Advertisement
Guest User

Anonymous JTSEC #OpIsrael Full Recon #11

a guest
Nov 13th, 2018
2,240
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 82.54 KB | None | 0 0
  1. ######################################################################################################################################
  2. Hostname www.jewish.net ISP Global Net Access, LLC
  3. Continent North America Flag
  4. US
  5. Country United States Country Code US
  6. Region Texas Local time 12 Nov 2018 17:15 CST
  7. City Spring Postal Code 77388
  8. IP Address 69.73.184.159 Latitude 30.051
  9. Longitude -95.47
  10.  
  11. #######################################################################################################################################
  12. > www.jewish.net
  13. Server: 194.187.251.67
  14. Address: 194.187.251.67#53
  15.  
  16. Non-authoritative answer:
  17. www.jewish.net canonical name = jewish.net.
  18. Name: jewish.net
  19. Address: 69.73.184.159
  20. #######################################################################################################################################
  21. HostIP:69.73.184.159
  22. HostName:www.jewish.net
  23.  
  24. Gathered Inet-whois information for 69.73.184.159
  25. --------------------------------------------------------------------------------------------------------------------------------------
  26.  
  27.  
  28. inetnum: 69.6.64.0 - 69.94.111.255
  29. netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
  30. descr: IPv4 address block not managed by the RIPE NCC
  31. remarks: ------------------------------------------------------
  32. remarks:
  33. remarks: You can find the whois server to query, or the
  34. remarks: IANA registry to query on this web page:
  35. remarks: http://www.iana.org/assignments/ipv4-address-space
  36. remarks:
  37. remarks: You can access databases of other RIRs at:
  38. remarks:
  39. remarks: AFRINIC (Africa)
  40. remarks: http://www.afrinic.net/ whois.afrinic.net
  41. remarks:
  42. remarks: APNIC (Asia Pacific)
  43. remarks: http://www.apnic.net/ whois.apnic.net
  44. remarks:
  45. remarks: ARIN (Northern America)
  46. remarks: http://www.arin.net/ whois.arin.net
  47. remarks:
  48. remarks: LACNIC (Latin America and the Carribean)
  49. remarks: http://www.lacnic.net/ whois.lacnic.net
  50. remarks:
  51. remarks: IANA IPV4 Recovered Address Space
  52. remarks: http://www.iana.org/assignments/ipv4-recovered-address-space/ipv4-recovered-address-space.xhtml
  53. remarks:
  54. remarks: ------------------------------------------------------
  55. country: EU # Country is really world wide
  56. admin-c: IANA1-RIPE
  57. tech-c: IANA1-RIPE
  58. status: ALLOCATED UNSPECIFIED
  59. mnt-by: RIPE-NCC-HM-MNT
  60. mnt-lower: RIPE-NCC-HM-MNT
  61. created: 2018-02-20T15:36:33Z
  62. last-modified: 2018-09-04T13:34:51Z
  63. source: RIPE
  64.  
  65. role: Internet Assigned Numbers Authority
  66. address: see http://www.iana.org.
  67. admin-c: IANA1-RIPE
  68. tech-c: IANA1-RIPE
  69. nic-hdl: IANA1-RIPE
  70. remarks: For more information on IANA services
  71. remarks: go to IANA web site at http://www.iana.org.
  72. mnt-by: RIPE-NCC-MNT
  73. created: 1970-01-01T00:00:00Z
  74. last-modified: 2001-09-22T09:31:27Z
  75. source: RIPE # Filtered
  76.  
  77. % This query was served by the RIPE Database Query Service version 1.92.6 (HEREFORD)
  78.  
  79.  
  80.  
  81. Gathered Inic-whois information for jewish.net
  82. ---------------------------------------------------------------------------------------------------------------------------------------
  83. Domain Name: JEWISH.NET
  84. Registry Domain ID: 1895875_DOMAIN_NET-VRSN
  85. Registrar WHOIS Server: whois.godaddy.com
  86. Registrar URL: http://www.godaddy.com
  87. Updated Date: 2018-02-16T10:48:18Z
  88. Creation Date: 1997-05-21T04:00:00Z
  89. Registry Expiry Date: 2021-05-22T04:00:00Z
  90. Registrar: GoDaddy.com, LLC
  91. Registrar IANA ID: 146
  92. Registrar Abuse Contact Email: abuse@godaddy.com
  93. Registrar Abuse Contact Phone: 480-624-2505
  94. Domain Status: clientDeleteProhibited https:/�U@cann.�~Ho0rg/�epp#cl�
  95. �ieU@ntDel�
  96. �et�U@e�U@h�������ibited
  97. Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
  98. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  99. Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
  100. Name Server: NS33.DOMAINCONTROL.COM
  101. Name Server: NS34.DOMAINCONTROL.COM
  102. DNSSEC: unsigned
  103. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  104. <<> Last update of whois database: 2018-11-12T23jV@:21:5�zH00Z <
  105.  
  106. For more information on Whois status codes, please visit https://icann.org/epp
  107.  
  108. �OTICE: The expiration date displayed in this reYV@date �zHt0he
  109. registrar's sponsorship of the domain name registration in the registry is
  110. currently set to expire. This date does not necessarily reflect the expiration
  111. date of the domain name registrant's agreement with the sponsoring
  112. registrar. Users may consult the sponsoring registrar's Whois database to
  113. view the registrar's reported date of expiration for this registration.
  114.  
  115. TERMS OF USE: You are not authorized to access or query our Whois
  116. �an�U@dme Jrough the use of electronic processes�U@ that�~H 0aret high-D
  117. automated except as reasonably necessary to register domain names or
  118. modify existing registrations; the Data in VeriSign Global Registry
  119. Services' ("VeriSign") Whois database is provided by VeriSign for
  120. information purposes only, and to assist persons in obtaining information
  121. about or related to a domain name registration record. VeriSign does not
  122. guarantee its accuracy. By submitting a Whois query, you agree to abide
  123. by the following terms of use: You agree that yo�U@u may�~H 0use� this �
  124. �DaU@ta on�
  125. �ly�U@
  126. for lawful purposes and that under no circumstances will you use this Data
  127. to: (1) allow, enable, or otherwise support the transmission of mass
  128. unsolicited, commercial advertising or solicitations via e-mail, telephone,
  129. or facsimile; or (2) enable high volume, automated, electronic processes
  130. that apply to VeriSign (or its computer systems). The compilation,
  131. repackaging, dissemination or other use of this Data is expressly
  132. prohibited without the prior written consent of YV@VeriS�zHi0gn.� You a�
  133. �grXV@ee no�
  134. �t gV@to
  135. use electronic processes that are automated and high-volume to access or
  136. query the Whois database except as reasonably necessary to register
  137. domain names or modify existing registrations. VeriSign reserves the right
  138. to restrict your access to the Whois database in its sole discretion to ensure
  139. operational stability. VeriSign may restrict or terminate your access to the
  140. Whois database for failure to abide by these terms of use. VeriSign
  141. 0eserves the right to modify these terms at any �U@time.�~H
  142.  
  143. The Registry database contains ONLY .COM, .NET, .EDU domains and
  144. Registrars.
  145.  
  146. Gathered Netcraft information for www.jewish.net
  147. ---------------------------------------------------------------------------------------------------------------------------------------
  148.  
  149. Retrieving Netcraft.com information for www.jewish.net
  150. Netcraft.com Information gathered
  151.  
  152. Gathered Subdomain information for jewish.net
  153. ---------------------------------------------------------------------------------------------------------------------------------------
  154. Searching Google.com:80...
  155. HostName:www.jewish.net
  156. HostIP:69.73.184.159
  157. Searching Altavista.com:80...
  158. Found 1 possible subdomain(s) for host jewish.net, Searched 0 pages containing 0 results
  159.  
  160. Gathered E-Mail information for jewish.net
  161. ---------------------------------------------------------------------------------------------------------------------------------------
  162. Searching Google.com:80...
  163. Searching Altavista.com:80...
  164. Found 0 E-Mail(s) for host jewish.net, Searched 0 pages containing 0 results
  165.  
  166. Gathered TCP Port information for 69.73.184.159
  167. ---------------------------------------------------------------------------------------------------------------------------------------
  168.  
  169. Port State
  170.  
  171. 21/tcp open
  172. 22/tcp open
  173. 26/tcp open
  174. 80/tcp open
  175. 110/tcp open
  176. 143/tcp open
  177.  
  178. Portscan Finished: Scanned 150 ports, 5 ports were in state closed
  179.  
  180. ######################################################################################################################################
  181.  
  182. [i] Scanning Site: http://www.jewish.net
  183.  
  184.  
  185.  
  186. B A S I C I N F O
  187. ======================================================================================================================================
  188.  
  189.  
  190. [+] Site Title:
  191. [+] IP address: 69.73.184.159
  192. [+] Web Server: Could Not Detect
  193. [+] CMS: Could Not Detect
  194. [+] Cloudflare: Not Detected
  195. [+] Robots File: Could NOT Find robots.txt!
  196.  
  197.  
  198.  
  199.  
  200. W H O I S L O O K U P
  201. ======================================================================================================================================
  202.  
  203. Domain Name: JEWISH.NET
  204. Registry Domain ID: 1895875_DOMAIN_NET-VRSN
  205. Registrar WHOIS Server: whois.godaddy.com
  206. Registrar URL: http://www.godaddy.com
  207. Updated Date: 2018-02-16T10:48:18Z
  208. Creation Date: 1997-05-21T04:00:00Z
  209. Registry Expiry Date: 2021-05-22T04:00:00Z
  210. Registrar: GoDaddy.com, LLC
  211. Registrar IANA ID: 146
  212. Registrar Abuse Contact Email: abuse@godaddy.com
  213. Registrar Abuse Contact Phone: 480-624-2505
  214. Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
  215. Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
  216. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  217. Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
  218. Name Server: NS33.DOMAINCONTROL.COM
  219. Name Server: NS34.DOMAINCONTROL.COM
  220. DNSSEC: unsigned
  221. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  222. >>> Last update of whois database: 2018-11-12T23:29:54Z <<<
  223.  
  224. For more information on Whois status codes, please visit https://icann.org/epp
  225.  
  226.  
  227.  
  228. The Registry database contains ONLY .COM, .NET, .EDU domains and
  229. Registrars.
  230.  
  231.  
  232.  
  233.  
  234. G E O I P L O O K U P
  235. ======================================================================================================================================
  236.  
  237. [i] IP Address: 69.73.184.159
  238. [i] Country: US
  239. [i] State: Texas
  240. [i] City: Spring
  241. [i] Latitude: 30.079901
  242. [i] Longitude: -95.417198
  243.  
  244.  
  245.  
  246.  
  247. H T T P H E A D E R S
  248. =======================================================================================================================================
  249.  
  250.  
  251. [i] HTTP/1.1 200 OK
  252. [i] Date: Mon, 12 Nov 2018 23:30:03 GMT
  253. [i] Accept-Ranges: bytes
  254. [i] Content-Type: text/html
  255. [i] Connection: close
  256.  
  257.  
  258.  
  259.  
  260. D N S L O O K U P
  261. =======================================================================================================================================
  262.  
  263. jewish.net. 1799 IN A 69.73.184.159
  264. jewish.net. 3599 IN NS ns33.domaincontrol.com.
  265. jewish.net. 3599 IN NS ns34.domaincontrol.com.
  266. jewish.net. 3599 IN SOA ns33.domaincontrol.com. dns.jomax.net. 2017060501 28800 7200 604800 3600
  267. jewish.net. 3599 IN MX 20 ALT1.ASPMX.L.GOOGLE.COM.et.
  268. jewish.net. 3599 IN MX 30 ALT2.ASPMX.L.GOOGLE.com.
  269. jewish.net. 3599 IN MX 10 ASPMX.L.GOOGLE.com.
  270. jewish.net. 3599 IN MX 40 ASPMX2.GOOGLEMAIL.com.
  271. jewish.net. 3599 IN MX 50 ASPMX3.GOOGLEMAIL.com.
  272.  
  273.  
  274.  
  275.  
  276. S U B N E T C A L C U L A T I O N
  277. =======================================================================================================================================
  278.  
  279. Address = 69.73.184.159
  280. Network = 69.73.184.159 / 32
  281. Netmask = 255.255.255.255
  282. Broadcast = not needed on Point-to-Point links
  283. Wildcard Mask = 0.0.0.0
  284. Hosts Bits = 0
  285. Max. Hosts = 1 (2^0 - 0)
  286. Host Range = { 69.73.184.159 - 69.73.184.159 }
  287.  
  288.  
  289.  
  290. N M A P P O R T S C A N
  291. =======================================================================================================================================
  292.  
  293.  
  294. Starting Nmap 7.40 ( https://nmap.org ) at 2018-11-12 23:30 UTC
  295. Nmap scan report for jewish.net (69.73.184.159)
  296. Host is up (0.020s latency).
  297. rDNS record for 69.73.184.159: finn.nocdirect.com
  298. PORT STATE SERVICE
  299. 21/tcp open ftp
  300. 22/tcp open ssh
  301. 23/tcp filtered telnet
  302. 80/tcp open http
  303. 110/tcp open pop3
  304. 143/tcp open imap
  305. 443/tcp open https
  306. 3389/tcp filtered ms-wbt-server
  307.  
  308. Nmap done: 1 IP address (1 host up) scanned in 1.32 seconds
  309.  
  310.  
  311.  
  312. S U B - D O M A I N F I N D E R
  313. =======================================================================================================================================
  314.  
  315.  
  316. [i] Total Subdomains Found : 4
  317.  
  318. [+] Subdomain: vps1.jewish.net
  319. [-] IP: 209.217.253.175
  320.  
  321. [+] Subdomain: vps2.jewish.net
  322. [-] IP: 209.140.30.90
  323.  
  324. [+] Subdomain: vps3.jewish.net
  325. [-] IP: 209.140.28.114
  326.  
  327. [+] Subdomain: update.jewish.net
  328. [-] IP: 209.140.28.114
  329.  
  330. #######################################################################################################################################
  331.  
  332. [?] Enter the target: http://www.jewish.net/
  333. [!] IP Address : 69.73.184.159
  334. [!] www.jewish.net doesn't seem to use a CMS
  335. [+] Honeypot Probabilty: 30%
  336. ---------------------------------------------------------------------------------------------------------------------------------------
  337. [~] Trying to gather whois information for www.jewish.net
  338. [+] Whois information found
  339. [-] Unable to build response, visit https://who.is/whois/www.jewish.net
  340. --------------------------------------------------------------------------------------------------------------------------------------
  341. PORT STATE SERVICE
  342. 21/tcp open ftp
  343. 22/tcp open ssh
  344. 23/tcp filtered telnet
  345. 80/tcp open http
  346. 110/tcp open pop3
  347. 143/tcp open imap
  348. 443/tcp open https
  349. 3389/tcp filtered ms-wbt-server
  350. Nmap done: 1 IP address (1 host up) scanned in 1.27 seconds
  351. ---------------------------------------------------------------------------------------------------------------------------------------
  352.  
  353. [+] DNS Records
  354. ns34.domaincontrol.com. (173.201.74.17) AS26496 GoDaddy.com, LLC United States
  355. ns33.domaincontrol.com. (216.69.185.17) AS26496 GoDaddy.com, LLC United States
  356.  
  357. [+] MX Records
  358. 30 (74.125.193.27) AS15169 Google Inc. United States
  359.  
  360. [+] MX Records
  361. 10 (172.217.197.27) AS15169 Google Inc. United States
  362.  
  363. [+] MX Records
  364. 40 (64.233.186.26) AS15169 Google Inc. United States
  365.  
  366. [+] MX Records
  367. 50 (74.125.193.26) AS15169 Google Inc. United States
  368.  
  369. [+] Host Records (A)
  370. www.jewish.netHTTP: (finn.nocdirect.com) (69.73.184.159) AS3595 Global Net Access, LLC United States
  371.  
  372. [+] TXT Records
  373.  
  374. [+] DNS Map: https://dnsdumpster.com/static/map/jewish.net.png
  375.  
  376. [>] Initiating 3 intel modules
  377. [>] Loading Alpha module (1/3)
  378. [>] Beta module deployed (2/3)
  379. [>] Gamma module initiated (3/3)
  380. No emails found
  381. No hosts found
  382. [+] Virtual hosts:
  383. --------------------------------------------------------------------------------------------------------------------------------------
  384. ######################################################################################################################################
  385. -------------------------------------------------------------------------------------------------------------------------------------
  386. + Target IP: 69.73.184.159
  387. + Target Hostname: www.jewish.net
  388. + Target Port: 80
  389. + Start Time: 2018-11-12 18:19:41 (GMT-5)
  390. ---------------------------------------------------------------------------------------------------------------------------------------
  391. + Server: No banner retrieved
  392. + The anti-clickjacking X-Frame-Options header is not present.
  393. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  394. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  395. + ERROR: Error limit (20) reached for host, giving up. Last error: error reading HTTP response
  396. + Scan terminated: 20 error(s) and 3 item(s) reported on remote host
  397. + End Time: 2018-11-12 18:26:34 (GMT-5) (413 seconds)
  398. --------------------------------------------------------------------------------------------------------------------------------------
  399. ######################################################################################################################################
  400. ---------------------------------------------------------------------------------------------------------------------------------------
  401. + Target IP: 69.73.184.159
  402. + Target Hostname: 69.73.184.159
  403. + Target Port: 443
  404. ---------------------------------------------------------------------------------------------------------------------------------------
  405. + SSL Info: Subject: /CN=finn.nocdirect.com.zz
  406. Ciphers: ECDHE-RSA-AES256-GCM-SHA384
  407. Issuer: /CN=finn.nocdirect.com.zz
  408. + Start Time: 2018-11-12 18:21:16 (GMT-5)
  409. --------------------------------------------------------------------------------------------------------------------------------------
  410. + Server: Apache
  411. + The anti-clickjacking X-Frame-Options header is not present.
  412. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  413. + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
  414. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  415. + ERROR: Error limit (20) reached for host, giving up. Last error: opening stream: can't connect: Connect failed: ; Connection timed out at /var/lib/nikto/plugins/LW2.pm line 5157.
  416. : Connection timed out
  417. + Scan terminated: 20 error(s) and 4 item(s) reported on remote host
  418. + End Time: 2018-11-12 18:28:06 (GMT-5) (410 seconds)
  419. --------------------------------------------------------------------------------------------------------------------------------------
  420. ######################################################################################################################################
  421. [+] Hosting Info for Website: www.jewish.net
  422. [+] Visitors per day: < 200
  423. [+] IP Address: 69.73.184.159
  424. [+] IP Reverse DNS (Host): finn.nocdirect.com
  425. [+] Hosting IP Range: 69.73.128.0 - 69.73.191.255 (16,384 ip)
  426. [+] Hosting Address: 2626 Spring Cypress Road, Spring, TX, 77388, US
  427. [+] Hosting Country: USA
  428. [+] Hosting Phone: +1-281-942-2800
  429. [+] Hosting Website: www.networktransit.net
  430. [+] CIDR: 69.73.128.0/18
  431. [+] Hosting CIDR: 69.73.128.0/18
  432.  
  433. [+] NS: jewish.net
  434. [+] NS: ns33.domaincontrol.com
  435. [+] NS: ns34.domaincontrol.com
  436. #######################################################################################################################################
  437.  
  438. ; <<>> DiG 9.11.5-1-Debian <<>> jewish.net
  439. ;; global options: +cmd
  440. ;; Got answer:
  441. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54838
  442. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  443.  
  444. ;; OPT PSEUDOSECTION:
  445. ; EDNS: version: 0, flags:; udp: 4096
  446. ;; QUESTION SECTION:
  447. ;jewish.net. IN A
  448.  
  449. ;; ANSWER SECTION:
  450. jewish.net. 1800 IN A 69.73.184.159
  451.  
  452. ;; Query time: 143 msec
  453. ;; SERVER: 194.187.251.67#53(194.187.251.67)
  454. ;; WHEN: lun nov 12 18:51:17 EST 2018
  455. ;; MSG SIZE rcvd: 55
  456.  
  457. ######################################################################################################################################
  458.  
  459. ; <<>> DiG 9.11.5-1-Debian <<>> +trace jewish.net
  460. ;; global options: +cmd
  461. . 84677 IN NS e.root-servers.net.
  462. . 84677 IN NS f.root-servers.net.
  463. . 84677 IN NS m.root-servers.net.
  464. . 84677 IN NS i.root-servers.net.
  465. . 84677 IN NS h.root-servers.net.
  466. . 84677 IN NS c.root-servers.net.
  467. . 84677 IN NS d.root-servers.net.
  468. . 84677 IN NS a.root-servers.net.
  469. . 84677 IN NS l.root-servers.net.
  470. . 84677 IN NS g.root-servers.net.
  471. . 84677 IN NS b.root-servers.net.
  472. . 84677 IN NS j.root-servers.net.
  473. . 84677 IN NS k.root-servers.net.
  474. . 84677 IN RRSIG NS 8 0 518400 20181125170000 20181112160000 2134 . j4dK8ZhBRxbwKKnFW+JtmtK9/SEOrKadV7KLXxE+MdXi7lEbPdeHwyO3 SKwAaMtOA1wla7tEP94C/7P0o9oztfesyTErvWY7ihkbRenZFxa2bY62 eYohQCNyedJj1bo1K/KrZjX/ixeynC2bq5f4MXH7mWTVFvFload2MqPH 1BBl/xAVIghpJe604i4oB7mEPlznlYyDPPLnJzMii45ZRbXe3AU/9adY FRkrxt3VbHnFUGcFyIqcLdzwKtpj5R7fAqPdtVs5+VXYmPuSGqFNQ8BP tgoJRA7lOAQ2eT5/Clg15MkEHDwPJ/+inztfg9tQq2PTWkpg800TohHr +Y2JEg==
  475. ;; Received 525 bytes from 194.187.251.67#53(194.187.251.67) in 132 ms
  476.  
  477. net. 172800 IN NS a.gtld-servers.net.
  478. net. 172800 IN NS b.gtld-servers.net.
  479. net. 172800 IN NS c.gtld-servers.net.
  480. net. 172800 IN NS d.gtld-servers.net.
  481. net. 172800 IN NS e.gtld-servers.net.
  482. net. 172800 IN NS f.gtld-servers.net.
  483. net. 172800 IN NS g.gtld-servers.net.
  484. net. 172800 IN NS h.gtld-servers.net.
  485. net. 172800 IN NS i.gtld-servers.net.
  486. net. 172800 IN NS j.gtld-servers.net.
  487. net. 172800 IN NS k.gtld-servers.net.
  488. net. 172800 IN NS l.gtld-servers.net.
  489. net. 172800 IN NS m.gtld-servers.net.
  490. net. 86400 IN DS 35886 8 2 7862B27F5F516EBE19680444D4CE5E762981931842C465F00236401D 8BD973EE
  491. net. 86400 IN RRSIG DS 8 1 86400 20181125170000 20181112160000 2134 . 2m7FFQ+rJsxmfmS3yFvcc1zbQU2EkZlKzPtmRji5jrpNHDd+UKS1kA9j N4t/oXy27f3AiH+K8jHlOOqnl77ihyTZ54tBQHTL0pb2GjBbiNsGmJUc NoTAYbmZ7VJTvE8DrkY/I2ZtlMYDCZrKsOWG+hf6HWfgQO3gyqu7Momr PUNHXs10fv31T94/D3E8m+RMc4tKlia+5cWwfoN3kqwjRxtEOjgYXMFN HIIppGEWEGmXHfAJhW2osdFVM3wLWi/jql3WqBoJgHj0GnbA6Z04ZB6P m2PRB8up3/ZarNlJ6+piAI5B5ExwXnxo4AIyqDqYg1sQDhAsbJQJ+TwE ul+vIQ==
  492. ;; Received 1167 bytes from 2001:7fd::1#53(k.root-servers.net) in 136 ms
  493.  
  494. jewish.net. 172800 IN NS ns33.domaincontrol.com.
  495. jewish.net. 172800 IN NS ns34.domaincontrol.com.
  496. A1RT98BS5QGC9NFI51S9HCI47ULJG6JH.net. 86400 IN NSEC3 1 1 0 - A1RUUFFJKCT2Q54P78F8EJGJ8JBK7I8B NS SOA RRSIG DNSKEY NSEC3PARAM
  497. A1RT98BS5QGC9NFI51S9HCI47ULJG6JH.net. 86400 IN RRSIG NSEC3 8 2 86400 20181116062711 20181109051711 6140 net. wrG8JgFFtuyQ5Re8TfxvOqM4SQwLK54XFMgDJzzMtOLNBNro4a+/TVy+ 3psbwhp8vLA8CIL6QMbQe7KQYkbXsVXiYzGNn/Ywp2Kk5DYHZc95foRe Tk2QAJUqVjBzr5O9+G6F62tVM+t0N2expPKlL2AqhQu2hDIPdSPm5K7M i2U=
  498. NFMMI3N1148H3LEPNQB26PTI6JHN9CVT.net. 86400 IN NSEC3 1 1 0 - NFN5TMSMHCFFAK16T6L9MF4CM6HTH12J NS DS RRSIG
  499. NFMMI3N1148H3LEPNQB26PTI6JHN9CVT.net. 86400 IN RRSIG NSEC3 8 2 86400 20181116062223 20181109051223 6140 net. Ma8UDXqe1pT+q3QGtClajQpf/iXJHnhpvIqWZ5RSccaj/kGgn//V0QJH 4DdTtCgyIGobmETcLugFy1/biZI+q1Yy8hOBHCMqgn/QDmT1hwoDNRJs OnvbKcEnz1Cwc4kqDuxlsZQB34px8rMr8q0n7+FqCkISQ0+7pCc6zJbg m9o=
  500. ;; Received 667 bytes from 2001:503:eea3::30#53(g.gtld-servers.net) in 134 ms
  501.  
  502. jewish.net. 1800 IN A 69.73.184.159
  503. jewish.net. 3600 IN NS ns33.domaincontrol.com.
  504. jewish.net. 3600 IN NS ns34.domaincontrol.com.
  505. ;; Received 110 bytes from 2603:5:22a1::11#53(ns34.domaincontrol.com) in 133 ms
  506. ######################################################################################################################################
  507. [*] Performing General Enumeration of Domain: jewish.net
  508. [-] DNSSEC is not configured for jewish.net
  509. [*] SOA ns33.domaincontrol.com 216.69.185.17
  510. [*] NS ns33.domaincontrol.com 216.69.185.17
  511. [*] NS ns33.domaincontrol.com 2607:f208:206::11
  512. [*] NS ns34.domaincontrol.com 173.201.74.17
  513. [*] NS ns34.domaincontrol.com 2603:5:22a1::11
  514. [*] MX ASPMX.L.GOOGLE.COM 74.125.133.26
  515. [*] MX ALT2.ASPMX.L.GOOGLE.COM 172.217.194.27
  516. [*] MX ASPMX2.GOOGLEMAIL.COM 64.233.164.27
  517. [*] MX ASPMX3.GOOGLEMAIL.COM 172.217.194.26
  518. [*] MX ASPMX.L.GOOGLE.COM 2a00:1450:400c:c06::1b
  519. [*] MX ALT2.ASPMX.L.GOOGLE.COM 2404:6800:4003:c04::1a
  520. [*] MX ASPMX2.GOOGLEMAIL.COM 2a00:1450:4010:c07::1b
  521. [*] A jewish.net 69.73.184.159
  522. [*] Enumerating SRV Records
  523. [-] No SRV Records Found for jewish.net
  524. [+] 0 Records Found
  525. ######################################################################################################################################
  526. [*] Processing domain jewish.net
  527. [+] Getting nameservers
  528. 216.69.185.17 - ns33.domaincontrol.com
  529. 173.201.74.17 - ns34.domaincontrol.com
  530. [-] Zone transfer failed
  531.  
  532. [+] MX records found, added to target list
  533. 10 ASPMX.L.GOOGLE.COM.
  534. 30 ALT2.ASPMX.L.GOOGLE.COM.
  535. 40 ASPMX2.GOOGLEMAIL.COM.
  536. 20 ALT1.ASPMX.L.GOOGLE.COM.et.
  537. 50 ASPMX3.GOOGLEMAIL.COM.
  538.  
  539. [*] Scanning jewish.net for A records
  540. 69.73.184.159 - jewish.net
  541. 69.73.184.159 - ftp.jewish.net
  542. 209.140.28.114 - update.jewish.net
  543. 209.217.253.175 - vps1.jewish.net
  544. 209.140.30.90 - vps2.jewish.net
  545. 68.178.252.5 - webmail.jewish.net
  546. 72.167.218.55 - webmail.jewish.net
  547. 173.201.192.133 - webmail.jewish.net
  548. 173.201.192.5 - webmail.jewish.net
  549. 173.201.193.133 - webmail.jewish.net
  550. 173.201.193.20 - webmail.jewish.net
  551. 173.201.192.20 - webmail.jewish.net
  552. 173.201.193.5 - webmail.jewish.net
  553. 173.201.192.148 - webmail.jewish.net
  554. 72.167.218.173 - webmail.jewish.net
  555. 68.178.252.148 - webmail.jewish.net
  556. 97.74.135.45 - webmail.jewish.net
  557. 68.178.252.20 - webmail.jewish.net
  558. 68.178.252.133 - webmail.jewish.net
  559. 72.167.218.183 - webmail.jewish.net
  560. 45.40.130.40 - webmail.jewish.net
  561. 97.74.135.148 - webmail.jewish.net
  562. 72.167.218.45 - webmail.jewish.net
  563. 45.40.130.41 - webmail.jewish.net
  564. 97.74.135.55 - webmail.jewish.net
  565. 97.74.135.133 - webmail.jewish.net
  566. 173.201.193.148 - webmail.jewish.net
  567. 69.73.184.159 - www.jewish.net
  568. ######################################################################################################################################
  569. Total hosts: 9
  570.  
  571. [-] Resolving hostnames IPs...
  572.  
  573. ...jewish-net:empty
  574. vps1.jewish.net:209.217.253.175
  575. vps3.jewish.net:209.140.28.114
  576. www.jewish-net:empty
  577. www.jewish.net:69.73.184.159
  578. www.vps1.jewish.net:empty
  579. www.vps3.jewish.net:empty
  580.  
  581. #####################################################################################################################################
  582.  
  583. Ip Address Status Type Domain Name Server
  584. ---------------------------------------------------------------------------------------------------------------------------------------
  585. 69.73.184.159 200 alias ftp.jewish.net
  586. 69.73.184.159 200 host jewish.net
  587. 209.140.28.114 host update.jewish.net
  588. 72.167.218.173 301 alias webmail.jewish.net
  589. 72.167.218.173 301 alias webmail.secureserver.net
  590. 72.167.218.173 301 host email.secureserver.net
  591. 72.167.218.183 301 host email.secureserver.net
  592. 173.201.193.133 301 host email.secureserver.net
  593. 173.201.192.20 301 host email.secureserver.net
  594. 173.201.193.148 301 host email.secureserver.net
  595. 72.167.218.55 301 host email.secureserver.net
  596. 45.40.130.41 301 host email.secureserver.net
  597. 72.167.218.45 301 host email.secureserver.net
  598. 173.201.192.148 301 host email.secureserver.net
  599. 173.201.192.5 301 host email.secureserver.net
  600. 68.178.252.5 301 host email.secureserver.net
  601. 97.74.135.55 301 host email.secureserver.net
  602. 97.74.135.148 301 host email.secureserver.net
  603. 173.201.193.20 301 host email.secureserver.net
  604. 173.201.193.5 301 host email.secureserver.net
  605. 97.74.135.45 301 host email.secureserver.net
  606. 68.178.252.148 301 host email.secureserver.net
  607. 173.201.192.133 301 host email.secureserver.net
  608. 68.178.252.133 301 host email.secureserver.net
  609. 68.178.252.20 301 host email.secureserver.net
  610. 97.74.135.133 301 host email.secureserver.net
  611. 45.40.130.40 301 host email.secureserver.net
  612. 69.73.184.159 200 alias www.jewish.net Apache
  613. 69.73.184.159 200 host jewish.net Apache
  614. ######################################################################################################################################
  615. [+] Testing domain
  616. www.jewish.net 69.73.184.159
  617. [+] Dns resolving
  618. Domain name Ip address Name server
  619. jewish.net 69.73.184.159 finn.nocdirect.com
  620. Found 1 host(s) for jewish.net
  621. [+] Testing wildcard
  622. Ok, no wildcard found.
  623.  
  624. [+] Scanning for subdomain on jewish.net
  625. [!] Wordlist not specified. I scannig with my internal wordlist...
  626. Estimated time about 69.62 seconds
  627.  
  628. Subdomain Ip address Name server
  629.  
  630. ftp.jewish.net 69.73.184.159 finn.nocdirect.com
  631. update.jewish.net 209.140.28.114 vps.moviesonlinefreestreaming.org
  632. webmail.jewish.net 45.40.130.40 p3plgemwbe26-v05.prod.phx3.secureserver.net
  633. www.jewish.net 69.73.184.159 finn.nocdirect.com
  634.  
  635. ######################################################################################################################################
  636. dnsenum VERSION:1.2.4
  637.  
  638. ----- www.jewish.net -----
  639.  
  640.  
  641. Host's addresses:
  642. __________________
  643.  
  644. jewish.net. 1604 IN A 69.73.184.159
  645.  
  646.  
  647. Name Servers:
  648. ______________
  649.  
  650. ns33.domaincontrol.com. 86399 IN A 216.69.185.17
  651. ns34.domaincontrol.com. 86399 IN A 173.201.74.17
  652.  
  653.  
  654. Mail (MX) Servers:
  655. ___________________
  656.  
  657. ASPMX3.GOOGLEMAIL.COM. 293 IN A 172.217.194.26
  658. ASPMX2.GOOGLEMAIL.COM. 293 IN A 64.233.164.26
  659. ALT2.ASPMX.L.GOOGLE.COM. 211 IN A 172.217.194.26
  660. ASPMX.L.GOOGLE.COM. 200 IN A 108.177.15.26
  661.  
  662.  
  663. Trying Zone Transfers and getting Bind Versions:
  664. _________________________________________________
  665.  
  666.  
  667. Trying Zone Transfer for www.jewish.net on ns33.domaincontrol.com ...
  668.  
  669. Trying Zone Transfer for www.jewish.net on ns34.domaincontrol.com ...
  670.  
  671. brute force file not specified, bay.
  672. ######################################################################################################################################
  673.  
  674.  
  675. Running Source: Ask
  676. Running Source: Archive.is
  677. Running Source: Baidu
  678. Running Source: Bing
  679. Running Source: CertDB
  680. Running Source: CertificateTransparency
  681. Running Source: Certspotter
  682. Running Source: Commoncrawl
  683. Running Source: Crt.sh
  684. Running Source: Dnsdb
  685. Running Source: DNSDumpster
  686. Running Source: DNSTable
  687. Running Source: Dogpile
  688. Running Source: Exalead
  689. Running Source: Findsubdomains
  690. Running Source: Googleter
  691. Running Source: Hackertarget
  692. Running Source: Ipv4Info
  693. Running Source: PTRArchive
  694. Running Source: Sitedossier
  695. Running Source: Threatcrowd
  696. Running Source: ThreatMiner
  697. Running Source: WaybackArchive
  698. Running Source: Yahoo
  699.  
  700. Running enumeration on www.jewish.net
  701.  
  702. dnsdb: Unexpected return status 503
  703.  
  704. waybackarchive: Get https://web.archive.org/cdx/search/cdx?url=*.www.jewish.net/*&output=json&fl=original&collapse=urlkey&page=: net/http: invalid header field value "http://web.archive.org/cdx/search/cdx?url=*.www.jewish.net/*&output=json&fl=original&collapse=urlkey&page=\x00" for key Referer
  705.  
  706.  
  707. Starting Bruteforcing of www.jewish.net with 9985 words
  708.  
  709. Total 1 Unique subdomains found for www.jewish.net
  710.  
  711. .www.jewish.net
  712. ######################################################################################################################################
  713. [*] Processing domain www.jewish.net
  714. [+] Getting nameservers
  715. 216.69.185.17 - ns33.domaincontrol.com
  716. 173.201.74.17 - ns34.domaincontrol.com
  717. [-] Zone transfer failed
  718.  
  719. [+] MX records found, added to target list
  720. 50 ASPMX3.GOOGLEMAIL.COM.
  721. 40 ASPMX2.GOOGLEMAIL.COM.
  722. 30 ALT2.ASPMX.L.GOOGLE.COM.
  723. 10 ASPMX.L.GOOGLE.COM.
  724. 20 ALT1.ASPMX.L.GOOGLE.COM.et.
  725.  
  726. [*] Scanning www.jewish.net for A records
  727. 69.73.184.159 - www.jewish.net
  728.  
  729. ######################################################################################################################################
  730. [+] www.jewish.net has no SPF record!
  731. [*] No DMARC record found. Looking for organizational record
  732. [+] No organizational DMARC record
  733. [+] Spoofing possible for www.jewish.net!
  734. ######################################################################################################################################
  735. __
  736. ____ _____ ___ ______ _/ /_____ ____ ___
  737. / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
  738. / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
  739. \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
  740. /_/ discover v0.5.0 - by @michenriksen
  741.  
  742. Identifying nameservers for www.jewish.net... Done
  743. Using nameservers:
  744.  
  745. - 216.69.185.17
  746. - 173.201.74.17
  747.  
  748. Checking for wildcard DNS... Done
  749.  
  750. Running collector: Threat Crowd... Done (0 hosts)
  751. Running collector: DNSDB... Error
  752. -> DNSDB returned unexpected response code: 503
  753. Running collector: Netcraft... Done (0 hosts)
  754. Running collector: PublicWWW... Done (0 hosts)
  755. Running collector: Censys... Skipped
  756. -> Key 'censys_secret' has not been set
  757. Running collector: Wayback Machine... Done (4 hosts)
  758. Running collector: PTRArchive... Error
  759. -> PTRArchive returned unexpected response code: 502
  760. Running collector: PassiveTotal... Skipped
  761. -> Key 'passivetotal_key' has not been set
  762. Running collector: Shodan... Skipped
  763. -> Key 'shodan' has not been set
  764. Running collector: Riddler... Skipped
  765. -> Key 'riddler_username' has not been set
  766. Running collector: VirusTotal... Skipped
  767. -> Key 'virustotal' has not been set
  768. Running collector: Dictionary... Done (0 hosts)
  769. Running collector: HackerTarget... Done (1 host)
  770. Running collector: Google Transparency Report... Done (0 hosts)
  771. Running collector: Certificate Search... Done (0 hosts)
  772.  
  773. Resolving 4 unique hosts...
  774. 69.73.184.159 jewish.net
  775. 209.140.28.114 update.jewish.net
  776. 69.73.184.159 www.jewish.net
  777.  
  778. Found subnets:
  779.  
  780. - 69.73.184.0-255 : 2 hosts
  781.  
  782. Wrote 3 hosts to:
  783.  
  784. - file:///root/aquatone/www.jewish.net/hosts.txt
  785. - file:///root/aquatone/www.jewish.net/hosts.json
  786. __
  787. ____ _____ ___ ______ _/ /_____ ____ ___
  788. / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
  789. / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
  790. \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
  791. /_/ takeover v0.5.0 - by @michenriksen
  792.  
  793. Loaded 3 hosts from /root/aquatone/www.jewish.net/hosts.json
  794. Loaded 25 domain takeover detectors
  795.  
  796. Identifying nameservers for www.jewish.net... Done
  797. Using nameservers:
  798.  
  799. - 216.69.185.17
  800. - 173.201.74.17
  801.  
  802. Checking hosts for domain takeover vulnerabilities...
  803.  
  804. Finished checking hosts:
  805.  
  806. - Vulnerable : 0
  807. - Not Vulnerable : 3
  808.  
  809. Wrote 0 potential subdomain takeovers to:
  810.  
  811. - file:///root/aquatone/www.jewish.net/takeovers.json
  812.  
  813. __
  814. ____ _____ ___ ______ _/ /_____ ____ ___
  815. / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
  816. / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
  817. \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
  818. /_/ scan v0.5.0 - by @michenriksen
  819.  
  820. Loaded 3 hosts from /root/aquatone/www.jewish.net/hosts.json
  821.  
  822. Probing 4 ports...
  823. 80/tcp 209.140.28.114 update.jewish.net
  824. 80/tcp 69.73.184.159 jewish.net, www.jewish.net
  825. 443/tcp 69.73.184.159 jewish.net, www.jewish.net
  826.  
  827. Wrote open ports to file:///root/aquatone/www.jewish.net/open_ports.txt
  828. Wrote URLs to file:///root/aquatone/www.jewish.net/urls.txt
  829. __
  830. ____ _____ ___ ______ _/ /_____ ____ ___
  831. / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
  832. / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
  833. \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
  834. /_/ gather v0.5.0 - by @michenriksen
  835.  
  836. Processing 5 pages...
  837.  
  838. Incompatability Error: Nightmarejs must be run on a system with a graphical desktop session (X11)
  839. ######################################################################################################################################
  840. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 19:30 EST
  841. Nmap scan report for www.jewish.net (69.73.184.159)
  842. Host is up (0.22s latency).
  843. Not shown: 429 filtered ports, 35 closed ports
  844. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  845. PORT STATE SERVICE
  846. 21/tcp open ftp
  847. 22/tcp open ssh
  848. 80/tcp open http
  849. 110/tcp open pop3
  850. 143/tcp open imap
  851. 443/tcp open https
  852. 465/tcp open smtps
  853. 587/tcp open submission
  854. 993/tcp open imaps
  855. 995/tcp open pop3s
  856. 3306/tcp open mysql
  857. 5666/tcp open nrpe
  858. #######################################################################################################################################
  859. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 19:31 EST
  860. Nmap scan report for www.jewish.net (69.73.184.159)
  861. Host is up (0.13s latency).
  862. Not shown: 2 filtered ports, 1 closed port
  863. PORT STATE SERVICE
  864. 67/udp open|filtered dhcps
  865. 68/udp open|filtered dhcpc
  866. 69/udp open|filtered tftp
  867. 88/udp open|filtered kerberos-sec
  868. 123/udp open|filtered ntp
  869. 139/udp open|filtered netbios-ssn
  870. 161/udp open|filtered snmp
  871. 162/udp open|filtered snmptrap
  872. 389/udp open|filtered ldap
  873. 520/udp open|filtered route
  874. 2049/udp open|filtered nfs
  875. #######################################################################################################################################
  876. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 19:31 EST
  877. Nmap scan report for www.jewish.net (69.73.184.159)
  878. Host is up (0.21s latency).
  879.  
  880. PORT STATE SERVICE VERSION
  881. 21/tcp open ftp Pure-FTPd
  882. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  883. Device type: general purpose|storage-misc|firewall|webcam
  884. Running (JUST GUESSING): Linux 4.X|3.X|2.6.X (92%), Synology DiskStation Manager 5.X (87%), WatchGuard Fireware 11.X (87%), Tandberg embedded (85%), FreeBSD 6.X (85%)
  885. OS CPE: cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/h:tandberg:vcs cpe:/o:freebsd:freebsd:6.2
  886. Aggressive OS guesses: Linux 4.4 (92%), Linux 3.10 - 3.12 (91%), Linux 2.6.18 - 2.6.22 (90%), Linux 4.9 (90%), Linux 4.0 (88%), Linux 2.6.18 (87%), Linux 3.10 - 3.16 (87%), Linux 3.10 - 4.11 (87%), Linux 3.11 - 4.1 (87%), Linux 3.18 (87%)
  887. No exact OS matches for host (test conditions non-ideal).
  888. Network Distance: 11 hops
  889.  
  890. TRACEROUTE (using port 21/tcp)
  891. HOP RTT ADDRESS
  892. 1 122.10 ms 10.244.200.1
  893. 2 122.12 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
  894. 3 122.14 ms 185.206.226.11
  895. 4 122.88 ms 80.231.153.49
  896. 5 ...
  897. 6 221.37 ms 4.69.150.161
  898. 7 213.54 ms ZAYO-BANDWI.edge1.Atlanta4.Level3.net (4.53.236.134)
  899. 8 213.96 ms 205.214.72.82
  900. 9 216.17 ms 209.51.149.106
  901. 10 215.19 ms 63.247.66.122
  902. 11 214.44 ms finn.nocdirect.com (69.73.184.159)
  903. #######################################################################################################################################
  904. # general
  905. (gen) banner: SSH-2.0-OpenSSH_7.4
  906. (gen) software: OpenSSH 7.4
  907. (gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
  908. (gen) compression: enabled (zlib@openssh.com)
  909.  
  910. # key exchange algorithms
  911. (kex) curve25519-sha256 -- [warn] unknown algorithm
  912. (kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
  913. (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
  914. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  915. (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
  916. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  917. (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
  918. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  919. (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
  920. `- [info] available since OpenSSH 4.4
  921. (kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
  922. (kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
  923. (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  924. `- [warn] using weak hashing algorithm
  925. `- [info] available since OpenSSH 2.3.0
  926. (kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
  927. (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
  928. `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
  929. (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  930. `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
  931. `- [warn] using small 1024-bit modulus
  932. `- [warn] using weak hashing algorithm
  933. `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
  934.  
  935. # host-key algorithms
  936. (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
  937. (key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
  938. (key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
  939. (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
  940. `- [warn] using weak random number generator could reveal the key
  941. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  942. (key) ssh-ed25519 -- [info] available since OpenSSH 6.5
  943.  
  944. # encryption algorithms (ciphers)
  945. (enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
  946. `- [info] default cipher since OpenSSH 6.9.
  947. (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
  948. (enc) aes192-ctr -- [info] available since OpenSSH 3.7
  949. (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
  950. (enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
  951. (enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
  952. (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  953. `- [warn] using weak cipher mode
  954. `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
  955. (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  956. `- [warn] using weak cipher mode
  957. `- [info] available since OpenSSH 2.3.0
  958. (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  959. `- [warn] using weak cipher mode
  960. `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
  961. (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  962. `- [fail] disabled since Dropbear SSH 0.53
  963. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  964. `- [warn] using weak cipher mode
  965. `- [warn] using small 64-bit block size
  966. `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
  967. (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  968. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  969. `- [warn] using weak cipher mode
  970. `- [warn] using small 64-bit block size
  971. `- [info] available since OpenSSH 2.1.0
  972. (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  973. `- [warn] using weak cipher
  974. `- [warn] using weak cipher mode
  975. `- [warn] using small 64-bit block size
  976. `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
  977.  
  978. # message authentication code algorithms
  979. (mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
  980. `- [info] available since OpenSSH 6.2
  981. (mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
  982. (mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
  983. (mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
  984. (mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
  985. `- [info] available since OpenSSH 6.2
  986. (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
  987. `- [warn] using small 64-bit tag size
  988. `- [info] available since OpenSSH 4.7
  989. (mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
  990. `- [info] available since OpenSSH 6.2
  991. (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
  992. `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
  993. (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
  994. `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
  995. (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
  996. `- [warn] using weak hashing algorithm
  997. `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
  998.  
  999. # algorithm recommendations (for OpenSSH 7.4)
  1000. (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
  1001. (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
  1002. (rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
  1003. (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
  1004. (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
  1005. (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
  1006. (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
  1007. (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
  1008. (rec) -blowfish-cbc -- enc algorithm to remove
  1009. (rec) -3des-cbc -- enc algorithm to remove
  1010. (rec) -aes256-cbc -- enc algorithm to remove
  1011. (rec) -cast128-cbc -- enc algorithm to remove
  1012. (rec) -aes192-cbc -- enc algorithm to remove
  1013. (rec) -aes128-cbc -- enc algorithm to remove
  1014. (rec) -hmac-sha2-512 -- mac algorithm to remove
  1015. (rec) -umac-128@openssh.com -- mac algorithm to remove
  1016. (rec) -hmac-sha2-256 -- mac algorithm to remove
  1017. (rec) -umac-64@openssh.com -- mac algorithm to remove
  1018. (rec) -hmac-sha1 -- mac algorithm to remove
  1019. (rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
  1020. (rec) -umac-64-etm@openssh.com -- mac algorithm to remove
  1021. #######################################################################################################################################
  1022. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 19:46 EST
  1023. Nmap scan report for www.jewish.net (69.73.184.159)
  1024. Host is up (0.22s latency).
  1025.  
  1026. PORT STATE SERVICE VERSION
  1027. 22/tcp filtered ssh
  1028. Too many fingerprints match this host to give specific OS details
  1029. Network Distance: 11 hops
  1030.  
  1031. TRACEROUTE (using proto 1/icmp)
  1032. HOP RTT ADDRESS
  1033. 1 126.43 ms 10.244.200.1
  1034. 2 135.41 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
  1035. 3 126.47 ms 185.206.226.11
  1036. 4 126.98 ms 80.231.153.49
  1037. 5 ...
  1038. 6 220.46 ms 4.69.150.161
  1039. 7 219.08 ms ZAYO-BANDWI.edge1.Atlanta4.Level3.net (4.53.236.134)
  1040. 8 219.48 ms 205.214.72.82
  1041. 9 221.73 ms 209.51.149.106
  1042. 10 219.97 ms 63.247.66.122
  1043. 11 217.90 ms finn.nocdirect.com (69.73.184.159)
  1044. #######################################################################################################################################
  1045. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 19:48 EST
  1046. Nmap scan report for www.jewish.net (69.73.184.159)
  1047. Host is up (0.21s latency).
  1048.  
  1049. PORT STATE SERVICE VERSION
  1050. 67/udp open|filtered dhcps
  1051. |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
  1052. Too many fingerprints match this host to give specific OS details
  1053. Network Distance: 11 hops
  1054.  
  1055. TRACEROUTE (using proto 1/icmp)
  1056. HOP RTT ADDRESS
  1057. 1 122.70 ms 10.244.200.1
  1058. 2 159.86 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
  1059. 3 122.73 ms 185.206.226.11
  1060. 4 123.23 ms 80.231.153.49
  1061. 5 ...
  1062. 6 216.32 ms 4.69.150.161
  1063. 7 214.69 ms ZAYO-BANDWI.edge1.Atlanta4.Level3.net (4.53.236.134)
  1064. 8 215.18 ms 205.214.72.82
  1065. 9 217.52 ms 209.51.149.106
  1066. 10 215.99 ms 63.247.66.122
  1067. 11 212.59 ms finn.nocdirect.com (69.73.184.159)
  1068. ######################################################################################################################################
  1069. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 19:50 EST
  1070. Nmap scan report for www.jewish.net (69.73.184.159)
  1071. Host is up (0.22s latency).
  1072.  
  1073. PORT STATE SERVICE VERSION
  1074. 68/udp open|filtered dhcpc
  1075. Too many fingerprints match this host to give specific OS details
  1076. Network Distance: 11 hops
  1077.  
  1078. TRACEROUTE (using proto 1/icmp)
  1079. HOP RTT ADDRESS
  1080. 1 128.88 ms 10.244.200.1
  1081. 2 176.19 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
  1082. 3 129.09 ms 185.206.226.11
  1083. 4 129.49 ms 80.231.153.49
  1084. 5 ...
  1085. 6 223.27 ms 4.69.150.161
  1086. 7 221.51 ms ZAYO-BANDWI.edge1.Atlanta4.Level3.net (4.53.236.134)
  1087. 8 221.56 ms 205.214.72.82
  1088. 9 223.68 ms 209.51.149.106
  1089. 10 222.49 ms 63.247.66.122
  1090. 11 215.04 ms finn.nocdirect.com (69.73.184.159)
  1091. ######################################################################################################################################
  1092. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 19:52 EST
  1093. Nmap scan report for www.jewish.net (69.73.184.159)
  1094. Host is up (0.21s latency).
  1095.  
  1096. PORT STATE SERVICE VERSION
  1097. 69/udp open|filtered tftp
  1098. Too many fingerprints match this host to give specific OS details
  1099. Network Distance: 11 hops
  1100.  
  1101. TRACEROUTE (using proto 1/icmp)
  1102. HOP RTT ADDRESS
  1103. 1 122.03 ms 10.244.200.1
  1104. 2 152.25 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
  1105. 3 122.07 ms 185.206.226.11
  1106. 4 122.41 ms 80.231.153.49
  1107. 5 ...
  1108. 6 215.49 ms 4.69.150.161
  1109. 7 214.24 ms ZAYO-BANDWI.edge1.Atlanta4.Level3.net (4.53.236.134)
  1110. 8 214.67 ms 205.214.72.82
  1111. 9 216.90 ms 209.51.149.106
  1112. 10 215.49 ms 63.247.66.122
  1113. 11 213.94 ms finn.nocdirect.com (69.73.184.159)
  1114. ######################################################################################################################################
  1115. ^ ^
  1116. _ __ _ ____ _ __ _ _ ____
  1117. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  1118. | V V // o // _/ | V V // 0 // 0 // _/
  1119. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  1120. <
  1121. ...'
  1122.  
  1123. WAFW00F - Web Application Firewall Detection Tool
  1124.  
  1125. By Sandro Gauci && Wendel G. Henrique
  1126.  
  1127. Checking http://www.jewish.net
  1128. The site http://www.jewish.net is behind a ModSecurity (OWASP CRS)
  1129. Number of requests: 11
  1130. #######################################################################################################################################
  1131.  
  1132. wig - WebApp Information Gatherer
  1133.  
  1134.  
  1135. Scanning http://www.jewish.net...
  1136. __________________ SITE INFO __________________
  1137. IP Title
  1138. 69.73.184.159 Jewish and Israeli Web Direc
  1139.  
  1140. ___________________ VERSION ___________________
  1141. Name Versions Type
  1142.  
  1143. _______________________________________________
  1144. Time: 226.3 sec Urls: 612 Fingerprints: 40401
  1145. ######################################################################################################################################
  1146. ------------------------------------------------------------------------------------------------------------------------------------
  1147.  
  1148. [ ! ] Starting SCANNER INURLBR 2.1 at [12-11-2018 20:01:45]
  1149. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  1150. It is the end user's responsibility to obey all applicable local, state and federal laws.
  1151. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  1152.  
  1153. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-www.jewish.net.txt ]
  1154. [ INFO ][ DORK ]::[ site:www.jewish.net ]
  1155. [ INFO ][ SEARCHING ]:: {
  1156. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.my ]
  1157.  
  1158. [ INFO ][ SEARCHING ]::
  1159. -[:::]
  1160. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  1161.  
  1162. [ INFO ][ SEARCHING ]::
  1163. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  1164. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.fm ID: 007843865286850066037:b0heuatvay8 ]
  1165.  
  1166. [ INFO ][ SEARCHING ]::
  1167. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  1168.  
  1169. [ INFO ][ TOTAL FOUND VALUES ]:: [ 0 ]
  1170. [ INFO ] Not a satisfactory result was found!
  1171.  
  1172.  
  1173. [ INFO ] [ Shutting down ]
  1174. [ INFO ] [ End of process INURLBR at [12-11-2018 20:01:53]
  1175. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  1176. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-www.jewish.net.txt ]
  1177. |_________________________________________________________________________________________
  1178.  
  1179. \_________________________________________________________________________________________/
  1180. #######################################################################################################################################
  1181. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 20:01 EST
  1182. Nmap scan report for www.jewish.net (69.73.184.159)
  1183. Host is up (0.15s latency).
  1184.  
  1185. PORT STATE SERVICE VERSION
  1186. 110/tcp open pop3 Dovecot pop3d
  1187. | pop3-brute:
  1188. | Accounts: No valid accounts found
  1189. | Statistics: Performed 55 guesses in 41 seconds, average tps: 1.3
  1190. |_ ERROR: Failed to connect.
  1191. |_pop3-capabilities: AUTH-RESP-CODE TOP USER STLS SASL(PLAIN LOGIN) RESP-CODES PIPELINING UIDL CAPA
  1192. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1193. Device type: general purpose|storage-misc|firewall
  1194. Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (92%), Synology DiskStation Manager 5.X (86%), WatchGuard Fireware 11.X (86%), FreeBSD 6.X (85%)
  1195. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/o:freebsd:freebsd:6.2
  1196. Aggressive OS guesses: Linux 3.10 - 3.12 (92%), Linux 4.4 (92%), Linux 4.9 (91%), Linux 2.6.18 - 2.6.22 (90%), Linux 3.10 (87%), Linux 4.0 (87%), Linux 2.6.18 (86%), Linux 3.10 - 4.11 (86%), Linux 3.11 - 4.1 (86%), Linux 3.2 - 4.9 (86%)
  1197. No exact OS matches for host (test conditions non-ideal).
  1198. Network Distance: 1 hop
  1199.  
  1200. TRACEROUTE (using port 80/tcp)
  1201. HOP RTT ADDRESS
  1202. 1 126.40 ms 69.73.184.159
  1203.  
  1204. ######################################################################################################################################
  1205. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 20:03 EST
  1206. Nmap scan report for www.jewish.net (69.73.184.159)
  1207. Host is up (0.21s latency).
  1208.  
  1209. PORT STATE SERVICE VERSION
  1210. 123/udp open|filtered ntp
  1211. Too many fingerprints match this host to give specific OS details
  1212. Network Distance: 11 hops
  1213.  
  1214. TRACEROUTE (using proto 1/icmp)
  1215. HOP RTT ADDRESS
  1216. 1 123.82 ms 10.244.200.1
  1217. 2 124.07 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
  1218. 3 123.87 ms 185.206.226.11
  1219. 4 124.53 ms 80.231.153.49
  1220. 5 124.75 ms 80.231.153.66
  1221. 6 217.57 ms 4.69.150.161
  1222. 7 216.18 ms ZAYO-BANDWI.edge1.Atlanta4.Level3.net (4.53.236.134)
  1223. 8 216.30 ms 205.214.72.82
  1224. 9 218.80 ms l3-atl-v1-p40.netdepot.com (209.51.149.106)
  1225. 10 222.47 ms 63.247.66.122
  1226. 11 212.08 ms 69.73.184.159
  1227. #######################################################################################################################################
  1228. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 20:05 EST
  1229. Nmap scan report for www.jewish.net (69.73.184.159)
  1230. Host is up (0.18s latency).
  1231.  
  1232. PORT STATE SERVICE VERSION
  1233. 161/tcp filtered snmp
  1234. 161/udp open|filtered snmp
  1235. Too many fingerprints match this host to give specific OS details
  1236. Network Distance: 11 hops
  1237.  
  1238. TRACEROUTE (using proto 1/icmp)
  1239. HOP RTT ADDRESS
  1240. 1 121.34 ms 10.244.200.1
  1241. 2 124.13 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
  1242. 3 121.39 ms 185.206.226.11
  1243. 4 121.92 ms 80.231.153.49
  1244. 5 122.35 ms 80.231.153.66
  1245. 6 214.85 ms 4.69.150.161
  1246. 7 213.71 ms ZAYO-BANDWI.edge1.Atlanta4.Level3.net (4.53.236.134)
  1247. 8 214.04 ms 205.214.72.82
  1248. 9 216.21 ms l3-atl-v1-p40.netdepot.com (209.51.149.106)
  1249. 10 215.28 ms 63.247.66.122
  1250. 11 216.12 ms 69.73.184.159
  1251. #######################################################################################################################################
  1252. ^ ^
  1253. _ __ _ ____ _ __ _ _ ____
  1254. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  1255. | V V // o // _/ | V V // 0 // 0 // _/
  1256. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  1257. <
  1258. ...'
  1259.  
  1260. WAFW00F - Web Application Firewall Detection Tool
  1261.  
  1262. By Sandro Gauci && Wendel G. Henrique
  1263.  
  1264. Checking https://www.jewish.net
  1265. The site https://www.jewish.net is behind a ModSecurity (OWASP CRS)
  1266. Number of requests: 11
  1267. #######################################################################################################################################
  1268.  
  1269.  
  1270. AVAILABLE PLUGINS
  1271. -----------------
  1272.  
  1273. PluginCompression
  1274. PluginOpenSSLCipherSuites
  1275. PluginSessionResumption
  1276. PluginHSTS
  1277. PluginChromeSha1Deprecation
  1278. PluginCertInfo
  1279. PluginHeartbleed
  1280. PluginSessionRenegotiation
  1281.  
  1282.  
  1283.  
  1284. CHECKING HOST(S) AVAILABILITY
  1285. -----------------------------
  1286.  
  1287. www.jewish.net:443 => 69.73.184.159:443
  1288.  
  1289.  
  1290.  
  1291. SCAN RESULTS FOR WWW.JEWISH.NET:443 - 69.73.184.159:443
  1292. -------------------------------------------------------
  1293.  
  1294. * Deflate Compression:
  1295. OK - Compression disabled
  1296.  
  1297. * Session Renegotiation:
  1298. Client-initiated Renegotiations: OK - Rejected
  1299. Secure Renegotiation: OK - Supported
  1300.  
  1301. * Certificate - Content:
  1302. SHA1 Fingerprint: 91d95c273ced329d0274e11eec58dc9ada560c21
  1303. Common Name: jewish.net
  1304. Issuer: cPanel, Inc. Certification Authority
  1305. Serial Number: E6FED669853BBC45AB4654AB331C5B46
  1306. Not Before: Dec 29 00:00:00 2017 GMT
  1307. Not After: Mar 29 23:59:59 2018 GMT
  1308. Signature Algorithm: sha256WithRSAEncryption
  1309. Public Key Algorithm: rsaEncryption
  1310. Key Size: 2048 bit
  1311. Exponent: 65537 (0x10001)
  1312. X509v3 Subject Alternative Name: {'DNS': ['jewish.net', 'www.jewish.net']}
  1313.  
  1314. * Certificate - Trust:
  1315. Hostname Validation: OK - Subject Alternative Name matches
  1316. Google CA Store (09/2015): FAILED - Certificate is NOT Trusted: certificate has expired
  1317. Java 6 CA Store (Update 65): FAILED - Certificate is NOT Trusted: certificate has expired
  1318. Microsoft CA Store (09/2015): FAILED - Certificate is NOT Trusted: certificate has expired
  1319. Apple CA Store (OS X 10.10.5): FAILED - Certificate is NOT Trusted: certificate has expired
  1320. Mozilla NSS CA Store (09/2015): FAILED - Certificate is NOT Trusted: certificate has expired
  1321. Certificate Chain Received: ['jewish.net', 'cPanel, Inc. Certification Authority', 'COMODO RSA Certification Authority']
  1322.  
  1323. * Certificate - OCSP Stapling:
  1324. NOT SUPPORTED - Server did not send back an OCSP response.
  1325.  
  1326. * Session Resumption:
  1327. With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
  1328. With TLS Session Tickets: OK - Supported
  1329.  
  1330. * SSLV2 Cipher Suites:
  1331. Server rejected all cipher suites.
  1332.  
  1333. * SSLV3 Cipher Suites:
  1334. Server rejected all cipher suites.
  1335.  
  1336.  
  1337.  
  1338. SCAN COMPLETED IN 4.30 S
  1339. ------------------------
  1340. Version: 1.11.12-static
  1341. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  1342.  
  1343. Connected to 69.73.184.159
  1344.  
  1345. Testing SSL server www.jewish.net on port 443 using SNI name www.jewish.net
  1346.  
  1347. TLS Fallback SCSV:
  1348. Server supports TLS Fallback SCSV
  1349.  
  1350. TLS renegotiation:
  1351. Secure session renegotiation supported
  1352.  
  1353. TLS Compression:
  1354. Compression disabled
  1355.  
  1356. Heartbleed:
  1357. TLS 1.2 not vulnerable to heartbleed
  1358. TLS 1.1 not vulnerable to heartbleed
  1359. TLS 1.0 not vulnerable to heartbleed
  1360.  
  1361. Supported Server Cipher(s):
  1362. Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  1363. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  1364. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1365. Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
  1366. Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
  1367. Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
  1368. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  1369. Accepted TLSv1.2 256 bits AES256-SHA256
  1370. Accepted TLSv1.2 256 bits AES256-SHA
  1371. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  1372. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  1373. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1374. Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
  1375. Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
  1376. Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
  1377. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  1378. Accepted TLSv1.2 128 bits AES128-SHA256
  1379. Accepted TLSv1.2 128 bits AES128-SHA
  1380. Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
  1381. Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
  1382. Accepted TLSv1.2 112 bits DES-CBC3-SHA
  1383. Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1384. Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
  1385. Accepted TLSv1.1 256 bits AES256-SHA
  1386. Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1387. Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
  1388. Accepted TLSv1.1 128 bits AES128-SHA
  1389. Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
  1390. Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
  1391. Accepted TLSv1.1 112 bits DES-CBC3-SHA
  1392. Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1393. Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
  1394. Accepted TLSv1.0 256 bits AES256-SHA
  1395. Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1396. Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
  1397. Accepted TLSv1.0 128 bits AES128-SHA
  1398. Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
  1399. Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
  1400. Accepted TLSv1.0 112 bits DES-CBC3-SHA
  1401.  
  1402. SSL Certificate:
  1403. Signature Algorithm: sha256WithRSAEncryption
  1404. RSA Key Strength: 2048
  1405.  
  1406. Subject: jewish.net
  1407. Altnames: DNS:jewish.net, DNS:www.jewish.net
  1408. Issuer: cPanel, Inc. Certification Authority
  1409.  
  1410. Not valid before: Dec 29 00:00:00 2017 GMT
  1411. Not valid after: Mar 29 23:59:59 2018 GMT
  1412.  
  1413. ######################################################################################################################################
  1414.  
  1415. I, [2018-11-12T20:10:42.838163 #8470] INFO -- : Initiating port scan
  1416. I, [2018-11-12T20:11:45.003293 #8470] INFO -- : Using nmap scan output file logs/nmap_output_2018-11-12_20-10-42.xml
  1417. I, [2018-11-12T20:11:45.004401 #8470] INFO -- : Discovered open port: 69.73.184.159:80
  1418. I, [2018-11-12T20:11:45.957118 #8470] INFO -- : Discovered open port: 69.73.184.159:443
  1419. I, [2018-11-12T20:11:47.715959 #8470] INFO -- : Discovered open port: 69.73.184.159:465
  1420. I, [2018-11-12T20:11:49.065628 #8470] INFO -- : Discovered open port: 69.73.184.159:993
  1421. I, [2018-11-12T20:11:51.247012 #8470] INFO -- : Discovered tcpwrapped port: 69.73.184.159:5666
  1422. I, [2018-11-12T20:11:52.106733 #8470] INFO -- : Discovered tcpwrapped port: 69.73.184.159:5666
  1423. I, [2018-11-12T20:11:53.833537 #8470] INFO -- : <<<Enumerating vulnerable applications>>>
  1424.  
  1425.  
  1426. --------------------------------------------------------
  1427. <<<Yasuo discovered following vulnerable applications>>>
  1428. --------------------------------------------------------
  1429. +----------+---------------------------------+----------------------------------------------+----------+----------+
  1430. | App Name | URL to Application | Potential Exploit | Username | Password |
  1431. +----------+---------------------------------+----------------------------------------------+----------+----------+
  1432. | SVN | https://69.73.184.159:443/.svn/ | ./auxiliary/scanner/http/svn_wcdb_scanner.rb | | |
  1433. +----------+---------------------------------+----------------------------------------------+----------+----------+
  1434. #######################################################################################################################################
  1435. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 20:14 EST
  1436. NSE: Loaded 148 scripts for scanning.
  1437. NSE: Script Pre-scanning.
  1438. Initiating NSE at 20:14
  1439. Completed NSE at 20:14, 0.00s elapsed
  1440. Initiating NSE at 20:14
  1441. Completed NSE at 20:14, 0.00s elapsed
  1442. Initiating Parallel DNS resolution of 1 host. at 20:14
  1443. Completed Parallel DNS resolution of 1 host. at 20:14, 16.50s elapsed
  1444. Initiating SYN Stealth Scan at 20:14
  1445. Scanning www.jewish.net (69.73.184.159) [474 ports]
  1446. Discovered open port 110/tcp on 69.73.184.159
  1447. Discovered open port 443/tcp on 69.73.184.159
  1448. Discovered open port 21/tcp on 69.73.184.159
  1449. Discovered open port 80/tcp on 69.73.184.159
  1450. Discovered open port 995/tcp on 69.73.184.159
  1451. Discovered open port 3306/tcp on 69.73.184.159
  1452. Discovered open port 143/tcp on 69.73.184.159
  1453. Discovered open port 587/tcp on 69.73.184.159
  1454. Discovered open port 993/tcp on 69.73.184.159
  1455. Discovered open port 465/tcp on 69.73.184.159
  1456. Discovered open port 5666/tcp on 69.73.184.159
  1457. Completed SYN Stealth Scan at 20:14, 5.07s elapsed (474 total ports)
  1458. Initiating Service scan at 20:14
  1459. Scanning 11 services on www.jewish.net (69.73.184.159)
  1460. Completed Service scan at 20:15, 34.05s elapsed (11 services on 1 host)
  1461. Initiating OS detection (try #1) against www.jewish.net (69.73.184.159)
  1462. Retrying OS detection (try #2) against www.jewish.net (69.73.184.159)
  1463. Initiating Traceroute at 20:15
  1464. Completed Traceroute at 20:15, 0.13s elapsed
  1465. Initiating Parallel DNS resolution of 2 hosts. at 20:15
  1466. Completed Parallel DNS resolution of 2 hosts. at 20:15, 16.50s elapsed
  1467. NSE: Script scanning 69.73.184.159.
  1468. Initiating NSE at 20:15
  1469. Completed NSE at 20:19, 199.27s elapsed
  1470. Initiating NSE at 20:19
  1471. Completed NSE at 20:19, 0.44s elapsed
  1472. Nmap scan report for www.jewish.net (69.73.184.159)
  1473. Host is up (0.14s latency).
  1474. Not shown: 428 filtered ports, 35 closed ports
  1475. PORT STATE SERVICE VERSION
  1476. 21/tcp open ftp Pure-FTPd
  1477. | ssl-cert: Subject: commonName=finn.nocdirect.com
  1478. | Subject Alternative Name: DNS:finn.nocdirect.com, DNS:www.finn.nocdirect.com
  1479. | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
  1480. | Public Key type: rsa
  1481. | Public Key bits: 2048
  1482. | Signature Algorithm: sha256WithRSAEncryption
  1483. | Not valid before: 2018-10-24T00:00:00
  1484. | Not valid after: 2019-10-24T23:59:59
  1485. | MD5: 087b 6b54 a03e 5b2c 8b2c ca41 c757 1cd8
  1486. |_SHA-1: 8b54 69e6 8e16 7e30 de40 1e11 032b b4f2 cde0 821c
  1487. |_ssl-date: TLS randomness does not represent time
  1488. 80/tcp open http-proxy Squid http proxy
  1489. |_http-open-proxy: Proxy might be redirecting requests
  1490. |_http-title: 403 Forbidden
  1491. 110/tcp open pop3 Dovecot pop3d
  1492. |_pop3-capabilities: USER AUTH-RESP-CODE UIDL RESP-CODES SASL(PLAIN LOGIN) STLS CAPA TOP PIPELINING
  1493. |_ssl-date: TLS randomness does not represent time
  1494. 143/tcp open imap Dovecot imapd
  1495. |_imap-capabilities: AUTH=PLAIN more NAMESPACE STARTTLS Pre-login post-login AUTH=LOGINA0001 LOGIN-REFERRALS capabilities have ID IDLE SASL-IR LITERAL+ listed ENABLE IMAP4rev1 OK
  1496. |_ssl-date: TLS randomness does not represent time
  1497. 443/tcp open ssl/ssl Apache httpd (SSL-only mode)
  1498. |_http-server-header: Apache
  1499. |_http-title: 403 Forbidden
  1500. |_ssl-date: TLS randomness does not represent time
  1501. 465/tcp open ssl/smtp Exim smtpd 4.91
  1502. |_smtp-commands: finn.nocdirect.com Hello www.jewish.net [82.102.18.181], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
  1503. | ssl-cert: Subject: commonName=jewish.net
  1504. | Subject Alternative Name: DNS:jewish.net, DNS:www.jewish.net
  1505. | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
  1506. | Public Key type: rsa
  1507. | Public Key bits: 2048
  1508. | Signature Algorithm: sha256WithRSAEncryption
  1509. | Not valid before: 2017-12-29T00:00:00
  1510. | Not valid after: 2018-03-29T23:59:59
  1511. | MD5: aae4 706f baf2 1d7a b7f5 7ad4 7c26 6041
  1512. |_SHA-1: 91d9 5c27 3ced 329d 0274 e11e ec58 dc9a da56 0c21
  1513. |_ssl-date: TLS randomness does not represent time
  1514. 587/tcp open smtp Exim smtpd 4.91
  1515. | smtp-commands: finn.nocdirect.com Hello www.jewish.net [82.102.18.181], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
  1516. |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
  1517. | ssl-cert: Subject: commonName=jewish.net
  1518. | Subject Alternative Name: DNS:jewish.net, DNS:www.jewish.net
  1519. | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
  1520. | Public Key type: rsa
  1521. | Public Key bits: 2048
  1522. | Signature Algorithm: sha256WithRSAEncryption
  1523. | Not valid before: 2017-12-29T00:00:00
  1524. | Not valid after: 2018-03-29T23:59:59
  1525. | MD5: aae4 706f baf2 1d7a b7f5 7ad4 7c26 6041
  1526. |_SHA-1: 91d9 5c27 3ced 329d 0274 e11e ec58 dc9a da56 0c21
  1527. |_ssl-date: TLS randomness does not represent time
  1528. 993/tcp open ssl/imaps?
  1529. |_ssl-date: TLS randomness does not represent time
  1530. 995/tcp open ssl/pop3s?
  1531. |_ssl-date: TLS randomness does not represent time
  1532. 3306/tcp open mysql MySQL 5.5.5-10.0.37-MariaDB
  1533. | mysql-info:
  1534. | Protocol: 10
  1535. | Version: 5.5.5-10.0.37-MariaDB
  1536. | Thread ID: 7153714
  1537. | Capabilities flags: 63487
  1538. | Some Capabilities: ConnectWithDatabase, IgnoreSigpipes, DontAllowDatabaseTableColumn, Speaks41ProtocolNew, SupportsCompression, LongColumnFlag, Support41Auth, FoundRows, InteractiveClient, Speaks41ProtocolOld, SupportsTransactions, LongPassword, ODBCClient, IgnoreSpaceBeforeParenthesis, SupportsLoadDataLocal, SupportsAuthPlugins, SupportsMultipleStatments, SupportsMultipleResults
  1539. | Status: Autocommit
  1540. | Salt: XRri6mH]yj),@;H:*a+P
  1541. |_ Auth Plugin Name: 94
  1542. 5666/tcp open tcpwrapped
  1543. Device type: general purpose
  1544. Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (92%)
  1545. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
  1546. Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (92%), Linux 3.10 - 4.11 (86%), Linux 3.10 - 3.12 (86%), Linux 4.4 (86%), Linux 4.9 (85%), Linux 3.2 - 4.9 (85%), Linux 2.6.18 (85%)
  1547. No exact OS matches for host (test conditions non-ideal).
  1548. Uptime guess: 37.787 days (since Sat Oct 6 02:25:51 2018)
  1549. Network Distance: 2 hops
  1550. TCP Sequence Prediction: Difficulty=261 (Good luck!)
  1551. IP ID Sequence Generation: All zeros
  1552. Service Info: Host: finn.nocdirect.com
  1553.  
  1554. TRACEROUTE (using port 139/tcp)
  1555. HOP RTT ADDRESS
  1556. 1 121.45 ms 10.244.200.1
  1557. 2 121.29 ms 69.73.184.159
  1558.  
  1559. NSE: Script Post-scanning.
  1560. Initiating NSE at 20:19
  1561. Completed NSE at 20:19, 0.00s elapsed
  1562. Initiating NSE at 20:19
  1563. Completed NSE at 20:19, 0.00s elapsed
  1564. Read data files from: /usr/bin/../share/nmap
  1565. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1566. Nmap done: 1 IP address (1 host up) scanned in 278.73 seconds
  1567. Raw packets sent: 974 (46.372KB) | Rcvd: 78 (3.944KB)
  1568. #######################################################################################################################################
  1569. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 20:19 EST
  1570. NSE: Loaded 148 scripts for scanning.
  1571. NSE: Script Pre-scanning.
  1572. Initiating NSE at 20:19
  1573. Completed NSE at 20:19, 0.00s elapsed
  1574. Initiating NSE at 20:19
  1575. Completed NSE at 20:19, 0.00s elapsed
  1576. Initiating Parallel DNS resolution of 1 host. at 20:19
  1577. Completed Parallel DNS resolution of 1 host. at 20:19, 16.50s elapsed
  1578. Initiating UDP Scan at 20:19
  1579. Scanning www.jewish.net (69.73.184.159) [14 ports]
  1580. Completed UDP Scan at 20:19, 2.17s elapsed (14 total ports)
  1581. Initiating Service scan at 20:19
  1582. Scanning 11 services on www.jewish.net (69.73.184.159)
  1583. Service scan Timing: About 9.09% done; ETC: 20:37 (0:16:20 remaining)
  1584. Completed Service scan at 20:21, 102.58s elapsed (11 services on 1 host)
  1585. Initiating OS detection (try #1) against www.jewish.net (69.73.184.159)
  1586. Retrying OS detection (try #2) against www.jewish.net (69.73.184.159)
  1587. Initiating Traceroute at 20:21
  1588. Completed Traceroute at 20:21, 7.20s elapsed
  1589. Initiating Parallel DNS resolution of 1 host. at 20:21
  1590. Completed Parallel DNS resolution of 1 host. at 20:21, 16.50s elapsed
  1591. NSE: Script scanning 69.73.184.159.
  1592. Initiating NSE at 20:21
  1593. Completed NSE at 20:21, 20.31s elapsed
  1594. Initiating NSE at 20:21
  1595. Completed NSE at 20:22, 1.02s elapsed
  1596. Nmap scan report for www.jewish.net (69.73.184.159)
  1597. Host is up (0.19s latency).
  1598.  
  1599. PORT STATE SERVICE VERSION
  1600. 53/udp closed domain
  1601. 67/udp open|filtered dhcps
  1602. 68/udp open|filtered dhcpc
  1603. 69/udp open|filtered tftp
  1604. 88/udp open|filtered kerberos-sec
  1605. 123/udp open|filtered ntp
  1606. 137/udp filtered netbios-ns
  1607. 138/udp filtered netbios-dgm
  1608. 139/udp open|filtered netbios-ssn
  1609. 161/udp open|filtered snmp
  1610. 162/udp open|filtered snmptrap
  1611. 389/udp open|filtered ldap
  1612. 520/udp open|filtered route
  1613. 2049/udp open|filtered nfs
  1614. Too many fingerprints match this host to give specific OS details
  1615. Network Distance: 11 hops
  1616.  
  1617. TRACEROUTE (using port 137/udp)
  1618. HOP RTT ADDRESS
  1619. 1 ...
  1620. 2 122.28 ms 10.244.200.1
  1621. 3 ... 4
  1622. 5 121.75 ms 10.244.200.1
  1623. 6 126.76 ms 10.244.200.1
  1624. 7 126.75 ms 10.244.200.1
  1625. 8 126.72 ms 10.244.200.1
  1626. 9 120.09 ms 10.244.200.1
  1627. 10 120.00 ms 10.244.200.1
  1628. 11 120.12 ms 10.244.200.1
  1629. 12 ... 18
  1630. 19 121.81 ms 10.244.200.1
  1631. 20 121.32 ms 10.244.200.1
  1632. 21 120.30 ms 10.244.200.1
  1633. 22 ... 29
  1634. 30 120.58 ms 10.244.200.1
  1635.  
  1636. NSE: Script Post-scanning.
  1637. Initiating NSE at 20:22
  1638. Completed NSE at 20:22, 0.00s elapsed
  1639. Initiating NSE at 20:22
  1640. Completed NSE at 20:22, 0.00s elapsed
  1641. Read data files from: /usr/bin/../share/nmap
  1642. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1643. Nmap done: 1 IP address (1 host up) scanned in 171.78 seconds
  1644. Raw packets sent: 123 (9.368KB) | Rcvd: 30 (3.796KB)
  1645. ######################################################################################################################################
  1646. Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-12 20:22 EST
  1647. Nmap scan report for www.jewish.net (69.73.184.159)
  1648. Host is up (0.16s latency).
  1649. Not shown: 17 filtered ports, 4 closed ports
  1650. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  1651. PORT STATE SERVICE
  1652. 21/tcp open ftp
  1653. 80/tcp open http
  1654. 110/tcp open pop3
  1655. 993/tcp open imaps
  1656. 3306/tcp open mysql
  1657. #######################################################################################################################################
  1658. + -- --=[Port 21 opened... running tests...
  1659. Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
  1660.  
  1661. Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-12 20:22:19
  1662. [DATA] max 1 task per 1 server, overall 1 task, 225 login tries, ~225 tries per task
  1663. [DATA] attacking ftp://www.jewish.net:21/
  1664. [STATUS] 1.81 tries/min, 197 tries in 01:49h, 31 to do in 00:18h, 1 active
  1665. [STATUS] 1.84 tries/min, 202 tries in 01:50h, 26 to do in 00:15h, 1 active
  1666. [STATUS] 1.86 tries/min, 207 tries in 01:51h, 21 to do in 00:12h, 1 active
  1667. [STATUS] 1.89 tries/min, 212 tries in 01:52h, 16 to do in 00:09h, 1 active
  1668. [STATUS] 1.91 tries/min, 216 tries in 01:53h, 12 to do in 00:07h, 1 active
  1669. 1 of 1 target completed, 0 valid passwords found
  1670. Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-12 22:15:19
  1671. + -- --=[Port 22 closed... skipping.
  1672. + -- --=[Port 23 closed... skipping.
  1673. + -- --=[Port 25 closed... skipping.
  1674. + -- --=[Port 80 opened... running tests...
  1675. Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
  1676.  
  1677. Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-12 22:15:19
  1678. [DATA] max 1 task per 1 server, overall 1 task, 1530 login tries (l:34/p:45), ~1530 tries per task
  1679. [DATA] attacking http-get://www.jewish.net:80//
  1680. [80][http-get] host: www.jewish.net login: admin password: admin
  1681. [STATUS] attack finished for www.jewish.net (valid pair found)
  1682. 1 of 1 target successfully completed, 1 valid password found
  1683. Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-12 22:15:21
  1684. + -- --=[Port 110 opened... running tests...
  1685. Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
  1686.  
  1687. Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-12 22:15:21
  1688. [DATA] max 1 task per 1 server, overall 1 task, 1530 login tries (l:34/p:45), ~1530 tries per task
  1689. [DATA] attacking pop3://www.jewish.net:110/
  1690. [STATUS] 6.00 tries/min, 6 tries in 00:01h, 1524 to do in 04:15h, 1 active
  1691. ctive
  1692. [STATUS] 3.62 tries/min, 1495 tries in 06:53h, 35 to do in 00:10h, 1 active
  1693. [STATUS] 3.62 tries/min, 1498 tries in 06:54h, 32 to do in 00:09h, 1 active
  1694. [STATUS] 3.62 tries/min, 1503 tries in 06:55h, 27 to do in 00:08h, 1 active
  1695. [STATUS] 3.62 tries/min, 1506 tries in 06:56h, 24 to do in 00:07h, 1 active
  1696. [STATUS] 3.62 tries/min, 1509 tries in 06:57h, 21 to do in 00:06h, 1 active
  1697. [STATUS] 3.62 tries/min, 1513 tries in 06:58h, 17 to do in 00:05h, 1 active
  1698. [STATUS] 3.62 tries/min, 1517 tries in 06:59h, 13 to do in 00:04h, 1 active
  1699. [STATUS] 3.62 tries/min, 1520 tries in 07:00h, 10 to do in 00:03h, 1 active
  1700. [STATUS] 3.62 tries/min, 1524 tries in 07:01h, 6 to do in 00:02h, 1 active
  1701. [STATUS] 3.62 tries/min, 1528 tries in 07:02h, 2 to do in 00:01h, 1 active
  1702. 1 of 1 target completed, 0 valid passwords found
  1703. Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-13 05:18:11
  1704. + -- --=[Port 139 closed... skipping.
  1705. + -- --=[Port 162 closed... skipping.
  1706. + -- --=[Port 389 closed... skipping.
  1707. + -- --=[Port 443 closed... skipping.
  1708. + -- --=[Port 445 closed... skipping.
  1709. + -- --=[Port 512 closed... skipping.
  1710. + -- --=[Port 513 closed... skipping.
  1711. + -- --=[Port 514 closed... skipping.
  1712. + -- --=[Port 993 opened... running tests...
  1713. Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
  1714.  
  1715. Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-13 05:18:11
  1716. [DATA] max 1 task per 1 server, overall 1 task, 1530 login tries (l:34/p:45), ~1530 tries per task
  1717. [DATA] attacking imaps://www.jewish.net:993/993
  1718. [STATUS] 4.00 tries/min, 4 tries in 00:01h, 1526 to do in 06:22h, 1 active
  1719. [STATUS] 3.26 tries/min, 1497 tries in 07:39h, 33 to do in 00:11h, 1 active
  1720. [STATUS] 3.26 tries/min, 1500 tries in 07:40h, 30 to do in 00:10h, 1 active
  1721. [STATUS] 3.26 tries/min, 1503 tries in 07:41h, 27 to do in 00:09h, 1 active
  1722. [STATUS] 3.26 tries/min, 1506 tries in 07:42h, 24 to do in 00:08h, 1 active
  1723. [STATUS] 3.26 tries/min, 1509 tries in 07:43h, 21 to do in 00:07h, 1 active
  1724. [STATUS] 3.26 tries/min, 1513 tries in 07:44h, 17 to do in 00:06h, 1 active
  1725. [STATUS] 3.26 tries/min, 1516 tries in 07:45h, 14 to do in 00:05h, 1 active
  1726. [STATUS] 3.26 tries/min, 1519 tries in 07:46h, 11 to do in 00:04h, 1 active
  1727. [STATUS] 3.26 tries/min, 1522 tries in 07:47h, 8 to do in 00:03h, 1 active
  1728. [STATUS] 3.26 tries/min, 1525 tries in 07:48h, 5 to do in 00:02h, 1 active
  1729. [STATUS] 3.26 tries/min, 1529 tries in 07:49h, 1 to do in 00:01h, 1 active
  1730. 1 of 1 target completed, 0 valid passwords found
  1731. Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-13 13:07:43
  1732. + -- --=[Port 1433 closed... skipping.
  1733. + -- --=[Port 1521 closed... skipping.
  1734. + -- --=[Port 3306 opened... running tests...
  1735. Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
  1736.  
  1737. Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-13 13:07:43
  1738. [DATA] max 1 task per 1 server, overall 1 task, 78 login tries, ~78 tries per task
  1739. [DATA] attacking mysql://www.jewish.net:3306/
  1740. [STATUS] 47.00 tries/min, 47 tries in 00:01h, 31 to do in 00:01h, 1 active
  1741. 1 of 1 target completed, 0 valid passwords found
  1742. Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-13 13:08:47
  1743. #######################################################################################################################################
  1744. Anonymous JTSEC #OpIsrael Full Recon #11
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement