Advertisement
JTSEC1333

Anonymous JTSEC #OpSudan Full Recon #90

Jun 14th, 2019
573
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 85.72 KB | None | 0 0
  1. #######################################################################################################################################
  2. =======================================================================================================================================
  3. Hostname ombudsman.gov.sd ISP NICDC
  4. Continent Africa Flag
  5. SD
  6. Country Sudan Country Code SD
  7. Region Unknown Local time 15 Jun 2019 01:28 CAT
  8. City Unknown Postal Code Unknown
  9. IP Address 62.12.105.3 Latitude 15
  10. Longitude 30
  11. =======================================================================================================================================
  12. #######################################################################################################################################
  13. > ombudsman.gov.sd
  14. Server: 185.93.180.131
  15. Address: 185.93.180.131#53
  16.  
  17. Non-authoritative answer:
  18. Name: ombudsman.gov.sd
  19. Address: 62.12.105.3
  20. >
  21. #######################################################################################################################################
  22. [+] Target : ombudsman.gov.sd
  23.  
  24. [+] IP Address : 62.12.105.3
  25.  
  26. [+] Headers :
  27.  
  28. [+] Cache-Control : private
  29. [+] Content-Type : text/html; charset=utf-8
  30. [+] Content-Encoding : gzip
  31. [+] Vary : Accept-Encoding
  32. [+] Server : Microsoft-IIS/8.5
  33. [+] Set-Cookie : ASP.NET_SessionId=m35c3mwldcx51illtkoz3a1z; path=/; HttpOnly, ASP.NET_SessionId=m35c3mwldcx51illtkoz3a1z; path=/; HttpOnly, __RequestVerificationToken=B6bQtxy8TuKscRN8AoBj9C2Mo8Dd09-97YW2vKjT21Jqs1JkyNJ4GaWSgd7mje4ni0xhHaCWpU_hXQHvd56RFnIPE6cZ1HXmAnKmhc4bwWU1; path=/; HttpOnly
  34. [+] X-AspNetMvc-Version : 5.2
  35. [+] X-Frame-Options : SAMEORIGIN
  36. [+] X-AspNet-Version : 4.0.30319
  37. [+] X-Powered-By : ASP.NET
  38. [+] X-Powered-By-Plesk : PleskWin
  39. [+] Date : Fri, 14 Jun 2019 23:32:49 GMT
  40. [+] Content-Length : 15099
  41.  
  42. [+] SSL Certificate Information :
  43.  
  44. [-] SSL is not Present on Target URL...Skipping...
  45.  
  46. [+] Whois Lookup :
  47.  
  48. [+] NIR : None
  49. [+] ASN Registry : afrinic
  50. [+] ASN : 327881
  51. [+] ASN CIDR : 62.12.105.0/24
  52. [+] ASN Country Code : SD
  53. [+] ASN Date : 2015-05-11
  54. [+] ASN Description : NICDC, SD
  55. [+] cidr : 62.12.105.0/24
  56. [+] name : ORG-MoTa1-AFRINIC
  57. [+] handle : IAEI1-AFRINIC
  58. [+] range : 62.12.105.0 - 62.12.105.255
  59. [+] description : National Information Center (NIC)
  60. [+] country : SD
  61. [+] state : None
  62. [+] city : None
  63. [+] address : National Information Center (NIC)
  64. [+] postal_code : None
  65. [+] emails : None
  66. [+] created : None
  67. [+] updated : None
  68.  
  69. [+] Crawling Target...
  70.  
  71. [+] Looking for robots.txt........[ Not Found ]
  72. [+] Looking for sitemap.xml.......[ Not Found ]
  73. [+] Extracting CSS Links..........[ 9 ]
  74. [+] Extracting Javascript Links...[ 11 ]
  75. [+] Extracting Internal Links.....[ 0 ]
  76. [+] Extracting External Links.....[ 5 ]
  77. [+] Extracting Images.............[ 11 ]
  78.  
  79. [+] Total Links Extracted : 36
  80.  
  81. [+] Dumping Links in /opt/FinalRecon/dumps/ombudsman.gov.sd.dump
  82. [+] Completed!
  83. #######################################################################################################################################
  84. [+] Starting At 2019-06-14 19:32:49.293363
  85. [+] Collecting Information On: ombudsman.gov.sd
  86. [#] Status: 200
  87. ---------------------------------------------------------------------------------------------------------------------------------------
  88. [#] Web Server Detected: Microsoft-IIS/8.5
  89. [#] X-Powered-By: ASP.NET
  90. - Cache-Control: private
  91. - Content-Type: text/html; charset=utf-8
  92. - Content-Encoding: gzip
  93. - Vary: Accept-Encoding
  94. - Server: Microsoft-IIS/8.5
  95. - Set-Cookie: ASP.NET_SessionId=mbqdsntfm2yalv3krsps4bfd; path=/; HttpOnly, ASP.NET_SessionId=mbqdsntfm2yalv3krsps4bfd; path=/; HttpOnly, __RequestVerificationToken=xXsHAGFBPMenM7f5KaF_y_uMHslurbG4K2_pwIwepkcRS-Hd1NhP1CXoN8qKUZgdcaDS2J4jRkw4WykI0e-JYhUHiTnTvkhL0KAIMXFOOOk1; path=/; HttpOnly
  96. - X-AspNetMvc-Version: 5.2
  97. - X-Frame-Options: SAMEORIGIN
  98. - X-AspNet-Version: 4.0.30319
  99. - X-Powered-By: ASP.NET
  100. - X-Powered-By-Plesk: PleskWin
  101. - Date: Fri, 14 Jun 2019 23:32:44 GMT
  102. - Content-Length: 15103
  103. ---------------------------------------------------------------------------------------------------------------------------------------
  104. [#] Finding Location..!
  105. [#] as: AS327881 National Information Center (NIC)
  106. [#] city: Khartoum
  107. [#] country: Sudan
  108. [#] countryCode: SD
  109. [#] isp: National Information Center
  110. [#] lat: 15.5007
  111. [#] lon: 32.5599
  112. [#] org: ORG MoTa1 AFRINIC
  113. [#] query: 62.12.105.3
  114. [#] region: KH
  115. [#] regionName: Khartoum
  116. [#] status: success
  117. [#] timezone: Africa/Khartoum
  118. [#] zip:
  119. ---------------------------------------------------------------------------------------------------------------------------------------
  120. [+] Detected WAF Presence in web application: ASP.NET Generic Web Application Protection
  121. ---------------------------------------------------------------------------------------------------------------------------------------
  122. [#] Starting Reverse DNS-
  123. [!] Found 4 any Domain
  124. - moiat.gov.sd
  125. - ombudsman.gov.sd
  126. - trafficpolice.gov.sd
  127. - whitenilestate.gov.sd
  128. ---------------------------------------------------------------------------------------------------------------------------------------
  129. [!] Scanning Open Port
  130. [#] 21/tcp open ftp
  131. [#] 80/tcp open http
  132. [#] 110/tcp open pop3
  133. [#] 143/tcp open imap
  134. [#] 443/tcp open https
  135. [#] 8443/tcp open https-alt
  136. ---------------------------------------------------------------------------------------------------------------------------------------
  137. [+] Collecting Information Disclosure!
  138. ######################################################################################################################################
  139. [i] Scanning Site: http://ombudsman.gov.sd
  140.  
  141.  
  142.  
  143. B A S I C I N F O
  144. ====================
  145.  
  146.  
  147. [+] Site Title: ديوان المظالم و الحسبة-الرئيسية
  148. [+] IP address: 62.12.105.3
  149. [+] Web Server: Microsoft-IIS/8.5
  150. [+] CMS: Could Not Detect
  151. [+] Cloudflare: Not Detected
  152. [+] Robots File: Could NOT Find robots.txt!
  153. #######################################################################################################################################
  154.  
  155.  
  156.  
  157.  
  158.  
  159. G E O I P L O O K U P
  160. =========================
  161.  
  162. [i] IP Address: 62.12.105.3
  163. [i] Country: Sudan
  164. [i] State:
  165. [i] City:
  166. [i] Latitude: 15.0
  167. [i] Longitude: 30.0
  168. #######################################################################################################################################
  169.  
  170.  
  171.  
  172. H T T P H E A D E R S
  173. =======================
  174.  
  175.  
  176. [i] HTTP/1.1 200 OK
  177. [i] Cache-Control: private
  178. [i] Content-Type: text/html; charset=utf-8
  179. [i] Server: Microsoft-IIS/8.5
  180. [i] Set-Cookie: ASP.NET_SessionId=pxywivvzjgeks25aibykfyfz; path=/; HttpOnly
  181. [i] X-AspNetMvc-Version: 5.2
  182. [i] X-Frame-Options: SAMEORIGIN
  183. [i] X-AspNet-Version: 4.0.30319
  184. [i] Set-Cookie: ASP.NET_SessionId=pxywivvzjgeks25aibykfyfz; path=/; HttpOnly
  185. [i] Set-Cookie: __RequestVerificationToken=iUe4A3LVzXh36CYebc4ZGJk6sxmPt34hjz7ct6shi2LmJbD9oWuISPHPSw5J0E0CZp84GxHefBYrOqtrT-izISkeyx9JWfIuMdH-2QnDHrQ1; path=/; HttpOnly
  186. [i] X-Powered-By: ASP.NET
  187. [i] X-Powered-By-Plesk: PleskWin
  188. [i] Date: Fri, 14 Jun 2019 23:32:36 GMT
  189. [i] Connection: close
  190. [i] Content-Length: 56574
  191. #######################################################################################################################################
  192.  
  193.  
  194.  
  195. D N S L O O K U P
  196. ===================
  197.  
  198. ombudsman.gov.sd. 21599 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2018071900 10800 900 604800 86400
  199. ombudsman.gov.sd. 21599 IN NS ns0.ndc.gov.sd.
  200. ombudsman.gov.sd. 21599 IN NS ns1.ndc.gov.sd.
  201. ombudsman.gov.sd. 21599 IN A 62.12.105.3
  202. ombudsman.gov.sd. 21599 IN MX 10 mail.obudsman.gov.sd.
  203. ombudsman.gov.sd. 21599 IN TXT "v=spf1 mx -all"
  204. #######################################################################################################################################
  205.  
  206.  
  207.  
  208. S U B N E T C A L C U L A T I O N
  209. ====================================
  210.  
  211. Address = 62.12.105.3
  212. Network = 62.12.105.3 / 32
  213. Netmask = 255.255.255.255
  214. Broadcast = not needed on Point-to-Point links
  215. Wildcard Mask = 0.0.0.0
  216. Hosts Bits = 0
  217. Max. Hosts = 1 (2^0 - 0)
  218. Host Range = { 62.12.105.3 - 62.12.105.3 }
  219. #######################################################################################################################################
  220.  
  221.  
  222. N M A P P O R T S C A N
  223. ============================
  224.  
  225. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 23:32 UTC
  226. Nmap scan report for ombudsman.gov.sd (62.12.105.3)
  227. Host is up (0.20s latency).
  228. rDNS record for 62.12.105.3: f03-web01.nic.gov.sd
  229.  
  230. PORT STATE SERVICE
  231. 21/tcp open ftp
  232. 22/tcp filtered ssh
  233. 23/tcp filtered telnet
  234. 80/tcp open http
  235. 110/tcp open pop3
  236. 143/tcp open imap
  237. 443/tcp open https
  238. 3389/tcp filtered ms-wbt-server
  239.  
  240. Nmap done: 1 IP address (1 host up) scanned in 3.37 seconds
  241. #######################################################################################################################################
  242. Enter Address Website = ombudsman.gov.sd
  243.  
  244.  
  245.  
  246. Reversing IP With HackTarget 'ombudsman.gov.sd'
  247. --------------------------------------------------
  248.  
  249. [+] eservices.motrb.gov.sd
  250. [+] mail.nashattolabi.sd
  251. [+] mail.saec.gov.sd
  252. [+] mail.test.net.sd
  253. [+] moiat.gov.sd
  254. [+] ncsp.gov.sd
  255. [+] penfund.gov.sd
  256. [+] saec.gov.sd
  257. [+] sudanpolice.gov.sd
  258. [+] test.net.sd
  259. [+] whitenilestate.gov.sd
  260. [+] www.sudanpolice.gov.sd
  261. #######################################################################################################################################
  262.  
  263.  
  264. Reverse IP With YouGetSignal 'ombudsman.gov.sd'
  265. --------------------------------------------------
  266.  
  267. [*] IP: 62.12.105.3
  268. [*] Domain: ombudsman.gov.sd
  269. [*] Total Domains: 4
  270.  
  271. [+] moiat.gov.sd
  272. [+] ombudsman.gov.sd
  273. [+] trafficpolice.gov.sd
  274. [+] whitenilestate.gov.sd
  275. #######################################################################################################################################
  276.  
  277.  
  278. Geo IP Lookup 'ombudsman.gov.sd'
  279. -----------------------------------
  280.  
  281. [+] IP Address: 62.12.105.3
  282. [+] Country: Sudan
  283. [+] State:
  284. [+] City:
  285. [+] Latitude: 15.0
  286. [+] Longitude: 30.0
  287. #######################################################################################################################################
  288.  
  289.  
  290.  
  291. Bypass Cloudflare 'ombudsman.gov.sd'
  292. ---------------------------------------
  293.  
  294. [!] CloudFlare Bypass 62.12.105.3 | webmail.ombudsman.gov.sd
  295. [!] CloudFlare Bypass 62.12.105.3 | mail.ombudsman.gov.sd
  296. [!] CloudFlare Bypass 62.12.105.3 | www.ombudsman.gov.sd
  297. #######################################################################################################################################
  298.  
  299. DNS Lookup 'ombudsman.gov.sd'
  300. --------------------------------
  301.  
  302. [+] ombudsman.gov.sd. 21599 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2018071900 10800 900 604800 86400
  303. [+] ombudsman.gov.sd. 21599 IN NS ns1.ndc.gov.sd.
  304. [+] ombudsman.gov.sd. 21599 IN NS ns0.ndc.gov.sd.
  305. [+] ombudsman.gov.sd. 21599 IN A 62.12.105.3
  306. [+] ombudsman.gov.sd. 21599 IN MX 10 mail.obudsman.gov.sd.
  307. [+] ombudsman.gov.sd. 21599 IN TXT "v=spf1 mx -all"
  308. #######################################################################################################################################
  309.  
  310. Show HTTP Header 'ombudsman.gov.sd'
  311. --------------------------------------
  312.  
  313. [+] HTTP/1.1 302 Found
  314. [+] Cache-Control: private
  315. [+] Content-Length: 144
  316. [+] Content-Type: text/html; charset=utf-8
  317. [+] Location: /Home/Index?aspxerrorpath=/
  318. [+] Server: Microsoft-IIS/8.5
  319. [+] X-AspNetMvc-Version: 5.2
  320. [+] X-AspNet-Version: 4.0.30319
  321. [+] X-Powered-By: ASP.NET
  322. [+] X-Powered-By-Plesk: PleskWin
  323. [+] Date: Fri, 14 Jun 2019 23:32:43 GMT
  324. #######################################################################################################################################
  325.  
  326. Port Scan 'ombudsman.gov.sd'
  327. -------------------------------
  328.  
  329. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 23:32 UTC
  330. Nmap scan report for ombudsman.gov.sd (62.12.105.3)
  331. Host is up (0.20s latency).
  332. rDNS record for 62.12.105.3: f03-web01.nic.gov.sd
  333.  
  334. PORT STATE SERVICE
  335. 21/tcp open ftp
  336. 22/tcp filtered ssh
  337. 23/tcp filtered telnet
  338. 80/tcp open http
  339. 110/tcp open pop3
  340. 143/tcp open imap
  341. 443/tcp open https
  342. 3389/tcp filtered ms-wbt-server
  343.  
  344. Nmap done: 1 IP address (1 host up) scanned in 2.04 seconds
  345. #######################################################################################################################################
  346.  
  347. Traceroute 'ombudsman.gov.sd'
  348. --------------------------------
  349.  
  350. Start: 2019-06-14T23:32:56+0000
  351. HOST: web01 Loss% Snt Last Avg Best Wrst StDev
  352. 1.|-- 45.79.12.202 0.0% 3 1.0 0.9 0.8 1.0 0.1
  353. 2.|-- 45.79.12.6 0.0% 3 1.9 3.2 0.8 6.9 3.3
  354. 3.|-- dls-b22-link.telia.net 0.0% 3 0.9 1.5 0.9 2.8 1.1
  355. 4.|-- atl-b22-link.telia.net 0.0% 3 21.9 19.9 18.8 21.9 1.7
  356. 5.|-- ash-bb3-link.telia.net 0.0% 3 29.9 31.7 29.9 35.0 2.9
  357. 6.|-- prs-bb4-link.telia.net 33.3% 3 106.7 106.8 106.7 106.8 0.1
  358. 7.|-- mei-b2-link.telia.net 0.0% 3 117.3 117.2 117.2 117.3 0.1
  359. 8.|-- flagtelecom-ic-324599-mei-b2.c.telia.net 0.0% 3 136.4 124.0 117.6 136.4 10.8
  360. 9.|-- ae0.0.cjr01.mrs002.flagtel.com 0.0% 3 325.1 314.7 306.1 325.1 9.7
  361. 10.|-- ae3.0.cjr04.prs001.flagtel.com 0.0% 3 128.8 128.7 128.5 128.8 0.2
  362. 11.|-- xe-0-0-1.0.pjr04.dxb001.flagtel.com 0.0% 3 256.2 256.2 255.8 256.7 0.5
  363. 12.|-- 80.77.2.42 0.0% 3 231.4 231.3 231.3 231.4 0.0
  364. 13.|-- 196.29.177.113 0.0% 3 234.9 234.9 234.8 235.0 0.1
  365. 14.|-- 197.254.196.62 0.0% 3 238.4 238.5 238.3 238.8 0.2
  366. 15.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
  367. #######################################################################################################################################
  368.  
  369.  
  370. Page Admin Finder 'ombudsman.gov.sd'
  371. ---------------------------------------
  372.  
  373.  
  374.  
  375. Avilable Links :
  376.  
  377. Find Page >> http://ombudsman.gov.sd/admin/
  378.  
  379. Find Page >> http://ombudsman.gov.sd/administrator/
  380.  
  381. Find Page >> http://ombudsman.gov.sd/admin1/
  382.  
  383. Find Page >> http://ombudsman.gov.sd/admin2/
  384.  
  385. Find Page >> http://ombudsman.gov.sd/admin3/
  386.  
  387. Find Page >> http://ombudsman.gov.sd/admin4/
  388.  
  389. Find Page >> http://ombudsman.gov.sd/admin5/
  390.  
  391. Find Page >> http://ombudsman.gov.sd/usuarios/
  392.  
  393. Find Page >> http://ombudsman.gov.sd/usuario/
  394.  
  395. Find Page >> http://ombudsman.gov.sd/moderator/
  396.  
  397. Find Page >> http://ombudsman.gov.sd/webadmin/
  398.  
  399. Find Page >> http://ombudsman.gov.sd/adminarea/
  400.  
  401. Find Page >> http://ombudsman.gov.sd/bb-admin/
  402.  
  403. Find Page >> http://ombudsman.gov.sd/adminLogin/
  404.  
  405. Find Page >> http://ombudsman.gov.sd/admin_area/
  406.  
  407. Find Page >> http://ombudsman.gov.sd/panel-administracion/
  408.  
  409. Find Page >> http://ombudsman.gov.sd/instadmin/
  410.  
  411. Find Page >> http://ombudsman.gov.sd/memberadmin/
  412.  
  413. Find Page >> http://ombudsman.gov.sd/administratorlogin/
  414.  
  415. Find Page >> http://ombudsman.gov.sd/adm/
  416.  
  417. Find Page >> http://ombudsman.gov.sd/admin_panel/
  418.  
  419. Find Page >> http://ombudsman.gov.sd/adm_cp/
  420. #######################################################################################################################################
  421.  
  422. ----- ombudsman.gov.sd -----
  423.  
  424.  
  425. Host's addresses:
  426. __________________
  427.  
  428. ombudsman.gov.sd. 85483 IN A 62.12.105.3
  429.  
  430. ----------------
  431. Wildcards test:
  432. ----------------
  433. good
  434.  
  435.  
  436. Name Servers:
  437. ______________
  438.  
  439. ns0.ndc.gov.sd. 13823 IN A 62.12.109.2
  440. ns1.ndc.gov.sd. 13817 IN A 62.12.109.3
  441.  
  442.  
  443. Mail (MX) Servers:
  444. ___________________
  445.  
  446. mail.obudsman.gov.sd A record query failed: NXDOMAIN
  447.  
  448.  
  449. Trying Zone Transfers and getting Bind Versions:
  450. _________________________________________________
  451.  
  452.  
  453. Trying Zone Transfer for ombudsman.gov.sd on ns0.ndc.gov.sd ...
  454. ombudsman.gov.sd. 86400 IN SOA (
  455. ombudsman.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
  456. ombudsman.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
  457. ombudsman.gov.sd. 86400 IN A 62.12.105.3
  458. ombudsman.gov.sd. 86400 IN MX 10
  459. ombudsman.gov.sd. 86400 IN TXT "v=spf1
  460. mail.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  461. mail.ombudsman.gov.sd. 86400 IN MX 10
  462. mssql.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  463. webmail.ombudsman.gov.sd. 86400 IN CNAME mail.ombudsman.gov.sd.
  464. www.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  465.  
  466. Trying Zone Transfer for ombudsman.gov.sd on ns1.ndc.gov.sd ...
  467. ombudsman.gov.sd. 86400 IN SOA (
  468. ombudsman.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
  469. ombudsman.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
  470. ombudsman.gov.sd. 86400 IN A 62.12.105.3
  471. ombudsman.gov.sd. 86400 IN MX 10
  472. ombudsman.gov.sd. 86400 IN TXT "v=spf1
  473. mail.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  474. mail.ombudsman.gov.sd. 86400 IN MX 10
  475. mssql.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  476. webmail.ombudsman.gov.sd. 86400 IN CNAME mail.ombudsman.gov.sd.
  477. www.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  478. #######################################################################################################################################
  479. Trying "ombudsman.gov.sd"
  480. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53576
  481. ;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 0
  482.  
  483. ;; QUESTION SECTION:
  484. ;ombudsman.gov.sd. IN ANY
  485.  
  486. ;; ANSWER SECTION:
  487. ombudsman.gov.sd. 85363 IN NS ns0.ndc.gov.sd.
  488. ombudsman.gov.sd. 86281 IN MX 10 mail.obudsman.gov.sd.
  489. ombudsman.gov.sd. 85363 IN A 62.12.105.3
  490. ombudsman.gov.sd. 85363 IN NS ns1.ndc.gov.sd.
  491. ombudsman.gov.sd. 85720 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2018071900 10800 900 604800 86400
  492.  
  493. Received 161 bytes from 185.93.180.131#53 in 113 ms
  494. #######################################################################################################################################
  495. ; <<>> DiG 9.11.5-P4-5-Debian <<>> ombudsman.gov.sd +dnssec
  496. ;; global options: +cmd
  497. ;; Got answer:
  498. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38088
  499. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  500.  
  501. ;; OPT PSEUDOSECTION:
  502. ; EDNS: version: 0, flags: do; udp: 4096
  503. ;; QUESTION SECTION:
  504. ;ombudsman.gov.sd. IN A
  505.  
  506. ;; ANSWER SECTION:
  507. ombudsman.gov.sd. 85296 IN A 62.12.105.3
  508.  
  509. ;; Query time: 112 msec
  510. ;; SERVER: 185.93.180.131#53(185.93.180.131)
  511. ;; WHEN: ven jun 14 19:45:11 EDT 2019
  512. ;; MSG SIZE rcvd: 61
  513. #######################################################################################################################################
  514. ; <<>> DiG 9.11.5-P4-5-Debian <<>> +trace ombudsman.gov.sd
  515. ;; global options: +cmd
  516. . 79394 IN NS g.root-servers.net.
  517. . 79394 IN NS d.root-servers.net.
  518. . 79394 IN NS c.root-servers.net.
  519. . 79394 IN NS j.root-servers.net.
  520. . 79394 IN NS m.root-servers.net.
  521. . 79394 IN NS l.root-servers.net.
  522. . 79394 IN NS f.root-servers.net.
  523. . 79394 IN NS b.root-servers.net.
  524. . 79394 IN NS a.root-servers.net.
  525. . 79394 IN NS e.root-servers.net.
  526. . 79394 IN NS k.root-servers.net.
  527. . 79394 IN NS i.root-servers.net.
  528. . 79394 IN NS h.root-servers.net.
  529. . 79394 IN RRSIG NS 8 0 518400 20190627170000 20190614160000 25266 . 21CJJEpZ30ZdfNAfEpN6Y8fJ2PN6Y+xtLSWLqeZVbiS8faVrKFmC3zsL EPgetyceuwXArZtOZb8POQU9VOxf3Sr3E0O6X2zPykBd/QnD2mn9u8vh 03tfCQi9ir8M8cHrLEhCyoLCXYmlWHpYZFuxwBLSYk3lNGn6Cn+DAVWa 6JeoLUSX/AJvOIcfq3NfIbh7jrqB8HU1Go+EkmQXe/iMLx1i2C8p+Cgi xpa7LYwEL3x9N22nKpwyWhUAAFFOmIRhkw5b5ijOzVd2u3BBaAbbrnQ0 belHPmKsx+x9b1zjmdOSW8RjI7/GQv+QuobcDELc6D0iEjYeFXozuXiH ys1Qrg==
  530. ;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 112 ms
  531.  
  532. sd. 172800 IN NS sd.cctld.authdns.ripe.net.
  533. sd. 172800 IN NS ns1.uaenic.ae.
  534. sd. 172800 IN NS ns2.uaenic.ae.
  535. sd. 172800 IN NS ans1.sis.sd.
  536. sd. 172800 IN NS ans1.canar.sd.
  537. sd. 172800 IN NS ans2.canar.sd.
  538. sd. 172800 IN NS ns-sd.afrinic.net.
  539. sd. 86400 IN NSEC se. NS RRSIG NSEC
  540. sd. 86400 IN RRSIG NSEC 8 1 86400 20190627170000 20190614160000 25266 . MjKCNtsNQnEJVz5cPYtkXVbByrRTMlQ1myLs8Pi2+FkFic00RpnZnk5w Pg1lbNn4MQZdx9L090dGjNO3WyleHv1t7HznzWMJ8qCENSIcE1uoRe6r Ak9F/wMKEKvQjra906vPpUlLMG3QcnbyhkP/eoRm2qeN7Ig5/Zsx0J6M gE154HbBf0Lehuk+gd6T/pMkxDs4Idb7z0btkGbQtXo2rrj4jSfRpg1R U7xPKgKJfjqp9ns1z+7dxCE9GWRg9El3ssDyi2Nw4YbRs/qPDh/upUFN /4IY0aeTOsumRH/3FBZ7xs0BaVcNU9RG0YcmEXuNyCnvaPQOkdw315my dR7WMQ==
  541. ;; Received 703 bytes from 199.7.91.13#53(d.root-servers.net) in 190 ms
  542.  
  543. gov.sd. 14400 IN NS sd.cctld.authdns.ripe.net.
  544. gov.sd. 14400 IN NS ns1.uaenic.ae.
  545. gov.sd. 14400 IN NS ns2.uaenic.ae.
  546. gov.sd. 14400 IN NS ans1.sis.sd.
  547. gov.sd. 14400 IN NS ans1.canar.sd.
  548. gov.sd. 14400 IN NS ans2.canar.sd.
  549. gov.sd. 14400 IN NS ns-sd.afrinic.net.
  550. ;; Received 272 bytes from 196.216.168.26#53(ns-sd.afrinic.net) in 289 ms
  551.  
  552. ;; Received 73 bytes from 213.42.0.226#53(ns1.uaenic.ae) in 229 ms
  553. #######################################################################################################################################
  554. [*] Performing General Enumeration of Domain: ombudsman.gov.sd
  555. [-] DNSSEC is not configured for ombudsman.gov.sd
  556. [*] SOA ns0.ndc.gov.sd 62.12.109.2
  557. [*] NS ns0.ndc.gov.sd 62.12.109.2
  558. [*] Bind Version for 62.12.109.2 you guess!
  559. [*] NS ns1.ndc.gov.sd 62.12.109.3
  560. [*] Bind Version for 62.12.109.3 you guess!
  561. [*] A ombudsman.gov.sd 62.12.105.3
  562. [*] TXT ombudsman.gov.sd v=spf1 mx -all
  563. [*] Enumerating SRV Records
  564. [-] No SRV Records Found for ombudsman.gov.sd
  565. [+] 0 Records Found
  566. #######################################################################################################################################
  567. [*] Processing domain ombudsman.gov.sd
  568. [*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a', '192.168.0.1']
  569. [+] Getting nameservers
  570. 62.12.109.2 - ns0.ndc.gov.sd
  571. [+] Zone transfer sucessful using nameserver ns0.ndc.gov.sd
  572. ombudsman.gov.sd. 86400 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2018071900 10800 900 604800 86400
  573. ombudsman.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
  574. ombudsman.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
  575. ombudsman.gov.sd. 86400 IN A 62.12.105.3
  576. ombudsman.gov.sd. 86400 IN MX 10 mail.obudsman.gov.sd.
  577. ombudsman.gov.sd. 86400 IN TXT "v=spf1 mx -all"
  578. mail.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  579. mail.ombudsman.gov.sd. 86400 IN MX 10 mail.ombudsman.gov.sd.
  580. mssql.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  581. webmail.ombudsman.gov.sd. 86400 IN CNAME mail.ombudsman.gov.sd.
  582. www.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  583. #######################################################################################################################################
  584. Ip Address Status Type Domain Name Server
  585. ---------- ------ ---- ----------- ------
  586. 62.12.105.3 200 host mail.ombudsman.gov.sd Microsoft-IIS/8.5
  587. 62.12.105.3 200 host mssql.ombudsman.gov.sd Microsoft-IIS/8.5
  588. 62.12.105.3 302 alias webmail.ombudsman.gov.sd Microsoft-IIS/8.5
  589. 62.12.105.3 302 host mail.ombudsman.gov.sd Microsoft-IIS/8.5
  590. 62.12.105.3 302 host www.ombudsman.gov.sd Microsoft-IIS/8.5
  591. #######################################################################################################################################
  592.  
  593. [+] Testing domain
  594. www.ombudsman.gov.sd 62.12.105.3
  595. [+] Dns resolving
  596. Domain name Ip address Name server
  597. ombudsman.gov.sd 62.12.105.3 f03-web01.nic.gov.sd
  598. Found 1 host(s) for ombudsman.gov.sd
  599. [+] Testing wildcard
  600. Ok, no wildcard found.
  601.  
  602. [+] Scanning for subdomain on ombudsman.gov.sd
  603. [!] Wordlist not specified. I scannig with my internal wordlist...
  604. Estimated time about 223.69 seconds
  605.  
  606. Subdomain Ip address Name server
  607.  
  608. mail.ombudsman.gov.sd 62.12.105.3 f03-web01.nic.gov.sd
  609. mssql.ombudsman.gov.sd 62.12.105.3 f03-web01.nic.gov.sd
  610. webmail.ombudsman.gov.sd 62.12.105.3 f03-web01.nic.gov.sd
  611. www.ombudsman.gov.sd 62.12.105.3 f03-web01.nic.gov.sd
  612. #######################################################################################################################################
  613. WhatWeb report for http://ombudsman.gov.sd
  614. Status : 200 OK
  615. Title : ديوان المظالم و الحسبة-الرئيسية
  616. IP : <Unknown>
  617. Country : <Unknown>
  618.  
  619. Summary : Script, ASP_NET[4.0.30319][MVC5.2], Email[[email protected]], Microsoft-IIS[8.5], Modernizr[2.6.2-respond-1.1.0.min], JQuery[1.10.2,1.9.1,3.3.1], HTML5, Frame, X-Frame-Options[SAMEORIGIN], UncommonHeaders[x-aspnetmvc-version,x-powered-by-plesk], HttpOnly[ASP.NET_SessionId,__RequestVerificationToken], Cookies[ASP.NET_SessionId,__RequestVerificationToken], X-Powered-By[ASP.NET], HTTPServer[Microsoft-IIS/8.5]
  620.  
  621. Detected Plugins:
  622. [ ASP_NET ]
  623. ASP.NET is a free web framework that enables great Web
  624. applications. Used by millions of developers, it runs some
  625. of the biggest sites in the world.
  626.  
  627. Version : 4.0.30319 (from X-AspNet-Version HTTP header)
  628. String : MVC5.2
  629. Google Dorks: (2)
  630. Website : http://www.asp.net/
  631.  
  632. [ Cookies ]
  633. Display the names of cookies in the HTTP headers. The
  634. values are not returned to save on space.
  635.  
  636. String : __RequestVerificationToken
  637. String : ASP.NET_SessionId
  638.  
  639. [ Email ]
  640. Extract email addresses. Find valid email address and
  641. syntactically invalid email addresses from mailto: link
  642. tags. We match syntactically invalid links containing
  643. mailto: to catch anti-spam email addresses, eg. bob at
  644. gmail.com. This uses the simplified email regular
  645. expression from
  646. http://www.regular-expressions.info/email.html for valid
  647. email address matching.
  648.  
  649.  
  650. [ Frame ]
  651. This plugin detects instances of frame and iframe HTML
  652. elements.
  653.  
  654.  
  655. [ HTML5 ]
  656. HTML version 5, detected by the doctype declaration
  657.  
  658.  
  659. [ HTTPServer ]
  660. HTTP server header string. This plugin also attempts to
  661. identify the operating system from the server header.
  662.  
  663. String : Microsoft-IIS/8.5 (from server string)
  664.  
  665. [ HttpOnly ]
  666. If the HttpOnly flag is included in the HTTP set-cookie
  667. response header and the browser supports it then the cookie
  668. cannot be accessed through client side script - More Info:
  669. http://en.wikipedia.org/wiki/HTTP_cookie
  670.  
  671. String : ASP.NET_SessionId,__RequestVerificationToken
  672.  
  673. [ JQuery ]
  674. A fast, concise, JavaScript that simplifies how to traverse
  675. HTML documents, handle events, perform animations, and add
  676. AJAX.
  677.  
  678. Version : 1.10.2,1.9.1,3.3.1
  679. Website : http://jquery.com/
  680.  
  681. [ Microsoft-IIS ]
  682. Microsoft Internet Information Services (IIS) for Windows
  683. Server is a flexible, secure and easy-to-manage Web server
  684. for hosting anything on the Web. From media streaming to
  685. web application hosting, IIS's scalable and open
  686. architecture is ready to handle the most demanding tasks.
  687.  
  688. Version : 8.5
  689. Website : http://www.iis.net/
  690.  
  691. [ Modernizr ]
  692. Modernizr adds classes to the <html> element which allow
  693. you to target specific browser functionality in your
  694. stylesheet. You don't actually need to write any Javascript
  695. to use it. [JavaScript]
  696.  
  697. Version : 2.6.2-respond-1.1.0.min
  698. Website : http://www.modernizr.com/
  699.  
  700. [ Script ]
  701. This plugin detects instances of script HTML elements and
  702. returns the script language/type.
  703.  
  704.  
  705. [ UncommonHeaders ]
  706. Uncommon HTTP server headers. The blacklist includes all
  707. the standard headers and many non standard but common ones.
  708. Interesting but fairly common headers should have their own
  709. plugins, eg. x-powered-by, server and x-aspnet-version.
  710. Info about headers can be found at www.http-stats.com
  711.  
  712. String : x-aspnetmvc-version,x-powered-by-plesk (from headers)
  713.  
  714. [ X-Frame-Options ]
  715. This plugin retrieves the X-Frame-Options value from the
  716. HTTP header. - More Info:
  717. http://msdn.microsoft.com/en-us/library/cc288472%28VS.85%29.
  718. aspx
  719.  
  720. String : SAMEORIGIN
  721.  
  722. [ X-Powered-By ]
  723. X-Powered-By HTTP header
  724.  
  725. String : ASP.NET (from x-powered-by string)
  726.  
  727. HTTP Headers:
  728. HTTP/1.1 200 OK
  729. Cache-Control: private
  730. Content-Type: text/html; charset=utf-8
  731. Content-Encoding: gzip
  732. Vary: Accept-Encoding
  733. Server: Microsoft-IIS/8.5
  734. X-AspNetMvc-Version: 5.2
  735. X-Frame-Options: SAMEORIGIN
  736. X-AspNet-Version: 4.0.30319
  737. Set-Cookie: __RequestVerificationToken=kusRRJtmx-BG465A1DEM_PDys7rab1VIWkuXKojpTYjnE9B4zp3FTxflYxEO_xBRhqnycMg3fTfe0tBnVxkfMoO3o6vGIacGPKacpUKsDsM1; path=/; HttpOnly
  738. Set-Cookie: ASP.NET_SessionId=m415ntwpdyovqakg455nrsco; path=/; HttpOnly
  739. X-Powered-By: ASP.NET
  740. X-Powered-By-Plesk: PleskWin
  741. Date: Fri, 14 Jun 2019 23:55:03 GMT
  742. Connection: close
  743. Content-Length: 15100
  744. #######################################################################################################################################
  745. DNS Servers for ombudsman.gov.sd:
  746. ns0.ndc.gov.sd
  747. ns1.ndc.gov.sd
  748.  
  749. Trying zone transfer first...
  750. Testing ns0.ndc.gov.sd
  751.  
  752. Whoah, it worked - misconfigured DNS server found:
  753. ombudsman.gov.sd. 86400 IN SOA ( ns0.ndc.gov.sd. root.ndc.gov.sd.
  754. 2018071900 ;serial
  755. 10800 ;refresh
  756. 900 ;retry
  757. 604800 ;expire
  758. 86400 ;minimum
  759. )
  760. ombudsman.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
  761. ombudsman.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
  762. ombudsman.gov.sd. 86400 IN A 62.12.105.3
  763. ombudsman.gov.sd. 86400 IN MX 10 mail.obudsman.gov.sd.
  764. ombudsman.gov.sd. 86400 IN TXT "v=spf1 mx -all"
  765. mail.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  766. mail.ombudsman.gov.sd. 86400 IN MX 10 mail.ombudsman.gov.sd.
  767. mssql.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  768. webmail.ombudsman.gov.sd. 86400 IN CNAME mail.ombudsman.gov.sd.
  769. www.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  770.  
  771. There isn't much point continuing, you have everything.
  772. Have a nice day.
  773. Exiting...
  774. #######################################################################################################################################
  775. dnsenum VERSION:1.2.4
  776.  
  777. ----- ombudsman.gov.sd -----
  778.  
  779.  
  780. Host's addresses:
  781. __________________
  782.  
  783. ombudsman.gov.sd. 84037 IN A 62.12.105.3
  784.  
  785.  
  786. Name Servers:
  787. ______________
  788.  
  789. ns0.ndc.gov.sd. 12377 IN A 62.12.109.2
  790. ns1.ndc.gov.sd. 12371 IN A 62.12.109.3
  791.  
  792.  
  793. Mail (MX) Servers:
  794. ___________________
  795.  
  796.  
  797.  
  798. Trying Zone Transfers and getting Bind Versions:
  799. _________________________________________________
  800.  
  801.  
  802. Trying Zone Transfer for ombudsman.gov.sd on ns0.ndc.gov.sd ...
  803. ombudsman.gov.sd. 86400 IN SOA (
  804. ombudsman.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
  805. ombudsman.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
  806. ombudsman.gov.sd. 86400 IN A 62.12.105.3
  807. ombudsman.gov.sd. 86400 IN MX 10
  808. ombudsman.gov.sd. 86400 IN TXT "v=spf1
  809. mail.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  810. mail.ombudsman.gov.sd. 86400 IN MX 10
  811. mssql.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  812. webmail.ombudsman.gov.sd. 86400 IN CNAME mail.ombudsman.gov.sd.
  813. www.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  814.  
  815. Trying Zone Transfer for ombudsman.gov.sd on ns1.ndc.gov.sd ...
  816. ombudsman.gov.sd. 86400 IN SOA (
  817. ombudsman.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
  818. ombudsman.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
  819. ombudsman.gov.sd. 86400 IN A 62.12.105.3
  820. ombudsman.gov.sd. 86400 IN MX 10
  821. ombudsman.gov.sd. 86400 IN TXT "v=spf1
  822. mail.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  823. mail.ombudsman.gov.sd. 86400 IN MX 10
  824. mssql.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  825. webmail.ombudsman.gov.sd. 86400 IN CNAME mail.ombudsman.gov.sd.
  826. www.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  827.  
  828. brute force file not specified, bay.
  829. #######################################################################################################################################
  830. [-] Enumerating subdomains now for ombudsman.gov.sd
  831. [-] verbosity is enabled, will show the subdomains results in realtime
  832. [-] Searching now in Baidu..
  833. [-] Searching now in Yahoo..
  834. [-] Searching now in Google..
  835. [-] Searching now in Bing..
  836. [-] Searching now in Ask..
  837. [-] Searching now in Netcraft..
  838. [-] Searching now in DNSdumpster..
  839. [-] Searching now in Virustotal..
  840. [-] Searching now in ThreatCrowd..
  841. [-] Searching now in SSL Certificates..
  842. [-] Searching now in PassiveDNS..
  843. Yahoo: www.ombudsman.gov.sd
  844. [-] Saving results to file: /usr/share/sniper/loot//domains/domains-ombudsman.gov.sd.txt
  845. [-] Total Unique Subdomains Found: 1
  846. www.ombudsman.gov.sd
  847. #######################################################################################################################################
  848. ===============================================
  849. -=Subfinder v1.1.3 github.com/subfinder/subfinder
  850. ===============================================
  851.  
  852.  
  853. Running Source: Ask
  854. Running Source: Archive.is
  855. Running Source: Baidu
  856. Running Source: Bing
  857. Running Source: CertDB
  858. Running Source: CertificateTransparency
  859. Running Source: Certspotter
  860. Running Source: Commoncrawl
  861. Running Source: Crt.sh
  862. Running Source: Dnsdb
  863. Running Source: DNSDumpster
  864. Running Source: DNSTable
  865. Running Source: Dogpile
  866. Running Source: Exalead
  867. Running Source: Findsubdomains
  868. Running Source: Googleter
  869. Running Source: Hackertarget
  870. Running Source: Ipv4Info
  871. Running Source: PTRArchive
  872. Running Source: Sitedossier
  873. Running Source: Threatcrowd
  874. Running Source: ThreatMiner
  875. Running Source: WaybackArchive
  876. Running Source: Yahoo
  877.  
  878. Running enumeration on ombudsman.gov.sd
  879.  
  880. dnsdb: Unexpected return status 503
  881.  
  882. waybackarchive: parse http://web.archive.org/cdx/search/cdx?url=*.ombudsman.gov.sd/*&output=json&fl=original&collapse=urlkey&page=: net/url: invalid control character in URL
  883.  
  884. dogpile: Get https://www.dogpile.com/search/web?q=ombudsman.gov.sd&qsi=1: EOF
  885.  
  886. ipv4info: <nil>
  887.  
  888.  
  889. Starting Bruteforcing of ombudsman.gov.sd with 9985 words
  890.  
  891. Total 6 Unique subdomains found for ombudsman.gov.sd
  892.  
  893. .ombudsman.gov.sd
  894. mail.ombudsman.gov.sd
  895. mssql.ombudsman.gov.sd
  896. webmail.ombudsman.gov.sd
  897. www.ombudsman.gov.sd
  898. www.ombudsman.gov.sd
  899. #######################################################################################################################################
  900. [*] Processing domain ombudsman.gov.sd
  901. [*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a', '192.168.0.1']
  902. [+] Getting nameservers
  903. 62.12.109.2 - ns0.ndc.gov.sd
  904. [+] Zone transfer sucessful using nameserver ns0.ndc.gov.sd
  905. ombudsman.gov.sd. 86400 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2018071900 10800 900 604800 86400
  906. ombudsman.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
  907. ombudsman.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
  908. ombudsman.gov.sd. 86400 IN A 62.12.105.3
  909. ombudsman.gov.sd. 86400 IN MX 10 mail.obudsman.gov.sd.
  910. ombudsman.gov.sd. 86400 IN TXT "v=spf1 mx -all"
  911. mail.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  912. mail.ombudsman.gov.sd. 86400 IN MX 10 mail.ombudsman.gov.sd.
  913. mssql.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  914. webmail.ombudsman.gov.sd. 86400 IN CNAME mail.ombudsman.gov.sd.
  915. www.ombudsman.gov.sd. 86400 IN A 62.12.105.3
  916. #######################################################################################################################################
  917. [*] Found SPF record:
  918. [*] v=spf1 mx -all
  919. [*] SPF record contains an All item: -all
  920. [*] No DMARC record found. Looking for organizational record
  921. [+] No organizational DMARC record
  922. [+] Spoofing possible for ombudsman.gov.sd!
  923. #######################################################################################################################################
  924. dig: '.ombudsman.gov.sd' is not a legal name (empty label)
  925.  
  926. SubOver v.1.2 Nizamul Rana (@Ice3man)
  927. ==================================================
  928.  
  929.  
  930. [~] Enjoy your hunt !
  931. [Not Vulnerable] .ombudsman.gov.sd
  932. [Not Vulnerable] 77.72.0.146
  933. [Not Vulnerable] 147.237.77.18
  934. [Not Vulnerable] 52.64.99.208
  935. [Not Vulnerable] IN
  936. [Not Vulnerable] domain
  937. [Not Vulnerable] 62.12.105.3
  938. [Not Vulnerable] mail.ombudsman.gov.sd
  939. [Not Vulnerable] www.cbs.gov.ws
  940. [Not Vulnerable] www.sviva.gov.il
  941. [Not Vulnerable] ombudsman.gov.sd
  942. [Not Vulnerable] www.ombudsman.gov.sd
  943. [Not Vulnerable] webmail.ombudsman.gov.sd
  944. [Not Vulnerable] mssql.ombudsman.gov.sd
  945. #######################################################################################################################################
  946. 62.12.96.0/20
  947. 62.12.96.0/24
  948. 62.12.97.0/24
  949. 62.12.98.0/24
  950. 62.12.99.0/24
  951. 62.12.100.0/24
  952. 62.12.101.0/24
  953. 62.12.102.0/23
  954. 62.12.104.0/24
  955. 62.12.105.0/24
  956. 62.12.106.0/24
  957. 62.12.107.0/24
  958. 62.12.108.0/24
  959. 62.12.109.0/24
  960. 62.12.110.0/24
  961. 62.12.111.0/24
  962. #######################################################################################################################################
  963. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 20:09 EDT
  964. Nmap scan report for ombudsman.gov.sd (62.12.105.3)
  965. Host is up (0.23s latency).
  966. rDNS record for 62.12.105.3: f03-web01.nic.gov.sd
  967. Not shown: 464 filtered ports, 6 closed ports
  968. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  969. PORT STATE SERVICE
  970. 21/tcp open ftp
  971. 80/tcp open http
  972. 110/tcp open pop3
  973. 143/tcp open imap
  974. 443/tcp open https
  975. 8443/tcp open https-alt
  976.  
  977. Nmap done: 1 IP address (1 host up) scanned in 6.71 seconds
  978. #######################################################################################################################################
  979. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 20:09 EDT
  980. Nmap scan report for ombudsman.gov.sd (62.12.105.3)
  981. Host is up (0.11s latency).
  982. rDNS record for 62.12.105.3: f03-web01.nic.gov.sd
  983. Not shown: 2 filtered ports
  984. PORT STATE SERVICE
  985. 53/udp open|filtered domain
  986. 67/udp open|filtered dhcps
  987. 68/udp open|filtered dhcpc
  988. 69/udp open|filtered tftp
  989. 88/udp open|filtered kerberos-sec
  990. 123/udp open|filtered ntp
  991. 139/udp open|filtered netbios-ssn
  992. 161/udp open|filtered snmp
  993. 162/udp open|filtered snmptrap
  994. 389/udp open|filtered ldap
  995. 520/udp open|filtered route
  996. 2049/udp open|filtered nfs
  997.  
  998. Nmap done: 1 IP address (1 host up) scanned in 3.13 seconds
  999. #######################################################################################################################################
  1000. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 20:09 EDT
  1001. Nmap scan report for ombudsman.gov.sd (62.12.105.3)
  1002. Host is up (0.25s latency).
  1003. rDNS record for 62.12.105.3: f03-web01.nic.gov.sd
  1004.  
  1005. PORT STATE SERVICE VERSION
  1006. 21/tcp open ftp Microsoft ftpd
  1007. | ftp-brute:
  1008. | Accounts: No valid accounts found
  1009. |_ Statistics: Performed 3083 guesses in 180 seconds, average tps: 16.8
  1010. | ftp-syst:
  1011. |_ SYST: Windows_NT
  1012. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1013. Device type: phone
  1014. Running: Nokia Symbian OS
  1015. OS CPE: cpe:/o:nokia:symbian_os
  1016. OS details: Nokia E70 or N86 mobile phone (Symbian OS)
  1017. Network Distance: 14 hops
  1018. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  1019.  
  1020. TRACEROUTE (using port 21/tcp)
  1021. HOP RTT ADDRESS
  1022. 1 114.81 ms 10.249.200.1
  1023. 2 115.15 ms vlan500.as03.bru1.be.m247.com (185.210.217.49)
  1024. 3 106.78 ms vlan299.agg1.bru1.be.m247.com (176.10.82.60)
  1025. 4 117.57 ms vlan2901.bb1.bru1.be.m247.com (176.10.82.30)
  1026. 5 120.43 ms te-7-7-0.bb1.lon1.uk.m247.com (176.10.83.147)
  1027. 6 116.20 ms 80.77.2.193
  1028. 7 307.59 ms xe-8-1-3.0.pjr03.ldn001.flagtel.com (85.95.26.242)
  1029. 8 126.01 ms xe-8-2-0.0.cjr04.prs001.flagtel.com (85.95.27.234)
  1030. 9 280.22 ms xe-0-0-1.0.pjr04.dxb001.flagtel.com (85.95.25.94)
  1031. 10 326.88 ms 80.77.2.42
  1032. 11 237.46 ms 196.29.177.113
  1033. 12 250.42 ms 197.254.196.62
  1034. 13 ...
  1035. 14 251.79 ms f03-web01.nic.gov.sd (62.12.105.3)
  1036. #######################################################################################################################################
  1037.  
  1038. wig - WebApp Information Gatherer
  1039.  
  1040.  
  1041. Scanning http://ombudsman.gov.sd...
  1042. _________________________ SITE INFO _________________________
  1043. IP Title
  1044. 62.12.105.3 ديوان المظالم و الحسبة-الرئيسية
  1045.  
  1046. __________________________ VERSION __________________________
  1047. Name Versions Type
  1048. ASP.NET 4.0.30319 Platform
  1049. IIS 8.5 Platform
  1050. jQuery 1.10.2 | 3.3.1 JavaScript
  1051. Microsoft Windows Server 2012 R2 OS
  1052.  
  1053. _____________________________________________________________
  1054. Time: 229.8 sec Urls: 629 Fingerprints: 40401
  1055. #######################################################################################################################################
  1056. HTTP/1.1 302 Found
  1057. Cache-Control: private
  1058. Content-Length: 144
  1059. Content-Type: text/html; charset=utf-8
  1060. Location: /Home/Index?aspxerrorpath=/
  1061. Server: Microsoft-IIS/8.5
  1062. X-AspNetMvc-Version: 5.2
  1063. X-AspNet-Version: 4.0.30319
  1064. X-Powered-By: ASP.NET
  1065. X-Powered-By-Plesk: PleskWin
  1066. Date: Sat, 15 Jun 2019 00:17:35 GMT
  1067.  
  1068. HTTP/1.1 302 Found
  1069. Cache-Control: private
  1070. Content-Length: 144
  1071. Content-Type: text/html; charset=utf-8
  1072. Location: /Home/Index?aspxerrorpath=/
  1073. Server: Microsoft-IIS/8.5
  1074. X-AspNetMvc-Version: 5.2
  1075. X-AspNet-Version: 4.0.30319
  1076. X-Powered-By: ASP.NET
  1077. X-Powered-By-Plesk: PleskWin
  1078. Date: Sat, 15 Jun 2019 00:17:35 GMT
  1079.  
  1080. HTTP/1.1 500 Internal Server Error
  1081. Cache-Control: private
  1082. Content-Length: 1763
  1083. Content-Type: text/html; charset=utf-8
  1084. Server: Microsoft-IIS/8.5
  1085. X-AspNet-Version: 4.0.30319
  1086. X-Powered-By: ASP.NET
  1087. X-Powered-By-Plesk: PleskWin
  1088. Date: Sat, 15 Jun 2019 00:17:35 GMT
  1089.  
  1090. Allow: OPTIONS, TRACE, GET, HEAD, POST
  1091. #######################################################################################################################################
  1092. Bootstrap
  1093. Font Awesome
  1094. jQuery 3.3.1
  1095. Plesk
  1096. IIS 8.5
  1097. Modernizr
  1098. Microsoft ASP.NET 4.0.30319
  1099. Microsoft ASP.NET
  1100. X-AspNetMvc-Version: 5.2
  1101. #######################################################################################################################################
  1102. tee: /usr/share/sniper/loot//output/nmap-ombudsman.gov.sd-port110.txt: Aucun fichier ou dossier de ce type
  1103. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 20:18 EDT
  1104. Nmap scan report for ombudsman.gov.sd (62.12.105.3)
  1105. Host is up (0.25s latency).
  1106. rDNS record for 62.12.105.3: f03-web01.nic.gov.sd
  1107.  
  1108. PORT STATE SERVICE VERSION
  1109. 110/tcp open pop3 MailEnable POP3 Server
  1110. | pop3-brute:
  1111. | Accounts: No valid accounts found
  1112. | Statistics: Performed 95 guesses in 7 seconds, average tps: 13.6
  1113. |_ ERROR: Failed to make a pop-connection.
  1114. |_pop3-capabilities: USER UIDL TOP
  1115. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1116. Device type: phone
  1117. Running: Nokia Symbian OS
  1118. OS CPE: cpe:/o:nokia:symbian_os
  1119. OS details: Nokia E70 or N86 mobile phone (Symbian OS)
  1120. Network Distance: 14 hops
  1121. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  1122.  
  1123. TRACEROUTE (using port 443/tcp)
  1124. HOP RTT ADDRESS
  1125. 1 108.18 ms 10.249.200.1
  1126. 2 108.41 ms vlan500.as03.bru1.be.m247.com (185.210.217.49)
  1127. 3 108.24 ms vlan299.agg1.bru1.be.m247.com (176.10.82.60)
  1128. 4 119.27 ms vlan2901.bb1.bru1.be.m247.com (176.10.82.30)
  1129. 5 114.07 ms te-7-7-0.bb1.lon1.uk.m247.com (176.10.83.147)
  1130. 6 120.70 ms 80.77.2.193
  1131. 7 286.18 ms xe-9-0-1.0.pjr04.ldn001.flagtel.com (85.95.27.193)
  1132. 8 134.34 ms xe-8-2-1.0.cjr04.prs001.flagtel.com (85.95.25.170)
  1133. 9 280.76 ms xe-0-0-1.0.pjr04.dxb001.flagtel.com (85.95.25.94)
  1134. 10 328.52 ms 80.77.2.42
  1135. 11 234.29 ms 196.29.177.113
  1136. 12 244.41 ms 197.254.196.62
  1137. 13 ...
  1138. 14 245.35 ms f03-web01.nic.gov.sd (62.12.105.3)
  1139. #######################################################################################################################################
  1140. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 19:47 EDT
  1141. Nmap scan report for f03-web01.nic.gov.sd (62.12.105.3)
  1142. Host is up (0.22s latency).
  1143. Not shown: 464 filtered ports, 6 closed ports
  1144. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  1145. PORT STATE SERVICE
  1146. 21/tcp open ftp
  1147. 80/tcp open http
  1148. 110/tcp open pop3
  1149. 143/tcp open imap
  1150. 443/tcp open https
  1151. 8443/tcp open https-alt
  1152.  
  1153. Nmap done: 1 IP address (1 host up) scanned in 6.80 seconds
  1154. #######################################################################################################################################
  1155. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 19:47 EDT
  1156. Nmap scan report for f03-web01.nic.gov.sd (62.12.105.3)
  1157. Host is up (0.11s latency).
  1158. Not shown: 2 filtered ports
  1159. PORT STATE SERVICE
  1160. 53/udp open|filtered domain
  1161. 67/udp open|filtered dhcps
  1162. 68/udp open|filtered dhcpc
  1163. 69/udp open|filtered tftp
  1164. 88/udp open|filtered kerberos-sec
  1165. 123/udp open|filtered ntp
  1166. 139/udp open|filtered netbios-ssn
  1167. 161/udp open|filtered snmp
  1168. 162/udp open|filtered snmptrap
  1169. 389/udp open|filtered ldap
  1170. 520/udp open|filtered route
  1171. 2049/udp open|filtered nfs
  1172.  
  1173. Nmap done: 1 IP address (1 host up) scanned in 2.15 seconds
  1174. #######################################################################################################################################
  1175. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 19:47 EDT
  1176. Nmap scan report for f03-web01.nic.gov.sd (62.12.105.3)
  1177. Host is up (0.25s latency).
  1178.  
  1179. PORT STATE SERVICE VERSION
  1180. 21/tcp open ftp Microsoft ftpd
  1181. | ftp-brute:
  1182. | Accounts: No valid accounts found
  1183. |_ Statistics: Performed 3086 guesses in 180 seconds, average tps: 16.8
  1184. | ftp-syst:
  1185. |_ SYST: Windows_NT
  1186. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1187. Device type: phone
  1188. Running: Nokia Symbian OS
  1189. OS CPE: cpe:/o:nokia:symbian_os
  1190. OS details: Nokia E70 or N86 mobile phone (Symbian OS)
  1191. Network Distance: 14 hops
  1192. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  1193.  
  1194. TRACEROUTE (using port 21/tcp)
  1195. HOP RTT ADDRESS
  1196. 1 108.27 ms 10.249.200.1
  1197. 2 108.32 ms vlan500.as03.bru1.be.m247.com (185.210.217.49)
  1198. 3 108.30 ms vlan299.agg1.bru1.be.m247.com (176.10.82.60)
  1199. 4 124.41 ms vlan2901.bb1.bru1.be.m247.com (176.10.82.30)
  1200. 5 114.62 ms te-7-7-0.bb1.lon1.uk.m247.com (176.10.83.147)
  1201. 6 117.47 ms 80.77.2.193
  1202. 7 303.91 ms xe-8-1-3.0.pjr03.ldn001.flagtel.com (85.95.26.242)
  1203. 8 127.46 ms xe-8-2-0.0.cjr04.prs001.flagtel.com (85.95.27.234)
  1204. 9 280.65 ms xe-0-0-1.0.pjr04.dxb001.flagtel.com (85.95.25.94)
  1205. 10 328.06 ms 80.77.2.42
  1206. 11 234.33 ms 196.29.177.113
  1207. 12 244.30 ms 197.254.196.62
  1208. 13 ...
  1209. 14 245.07 ms f03-web01.nic.gov.sd (62.12.105.3)
  1210. #######################################################################################################################################
  1211. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 19:51 EDT
  1212. Nmap scan report for f03-web01.nic.gov.sd (62.12.105.3)
  1213. Host is up.
  1214.  
  1215. PORT STATE SERVICE VERSION
  1216. 67/udp open|filtered dhcps
  1217. |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
  1218. Too many fingerprints match this host to give specific OS details
  1219.  
  1220. TRACEROUTE (using proto 1/icmp)
  1221. HOP RTT ADDRESS
  1222. 1 107.99 ms 10.249.200.1
  1223. 2 108.92 ms vlan500.as03.bru1.be.m247.com (185.210.217.49)
  1224. 3 108.04 ms vlan299.agg1.bru1.be.m247.com (176.10.82.60)
  1225. 4 115.01 ms vlan2901.bb1.bru1.be.m247.com (176.10.82.30)
  1226. 5 114.44 ms te-7-7-0.bb1.lon1.uk.m247.com (176.10.83.147)
  1227. 6 117.22 ms 80.77.2.193
  1228. 7 284.27 ms xe-9-0-1.0.pjr04.ldn001.flagtel.com (85.95.27.193)
  1229. 8 127.63 ms xe-8-2-0.0.cjr04.prs001.flagtel.com (85.95.27.234)
  1230. 9 281.29 ms xe-0-0-1.0.pjr04.dxb001.flagtel.com (85.95.25.94)
  1231. 10 351.01 ms 80.77.2.42
  1232. 11 235.72 ms 196.29.177.113
  1233. 12 245.18 ms 197.254.196.62
  1234. 13 ... 30
  1235. #######################################################################################################################################
  1236. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 19:53 EDT
  1237. Nmap scan report for f03-web01.nic.gov.sd (62.12.105.3)
  1238. Host is up.
  1239.  
  1240. PORT STATE SERVICE VERSION
  1241. 68/udp open|filtered dhcpc
  1242. Too many fingerprints match this host to give specific OS details
  1243.  
  1244. TRACEROUTE (using proto 1/icmp)
  1245. HOP RTT ADDRESS
  1246. 1 113.23 ms 10.249.200.1
  1247. 2 113.79 ms vlan500.as03.bru1.be.m247.com (185.210.217.49)
  1248. 3 113.82 ms vlan299.agg1.bru1.be.m247.com (176.10.82.60)
  1249. 4 116.20 ms vlan2901.bb1.bru1.be.m247.com (176.10.82.30)
  1250. 5 119.44 ms te-7-7-0.bb1.lon1.uk.m247.com (176.10.83.147)
  1251. 6 122.43 ms 80.77.2.193
  1252. 7 291.09 ms xe-9-0-1.0.pjr04.ldn001.flagtel.com (85.95.27.193)
  1253. 8 127.47 ms xe-8-2-0.0.cjr04.prs001.flagtel.com (85.95.27.234)
  1254. 9 279.87 ms xe-0-0-1.0.pjr04.dxb001.flagtel.com (85.95.25.94)
  1255. 10 327.09 ms 80.77.2.42
  1256. 11 244.13 ms 196.29.177.113
  1257. 12 253.82 ms 197.254.196.62
  1258. 13 ... 30
  1259. #######################################################################################################################################
  1260. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 19:55 EDT
  1261. Nmap scan report for f03-web01.nic.gov.sd (62.12.105.3)
  1262. Host is up.
  1263.  
  1264. PORT STATE SERVICE VERSION
  1265. 69/udp open|filtered tftp
  1266. Too many fingerprints match this host to give specific OS details
  1267.  
  1268. TRACEROUTE (using proto 1/icmp)
  1269. HOP RTT ADDRESS
  1270. 1 109.98 ms 10.249.200.1
  1271. 2 110.54 ms vlan500.as03.bru1.be.m247.com (185.210.217.49)
  1272. 3 110.06 ms vlan299.agg1.bru1.be.m247.com (176.10.82.60)
  1273. 4 110.09 ms vlan2901.bb1.bru1.be.m247.com (176.10.82.30)
  1274. 5 116.36 ms te-7-7-0.bb1.lon1.uk.m247.com (176.10.83.147)
  1275. 6 119.03 ms 80.77.2.193
  1276. 7 288.67 ms xe-9-0-1.0.pjr04.ldn001.flagtel.com (85.95.27.193)
  1277. 8 129.43 ms xe-8-2-0.0.cjr04.prs001.flagtel.com (85.95.27.234)
  1278. 9 282.66 ms xe-0-0-1.0.pjr04.dxb001.flagtel.com (85.95.25.94)
  1279. 10 330.12 ms 80.77.2.42
  1280. 11 235.57 ms 196.29.177.113
  1281. 12 245.06 ms 197.254.196.62
  1282. 13 ... 30
  1283. #######################################################################################################################################
  1284. wig - WebApp Information Gatherer
  1285.  
  1286.  
  1287. Scanning http://62.12.105.3...
  1288. ______________________ SITE INFO _______________________
  1289. IP Title
  1290. 62.12.105.3 Domain Default page
  1291.  
  1292. _______________________ VERSION ________________________
  1293. Name Versions Type
  1294. ASP.NET 4.0.30319 Platform
  1295. IIS 8.5 Platform
  1296. Microsoft Windows Server 2012 R2 OS
  1297.  
  1298. ________________________________________________________
  1299. Time: 36.8 sec Urls: 601 Fingerprints: 40401
  1300. #######################################################################################################################################
  1301. HTTP/1.1 200 OK
  1302. Content-Length: 3815
  1303. Content-Type: text/html
  1304. Last-Modified: Sun, 24 Apr 2016 21:37:41 GMT
  1305. Accept-Ranges: bytes
  1306. ETag: "f1eb6487719ed11:0"
  1307. Server: Microsoft-IIS/8.5
  1308. X-Powered-By: ASP.NET
  1309. Date: Fri, 14 Jun 2019 23:58:38 GMT
  1310.  
  1311. HTTP/1.1 200 OK
  1312. Content-Length: 3815
  1313. Content-Type: text/html
  1314. Last-Modified: Sun, 24 Apr 2016 21:37:41 GMT
  1315. Accept-Ranges: bytes
  1316. ETag: "f1eb6487719ed11:0"
  1317. Server: Microsoft-IIS/8.5
  1318. X-Powered-By: ASP.NET
  1319. Date: Fri, 14 Jun 2019 23:58:39 GMT
  1320.  
  1321. Allow: OPTIONS, TRACE, GET, HEAD, POST
  1322. #######################################################################################################################################
  1323. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 19:58 EDT
  1324. Nmap scan report for f03-web01.nic.gov.sd (62.12.105.3)
  1325. Host is up (0.25s latency).
  1326.  
  1327. PORT STATE SERVICE VERSION
  1328. 110/tcp open pop3 MailEnable POP3 Server
  1329. | pop3-brute:
  1330. | Accounts: No valid accounts found
  1331. | Statistics: Performed 85 guesses in 7 seconds, average tps: 12.1
  1332. |_ ERROR: Failed to make a pop-connection.
  1333. |_pop3-capabilities: TOP USER UIDL
  1334. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1335. Device type: phone
  1336. Running: Nokia Symbian OS
  1337. OS CPE: cpe:/o:nokia:symbian_os
  1338. OS details: Nokia E70 or N86 mobile phone (Symbian OS)
  1339. Network Distance: 14 hops
  1340. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  1341.  
  1342. TRACEROUTE (using port 443/tcp)
  1343. HOP RTT ADDRESS
  1344. 1 107.51 ms 10.249.200.1
  1345. 2 107.93 ms vlan500.as03.bru1.be.m247.com (185.210.217.49)
  1346. 3 107.65 ms vlan299.agg1.bru1.be.m247.com (176.10.82.60)
  1347. 4 117.95 ms vlan2901.bb1.bru1.be.m247.com (176.10.82.30)
  1348. 5 150.84 ms te-7-7-0.bb1.lon1.uk.m247.com (176.10.83.147)
  1349. 6 116.52 ms 80.77.2.193
  1350. 7 306.04 ms xe-8-1-3.0.pjr03.ldn001.flagtel.com (85.95.26.242)
  1351. 8 126.86 ms xe-8-2-0.0.cjr04.prs001.flagtel.com (85.95.27.234)
  1352. 9 280.43 ms xe-0-0-1.0.pjr04.dxb001.flagtel.com (85.95.25.94)
  1353. 10 327.66 ms 80.77.2.42
  1354. 11 235.45 ms 196.29.177.113
  1355. 12 244.96 ms 197.254.196.62
  1356. 13 ...
  1357. 14 262.43 ms f03-web01.nic.gov.sd (62.12.105.3)
  1358. #######################################################################################################################################
  1359. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 19:59 EDT
  1360. Nmap scan report for f03-web01.nic.gov.sd (62.12.105.3)
  1361. Host is up.
  1362.  
  1363. PORT STATE SERVICE VERSION
  1364. 123/udp open|filtered ntp
  1365. Too many fingerprints match this host to give specific OS details
  1366.  
  1367. TRACEROUTE (using proto 1/icmp)
  1368. HOP RTT ADDRESS
  1369. 1 111.37 ms 10.249.200.1
  1370. 2 111.94 ms vlan500.as03.bru1.be.m247.com (185.210.217.49)
  1371. 3 111.73 ms vlan299.agg1.bru1.be.m247.com (176.10.82.60)
  1372. 4 111.59 ms vlan2901.bb1.bru1.be.m247.com (176.10.82.30)
  1373. 5 117.61 ms te-7-7-0.bb1.lon1.uk.m247.com (176.10.83.147)
  1374. 6 120.42 ms 80.77.2.193
  1375. 7 285.12 ms xe-9-0-1.0.pjr04.ldn001.flagtel.com (85.95.27.193)
  1376. 8 132.51 ms xe-8-2-0.0.cjr04.prs001.flagtel.com (85.95.27.234)
  1377. 9 284.28 ms xe-0-0-1.0.pjr04.dxb001.flagtel.com (85.95.25.94)
  1378. 10 332.36 ms 80.77.2.42
  1379. 11 235.19 ms 196.29.177.113
  1380. 12 249.02 ms 197.254.196.62
  1381. 13 ... 30
  1382. #######################################################################################################################################
  1383. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 20:03 EDT
  1384. NSE: Loaded 148 scripts for scanning.
  1385. NSE: Script Pre-scanning.
  1386. NSE: Starting runlevel 1 (of 2) scan.
  1387. Initiating NSE at 20:03
  1388. Completed NSE at 20:03, 0.00s elapsed
  1389. NSE: Starting runlevel 2 (of 2) scan.
  1390. Initiating NSE at 20:03
  1391. Completed NSE at 20:03, 0.00s elapsed
  1392. Initiating Ping Scan at 20:03
  1393. Scanning 62.12.105.3 [4 ports]
  1394. Completed Ping Scan at 20:03, 0.28s elapsed (1 total hosts)
  1395. Initiating Parallel DNS resolution of 1 host. at 20:03
  1396. Completed Parallel DNS resolution of 1 host. at 20:03, 0.02s elapsed
  1397. Initiating Connect Scan at 20:03
  1398. Scanning f03-web01.nic.gov.sd (62.12.105.3) [65535 ports]
  1399. Discovered open port 80/tcp on 62.12.105.3
  1400. Discovered open port 110/tcp on 62.12.105.3
  1401. Discovered open port 443/tcp on 62.12.105.3
  1402. Discovered open port 21/tcp on 62.12.105.3
  1403. Discovered open port 143/tcp on 62.12.105.3
  1404. Connect Scan Timing: About 6.92% done; ETC: 20:10 (0:06:57 remaining)
  1405. Connect Scan Timing: About 17.02% done; ETC: 20:09 (0:04:57 remaining)
  1406. Connect Scan Timing: About 25.73% done; ETC: 20:09 (0:04:23 remaining)
  1407. Connect Scan Timing: About 44.65% done; ETC: 20:10 (0:03:59 remaining)
  1408. Connect Scan Timing: About 52.02% done; ETC: 20:11 (0:03:37 remaining)
  1409. Connect Scan Timing: About 60.82% done; ETC: 20:11 (0:03:12 remaining)
  1410. Connect Scan Timing: About 71.01% done; ETC: 20:11 (0:02:14 remaining)
  1411. Connect Scan Timing: About 84.00% done; ETC: 20:10 (0:01:08 remaining)
  1412. Connect Scan Timing: About 92.34% done; ETC: 20:10 (0:00:32 remaining)
  1413. Completed Connect Scan at 20:10, 413.88s elapsed (65535 total ports)
  1414. Initiating Service scan at 20:10
  1415. Scanning 5 services on f03-web01.nic.gov.sd (62.12.105.3)
  1416. Completed Service scan at 20:10, 25.60s elapsed (5 services on 1 host)
  1417. Initiating OS detection (try #1) against f03-web01.nic.gov.sd (62.12.105.3)
  1418. Retrying OS detection (try #2) against f03-web01.nic.gov.sd (62.12.105.3)
  1419. adjust_timeouts2: packet supposedly had rtt of -226841 microseconds. Ignoring time.
  1420. adjust_timeouts2: packet supposedly had rtt of -226841 microseconds. Ignoring time.
  1421. Initiating Traceroute at 20:11
  1422. Completed Traceroute at 20:11, 6.34s elapsed
  1423. Initiating Parallel DNS resolution of 12 hosts. at 20:11
  1424. Completed Parallel DNS resolution of 12 hosts. at 20:11, 0.20s elapsed
  1425. NSE: Script scanning 62.12.105.3.
  1426. NSE: Starting runlevel 1 (of 2) scan.
  1427. Initiating NSE at 20:11
  1428. NSE Timing: About 99.12% done; ETC: 20:11 (0:00:00 remaining)
  1429. NSE Timing: About 99.27% done; ETC: 20:12 (0:00:00 remaining)
  1430. NSE Timing: About 99.71% done; ETC: 20:12 (0:00:00 remaining)
  1431. Completed NSE at 20:12, 92.84s elapsed
  1432. NSE: Starting runlevel 2 (of 2) scan.
  1433. Initiating NSE at 20:12
  1434. Completed NSE at 20:12, 0.50s elapsed
  1435. Nmap scan report for f03-web01.nic.gov.sd (62.12.105.3)
  1436. Host is up, received syn-ack ttl 112 (0.19s latency).
  1437. Scanned at 2019-06-14 20:03:29 EDT for 551s
  1438. Not shown: 65523 filtered ports
  1439. Reason: 65522 no-responses and 1 host-unreach
  1440. PORT STATE SERVICE REASON VERSION
  1441. 21/tcp open ftp syn-ack Microsoft ftpd
  1442. | ftp-syst:
  1443. |_ SYST: Windows_NT
  1444. | ssl-cert: Subject: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US/organizationalUnitName=Plesk/localityName=Seattle/[email protected]
  1445. | Issuer: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US/organizationalUnitName=Plesk/localityName=Seattle/[email protected]
  1446. | Public Key type: rsa
  1447. | Public Key bits: 2048
  1448. | Signature Algorithm: sha256WithRSAEncryption
  1449. | Not valid before: 2016-04-19T09:30:36
  1450. | Not valid after: 2017-04-19T09:30:36
  1451. | MD5: 8d45 138f 8b9f f882 90d9 90be 195a f4d0
  1452. | SHA-1: 69d9 baa7 b23e 96ac 6090 cc93 d352 5c78 acba 9790
  1453. | -----BEGIN CERTIFICATE-----
  1454. | MIIEajCCA1KgAwIBAgIEBNin+DANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMC
  1455. | VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1NlYXR0bGUxDTALBgNV
  1456. | BAoTBE9kaW4xDjAMBgNVBAsTBVBsZXNrMQ4wDAYDVQQDEwVQbGVzazEdMBsGCSqG
  1457. | SIb3DQEJARYOaW5mb0BwbGVzay5jb20wHhcNMTYwNDE5MDkzMDM2WhcNMTcwNDE5
  1458. | MDkzMDM2WjCBgjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
  1459. | BgNVBAcTB1NlYXR0bGUxDTALBgNVBAoTBE9kaW4xDjAMBgNVBAsTBVBsZXNrMQ4w
  1460. | DAYDVQQDEwVQbGVzazEdMBsGCSqGSIb3DQEJARYOaW5mb0BwbGVzay5jb20wggEi
  1461. | MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDSBgk7uIcz0ea9fN1QDp3Pl19b
  1462. | rjqqnl3b7UIxbZaPhoraBvBknLJ0hEzOitQmKsxIsGKPLjxSb6WMmiE+YRH0kvOU
  1463. | oXWa/yjRx3rG6Z+Wd6U7r7IIbWdBMGgbTQ2OdzmrKXVqoaXM2crH9cPDhWJgkVu9
  1464. | Q6zuUiMjo7cwFR1X/vAVPW1C4l5HQcW3oGC14ll5jC15IbB04YusglQVfD/8u246
  1465. | nMRgToyj+gxMvsifYG9h53OT0qJz/MFk4PvtG2MAy8ipR10VMtOUrMqzaZ1ntjex
  1466. | sqog2cNgT6LLRMi870OCRaT/cVYCjNlhcQIE2Tpyf9MYKK0myMokTBXs+WNHAgMB
  1467. | AAGjgeUwgeIwHQYDVR0OBBYEFKXkfR1gs1JC6WRjoLsdij8g/DVYMIGyBgNVHSME
  1468. | gaowgaeAFKXkfR1gs1JC6WRjoLsdij8g/DVYoYGIpIGFMIGCMQswCQYDVQQGEwJV
  1469. | UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHU2VhdHRsZTENMAsGA1UE
  1470. | ChMET2RpbjEOMAwGA1UECxMFUGxlc2sxDjAMBgNVBAMTBVBsZXNrMR0wGwYJKoZI
  1471. | hvcNAQkBFg5pbmZvQHBsZXNrLmNvbYIEBNin+DAMBgNVHRMEBTADAQH/MA0GCSqG
  1472. | SIb3DQEBCwUAA4IBAQARU5/ZcbkEx+CNZjqAY2r5h5m2Bq5kt0CY+j6uH05oreL9
  1473. | 5gKbBctsDTehfCw5+VpFpv4lCogQ9QJlQ8A3VQXV4kjueRIMvrShPbh7vZ1LcQNR
  1474. | PXDUyNZpbItE29/rJe4qvgFWMd73yw18H871kwLtddx0XfOv2tgO5fzLr9BT5hzq
  1475. | E9upUN40ATHb/bDcAVLsUTOmYM9idZ4AS/oj0oCeBR9eqcw3IHNneIO3Qk2EA2UO
  1476. | U93iDngn3tuYqUFlLZSjcVfWIWvY7cDMfqGEdanpz42V5nFqUQ76sWvYb8iF73uy
  1477. | uxIFo3Edw+sf2D1fyEpbDQZNsNiNSyUUHUq3qagk
  1478. |_-----END CERTIFICATE-----
  1479. 25/tcp closed smtp conn-refused
  1480. 80/tcp open http syn-ack Microsoft IIS httpd 8.5
  1481. |_http-favicon: Unknown favicon MD5: 1DB747255C64A30F9236E9D929E986CA
  1482. | http-methods:
  1483. | Supported Methods: OPTIONS TRACE GET HEAD POST
  1484. |_ Potentially risky methods: TRACE
  1485. |_http-server-header: Microsoft-IIS/8.5
  1486. |_http-title: Domain Default page
  1487. 110/tcp open pop3 syn-ack MailEnable POP3 Server
  1488. |_pop3-capabilities: USER UIDL TOP
  1489. 113/tcp closed ident conn-refused
  1490. 139/tcp closed netbios-ssn conn-refused
  1491. 143/tcp open imap syn-ack MailEnable imapd
  1492. |_imap-capabilities: IMAP4 IMAP4rev1 AUTH=LOGIN OK completed CHILDREN AUTH=CRAM-MD5 CAPABILITY IDLE UIDPLUSA0001
  1493. 443/tcp open https? syn-ack
  1494. 445/tcp closed microsoft-ds conn-refused
  1495. 993/tcp closed imaps conn-refused
  1496. 995/tcp closed pop3s conn-refused
  1497. 1025/tcp closed NFS-or-IIS conn-refused
  1498. Device type: general purpose|WAP|router
  1499. Running (JUST GUESSING): Linux 2.6.X|2.4.X|3.X (98%), MikroTik RouterOS 6.X (92%)
  1500. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:linux:linux_kernel:3.2.0 cpe:/o:mikrotik:routeros:6.15 cpe:/o:linux:linux_kernel:2.6.22
  1501. OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
  1502. Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (98%), Tomato 1.27 - 1.28 (Linux 2.4.20) (92%), Linux 3.2.0 (92%), MikroTik RouterOS 6.15 (Linux 3.3.5) (92%), Tomato firmware (Linux 2.6.22) (91%)
  1503. No exact OS matches for host (test conditions non-ideal).
  1504. TCP/IP fingerprint:
  1505. SCAN(V=7.70%E=4%D=6/14%OT=21%CT=25%CU=%PV=N%G=N%TM=5D0437F8%P=x86_64-pc-linux-gnu)
  1506. SEQ(SP=FF%GCD=1%ISR=103%CI=Z%TS=U)
  1507. SEQ(CI=Z)
  1508. OPS(O1=M44FW8N%O2=M44FW8N%O3=M44FW8N%O4=M44FW8N%O5=M44FW8N%O6=M44F)
  1509. WIN(W1=2000%W2=2000%W3=2000%W4=2000%W5=2000%W6=2000)
  1510. ECN(R=Y%DF=Y%TG=80%W=2000%O=M44FW8N%CC=Y%Q=)
  1511. ECN(R=N)
  1512. T1(R=Y%DF=Y%TG=80%S=O%A=S+%F=AS%RD=0%Q=)
  1513. T2(R=N)
  1514. T3(R=N)
  1515. T4(R=N)
  1516. T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
  1517. T6(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
  1518. T7(R=N)
  1519. U1(R=N)
  1520. IE(R=N)
  1521.  
  1522. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  1523.  
  1524. TRACEROUTE (using proto 1/icmp)
  1525. HOP RTT ADDRESS
  1526. 1 112.96 ms 10.249.200.1
  1527. 2 113.16 ms vlan500.as03.bru1.be.m247.com (185.210.217.49)
  1528. 3 113.00 ms vlan299.agg1.bru1.be.m247.com (176.10.82.60)
  1529. 4 122.99 ms vlan2901.bb1.bru1.be.m247.com (176.10.82.30)
  1530. 5 151.61 ms te-7-7-0.bb1.lon1.uk.m247.com (176.10.83.147)
  1531. 6 148.57 ms 80.77.2.193
  1532. 7 287.17 ms xe-9-0-1.0.pjr04.ldn001.flagtel.com (85.95.27.193)
  1533. 8 132.28 ms xe-8-2-0.0.cjr04.prs001.flagtel.com (85.95.27.234)
  1534. 9 285.74 ms xe-0-0-1.0.pjr04.dxb001.flagtel.com (85.95.25.94)
  1535. 10 333.26 ms 80.77.2.42
  1536. 11 235.30 ms 196.29.177.113
  1537. 12 245.09 ms 197.254.196.62
  1538. 13 ... 30
  1539.  
  1540. NSE: Script Post-scanning.
  1541. NSE: Starting runlevel 1 (of 2) scan.
  1542. Initiating NSE at 20:12
  1543. Completed NSE at 20:12, 0.00s elapsed
  1544. NSE: Starting runlevel 2 (of 2) scan.
  1545. Initiating NSE at 20:12
  1546. Completed NSE at 20:12, 0.00s elapsed
  1547. Read data files from: /usr/bin/../share/nmap
  1548. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1549. Nmap done: 1 IP address (1 host up) scanned in 550.98 seconds
  1550. Raw packets sent: 173 (11.884KB) | Rcvd: 2132 (119.118KB)
  1551. #######################################################################################################################################
  1552. Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-14 20:12 EDT
  1553. NSE: Loaded 148 scripts for scanning.
  1554. NSE: Script Pre-scanning.
  1555. Initiating NSE at 20:12
  1556. Completed NSE at 20:12, 0.00s elapsed
  1557. Initiating NSE at 20:12
  1558. Completed NSE at 20:12, 0.00s elapsed
  1559. Initiating Parallel DNS resolution of 1 host. at 20:12
  1560. Completed Parallel DNS resolution of 1 host. at 20:12, 0.03s elapsed
  1561. Initiating UDP Scan at 20:12
  1562. Scanning f03-web01.nic.gov.sd (62.12.105.3) [14 ports]
  1563. Completed UDP Scan at 20:12, 2.00s elapsed (14 total ports)
  1564. Initiating Service scan at 20:12
  1565. Scanning 12 services on f03-web01.nic.gov.sd (62.12.105.3)
  1566. Service scan Timing: About 8.33% done; ETC: 20:32 (0:17:58 remaining)
  1567. Completed Service scan at 20:14, 102.58s elapsed (12 services on 1 host)
  1568. Initiating OS detection (try #1) against f03-web01.nic.gov.sd (62.12.105.3)
  1569. Retrying OS detection (try #2) against f03-web01.nic.gov.sd (62.12.105.3)
  1570. Initiating Traceroute at 20:14
  1571. Completed Traceroute at 20:14, 7.13s elapsed
  1572. Initiating Parallel DNS resolution of 1 host. at 20:14
  1573. Completed Parallel DNS resolution of 1 host. at 20:14, 0.00s elapsed
  1574. NSE: Script scanning 62.12.105.3.
  1575. Initiating NSE at 20:14
  1576. Completed NSE at 20:14, 20.32s elapsed
  1577. Initiating NSE at 20:14
  1578. Completed NSE at 20:14, 1.02s elapsed
  1579. Nmap scan report for f03-web01.nic.gov.sd (62.12.105.3)
  1580. Host is up (0.11s latency).
  1581.  
  1582. PORT STATE SERVICE VERSION
  1583. 53/udp open|filtered domain
  1584. 67/udp open|filtered dhcps
  1585. 68/udp open|filtered dhcpc
  1586. 69/udp open|filtered tftp
  1587. 88/udp open|filtered kerberos-sec
  1588. 123/udp open|filtered ntp
  1589. 137/udp filtered netbios-ns
  1590. 138/udp filtered netbios-dgm
  1591. 139/udp open|filtered netbios-ssn
  1592. 161/udp open|filtered snmp
  1593. 162/udp open|filtered snmptrap
  1594. 389/udp open|filtered ldap
  1595. 520/udp open|filtered route
  1596. 2049/udp open|filtered nfs
  1597. Too many fingerprints match this host to give specific OS details
  1598.  
  1599. TRACEROUTE (using port 137/udp)
  1600. HOP RTT ADDRESS
  1601. 1 109.29 ms 10.249.200.1
  1602. 2 ... 3
  1603. 4 106.89 ms 10.249.200.1
  1604. 5 114.41 ms 10.249.200.1
  1605. 6 108.04 ms 10.249.200.1
  1606. 7 108.05 ms 10.249.200.1
  1607. 8 108.06 ms 10.249.200.1
  1608. 9 108.07 ms 10.249.200.1
  1609. 10 108.11 ms 10.249.200.1
  1610. 11 ... 18
  1611. 19 106.49 ms 10.249.200.1
  1612. 20 106.21 ms 10.249.200.1
  1613. 21 ... 27
  1614. 28 107.49 ms 10.249.200.1
  1615. 29 ...
  1616. 30 112.61 ms 10.249.200.1
  1617.  
  1618. NSE: Script Post-scanning.
  1619. Initiating NSE at 20:14
  1620. Completed NSE at 20:14, 0.00s elapsed
  1621. Initiating NSE at 20:14
  1622. Completed NSE at 20:14, 0.00s elapsed
  1623. Read data files from: /usr/bin/../share/nmap
  1624. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1625. Nmap done: 1 IP address (1 host up) scanned in 137.94 seconds
  1626. Raw packets sent: 147 (13.614KB) | Rcvd: 981 (407.074KB)
  1627. #######################################################################################################################################
  1628.  
  1629. Hosts
  1630. =====
  1631.  
  1632. address mac name os_name os_flavor os_sp purpose info comments
  1633. ------- --- ---- ------- --------- ----- ------- ---- --------
  1634. 52.64.99.208 cbs.gov.ws Linux 3.X server
  1635. 62.12.105.3 f03-web01.nic.gov.sd Linux 2.6.X server
  1636. 77.72.0.146 argon.cloudhosting.co.uk Unknown device
  1637. 147.237.77.18 Unknown device
  1638.  
  1639. Services
  1640. ========
  1641.  
  1642. host port proto name state info
  1643. ---- ---- ----- ---- ----- ----
  1644. 52.64.99.208 20 tcp ftp-data closed
  1645. 52.64.99.208 21 tcp ftp open vsftpd 3.0.2
  1646. 52.64.99.208 25 tcp smtp closed
  1647. 52.64.99.208 53 udp domain unknown
  1648. 52.64.99.208 67 udp dhcps unknown
  1649. 52.64.99.208 68 udp dhcpc unknown
  1650. 52.64.99.208 69 udp tftp unknown
  1651. 52.64.99.208 80 tcp http open Apache httpd
  1652. 52.64.99.208 88 udp kerberos-sec unknown
  1653. 52.64.99.208 123 udp ntp unknown
  1654. 52.64.99.208 137 udp netbios-ns filtered
  1655. 52.64.99.208 138 udp netbios-dgm filtered
  1656. 52.64.99.208 139 tcp netbios-ssn closed
  1657. 52.64.99.208 139 udp netbios-ssn unknown
  1658. 52.64.99.208 161 udp snmp unknown
  1659. 52.64.99.208 162 udp snmptrap unknown
  1660. 52.64.99.208 389 udp ldap unknown
  1661. 52.64.99.208 443 tcp ssl/http open Apache httpd
  1662. 52.64.99.208 445 tcp microsoft-ds closed
  1663. 52.64.99.208 520 udp route unknown
  1664. 52.64.99.208 1024 tcp kdm closed
  1665. 52.64.99.208 1025 tcp nfs-or-iis closed
  1666. 52.64.99.208 1026 tcp lsa-or-nterm closed
  1667. 52.64.99.208 1027 tcp iis closed
  1668. 52.64.99.208 1028 tcp unknown closed
  1669. 52.64.99.208 1029 tcp ms-lsa closed
  1670. 52.64.99.208 1030 tcp iad1 closed
  1671. 52.64.99.208 1031 tcp iad2 closed
  1672. 52.64.99.208 1032 tcp iad3 closed
  1673. 52.64.99.208 1033 tcp netinfo closed
  1674. 52.64.99.208 1034 tcp zincite-a closed
  1675. 52.64.99.208 1035 tcp multidropper closed
  1676. 52.64.99.208 1036 tcp nsstp closed
  1677. 52.64.99.208 1037 tcp ams closed
  1678. 52.64.99.208 1038 tcp mtqp closed
  1679. 52.64.99.208 1039 tcp sbl closed
  1680. 52.64.99.208 1040 tcp netsaint closed
  1681. 52.64.99.208 1041 tcp danf-ak2 closed
  1682. 52.64.99.208 1042 tcp afrog closed
  1683. 52.64.99.208 1043 tcp boinc closed
  1684. 52.64.99.208 1044 tcp dcutility closed
  1685. 52.64.99.208 1045 tcp fpitp closed
  1686. 52.64.99.208 1046 tcp wfremotertm closed
  1687. 52.64.99.208 1047 tcp neod1 closed
  1688. 52.64.99.208 1048 tcp neod2 closed
  1689. 52.64.99.208 2049 udp nfs unknown
  1690. 62.12.105.3 21 tcp ftp open Microsoft ftpd
  1691. 62.12.105.3 25 tcp smtp closed
  1692. 62.12.105.3 53 udp domain unknown
  1693. 62.12.105.3 67 udp dhcps unknown
  1694. 62.12.105.3 68 udp dhcpc unknown
  1695. 62.12.105.3 69 udp tftp unknown
  1696. 62.12.105.3 80 tcp http open Microsoft IIS httpd 8.5
  1697. 62.12.105.3 88 udp kerberos-sec unknown
  1698. 62.12.105.3 110 tcp pop3 open MailEnable POP3 Server
  1699. 62.12.105.3 113 tcp ident closed
  1700. 62.12.105.3 123 udp ntp unknown
  1701. 62.12.105.3 137 udp netbios-ns filtered
  1702. 62.12.105.3 138 udp netbios-dgm filtered
  1703. 62.12.105.3 139 tcp netbios-ssn closed
  1704. 62.12.105.3 139 udp netbios-ssn unknown
  1705. 62.12.105.3 143 tcp imap open MailEnable imapd
  1706. 62.12.105.3 161 udp snmp unknown
  1707. 62.12.105.3 162 udp snmptrap unknown
  1708. 62.12.105.3 389 udp ldap unknown
  1709. 62.12.105.3 443 tcp https open
  1710. 62.12.105.3 445 tcp microsoft-ds closed
  1711. 62.12.105.3 520 udp route unknown
  1712. 62.12.105.3 993 tcp imaps closed
  1713. 62.12.105.3 995 tcp pop3s closed
  1714. 62.12.105.3 1025 tcp nfs-or-iis closed
  1715. 62.12.105.3 2049 udp nfs unknown
  1716. 62.12.105.3 8443 tcp https-alt open
  1717. 77.72.0.146 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 2 of 50 allowed.\x0d\x0a220-Local time is now 23:05. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
  1718. 77.72.0.146 67 udp dhcps unknown
  1719. 77.72.0.146 68 udp dhcpc unknown
  1720. 77.72.0.146 69 udp tftp unknown
  1721. 77.72.0.146 80 tcp http open
  1722. 77.72.0.146 88 udp kerberos-sec unknown
  1723. 77.72.0.146 110 tcp pop3 open
  1724. 77.72.0.146 123 udp ntp unknown
  1725. 77.72.0.146 139 udp netbios-ssn unknown
  1726. 77.72.0.146 143 tcp imap open
  1727. 77.72.0.146 389 udp ldap unknown
  1728. 77.72.0.146 443 tcp https open
  1729. 77.72.0.146 465 tcp smtps open
  1730. 77.72.0.146 520 udp route unknown
  1731. 77.72.0.146 587 tcp submission open
  1732. 77.72.0.146 993 tcp imaps open
  1733. 77.72.0.146 995 tcp pop3s open
  1734. 77.72.0.146 2049 udp nfs unknown
  1735. 147.237.77.18 53 udp domain unknown
  1736. 147.237.77.18 67 udp dhcps unknown
  1737. 147.237.77.18 68 udp dhcpc unknown
  1738. 147.237.77.18 69 udp tftp unknown
  1739. 147.237.77.18 80 tcp http open
  1740. 147.237.77.18 88 udp kerberos-sec unknown
  1741. 147.237.77.18 123 udp ntp unknown
  1742. 147.237.77.18 139 udp netbios-ssn unknown
  1743. 147.237.77.18 161 udp snmp unknown
  1744. 147.237.77.18 162 udp snmptrap unknown
  1745. 147.237.77.18 389 udp ldap unknown
  1746. 147.237.77.18 520 udp route unknown
  1747. 147.237.77.18 2049 udp nfs unknown
  1748. #######################################################################################################################################
  1749. Domains still to check: 1
  1750. Checking if the hostname ombudsman.gov.sd. given is in fact a domain...
  1751.  
  1752. Analyzing domain: ombudsman.gov.sd.
  1753. Checking NameServers using system default resolver...
  1754. IP: 62.12.109.2 (Sudan)
  1755. HostName: ns0.ndc.gov.sd Type: NS
  1756. IP: 62.12.109.3 (Sudan)
  1757. HostName: ns1.ndc.gov.sd Type: NS
  1758.  
  1759. Checking MailServers using system default resolver...
  1760. WARNING!! There are no MX records for this domain
  1761.  
  1762. Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
  1763. Zone transfer successful on name server 62.12.109.2 (5 hosts)
  1764. Zone transfer successful on name server 62.12.109.3 (5 hosts)
  1765.  
  1766. Checking SPF record...
  1767.  
  1768. Checking 5 most common hostnames using system default resolver...
  1769. IP: 62.12.105.3 (Sudan)
  1770. HostName: mssql.ombudsman.gov.sd. Type: A
  1771. IP: 62.12.105.3 (Sudan)
  1772. HostName: mssql.ombudsman.gov.sd. Type: A
  1773. HostName: mail.ombudsman.gov.sd. Type: A
  1774. HostName: f03-web01.nic.gov.sd Type: PTR
  1775. IP: 62.12.105.3 (Sudan)
  1776. HostName: mssql.ombudsman.gov.sd. Type: A
  1777. HostName: mail.ombudsman.gov.sd. Type: A
  1778. HostName: f03-web01.nic.gov.sd Type: PTR
  1779. HostName: www.ombudsman.gov.sd. Type: A
  1780. IP: 62.12.105.3 (Sudan)
  1781. HostName: mssql.ombudsman.gov.sd. Type: A
  1782. HostName: mail.ombudsman.gov.sd. Type: A
  1783. HostName: f03-web01.nic.gov.sd Type: PTR
  1784. HostName: www.ombudsman.gov.sd. Type: A
  1785. HostName: webmail.ombudsman.gov.sd. Type: A
  1786.  
  1787. Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
  1788. Checking netblock 62.12.109.0
  1789. Checking netblock 62.12.105.0
  1790.  
  1791. Searching for ombudsman.gov.sd. emails in Google
  1792.  
  1793. Checking 3 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
  1794. Host 62.12.109.2 is up (reset ttl 64)
  1795. Host 62.12.109.3 is up (reset ttl 64)
  1796. Host 62.12.105.3 is up (reset ttl 64)
  1797.  
  1798. Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
  1799. Scanning ip 62.12.109.2 (ns0.ndc.gov.sd):
  1800. 53/tcp open domain syn-ack ttl 48 (unknown banner: you guess!)
  1801. | dns-nsid:
  1802. |_ bind.version: you guess!
  1803. | fingerprint-strings:
  1804. | DNSVersionBindReqTCP:
  1805. | version
  1806. | bind
  1807. |_ guess!
  1808. Scanning ip 62.12.109.3 (ns1.ndc.gov.sd):
  1809. 53/tcp open domain syn-ack ttl 48 (unknown banner: you guess!)
  1810. | dns-nsid:
  1811. |_ bind.version: you guess!
  1812. | fingerprint-strings:
  1813. | DNSVersionBindReqTCP:
  1814. | version
  1815. | bind
  1816. |_ guess!
  1817. Scanning ip 62.12.105.3 (webmail.ombudsman.gov.sd.):
  1818. 21/tcp open ftp syn-ack ttl 112 Microsoft ftpd
  1819. | ftp-syst:
  1820. |_ SYST: Windows_NT
  1821. | ssl-cert: Subject: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US
  1822. | Issuer: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US
  1823. | Public Key type: rsa
  1824. | Public Key bits: 2048
  1825. | Signature Algorithm: sha256WithRSAEncryption
  1826. | Not valid before: 2016-04-19T09:30:36
  1827. | Not valid after: 2017-04-19T09:30:36
  1828. | MD5: 8d45 138f 8b9f f882 90d9 90be 195a f4d0
  1829. |_SHA-1: 69d9 baa7 b23e 96ac 6090 cc93 d352 5c78 acba 9790
  1830. 80/tcp open http syn-ack ttl 112 Microsoft IIS httpd 8.5
  1831. |_http-favicon: Unknown favicon MD5: 1DB747255C64A30F9236E9D929E986CA
  1832. | http-methods:
  1833. | Supported Methods: OPTIONS TRACE GET HEAD POST
  1834. |_ Potentially risky methods: TRACE
  1835. |_http-server-header: Microsoft-IIS/8.5
  1836. |_http-title: Domain Default page
  1837. 110/tcp open pop3 syn-ack ttl 112 MailEnable POP3 Server
  1838. |_pop3-capabilities: USER TOP UIDL
  1839. 143/tcp open imap syn-ack ttl 112 MailEnable imapd
  1840. |_imap-capabilities: IMAP4 OK completed AUTH=LOGIN IDLE UIDPLUSA0001 AUTH=CRAM-MD5 IMAP4rev1 CAPABILITY CHILDREN
  1841. 443/tcp open https? syn-ack ttl 112
  1842. 8443/tcp open ssl/http syn-ack ttl 112 Microsoft IIS httpd 8.5
  1843. |_http-favicon: Unknown favicon MD5: 1DB747255C64A30F9236E9D929E986CA
  1844. | http-methods:
  1845. |_ Supported Methods: GET HEAD POST OPTIONS
  1846. | http-robots.txt: 1 disallowed entry
  1847. |_/
  1848. |_http-server-header: Microsoft-IIS/8.5
  1849. |_http-title: Plesk Onyx 17.8.11
  1850. | ssl-cert: Subject: commonName=f03-web01.nic.gov.sd
  1851. | Subject Alternative Name: DNS:f03-web01.nic.gov.sd
  1852. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  1853. | Public Key type: rsa
  1854. | Public Key bits: 2048
  1855. | Signature Algorithm: sha256WithRSAEncryption
  1856. | Not valid before: 2019-05-16T00:30:46
  1857. | Not valid after: 2019-08-14T00:30:46
  1858. | MD5: 8a76 d806 383f 0437 1e28 3297 e8bc 357a
  1859. |_SHA-1: 2d8f b6fa 2b1d d78f 9c4f 7916 a2b0 d7c3 e5c9 5305
  1860. Device type: general purpose|WAP|router
  1861. Running (JUST GUESSING): Linux 2.6.X|2.4.X|3.X (98%), MikroTik RouterOS 6.X (92%)
  1862. OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  1863. WebCrawling domain's web servers... up to 50 max links.
  1864.  
  1865. + URL to crawl: http://mail.ombudsman.gov.sd.
  1866. + Date: 2019-06-14
  1867.  
  1868. + Crawling URL: http://mail.ombudsman.gov.sd.:
  1869. + Links:
  1870. + Crawling http://mail.ombudsman.gov.sd. (400 Bad Request)
  1871. + Searching for directories...
  1872. + Searching open folders...
  1873.  
  1874.  
  1875. + URL to crawl: http://webmail.ombudsman.gov.sd.
  1876. + Date: 2019-06-14
  1877.  
  1878. + Crawling URL: http://webmail.ombudsman.gov.sd.:
  1879. + Links:
  1880. + Crawling http://webmail.ombudsman.gov.sd. (400 Bad Request)
  1881. + Searching for directories...
  1882. + Searching open folders...
  1883.  
  1884.  
  1885. + URL to crawl: http://mssql.ombudsman.gov.sd.
  1886. + Date: 2019-06-14
  1887.  
  1888. + Crawling URL: http://mssql.ombudsman.gov.sd.:
  1889. + Links:
  1890. + Crawling http://mssql.ombudsman.gov.sd. (400 Bad Request)
  1891. + Searching for directories...
  1892. + Searching open folders...
  1893.  
  1894.  
  1895. + URL to crawl: http://www.ombudsman.gov.sd.
  1896. + Date: 2019-06-14
  1897.  
  1898. + Crawling URL: http://www.ombudsman.gov.sd.:
  1899. + Links:
  1900. + Crawling http://www.ombudsman.gov.sd. (400 Bad Request)
  1901. + Searching for directories...
  1902. + Searching open folders...
  1903.  
  1904.  
  1905. + URL to crawl: https://mail.ombudsman.gov.sd.:8443
  1906. + Date: 2019-06-14
  1907.  
  1908. + Crawling URL: https://mail.ombudsman.gov.sd.:8443:
  1909. + Links:
  1910. + Crawling https://mail.ombudsman.gov.sd.:8443 ([Errno 104] Connection reset by peer)
  1911. + Searching for directories...
  1912. + Searching open folders...
  1913.  
  1914.  
  1915. + URL to crawl: https://webmail.ombudsman.gov.sd.:8443
  1916. + Date: 2019-06-14
  1917.  
  1918. + Crawling URL: https://webmail.ombudsman.gov.sd.:8443:
  1919. + Links:
  1920. + Crawling https://webmail.ombudsman.gov.sd.:8443 ([Errno 104] Connection reset by peer)
  1921. + Searching for directories...
  1922. + Searching open folders...
  1923.  
  1924.  
  1925. + URL to crawl: https://mssql.ombudsman.gov.sd.:8443
  1926. + Date: 2019-06-14
  1927.  
  1928. + Crawling URL: https://mssql.ombudsman.gov.sd.:8443:
  1929. + Links:
  1930. + Crawling https://mssql.ombudsman.gov.sd.:8443 ([Errno 104] Connection reset by peer)
  1931. + Searching for directories...
  1932. + Searching open folders...
  1933.  
  1934.  
  1935. + URL to crawl: https://www.ombudsman.gov.sd.:8443
  1936. + Date: 2019-06-14
  1937.  
  1938. + Crawling URL: https://www.ombudsman.gov.sd.:8443:
  1939. + Links:
  1940. + Crawling https://www.ombudsman.gov.sd.:8443 ([Errno 104] Connection reset by peer)
  1941. + Searching for directories...
  1942. + Searching open folders...
  1943.  
  1944. --Finished--
  1945. Summary information for domain ombudsman.gov.sd.
  1946. ---------------------------------------------------------------------------------------------------------------------------------------
  1947.  
  1948. Domain Ips Information:
  1949. IP: 62.12.109.2
  1950. HostName: ns0.ndc.gov.sd Type: NS
  1951. Country: Sudan
  1952. Zone Transfer: 5
  1953. Is Active: True (reset ttl 64)
  1954. Port: 53/tcp open domain syn-ack ttl 48 (unknown banner: you guess!)
  1955. Script Info: | dns-nsid:
  1956. Script Info: |_ bind.version: you guess!
  1957. Script Info: | fingerprint-strings:
  1958. Script Info: | DNSVersionBindReqTCP:
  1959. Script Info: | version
  1960. Script Info: | bind
  1961. Script Info: |_ guess!
  1962. IP: 62.12.109.3
  1963. HostName: ns1.ndc.gov.sd Type: NS
  1964. Country: Sudan
  1965. Zone Transfer: 5
  1966. Is Active: True (reset ttl 64)
  1967. Port: 53/tcp open domain syn-ack ttl 48 (unknown banner: you guess!)
  1968. Script Info: | dns-nsid:
  1969. Script Info: |_ bind.version: you guess!
  1970. Script Info: | fingerprint-strings:
  1971. Script Info: | DNSVersionBindReqTCP:
  1972. Script Info: | version
  1973. Script Info: | bind
  1974. Script Info: |_ guess!
  1975. IP: 62.12.105.3
  1976. HostName: mssql.ombudsman.gov.sd. Type: A
  1977. HostName: mail.ombudsman.gov.sd. Type: A
  1978. HostName: f03-web01.nic.gov.sd Type: PTR
  1979. HostName: www.ombudsman.gov.sd. Type: A
  1980. HostName: webmail.ombudsman.gov.sd. Type: A
  1981. Country: Sudan
  1982. Is Active: True (reset ttl 64)
  1983. Port: 21/tcp open ftp syn-ack ttl 112 Microsoft ftpd
  1984. Script Info: | ftp-syst:
  1985. Script Info: |_ SYST: Windows_NT
  1986. Script Info: | ssl-cert: Subject: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US
  1987. Script Info: | Issuer: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US
  1988. Script Info: | Public Key type: rsa
  1989. Script Info: | Public Key bits: 2048
  1990. Script Info: | Signature Algorithm: sha256WithRSAEncryption
  1991. Script Info: | Not valid before: 2016-04-19T09:30:36
  1992. Script Info: | Not valid after: 2017-04-19T09:30:36
  1993. Script Info: | MD5: 8d45 138f 8b9f f882 90d9 90be 195a f4d0
  1994. Script Info: |_SHA-1: 69d9 baa7 b23e 96ac 6090 cc93 d352 5c78 acba 9790
  1995. Port: 80/tcp open http syn-ack ttl 112 Microsoft IIS httpd 8.5
  1996. Script Info: |_http-favicon: Unknown favicon MD5: 1DB747255C64A30F9236E9D929E986CA
  1997. Script Info: | http-methods:
  1998. Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
  1999. Script Info: |_ Potentially risky methods: TRACE
  2000. Script Info: |_http-server-header: Microsoft-IIS/8.5
  2001. Script Info: |_http-title: Domain Default page
  2002. Port: 110/tcp open pop3 syn-ack ttl 112 MailEnable POP3 Server
  2003. Script Info: |_pop3-capabilities: USER TOP UIDL
  2004. Port: 143/tcp open imap syn-ack ttl 112 MailEnable imapd
  2005. Script Info: |_imap-capabilities: IMAP4 OK completed AUTH=LOGIN IDLE UIDPLUSA0001 AUTH=CRAM-MD5 IMAP4rev1 CAPABILITY CHILDREN
  2006. Port: 443/tcp open https? syn-ack ttl 112
  2007. Port: 8443/tcp open ssl/http syn-ack ttl 112 Microsoft IIS httpd 8.5
  2008. Script Info: |_http-favicon: Unknown favicon MD5: 1DB747255C64A30F9236E9D929E986CA
  2009. Script Info: | http-methods:
  2010. Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
  2011. Script Info: | http-robots.txt: 1 disallowed entry
  2012. Script Info: |_/
  2013. Script Info: |_http-server-header: Microsoft-IIS/8.5
  2014. Script Info: |_http-title: Plesk Onyx 17.8.11
  2015. Script Info: | ssl-cert: Subject: commonName=f03-web01.nic.gov.sd
  2016. Script Info: | Subject Alternative Name: DNS:f03-web01.nic.gov.sd
  2017. Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  2018. Script Info: | Public Key type: rsa
  2019. Script Info: | Public Key bits: 2048
  2020. Script Info: | Signature Algorithm: sha256WithRSAEncryption
  2021. Script Info: | Not valid before: 2019-05-16T00:30:46
  2022. Script Info: | Not valid after: 2019-08-14T00:30:46
  2023. Script Info: | MD5: 8a76 d806 383f 0437 1e28 3297 e8bc 357a
  2024. Script Info: |_SHA-1: 2d8f b6fa 2b1d d78f 9c4f 7916 a2b0 d7c3 e5c9 5305
  2025. Script Info: Device type: general purpose|WAP|router
  2026. Script Info: Running (JUST GUESSING): Linux 2.6.X|2.4.X|3.X (98%), MikroTik RouterOS 6.X (92%)
  2027. Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  2028. #######################################################################################################################################
  2029. Anonymous JTSEC #OpSudan Full Recon #90
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement