Guest User

Anonymous JTSEC #OpDomesticTerrorism Full Recon #1

a guest
Jan 26th, 2019
2,075
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 83.86 KB | None | 0 0
  1. #######################################################################################################################################
  2. Nom de l'hôte www.therebel.media FAI Akamai International B.V.
  3. Continent Amérique du Nord Drapeau
  4. US
  5. Pays Etats-Unis d'Amérique Code du pays US
  6. Région Inconnu Heure locale 25 Jan 2019 19:23 CST
  7. Ville Inconnu Code Postal Inconnu
  8. Adresse IP 104.72.70.183 Latitude 37.751
  9. Longitude -97.822
  10. #######################################################################################################################################
  11. > www.therebel.media
  12. Server: 27.50.70.139
  13. Address: 27.50.70.139#53
  14.  
  15. Non-authoritative answer:
  16. www.therebel.media canonical name = www.therebel.media.edgekey.net.
  17. www.therebel.media.edgekey.net canonical name = e15521.e2.akamaiedge.net.
  18. Name: e15521.e2.akamaiedge.net
  19. Address: 104.72.70.183
  20. Name: e15521.e2.akamaiedge.net
  21. Address: 104.72.70.116
  22. >
  23. #######################################################################################################################################
  24.  
  25. HostIP:23.32.5.54
  26. HostName:www.therebel.media
  27.  
  28. Gathered Inet-whois information for 23.32.5.54
  29. ---------------------------------------------------------------------------------------------------------------------------------------
  30.  
  31.  
  32. inetnum: 23.19.64.0 - 23.83.63.255
  33. netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
  34. descr: IPv4 address block not managed by the RIPE NCC
  35. remarks: ------------------------------------------------------
  36. remarks:
  37. remarks: For registration information,
  38. remarks: you can consult the following sources:
  39. remarks:
  40. remarks: IANA
  41. remarks: http://www.iana.org/assignments/ipv4-address-space
  42. remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
  43. remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
  44. remarks:
  45. remarks: AFRINIC (Africa)
  46. remarks: http://www.afrinic.net/ whois.afrinic.net
  47. remarks:
  48. remarks: APNIC (Asia Pacific)
  49. remarks: http://www.apnic.net/ whois.apnic.net
  50. remarks:
  51. remarks: ARIN (Northern America)
  52. remarks: http://www.arin.net/ whois.arin.net
  53. remarks:
  54. remarks: LACNIC (Latin America and the Carribean)
  55. remarks: http://www.lacnic.net/ whois.lacnic.net
  56. remarks:
  57. remarks: ------------------------------------------------------
  58. country: EU # Country is really world wide
  59. admin-c: IANA1-RIPE
  60. tech-c: IANA1-RIPE
  61. status: ALLOCATED UNSPECIFIED
  62. mnt-by: RIPE-NCC-HM-MNT
  63. created: 2019-01-07T10:48:01Z
  64. last-modified: 2019-01-07T10:48:01Z
  65. source: RIPE
  66.  
  67. role: Internet Assigned Numbers Authority
  68. address: see http://www.iana.org.
  69. admin-c: IANA1-RIPE
  70. tech-c: IANA1-RIPE
  71. nic-hdl: IANA1-RIPE
  72. remarks: For more information on IANA services
  73. remarks: go to IANA web site at http://www.iana.org.
  74. mnt-by: RIPE-NCC-MNT
  75. created: 1970-01-01T00:00:00Z
  76. last-modified: 2001-09-22T09:31:27Z
  77. source: RIPE # Filtered
  78.  
  79. % Information related to '23.32.5.0/24AS16625'
  80.  
  81. route: 23.32.5.0/24
  82. descr: Akamai Technologies
  83. origin: AS16625
  84. mnt-by: AKAM1-RIPE-MNT
  85. created: 2016-12-23T09:50:04Z
  86. last-modified: 2018-09-04T18:36:30Z
  87. source: RIPE-NONAUTH
  88.  
  89. % Information related to '23.32.5.0/24AS20940'
  90.  
  91. route: 23.32.5.0/24
  92. descr: Akamai Technologies
  93. origin: AS20940
  94. mnt-by: AKAM1-RIPE-MNT
  95. created: 2016-12-23T09:50:04Z
  96. last-modified: 2018-09-04T18:36:29Z
  97. source: RIPE-NONAUTH
  98.  
  99. % This query was served by the RIPE Database Query Service version 1.92.6 (HEREFORD)
  100.  
  101.  
  102.  
  103. Gathered Inic-whois information for therebel.media
  104. ---------------------------------------------------------------------------------------------------------------------------------------
  105. Domain Name: therebel.media
  106. Registry Domain ID: 7ca2751dcb1647079f81c39e4c4542d0-DONUTS
  107. Registrar WHOIS Server: WHOIS.ENOM.COM
  108. Registrar URL: http://www.enom.com
  109. Updated Date: 2019-01-25T16:25:56Z
  110. Creation Date: 2015-02-09T22:44:06Z
  111. Registry Expiry Date: 2020-02-09T22:44:06Z
  112. Registrar: eNom, LLC
  113. Registrar IANA ID: 48
  114. Registrar Abuse Contact Email:
  115. Registrar Abuse Contact Phone:
  116. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  117. Domain Status: renewPeriod https://icann.org/epp#renewPeriod
  118. Registry Registrant ID: REDACTED FOR PRIVACY
  119. Registrant Name: REDACTED FOR PRIVACY
  120. Registrant Organization: Rebel Media
  121. Registrant Street: REDACTED FOR PRIVACY
  122. Registrant City: REDACTED FOR PRIVACY
  123. Registrant State/Province: ON
  124. Registrant Postal Code: REDACTED FOR PRIVACY
  125. Registrant Country: CA
  126. Registrant Phone: REDACTED FOR PRIVACY
  127. Registrant Phone Ext: REDACTED FOR PRIVACY
  128. Registrant Fax: REDACTED FOR PRIVACY
  129. Registrant Fax Ext: REDACTED FOR PRIVACY
  130. Registrant Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to c�ontact t}�oU�9��he Registrant,�ѡg� Admin, or0ԡg� Tech contact of %+@the qOR PRIVACY
  131. Registrant Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
  132. Registry Admin ID: REDACTED FOR PRIVACY
  133. Admin Name: REDACTED FOR PRIVACY
  134. Admin Organization: REDACTED FOR PRIVACY
  135. Admin Street: REDACTED FOR PRIVACY
  136. Admin City: REDACTED FOR PRIVACY
  137. Admin State/Province: REDACTED FOR PRIVACY
  138. Admin Postal Code: REDACTED FOR PRIVACY
  139. }�oU�9�ountryueried domai+n name.
  140. Registry Admin ID: REDACTED FOR PRIVACY
  141. Admin Name: REDACTED FOR PRIVACY
  142. Admin Organization: REDACTED FOR PRIVACY
  143. Admin Street: REDACTED FOR PRIVACY
  144. Admin City: REDACTED FOR PRIVACY
  145. Admin State/Province: REDACTED FOR PRIVACY
  146. Admin Postal Code: REDACTED FOR PRIVACY
  147. #######################################################################################################################################
  148. [i] Scanning Site: https://www.therebel.media
  149.  
  150.  
  151.  
  152. B A S I C I N F O
  153. =======================================================================================================================================
  154.  
  155.  
  156. [+] Site Title: The Rebel
  157. [+] IP address: 23.32.5.54
  158. [+] Web Server: Apache/2.4.7 (Ubuntu)
  159. [+] CMS: Could Not Detect
  160. [+] Cloudflare: Not Detected
  161. [+] Robots File: Found
  162.  
  163. -------------[ contents ]----------------
  164. User-Agent: *
  165. Disallow: /admin/
  166. Disallow: /utils/
  167. Disallow: /forms/
  168. Disallow: /users/
  169. Sitemap: http://www.therebel.media/sitemap_index.xml
  170.  
  171. -----------[end of contents]-------------
  172.  
  173.  
  174.  
  175. W H O I S L O O K U P
  176. ======================================================================================================================================
  177.  
  178. Domain Name: therebel.media
  179. Registry Domain ID: 7ca2751dcb1647079f81c39e4c4542d0-DONUTS
  180. Registrar WHOIS Server: WHOIS.ENOM.COM
  181. Registrar URL: http://www.enom.com
  182. Updated Date: 2019-01-25T16:25:56Z
  183. Creation Date: 2015-02-09T22:44:06Z
  184. Registry Expiry Date: 2020-02-09T22:44:06Z
  185. Registrar: eNom, LLC
  186. Registrar IANA ID: 48
  187. Registrar Abuse Contact Email:
  188. Registrar Abuse Contact Phone:
  189. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  190. Domain Status: renewPeriod https://icann.org/epp#renewPeriod
  191. Registry Registrant ID: REDACTED FOR PRIVACY
  192. Registrant Name: REDACTED FOR PRIVACY
  193. Registrant Organization: Rebel Media
  194. Registrant Street: REDACTED FOR PRIVACY
  195. Registrant City: REDACTED FOR PRIVACY
  196. Registrant State/Province: ON
  197. Registrant Postal Code: REDACTED FOR PRIVACY
  198. Registrant Country: CA
  199. Registrant Phone: REDACTED FOR PRIVACY
  200. Registrant Phone Ext: REDACTED FOR PRIVACY
  201. Registrant Fax: REDACTED FOR PRIVACY
  202. Registrant Fax Ext: REDACTED FOR PRIVACY
  203. Registrant Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
  204. Registry Admin ID: REDACTED FOR PRIVACY
  205. Admin Name: REDACTED FOR PRIVACY
  206. Admin Organization: REDACTED FOR PRIVACY
  207. Admin Street: REDACTED FOR PRIVACY
  208. Admin City: REDACTED FOR PRIVACY
  209. Admin State/Province: REDACTED FOR PRIVACY
  210. Admin Postal Code: REDACTED FOR PRIVACY
  211. Admin Country: REDACTED FOR PRIVACY
  212. Admin Phone: REDACTED FOR PRIVACY
  213. Admin Phone Ext: REDACTED FOR PRIVACY
  214. Admin Fax: REDACTED FOR PRIVACY
  215. Admin Fax Ext: REDACTED FOR PRIVACY
  216. Admin Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
  217. Registry Tech ID: REDACTED FOR PRIVACY
  218. Tech Name: REDACTED FOR PRIVACY
  219. Tech Organization: REDACTED FOR PRIVACY
  220. Tech Street: REDACTED FOR PRIVACY
  221. Tech City: REDACTED FOR PRIVACY
  222. Tech State/Province: REDACTED FOR PRIVACY
  223. Tech Postal Code: REDACTED FOR PRIVACY
  224. Tech Country: REDACTED FOR PRIVACY
  225. Tech Phone: REDACTED FOR PRIVACY
  226. Tech Phone Ext: REDACTED FOR PRIVACY
  227. Tech Fax: REDACTED FOR PRIVACY
  228. Tech Fax Ext: REDACTED FOR PRIVACY
  229. Tech Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
  230. Name Server: ns20.nationbuilder.com
  231. Name Server: ns21.nationbuilder.com
  232. Name Server: ns22.nationbuilder.com
  233. Name Server: ns23.nationbuilder.com
  234. DNSSEC: unsigned
  235. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  236. >>> Last update of WHOIS database: 2019-01-26T05:56:37Z <<<
  237.  
  238. For more information on Whois status codes, please visit https://icann.org/epp
  239.  
  240. Terms of Use: Donuts Inc. provides this Whois service for information purposes, and to assist persons in obtaining information about or related to a domain name registration record. Donuts does not guarantee its accuracy. Users accessing the Donuts Whois service agree to use the data only for lawful purposes, and under no circumstances may this data be used to: a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the registrar’s own existing customers and b) enable high volume, automated, electronic processes that send queries or data to the systems of Donuts or any ICANN-accredited registrar, except as reasonably necessary to register domain names or modify existing registrations. When using the Donuts Whois service, please consider the following: The Whois service is not a replacement for standard EPP commands to the SRS service. Whois is not considered authoritative for registered domain objects. The Whois service may be scheduled for downtime during production or OT&E maintenance periods. Queries to the Whois services are throttled. If too many queries are received from a single IP address within a specified time, the service will begin to reject further queries for a period of time to prevent disruption of Whois service access. Abuse of the Whois system through data mining is mitigated by detecting and limiting bulk query access from single sources. Where applicable, the presence of a [Non-Public Data] tag indicates that such data is not made publicly available due to applicable data privacy laws or requirements. Should you wish to contact the registrant, please refer to the Whois records available through the registrar URL listed above. Access to non-public data may be provided, upon request, where it can be reasonably confirmed that the requester holds a specific legitimate interest and a proper legal basis for accessing the withheld da
  241. ta. Access to this data can be requested by submitting a request via the form found at https://donuts.domains/about/policies/whois-layered-access/ Donuts Inc. reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.
  242.  
  243.  
  244.  
  245.  
  246. G E O I P L O O K U P
  247. =======================================================================================================================================
  248.  
  249. [i] IP Address: 52.216.9.186
  250. [i] Country: United States
  251. [i] State: Virginia
  252. [i] City: Ashburn
  253. [i] Latitude: 39.0481
  254. [i] Longitude: -77.4728
  255.  
  256.  
  257.  
  258.  
  259. H T T P H E A D E R S
  260. =======================================================================================================================================
  261.  
  262.  
  263. [i] HTTP/1.0 200 OK
  264. [i] Access-Control-Allow-Origin: *
  265. [i] Access-Control-Request-Method: GET, POST, PUT, DELETE
  266. [i] Content-Type: text/html; charset=utf-8
  267. [i] ETag: W/"58b96276e2a672938556fab1d8de1670-gzip"
  268. [i] Server: Apache/2.4.7 (Ubuntu)
  269. [i] Status: 200 OK
  270. [i] X-Content-Type-Options: nosniff
  271. [i] X-Frame-Options: ALLOWALL
  272. [i] X-Middleware-Start: t=1548482201120175
  273. [i] X-Powered-By: Phusion Passenger Enterprise 5.0.28
  274. [i] X-Rack-Cache: stale, invalid
  275. [i] X-Request-Id: 1afa051a-fc91-48fc-9067-d092ca04ecb0
  276. [i] X-Runtime: 0.081075
  277. [i] X-Served-By: app10
  278. [i] Expires: Sat, 26 Jan 2019 05:56:41 GMT
  279. [i] Cache-Control: max-age=0, no-cache, no-store
  280. [i] Pragma: no-cache
  281. [i] Date: Sat, 26 Jan 2019 05:56:41 GMT
  282. [i] Connection: close
  283. [i] Set-Cookie: _nbuild_nocache=true; path=/; expires=Sun, 26 Jan 2020 05:56:41 -0000
  284. [i] Set-Cookie: _nbuild_token=anl7boeN%2F9D%2B4adKuxF7QiRHTXn4XLnPT731wO7yWk8%3D; path=/; secure; HttpOnly
  285. [i] Set-Cookie: _nbuild_session=3406b8de9364b522dafa8433bc4038d9; path=/; HttpOnly
  286.  
  287.  
  288.  
  289.  
  290. D N S L O O K U P
  291. =======================================================================================================================================
  292.  
  293. therebel.media. 4 IN A 52.216.16.170
  294. therebel.media. 21599 IN NS ns-1227.awsdns-25.org.
  295. therebel.media. 21599 IN NS ns-184.awsdns-23.com.
  296. therebel.media. 21599 IN NS ns-2005.awsdns-58.co.uk.
  297. therebel.media. 21599 IN NS ns-671.awsdns-19.net.
  298. therebel.media. 899 IN SOA ns-2005.awsdns-58.co.uk. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400
  299. therebel.media. 299 IN MX 1 aspmx.l.google.com.
  300. therebel.media. 299 IN MX 10 alt3.aspmx.l.google.com.
  301. therebel.media. 299 IN MX 10 alt4.aspmx.l.google.com.
  302. therebel.media. 299 IN MX 5 alt1.aspmx.l.google.com.
  303. therebel.media. 299 IN MX 5 alt2.aspmx.l.google.com.
  304. therebel.media. 299 IN TXT "MS=ms70016162"
  305. therebel.media. 299 IN TXT "v=spf1 a mx include:_spf.google.com include:sendgrid.net ~all"
  306.  
  307.  
  308.  
  309.  
  310. S U B N E T C A L C U L A T I O N
  311. =======================================================================================================================================
  312.  
  313. Address = 52.216.108.74
  314. Network = 52.216.108.74 / 32
  315. Netmask = 255.255.255.255
  316. Broadcast = not needed on Point-to-Point links
  317. Wildcard Mask = 0.0.0.0
  318. Hosts Bits = 0
  319. Max. Hosts = 1 (2^0 - 0)
  320. Host Range = { 52.216.108.74 - 52.216.108.74 }
  321.  
  322.  
  323.  
  324. N M A P P O R T S C A N
  325. ======================================================================================================================================
  326.  
  327.  
  328. Starting Nmap 7.40 ( https://nmap.org ) at 2019-01-26 05:56 UTC
  329. Nmap scan report for therebel.media (52.216.96.122)
  330. Host is up (0.0073s latency).
  331. rDNS record for 52.216.96.122: s3-website-us-east-1.amazonaws.com
  332. PORT STATE SERVICE
  333. 21/tcp filtered ftp
  334. 22/tcp filtered ssh
  335. 23/tcp filtered telnet
  336. 80/tcp open http
  337. 110/tcp filtered pop3
  338. 143/tcp filtered imap
  339. 443/tcp filtered https
  340. 3389/tcp filtered ms-wbt-server
  341.  
  342. Nmap done: 1 IP address (1 host up) scanned in 1.30 seconds
  343.  
  344.  
  345.  
  346. S U B - D O M A I N F I N D E R
  347. ======================================================================================================================================
  348.  
  349.  
  350. [i] Total Subdomains Found : 2
  351.  
  352. [+] Subdomain: gorka.therebel.media
  353. [-] IP: 132.148.194.157
  354.  
  355. [+] Subdomain: mail.therebel.media
  356. [-] IP: 198.57.164.126
  357. #######################################################################################################################################
  358. [?] Enter the target: example( http://domain.com )
  359. https://www.therebel.media/
  360. [!] IP Address : 23.32.5.54
  361. [!] www.therebel.media doesn't seem to use a CMS
  362. [+] Honeypot Probabilty: 0%
  363. ---------------------------------------------------------------------------------------------------------------------------------------
  364. [~] Trying to gather whois information for www.therebel.media
  365. [+] Whois information found
  366. [-] Unable to build response, visit https://who.is/whois/www.therebel.media
  367. ---------------------------------------------------------------------------------------------------------------------------------------
  368. PORT STATE SERVICE
  369. 21/tcp filtered ftp
  370. 22/tcp filtered ssh
  371. 23/tcp filtered telnet
  372. 80/tcp open http
  373. 110/tcp filtered pop3
  374. 143/tcp filtered imap
  375. 443/tcp open https
  376. 3389/tcp filtered ms-wbt-server
  377. Nmap done: 1 IP address (1 host up) scanned in 3.04 seconds
  378. ---------------------------------------------------------------------------------------------------------------------------------------
  379. There was an error getting results
  380.  
  381. [-] DNS Records
  382. [>] Initiating 3 intel modules
  383. [>] Loading Alpha module (1/3)
  384. [>] Beta module deployed (2/3)
  385. [>] Gamma module initiated (3/3)
  386.  
  387.  
  388. [+] Emails found:
  389. ---------------------------------------------------------------------------------------------------------------------------------------
  390. No hosts found
  391. [+] Virtual hosts:
  392. ---------------------------------------------------------------------------------------------------------------------------------------
  393. #######################################################################################################################################
  394. ; <<>> DiG 9.11.5-P1-1-Debian <<>> therebel.media
  395. ;; global options: +cmd
  396. ;; Got answer:
  397. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48063
  398. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  399.  
  400. ;; OPT PSEUDOSECTION:
  401. ; EDNS: version: 0, flags:; udp: 4096
  402. ;; QUESTION SECTION:
  403. ;therebel.media. IN A
  404.  
  405. ;; ANSWER SECTION:
  406. therebel.media. 5 IN A 52.216.238.218
  407.  
  408. ;; Query time: 405 msec
  409. ;; SERVER: 27.50.70.139#53(27.50.70.139)
  410. ;; WHEN: sam jan 26 01:27:57 EST 2019
  411. ;; MSG SIZE rcvd: 59
  412. #######################################################################################################################################
  413. ; <<>> DiG 9.11.5-P1-1-Debian <<>> +trace therebel.media
  414. ;; global options: +cmd
  415. . 79625 IN NS l.root-servers.net.
  416. . 79625 IN NS h.root-servers.net.
  417. . 79625 IN NS f.root-servers.net.
  418. . 79625 IN NS d.root-servers.net.
  419. . 79625 IN NS e.root-servers.net.
  420. . 79625 IN NS b.root-servers.net.
  421. . 79625 IN NS j.root-servers.net.
  422. . 79625 IN NS k.root-servers.net.
  423. . 79625 IN NS m.root-servers.net.
  424. . 79625 IN NS g.root-servers.net.
  425. . 79625 IN NS a.root-servers.net.
  426. . 79625 IN NS i.root-servers.net.
  427. . 79625 IN NS c.root-servers.net.
  428. . 79625 IN RRSIG NS 8 0 518400 20190207230000 20190125220000 16749 . p3HxhmXeyDLC8XOjqrdowF+mSxUguADldqdiGumGbhBgjosU9ps1A8oX eAUtULdme3H+Y+aaVHx9YdNqw7l0UQ8OSM8oM6qgYmjTZAv8Ak2FMkAt BMO/5J0XXh5H2waDUIVIKjs+0uN1h7I9oZKrLjC4eilMLXc11GLUTSp3 EQGzbJlqqMD1fAaXmHUnSz2UAsqVDi32aDtyOmD4VsQy9lvHXlhkqOj5 NX9+YW5dmecyVXweDekreOAykE9tW9U2gCJn3oZrMN+IxVDrTeMxPLZ6 063PIwD9r3Bu2Qcdv3p1k3irdOlLoDO1i4zvSnE2TA71VzY9bnYyCLgA 13GFlA==
  429. ;; Received 525 bytes from 27.50.70.139#53(27.50.70.139) in 348 ms
  430.  
  431. media. 172800 IN NS demand.gamma.aridns.net.au.
  432. media. 172800 IN NS demand.beta.aridns.net.au.
  433. media. 172800 IN NS demand.alpha.aridns.net.au.
  434. media. 172800 IN NS demand.delta.aridns.net.au.
  435. media. 86400 IN DS 58966 8 1 D226735F01B6C8722C3B812E10691EF3F40BBCA9
  436. media. 86400 IN DS 58966 8 2 93C1569DBDDE5D844CD5A00900535B640FF33CC6C57DE66D76845D1A C0F13CEB
  437. media. 86400 IN RRSIG DS 8 1 86400 20190208050000 20190126040000 16749 . hCmvrQuWR8SvfnJgIbkRA4gbo5fgIeSwWqg1p1wyjeyhYNZWuvPzhm5O KXud/qRPZAciAEKhfEQXP52woB2rfHwec6het2S2WiDaGaYGz9fXZg1F 85mT7CqNmBvy9FUnhdhIoBYTuo6+VpbFRjcjvxTXpf3V0IDJSf9pOotz cVGz/rT1FvExDhg0nOnW+jQgxp9xZAhfL5cj/sjHCd+pxYLtMLvCIQWw 7+ruU2C+mLaOaC9NyM+XJZubL1KujTfS/UtvXMaVRX6iSUbXCvsjV7qO L101xshwCcbVIkX0pQUPL9xsbm6XsLyeXmF2zmpCeJJ9GqY64CpgNdr2 I2kRIA==
  438. ;; Received 738 bytes from 192.112.36.4#53(g.root-servers.net) in 291 ms
  439.  
  440. therebel.media. 86400 IN NS ns23.nationbuilder.com.
  441. therebel.media. 86400 IN NS ns22.nationbuilder.com.
  442. therebel.media. 86400 IN NS ns21.nationbuilder.com.
  443. therebel.media. 86400 IN NS ns20.nationbuilder.com.
  444. bivhvcs8hu8cnsq6hto8rv18s3uvohbe.media. 86400 IN NSEC3 1 1 1 F7231E27 BJ4BL952KGT0KODU8U9JJQVGFQ2POERQ NS SOA RRSIG DNSKEY NSEC3PARAM TYPE65534
  445. bivhvcs8hu8cnsq6hto8rv18s3uvohbe.media. 86400 IN RRSIG NSEC3 8 2 86400 20190221085044 20190122080642 61290 media. FD+xihmSOePxrzxlFiwpMpSfHLcmeIGKtwWRTm4sGnJmNCCEOQbpMLQR 5q3GByRaSuHPx3MQl5/0HDnAp6JaTCDnHou3rz2IGeKq7yZektcymnRE lUmfKk19Ks3RxdW2+pNRgN1e/T71lcA5zLw2hptcY9ISp5obwElXQvU3 iqO3PleVhgOc3bk6S5CUyX5WIKvVHzl5KqidqeYgUZoFWg==
  446. bccrpgi937kueg34g4nd91bd4k34oe0j.media. 86400 IN NSEC3 1 1 1 F7231E27 BER58Q3TSUCEKRS18BTLH7O61O31Q322 NS DS RRSIG
  447. bccrpgi937kueg34g4nd91bd4k34oe0j.media. 86400 IN RRSIG NSEC3 8 2 86400 20190222123738 20190123123159 61290 media. eToyig60L6bH+aqaBYvHlWv6pyt3Vnx5n4ke3rsPm57LK+xLZjSBPylR n5nQjBw7DIiQhzG2msXy8xzjJEC4VfrNt79g7SRyyKqcX5Vc/aD123+5 8g5UsM0+QwQJv1AhePJ8VJrjwNVxiMunF+CroUqyfZgajwxq7sWhklxC Y04xP1ev7kjaiYQmRPpqyvhGvxnS4vQ7WwIaX2ozYE3Vfg==
  448. ;; Received 731 bytes from 2001:dcd:1::7#53(demand.alpha.aridns.net.au) in 89 ms
  449.  
  450. therebel.media. 5 IN A 52.216.65.42
  451. therebel.media. 172800 IN NS ns-1227.awsdns-25.org.
  452. therebel.media. 172800 IN NS ns-184.awsdns-23.com.
  453. therebel.media. 172800 IN NS ns-2005.awsdns-58.co.uk.
  454. therebel.media. 172800 IN NS ns-671.awsdns-19.net.
  455. ;; Received 199 bytes from 205.251.194.159#53(ns23.nationbuilder.com) in 404 ms
  456. #######################################################################################################################################
  457. Traceroute 'www.therebel.media '
  458. ---------------------------------------------------------------------------------------------------------------------------------------
  459.  
  460. Start: 2019-01-26T06:33:06+0000
  461. HOST: web01 Loss% Snt Last Avg Best Wrst StDev
  462. 1.|-- 45.79.12.202 0.0% 3 0.8 1.0 0.8 1.1 0.1
  463. 2.|-- 45.79.12.2 0.0% 3 0.9 0.9 0.5 1.4 0.4
  464. 3.|-- 45.79.12.9 0.0% 3 1.4 2.2 1.4 2.9 0.8
  465. 4.|-- dls-b22-link.telia.net 0.0% 3 1.9 1.2 0.8 1.9 0.6
  466. 5.|-- dls-b21-link.telia.net 0.0% 3 2.2 1.8 1.6 2.2 0.4
  467. 6.|-- dls-b23-link.telia.net 0.0% 3 1.5 1.4 1.4 1.5 0.0
  468. 7.|-- akamai-ic-341035-dls-b21.c.telia.net 0.0% 3 38.0 37.7 37.1 38.1 0.5
  469. 8.|-- ae16.cyrusone-dfw.netarch.akamai.com 0.0% 3 4.1 40.4 2.1 114.9 64.6
  470. 9.|-- a23-53-127-32.deploy.static.akamaitechnologies.com 0.0% 3 2.3 2.0 1.8 2.3 0.3
  471. #######################################################################################################################################
  472. Ip Address Status Type Domain Name Server
  473. ---------- ------ ---- ----------- ------
  474. 198.57.164.126 200 host mail.therebel.media
  475. 23.32.5.72 302 alias uk.therebel.media
  476. 23.32.5.72 302 alias uk.therebel.media.edgekey.net
  477. 23.32.5.72 302 host e15521.e2.akamaiedge.net
  478. 23.32.5.54 302 host e15521.e2.akamaiedge.net
  479. 23.32.5.54 302 alias www.therebel.media
  480. 23.32.5.54 302 alias www.therebel.media.edgekey.net
  481. 23.32.5.54 302 host e15521.e2.akamaiedge.net
  482. 23.32.5.72 302 host e15521.e2.akamaiedge.net
  483. #######################################################################################################################################
  484. [*] Performing General Enumeration of Domain: therebel.media
  485. [-] DNSSEC is not configured for therebel.media
  486. [*] SOA ns-2005.awsdns-58.co.uk 205.251.199.213
  487. [*] NS ns-671.awsdns-19.net 205.251.194.159
  488. [*] NS ns-671.awsdns-19.net 2600:9000:5302:9f00::1
  489. [*] NS ns-1227.awsdns-25.org 205.251.196.203
  490. [*] NS ns-1227.awsdns-25.org 2600:9000:5304:cb00::1
  491. [*] NS ns-184.awsdns-23.com 205.251.192.184
  492. [*] NS ns-184.awsdns-23.com 2600:9000:5300:b800::1
  493. [*] NS ns-2005.awsdns-58.co.uk 205.251.199.213
  494. [*] NS ns-2005.awsdns-58.co.uk 2600:9000:5307:d500::1
  495. [*] MX alt1.aspmx.l.google.com 74.125.195.26
  496. [*] MX alt4.aspmx.l.google.com 173.194.219.26
  497. [*] MX alt3.aspmx.l.google.com 74.125.126.27
  498. [*] MX aspmx.l.google.com 172.217.194.27
  499. [*] MX alt2.aspmx.l.google.com 64.233.179.26
  500. [*] MX alt1.aspmx.l.google.com 2607:f8b0:400e:c09::1b
  501. [*] MX alt4.aspmx.l.google.com 2607:f8b0:4002:c03::1b
  502. [*] MX alt3.aspmx.l.google.com 2607:f8b0:4001:c1d::1a
  503. [*] MX aspmx.l.google.com 2404:6800:4003:c04::1a
  504. [*] MX alt2.aspmx.l.google.com 2607:f8b0:4003:c09::1b
  505. [*] A therebel.media 52.216.139.146
  506. [*] TXT therebel.media MS=ms70016162
  507. [*] TXT therebel.media v=spf1 a mx include:_spf.google.com include:sendgrid.net ~all
  508. [*] Enumerating SRV Records
  509. [-] No SRV Records Found for therebel.media
  510. [+] 0 Records Found
  511. #######################################################################################################################################
  512. [*] Processing domain therebel.media
  513. [*] Using system resolvers ['27.50.70.139', '38.132.106.139', '185.93.180.131', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
  514. [+] Getting nameservers
  515. 205.251.192.184 - ns-184.awsdns-23.com
  516. 205.251.196.203 - ns-1227.awsdns-25.org
  517. 205.251.199.213 - ns-2005.awsdns-58.co.uk
  518. 205.251.194.159 - ns-671.awsdns-19.net
  519. [-] Zone transfer failed
  520.  
  521. [+] TXT records found
  522. "v=spf1 a mx include:_spf.google.com include:sendgrid.net ~all"
  523. "MS=ms70016162"
  524.  
  525. [+] MX records found, added to target list
  526. 10 alt4.aspmx.l.google.com.
  527. 5 alt1.aspmx.l.google.com.
  528. 10 alt3.aspmx.l.google.com.
  529. 1 aspmx.l.google.com.
  530. 5 alt2.aspmx.l.google.com.
  531.  
  532. [*] Scanning therebel.media for A records
  533. 54.231.48.186 - therebel.media
  534. 198.57.164.126 - mail.therebel.media
  535. 104.72.70.116 - uk.therebel.media
  536. 104.72.70.183 - uk.therebel.media
  537. 104.72.70.183 - www.therebel.media
  538. 104.72.70.116 - www.therebel.media
  539. #######################################################################################################################################
  540. =======================================================================================================================================
  541. | E-mails:
  542. | [+] E-mail Found: [email protected]
  543. | [+] E-mail Found: [email protected]
  544. | [+] E-mail Found: [email protected]
  545. | [+] E-mail Found: [email protected]
  546. | [+] E-mail Found: [email protected]
  547. | [+] E-mail Found: [email protected]
  548. | [+] E-mail Found: [email protected]
  549. | [+] E-mail Found: [email protected]
  550. | [+] E-mail Found: [email protected]
  551. | [+] E-mail Found: [email protected]
  552. | [+] E-mail Found: [email protected]
  553. | [+] E-mail Found: [email protected]
  554. | [+] E-mail Found: [email protected]
  555. | [+] E-mail Found: [email protected]
  556. | [+] E-mail Found: [email protected]
  557. | [+] E-mail Found: [email protected]
  558. | [+] E-mail Found: [email protected]
  559. | [+] E-mail Found: [email protected]
  560. | [+] E-mail Found: [email protected]
  561. | [+] E-mail Found: [email protected]
  562. | [+] E-mail Found: [email protected]
  563. | [+] E-mail Found: [email protected]
  564. | [+] E-mail Found: [email protected]
  565. | [+] E-mail Found: [email protected]
  566. | [+] E-mail Found: [email protected]
  567. | [+] E-mail Found: [email protected]
  568. | [+] E-mail Found: [email protected]
  569. | [+] E-mail Found: [email protected]
  570. | [+] E-mail Found: [email protected]
  571. | [+] E-mail Found: [email protected]
  572. | [+] E-mail Found: [email protected],
  573. | [+] E-mail Found: [email protected]
  574. | [+] E-mail Found: [email protected]
  575. | [+] E-mail Found: [email protected]
  576. | [+] E-mail Found: [email protected]
  577. | [+] E-mail Found: [email protected],
  578. | [+] E-mail Found: [email protected]
  579. | [+] E-mail Found: [email protected]
  580. | [+] E-mail Found: [email protected]
  581. | [+] E-mail Found: [email protected]
  582. | [+] E-mail Found: [email protected]
  583. | [+] E-mail Found: [email protected]
  584. | [+] E-mail Found: [email protected]
  585. | [+] E-mail Found: [email protected]
  586. | [+] E-mail Found: [email protected]
  587. =======================================================================================================================================
  588. #######################################################################################################################################
  589. [+] Testing domain
  590. www.therebel.media 104.72.70.183
  591. [+] Dns resolving
  592. Domain name Ip address Name server
  593. therebel.media 52.216.168.242 s3-website-us-east-1.amazonaws.com
  594. Found 1 host(s) for therebel.media
  595. [+] Testing wildcard
  596. Ok, no wildcard found.
  597.  
  598. [+] Scanning for subdomain on therebel.media
  599. [!] Wordlist not specified. I scannig with my internal wordlist...
  600. Estimated time about 169.15 seconds
  601.  
  602. Subdomain Ip address Name server
  603.  
  604. mail.therebel.media 198.57.164.126 cpanel.can2000.net
  605. uk.therebel.media 104.72.70.183 a104-72-70-183.deploy.static.akamaitechnologies.com
  606. www.therebel.media 104.72.70.183 a104-72-70-183.deploy.static.akamaitechnologies.com
  607. #######################################################################################################################################
  608. ---------------------------------------------------------------------------------------------------------------------------------------
  609. + Target IP: 23.32.5.72
  610. + Target Hostname: www.therebel.media
  611. + Target Port: 443
  612. ---------------------------------------------------------------------------------------------------------------------------------------
  613. + SSL Info: Subject: /CN=www.therebel.media
  614. Ciphers: ECDHE-RSA-AES256-GCM-SHA384
  615. Issuer: /C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
  616. + Start Time: 2019-01-26 01:04:46 (GMT-5)
  617. ---------------------------------------------------------------------------------------------------------------------------------------
  618. + Server: Apache/2.4.7 (Ubuntu)
  619. + Cookie _nbuild_nocache created without the secure flag
  620. + Cookie _nbuild_nocache created without the httponly flag
  621. + Cookie _nbuild_session created without the secure flag
  622. + Retrieved x-powered-by header: Phusion Passenger Enterprise 5.0.28
  623. + Retrieved x-served-by header: app14
  624. + Server leaks inodes via ETags, header found with file /, fields: 0xW/daa481fe14f1ea011858713fe8b9d8a2 0xgzip
  625. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  626. + Uncommon header 'x-request-id' found, with contents: 16848de0-e197-469e-a4e9-2cfff1effeee
  627. + Uncommon header 'access-control-request-method' found, with contents: GET, POST, PUT, DELETE
  628. + Uncommon header 'x-runtime' found, with contents: 0.076294
  629. + Uncommon header 'x-served-by' found, with contents: app14
  630. + Uncommon header 'x-middleware-start' found, with contents: t=1548482691126528
  631. + Uncommon header 'x-rack-cache' found, with contents: stale, invalid
  632. + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
  633. + Uncommon header 'x-nb-code' found, with contents: 1007
  634. + Entry '/admin/' in robots.txt returned a non-forbidden or redirect HTTP code (302)
  635. + "robots.txt" contains 4 entries which should be manually viewed.
  636. + Uncommon header 'x-content-digest' found, with contents: da39a3ee5e6b4b0d3255bfef95601890afd80709
  637. + Apache/2.4.7 appears to be outdated (current is at least Apache/2.4.12). Apache 2.0.65 (final release) and 2.2.29 are also current.
  638. + ERROR: Error limit (20) reached for host, giving up. Last error: opening stream: can't connect: SSL negotiation failed: error:14094438:SSL routines:ssl3_read_bytes:tlsv1 alert internal error at /var/lib/nikto/plugins/LW2.pm line 5157.
  639. at /var/lib/nikto/plugins/LW2.pm line 5157.
  640. ; at /var/lib/nikto/plugins/LW2.pm line 5157.
  641. + Scan terminated: 20 error(s) and 19 item(s) reported on remote host
  642. + End Time: 2019-01-26 01:21:35 (GMT-5) (1009 seconds)
  643. ---------------------------------------------------------------------------------------------------------------------------------------
  644. #######################################################################################################################################
  645. dnsenum VERSION:1.2.4
  646.  
  647. ----- www.therebel.media -----
  648.  
  649.  
  650. Host's addresses:
  651. __________________
  652.  
  653. e15521.e2.akamaiedge.net. 19 IN A 23.32.5.54
  654. e15521.e2.akamaiedge.net. 19 IN A 23.32.5.72
  655.  
  656.  
  657. Name Servers:
  658. ______________
  659. #######################################################################################################################################
  660. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-26 01:07 EST
  661. Nmap scan report for www.therebel.media (23.32.5.54)
  662. Host is up (0.34s latency).
  663. Other addresses for www.therebel.media (not scanned): 23.32.5.72
  664. rDNS record for 23.32.5.54: a23-32-5-54.deploy.static.akamaitechnologies.com
  665. Not shown: 471 filtered ports, 3 closed ports
  666. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  667. PORT STATE SERVICE
  668. 80/tcp open http
  669. 443/tcp open https
  670. #######################################################################################################################################
  671. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-26 01:08 EST
  672. Nmap scan report for www.therebel.media (23.32.5.54)
  673. Host is up (0.23s latency).
  674. Other addresses for www.therebel.media (not scanned): 23.32.5.72
  675. rDNS record for 23.32.5.54: a23-32-5-54.deploy.static.akamaitechnologies.com
  676. Not shown: 2 filtered ports
  677. PORT STATE SERVICE
  678. 53/udp open|filtered domain
  679. 67/udp open|filtered dhcps
  680. 68/udp open|filtered dhcpc
  681. 69/udp open|filtered tftp
  682. 88/udp open|filtered kerberos-sec
  683. 123/udp open|filtered ntp
  684. 139/udp open|filtered netbios-ssn
  685. 161/udp open|filtered snmp
  686. 162/udp open|filtered snmptrap
  687. 389/udp open|filtered ldap
  688. 520/udp open|filtered route
  689. 2049/udp open|filtered nfs
  690. #######################################################################################################################################
  691.  
  692. ^ ^
  693. _ __ _ ____ _ __ _ _ ____
  694. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  695. | V V // o // _/ | V V // 0 // 0 // _/
  696. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  697. <
  698. ...'
  699.  
  700. WAFW00F - Web Application Firewall Detection Tool
  701.  
  702. By Sandro Gauci && Wendel G. Henrique
  703.  
  704. Checking http://www.therebel.media
  705. The site http://www.therebel.media is behind a ModSecurity (OWASP CRS)
  706. Number of requests: 12
  707. #######################################################################################################################################
  708. http://www.therebel.media [302 Found] Country[UNITED STATES][US], IP[23.32.5.54], RedirectLocation[https://www.therebel.media/], Ruby-on-Rails, UncommonHeaders[access-control-allow-origin,x-middleware-start,x-nb-code,x-rack-cache,x-request-id,x-served-by], X-Powered-By[Phusion Passenger Enterprise 5.0.28]
  709. https://www.therebel.media/ [200 OK] Apache[2.4.7], Cookies[_nbuild_nocache,_nbuild_session,_nbuild_token], Country[UNITED STATES][US], Frame, Google-Analytics[UA-59791339-1], HTML5, HTTPServer[Ubuntu Linux][Apache/2.4.7 (Ubuntu)], HttpOnly[_nbuild_session,_nbuild_token], IP[23.32.5.72], JQuery, Open-Graph-Protocol[article], PoweredBy[NationBuilder], Ruby-on-Rails, Script[text/javascript], Title[The Rebel], UncommonHeaders[access-control-allow-origin,access-control-request-method,x-content-type-options,x-middleware-start,x-rack-cache,x-request-id,x-served-by], X-Frame-Options[ALLOWALL], X-Powered-By[Phusion Passenger Enterprise 5.0.28], X-UA-Compatible[IE=edge]
  710. #######################################################################################################################################
  711.  
  712. wig - WebApp Information Gatherer
  713.  
  714.  
  715. Scanning https://www.therebel.media...
  716. _____________________ SITE INFO ______________________
  717. IP Title
  718. 23.32.5.54 The Rebel
  719. 23.32.5.72
  720.  
  721. ______________________ VERSION _______________________
  722. Name Versions Type
  723. Apache 2.4.7 Platform
  724. Ubuntu 14.04 OS
  725.  
  726. ____________________ INTERESTING _____________________
  727. URL Note Type
  728. /robots.txt robots.txt index Interesting
  729.  
  730. ______________________________________________________
  731. Time: 225.9 sec Urls: 788 Fingerprints: 40401
  732. #######################################################################################################################################
  733. HTTP/1.1 302 Found
  734. Access-Control-Allow-Origin: *
  735. Content-Type: text/html
  736. Location: https://www.therebel.media/
  737. Status: 302 Found
  738. X-Middleware-Start: t=1548483240817260
  739. X-nb-code: 1011
  740. X-Powered-By: Phusion Passenger Enterprise 5.0.28
  741. X-Rack-Cache: miss
  742. X-Request-Id: 4fc76dd9-5208-4b50-a136-351c9f366f43
  743. X-Runtime: 0.064512
  744. X-Served-By: app13
  745. Content-Length: 0
  746. Expires: Sat, 26 Jan 2019 06:14:01 GMT
  747. Cache-Control: max-age=0, no-cache, no-store
  748. Pragma: no-cache
  749. Date: Sat, 26 Jan 2019 06:14:01 GMT
  750. Connection: keep-alive
  751.  
  752. HTTP/1.1 302 Found
  753. Access-Control-Allow-Origin: *
  754. Content-Type: text/html
  755. Location: https://www.therebel.media/
  756. Status: 302 Found
  757. X-Middleware-Start: t=1548483242078938
  758. X-nb-code: 1011
  759. X-Powered-By: Phusion Passenger Enterprise 5.0.28
  760. X-Rack-Cache: miss
  761. X-Request-Id: d6acd65f-5621-4430-af8b-e337221656b3
  762. X-Runtime: 0.065847
  763. X-Served-By: app10
  764. Content-Length: 0
  765. Expires: Sat, 26 Jan 2019 06:14:02 GMT
  766. Cache-Control: max-age=0, no-cache, no-store
  767. Pragma: no-cache
  768. Date: Sat, 26 Jan 2019 06:14:02 GMT
  769. Connection: keep-alive
  770.  
  771. HTTP/1.1 200 OK
  772. Access-Control-Allow-Origin: *
  773. Access-Control-Request-Method: GET, POST, PUT, DELETE
  774. Content-Type: text/html; charset=utf-8
  775. ETag: W/"8a2ce9516071e06dcf13e06163289744"
  776. Server: Apache/2.4.7 (Ubuntu)
  777. Status: 200 OK
  778. X-Content-Type-Options: nosniff
  779. X-Frame-Options: ALLOWALL
  780. X-Middleware-Start: t=1548483244237211
  781. X-Powered-By: Phusion Passenger Enterprise 5.0.28
  782. X-Rack-Cache: stale, invalid
  783. X-Request-Id: 82919a8e-7a88-46d1-b5b4-e139cd838145
  784. X-Runtime: 0.079457
  785. X-Served-By: app13
  786. Content-Length: 0
  787. Expires: Sat, 26 Jan 2019 06:14:04 GMT
  788. Cache-Control: max-age=0, no-cache, no-store
  789. Pragma: no-cache
  790. Date: Sat, 26 Jan 2019 06:14:04 GMT
  791. Connection: keep-alive
  792. Set-Cookie: _nbuild_nocache=true; path=/; expires=Sun, 26 Jan 2020 06:14:04 -0000
  793. Set-Cookie: _nbuild_token=bKK8bXNRkzYxYw%2BzMcAnXz83djWv5SnE5nP2w8FXhS8%3D; path=/; secure; HttpOnly
  794. Set-Cookie: _nbuild_session=786ff12cbc6e216a078ee30283be8d26; path=/; HttpOnly
  795. #######################################################################################################################################
  796.  
  797. ^ ^
  798. _ __ _ ____ _ __ _ _ ____
  799. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  800. | V V // o // _/ | V V // 0 // 0 // _/
  801. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  802. <
  803. ...'
  804.  
  805. WAFW00F - Web Application Firewall Detection Tool
  806.  
  807. By Sandro Gauci && Wendel G. Henrique
  808.  
  809. Checking https://www.therebel.media
  810. The site https://www.therebel.media is behind a ModSecurity (OWASP CRS)
  811. Number of requests: 11
  812. #######################################################################################################################################
  813. https://www.therebel.media [200 OK] Apache[2.4.7], Cookies[_nbuild_nocache,_nbuild_session,_nbuild_token], Country[UNITED STATES][US], Frame, Google-Analytics[UA-59791339-1], HTML5, HTTPServer[Ubuntu Linux][Apache/2.4.7 (Ubuntu)], HttpOnly[_nbuild_session,_nbuild_token], IP[23.32.5.54], JQuery, Open-Graph-Protocol[article], PoweredBy[NationBuilder], Ruby-on-Rails, Script[text/javascript], Title[The Rebel], UncommonHeaders[access-control-allow-origin,access-control-request-method,x-content-type-options,x-middleware-start,x-rack-cache,x-request-id,x-served-by], X-Frame-Options[ALLOWALL], X-Powered-By[Phusion Passenger Enterprise 5.0.28], X-UA-Compatible[IE=edge]
  814. #######################################################################################################################################
  815.  
  816. wig - WebApp Information Gatherer
  817.  
  818.  
  819. Scanning https://www.therebel.media...
  820. _____________________ SITE INFO _____________________
  821. IP Title
  822. 23.32.5.54 The Rebel
  823. 23.32.5.72
  824.  
  825. ______________________ VERSION ______________________
  826. Name Versions Type
  827. Apache 2.4.7 Platform
  828. Ubuntu 14.04 OS
  829.  
  830. ____________________ INTERESTING ____________________
  831. URL Note Type
  832. /robots.txt robots.txt index Interesting
  833.  
  834. _____________________________________________________
  835. Time: 19.4 sec Urls: 788 Fingerprints: 40401
  836. #######################################################################################################################################
  837. HTTP/1.1 200 OK
  838. Access-Control-Allow-Origin: *
  839. Access-Control-Request-Method: GET, POST, PUT, DELETE
  840. Content-Type: text/html; charset=utf-8
  841. ETag: W/"531be910ca9751e8ffdc45938717c662"
  842. Server: Apache/2.4.7 (Ubuntu)
  843. Status: 200 OK
  844. X-Content-Type-Options: nosniff
  845. X-Frame-Options: ALLOWALL
  846. X-Middleware-Start: t=1548483356156277
  847. X-Powered-By: Phusion Passenger Enterprise 5.0.28
  848. X-Rack-Cache: stale, invalid
  849. X-Request-Id: 05836a5e-d771-438d-9408-58a14b899630
  850. X-Runtime: 0.094076
  851. X-Served-By: app10
  852. Content-Length: 0
  853. Expires: Sat, 26 Jan 2019 06:15:56 GMT
  854. Cache-Control: max-age=0, no-cache, no-store
  855. Pragma: no-cache
  856. Date: Sat, 26 Jan 2019 06:15:56 GMT
  857. Connection: keep-alive
  858. Set-Cookie: _nbuild_nocache=true; path=/; expires=Sun, 26 Jan 2020 06:15:56 -0000
  859. Set-Cookie: _nbuild_token=LXzcq0eT8jMuRpmtPjZtdsJJ1liOUypGh2I0fJVgyR8%3D; path=/; secure; HttpOnly
  860. Set-Cookie: _nbuild_session=d4002cc8d5b4062512a0bc0bbc8614a9; path=/; HttpOnly
  861.  
  862. HTTP/1.1 200 OK
  863. Access-Control-Allow-Origin: *
  864. Access-Control-Request-Method: GET, POST, PUT, DELETE
  865. Content-Type: text/html; charset=utf-8
  866. ETag: W/"2423ff611fe7a26586c8e1dc0549caa0"
  867. Server: Apache/2.4.7 (Ubuntu)
  868. Status: 200 OK
  869. X-Content-Type-Options: nosniff
  870. X-Frame-Options: ALLOWALL
  871. X-Middleware-Start: t=1548483358631660
  872. X-Powered-By: Phusion Passenger Enterprise 5.0.28
  873. X-Rack-Cache: stale, invalid
  874. X-Request-Id: d805c658-597e-479b-ba7d-2641fe752022
  875. X-Runtime: 0.105382
  876. X-Served-By: app13
  877. Content-Length: 0
  878. Expires: Sat, 26 Jan 2019 06:15:58 GMT
  879. Cache-Control: max-age=0, no-cache, no-store
  880. Pragma: no-cache
  881. Date: Sat, 26 Jan 2019 06:15:58 GMT
  882. Connection: keep-alive
  883. Set-Cookie: _nbuild_nocache=true; path=/; expires=Sun, 26 Jan 2020 06:15:58 -0000
  884. Set-Cookie: _nbuild_token=m%2BV0fjJqJSGFGSOgMxVAD%2BegmcnNfhGZ5ULziUPiuT8%3D; path=/; secure; HttpOnly
  885. Set-Cookie: _nbuild_session=e909bdd0d279368c437fbfa2033762d9; path=/; HttpOnly
  886. #######################################################################################################################################
  887. Version: 1.11.12-static
  888. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  889.  
  890. Connected to 104.72.70.116
  891.  
  892. Testing SSL server www.therebel.media on port 443 using SNI name www.therebel.media
  893.  
  894. TLS Fallback SCSV:
  895. Server supports TLS Fallback SCSV
  896.  
  897. TLS renegotiation:
  898. Secure session renegotiation supported
  899.  
  900. TLS Compression:
  901. Compression disabled
  902.  
  903. Heartbleed:
  904. TLS 1.2 not vulnerable to heartbleed
  905. TLS 1.1 not vulnerable to heartbleed
  906. TLS 1.0 not vulnerable to heartbleed
  907.  
  908. Supported Server Cipher(s):
  909. Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  910. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  911. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  912. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  913. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  914. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  915. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  916. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  917. Accepted TLSv1.2 256 bits AES256-SHA256
  918. Accepted TLSv1.2 128 bits AES128-SHA256
  919. Accepted TLSv1.2 256 bits AES256-SHA
  920. Accepted TLSv1.2 128 bits AES128-SHA
  921. Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  922. Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  923. Accepted TLSv1.1 256 bits AES256-SHA
  924. Accepted TLSv1.1 128 bits AES128-SHA
  925. Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  926. Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  927. Accepted TLSv1.0 256 bits AES256-SHA
  928. Accepted TLSv1.0 128 bits AES128-SHA
  929.  
  930. SSL Certificate:
  931. Signature Algorithm: sha256WithRSAEncryption
  932. RSA Key Strength: 2048
  933.  
  934. Subject: www.therebel.media
  935. Altnames: DNS:australia.therebel.media, DNS:uk.therebel.media, DNS:www.lerebelle.media, DNS:www.marklathamsoutsiders.com, DNS:www.therebel.media
  936. Issuer: Let's Encrypt Authority X3
  937.  
  938. Not valid before: Nov 21 18:06:45 2018 GMT
  939. Not valid after: Feb 19 18:06:45 2019 GMT
  940. #######################################################################################################################################
  941. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:27 EST
  942. Nmap scan report for a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  943. Host is up (0.25s latency).
  944. Not shown: 470 filtered ports, 4 closed ports
  945. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  946. PORT STATE SERVICE
  947. 80/tcp open http
  948. 443/tcp open https
  949. #######################################################################################################################################
  950. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:27 EST
  951. Nmap scan report for a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  952. Host is up (0.24s latency).
  953. Not shown: 2 filtered ports, 1 closed port
  954. PORT STATE SERVICE
  955. 67/udp open|filtered dhcps
  956. 68/udp open|filtered dhcpc
  957. 69/udp open|filtered tftp
  958. 88/udp open|filtered kerberos-sec
  959. 123/udp open|filtered ntp
  960. 139/udp open|filtered netbios-ssn
  961. 161/udp open|filtered snmp
  962. 162/udp open|filtered snmptrap
  963. 389/udp open|filtered ldap
  964. 520/udp open|filtered route
  965. 2049/udp open|filtered nfs
  966. #######################################################################################################################################
  967. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:27 EST
  968. Nmap scan report for a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  969. Host is up (0.13s latency).
  970.  
  971. PORT STATE SERVICE VERSION
  972. 67/udp open|filtered dhcps
  973. |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
  974. Too many fingerprints match this host to give specific OS details
  975. Network Distance: 10 hops
  976.  
  977. TRACEROUTE (using proto 1/icmp)
  978. HOP RTT ADDRESS
  979. 1 228.44 ms 10.245.200.1
  980. 2 228.48 ms v106.ce02.hkg-10.hk.leaseweb.net (43.249.36.189)
  981. 3 229.29 ms te-0-0-2-3.br02.hkg-10.hk.leaseweb.net (43.249.36.12)
  982. 4 229.32 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
  983. 5 229.34 ms ae-101.bb10.hkg-12.leaseweb.net (31.31.38.192)
  984. 6 367.53 ms 4826.hkg.equinix.com (119.27.63.115)
  985. 7 343.48 ms Te-0-0-0-2-8.cor01.syd11.nsw.VOCUS.net.au (119.161.84.31)
  986. 8 343.50 ms 114.31.192.39
  987. 9 350.52 ms as20940.bdr02.syd03.nsw.VOCUS.net.au (175.45.124.226)
  988. 10 343.51 ms a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  989. #######################################################################################################################################
  990. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:29 EST
  991. Nmap scan report for a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  992. Host is up (0.12s latency).
  993.  
  994. PORT STATE SERVICE VERSION
  995. 68/udp open|filtered dhcpc
  996. Too many fingerprints match this host to give specific OS details
  997. Network Distance: 10 hops
  998.  
  999. TRACEROUTE (using proto 1/icmp)
  1000. HOP RTT ADDRESS
  1001. 1 228.61 ms 10.245.200.1
  1002. 2 229.49 ms v106.ce02.hkg-10.hk.leaseweb.net (43.249.36.189)
  1003. 3 229.54 ms te-0-0-2-3.br02.hkg-10.hk.leaseweb.net (43.249.36.12)
  1004. 4 229.57 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
  1005. 5 229.83 ms ae-101.bb10.hkg-12.leaseweb.net (31.31.38.192)
  1006. 6 368.16 ms 4826.hkg.equinix.com (119.27.63.115)
  1007. 7 344.08 ms Te-0-0-0-2-8.cor01.syd11.nsw.VOCUS.net.au (119.161.84.31)
  1008. 8 365.58 ms 114.31.192.39
  1009. 9 346.98 ms as20940.bdr02.syd03.nsw.VOCUS.net.au (175.45.124.226)
  1010. 10 344.17 ms a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1011. #######################################################################################################################################
  1012. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:31 EST
  1013. Nmap scan report for a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1014. Host is up (0.12s latency).
  1015.  
  1016. PORT STATE SERVICE VERSION
  1017. 69/udp open|filtered tftp
  1018. Too many fingerprints match this host to give specific OS details
  1019. Network Distance: 10 hops
  1020.  
  1021. TRACEROUTE (using proto 1/icmp)
  1022. HOP RTT ADDRESS
  1023. 1 228.10 ms 10.245.200.1
  1024. 2 228.12 ms v106.ce02.hkg-10.hk.leaseweb.net (43.249.36.189)
  1025. 3 229.22 ms te-0-0-2-3.br02.hkg-10.hk.leaseweb.net (43.249.36.12)
  1026. 4 229.24 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
  1027. 5 229.26 ms ae-101.bb10.hkg-12.leaseweb.net (31.31.38.192)
  1028. 6 367.53 ms 4826.hkg.equinix.com (119.27.63.115)
  1029. 7 343.20 ms Te-0-0-0-2-8.cor01.syd11.nsw.VOCUS.net.au (119.161.84.31)
  1030. 8 344.14 ms 114.31.192.39
  1031. 9 344.51 ms as20940.bdr02.syd03.nsw.VOCUS.net.au (175.45.124.226)
  1032. 10 343.21 ms a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1033. #######################################################################################################################################
  1034. ^ ^
  1035. _ __ _ ____ _ __ _ _ ____
  1036. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  1037. | V V // o // _/ | V V // 0 // 0 // _/
  1038. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  1039. <
  1040. ...'
  1041.  
  1042. WAFW00F - Web Application Firewall Detection Tool
  1043.  
  1044. By Sandro Gauci && Wendel G. Henrique
  1045.  
  1046. Checking http://104.72.70.183
  1047. Generic Detection results:
  1048. No WAF detected by the generic detection
  1049. Number of requests: 14
  1050. #######################################################################################################################################
  1051.  
  1052. wig - WebApp Information Gatherer
  1053.  
  1054.  
  1055. Scanning http://104.72.70.183...
  1056. _____________________ SITE INFO ______________________
  1057. IP Title
  1058. 104.72.70.183
  1059.  
  1060. ______________________ VERSION _______________________
  1061. Name Versions Type
  1062.  
  1063. ____________________ INTERESTING _____________________
  1064. URL Note Type
  1065. /readme.html Readme file Interesting
  1066. /install.php Installation file Interesting
  1067. /test.php Test file Interesting
  1068.  
  1069. ______________________________________________________
  1070. Time: 52.8 sec Urls: 598 Fingerprints: 40401
  1071. #######################################################################################################################################
  1072. HTTP/1.1 400 Bad Request
  1073. Mime-Version: 1.0
  1074. Content-Type: text/html
  1075. Content-Length: 208
  1076. Expires: Sat, 26 Jan 2019 01:35:34 GMT
  1077. Date: Sat, 26 Jan 2019 01:35:34 GMT
  1078. Connection: keep-alive
  1079.  
  1080. HTTP/1.1 400 Bad Request
  1081. Mime-Version: 1.0
  1082. Content-Type: text/html
  1083. Content-Length: 208
  1084. Expires: Sat, 26 Jan 2019 01:35:35 GMT
  1085. Date: Sat, 26 Jan 2019 01:35:35 GMT
  1086. Connection: keep-alive
  1087. #######################################################################################################################################
  1088. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:35 EST
  1089. Nmap scan report for a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1090. Host is up (0.12s latency).
  1091.  
  1092. PORT STATE SERVICE VERSION
  1093. 123/udp open|filtered ntp
  1094. Too many fingerprints match this host to give specific OS details
  1095. Network Distance: 10 hops
  1096.  
  1097. TRACEROUTE (using proto 1/icmp)
  1098. HOP RTT ADDRESS
  1099. 1 228.25 ms 10.245.200.1
  1100. 2 228.27 ms v106.ce02.hkg-10.hk.leaseweb.net (43.249.36.189)
  1101. 3 228.78 ms te-0-0-2-3.br02.hkg-10.hk.leaseweb.net (43.249.36.12)
  1102. 4 228.99 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
  1103. 5 229.65 ms ae-101.bb10.hkg-12.leaseweb.net (31.31.38.192)
  1104. 6 367.89 ms 4826.hkg.equinix.com (119.27.63.115)
  1105. 7 343.38 ms Te-0-0-0-2-8.cor01.syd11.nsw.VOCUS.net.au (119.161.84.31)
  1106. 8 367.11 ms 114.31.192.39
  1107. 9 347.10 ms as20940.bdr02.syd03.nsw.VOCUS.net.au (175.45.124.226)
  1108. 10 343.43 ms a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1109. #######################################################################################################################################
  1110. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:37 EST
  1111. Nmap scan report for a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1112. Host is up (0.29s latency).
  1113.  
  1114. PORT STATE SERVICE VERSION
  1115. 161/tcp filtered snmp
  1116. 161/udp open|filtered snmp
  1117. Too many fingerprints match this host to give specific OS details
  1118. Network Distance: 10 hops
  1119.  
  1120. TRACEROUTE (using proto 1/icmp)
  1121. HOP RTT ADDRESS
  1122. 1 229.65 ms 10.245.200.1
  1123. 2 229.67 ms v106.ce02.hkg-10.hk.leaseweb.net (43.249.36.189)
  1124. 3 230.04 ms te-0-0-2-3.br02.hkg-10.hk.leaseweb.net (43.249.36.12)
  1125. 4 230.06 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
  1126. 5 231.03 ms ae-101.bb10.hkg-12.leaseweb.net (31.31.38.192)
  1127. 6 368.95 ms 4826.hkg.equinix.com (119.27.63.115)
  1128. 7 344.54 ms Te-0-0-0-2-8.cor01.syd11.nsw.VOCUS.net.au (119.161.84.31)
  1129. 8 345.69 ms 114.31.192.39
  1130. 9 380.27 ms as20940.bdr02.syd03.nsw.VOCUS.net.au (175.45.124.226)
  1131. 10 344.55 ms a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1132. #######################################################################################################################################
  1133. Version: 1.11.12-static
  1134. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  1135.  
  1136. Connected to 104.72.70.183
  1137.  
  1138. Testing SSL server 104.72.70.183 on port 443 using SNI name 104.72.70.183
  1139.  
  1140. TLS Fallback SCSV:
  1141. Server does not support TLS Fallback SCSV
  1142.  
  1143. TLS renegotiation:
  1144. Session renegotiation not supported
  1145.  
  1146. TLS Compression:
  1147. Compression disabled
  1148.  
  1149. Heartbleed:
  1150. TLS 1.2 not vulnerable to heartbleed
  1151. TLS 1.1 not vulnerable to heartbleed
  1152. TLS 1.0 not vulnerable to heartbleed
  1153.  
  1154. Supported Server Cipher(s):
  1155. #######################################################################################################################################
  1156. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:43 EST
  1157. NSE: Loaded 148 scripts for scanning.
  1158. NSE: Script Pre-scanning.
  1159. NSE: Starting runlevel 1 (of 2) scan.
  1160. Initiating NSE at 20:43
  1161. Completed NSE at 20:43, 0.00s elapsed
  1162. NSE: Starting runlevel 2 (of 2) scan.
  1163. Initiating NSE at 20:43
  1164. Completed NSE at 20:43, 0.00s elapsed
  1165. Initiating Ping Scan at 20:43
  1166. Scanning 104.72.70.183 [4 ports]
  1167. Completed Ping Scan at 20:43, 0.26s elapsed (1 total hosts)
  1168. Initiating Parallel DNS resolution of 1 host. at 20:43
  1169. Completed Parallel DNS resolution of 1 host. at 20:43, 0.02s elapsed
  1170. Initiating Connect Scan at 20:43
  1171. Scanning a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183) [1000 ports]
  1172. Discovered open port 80/tcp on 104.72.70.183
  1173. Discovered open port 443/tcp on 104.72.70.183
  1174. Completed Connect Scan at 20:43, 13.75s elapsed (1000 total ports)
  1175. Initiating Service scan at 20:43
  1176. Scanning 2 services on a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1177. Service scan Timing: About 50.00% done; ETC: 20:45 (0:00:36 remaining)
  1178. Completed Service scan at 20:44, 36.22s elapsed (2 services on 1 host)
  1179. Initiating OS detection (try #1) against a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1180. Retrying OS detection (try #2) against a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1181. Initiating Traceroute at 20:44
  1182. Completed Traceroute at 20:44, 0.37s elapsed
  1183. Initiating Parallel DNS resolution of 10 hosts. at 20:44
  1184. Completed Parallel DNS resolution of 10 hosts. at 20:44, 16.50s elapsed
  1185. NSE: Script scanning 104.72.70.183.
  1186. NSE: Starting runlevel 1 (of 2) scan.
  1187. Initiating NSE at 20:44
  1188. NSE Timing: About 98.92% done; ETC: 20:45 (0:00:00 remaining)
  1189. NSE Timing: About 99.64% done; ETC: 20:45 (0:00:00 remaining)
  1190. Completed NSE at 20:46, 90.06s elapsed
  1191. NSE: Starting runlevel 2 (of 2) scan.
  1192. Initiating NSE at 20:46
  1193. Completed NSE at 20:46, 0.70s elapsed
  1194. Nmap scan report for a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1195. Host is up, received reset ttl 64 (0.24s latency).
  1196. Scanned at 2019-01-25 20:43:35 EST for 164s
  1197. Not shown: 994 filtered ports
  1198. Reason: 994 no-responses
  1199. PORT STATE SERVICE REASON VERSION
  1200. 25/tcp closed smtp conn-refused
  1201. 53/tcp closed domain conn-refused
  1202. 80/tcp open http-proxy syn-ack Squid http proxy
  1203. |_http-open-proxy: Proxy might be redirecting requests
  1204. |_http-title: Invalid URL
  1205. 139/tcp closed netbios-ssn conn-refused
  1206. 443/tcp open https? syn-ack
  1207. 445/tcp closed microsoft-ds conn-refused
  1208. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  1209. SF-Port443-TCP:V=7.70%I=7%D=1/25%Time=5C4BBB5C%P=x86_64-pc-linux-gnu%r(SSL
  1210. SF:SessionReq,7,"\x15\x03\x04\0\x02\x02P")%r(TLSSessionReq,7,"\x15\x03\x04
  1211. SF:\0\x02\x02P")%r(SSLv23SessionReq,7,"\x15\x03\x04\0\x02\x02P");
  1212. Device type: general purpose|storage-misc|broadband router|WAP
  1213. Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (87%)
  1214. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:hp:p2000_g3 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/h:asus:rt-ac66u cpe:/o:linux:linux_kernel:2.6.22
  1215. OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
  1216. Aggressive OS guesses: Linux 3.16 - 4.6 (94%), Linux 3.10 - 4.11 (92%), Linux 3.13 (92%), Linux 3.13 or 4.2 (92%), Linux 4.2 (92%), Linux 4.4 (92%), Linux 3.18 (91%), HP P2000 G3 NAS device (91%), Linux 3.2 - 4.9 (90%), Linux 3.16 (90%)
  1217. No exact OS matches for host (test conditions non-ideal).
  1218. TCP/IP fingerprint:
  1219. SCAN(V=7.70%E=4%D=1/25%OT=80%CT=25%CU=%PV=N%DS=10%DC=T%G=N%TM=5C4BBBEB%P=x86_64-pc-linux-gnu)
  1220. SEQ(SP=103%GCD=1%ISR=108%TI=Z%CI=Z%TS=8)
  1221. OPS(O1=M4B3ST11NW7%O2=M4B3ST11NW7%O3=M4B3NNT11NW7%O4=M4B3ST11NW7%O5=M4B3ST11NW7%O6=M4B3ST11)
  1222. WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7120)
  1223. ECN(R=Y%DF=Y%TG=40%W=7210%O=M4B3NNSNW7%CC=Y%Q=)
  1224. T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
  1225. T2(R=N)
  1226. T3(R=N)
  1227. T4(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
  1228. T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
  1229. T6(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
  1230. T7(R=N)
  1231. U1(R=N)
  1232. IE(R=Y%DFI=N%TG=40%CD=S)
  1233.  
  1234. Uptime guess: 43.094 days (since Thu Dec 13 18:31:04 2018)
  1235. Network Distance: 10 hops
  1236. TCP Sequence Prediction: Difficulty=259 (Good luck!)
  1237. IP ID Sequence Generation: All zeros
  1238.  
  1239. TRACEROUTE (using proto 1/icmp)
  1240. HOP RTT ADDRESS
  1241. 1 231.16 ms 10.245.200.1
  1242. 2 231.20 ms v106.ce02.hkg-10.hk.leaseweb.net (43.249.36.189)
  1243. 3 231.60 ms te-0-0-2-3.br02.hkg-10.hk.leaseweb.net (43.249.36.12)
  1244. 4 231.64 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
  1245. 5 232.60 ms ae-101.bb10.hkg-12.leaseweb.net (31.31.38.192)
  1246. 6 370.59 ms 4826.hkg.equinix.com (119.27.63.115)
  1247. 7 346.03 ms Te-0-0-0-2-8.cor01.syd11.nsw.VOCUS.net.au (119.161.84.31)
  1248. 8 346.62 ms 114.31.192.39
  1249. 9 347.60 ms as20940.bdr02.syd03.nsw.VOCUS.net.au (175.45.124.226)
  1250. 10 346.08 ms a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1251.  
  1252. NSE: Script Post-scanning.
  1253. NSE: Starting runlevel 1 (of 2) scan.
  1254. Initiating NSE at 20:46
  1255. Completed NSE at 20:46, 0.00s elapsed
  1256. NSE: Starting runlevel 2 (of 2) scan.
  1257. Initiating NSE at 20:46
  1258. Completed NSE at 20:46, 0.00s elapsed
  1259. Read data files from: /usr/bin/../share/nmap
  1260. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1261. Nmap done: 1 IP address (1 host up) scanned in 164.43 seconds
  1262. Raw packets sent: 83 (7.760KB) | Rcvd: 45 (3.844KB)
  1263. #######################################################################################################################################
  1264. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:46 EST
  1265. NSE: Loaded 148 scripts for scanning.
  1266. NSE: Script Pre-scanning.
  1267. Initiating NSE at 20:46
  1268. Completed NSE at 20:46, 0.00s elapsed
  1269. Initiating NSE at 20:46
  1270. Completed NSE at 20:46, 0.00s elapsed
  1271. Initiating Parallel DNS resolution of 1 host. at 20:46
  1272. Completed Parallel DNS resolution of 1 host. at 20:46, 0.02s elapsed
  1273. Initiating UDP Scan at 20:46
  1274. Scanning a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183) [14 ports]
  1275. Completed UDP Scan at 20:46, 3.02s elapsed (14 total ports)
  1276. Initiating Service scan at 20:46
  1277. Scanning 11 services on a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1278. Service scan Timing: About 9.09% done; ETC: 21:04 (0:16:20 remaining)
  1279. Completed Service scan at 20:48, 102.59s elapsed (11 services on 1 host)
  1280. Initiating OS detection (try #1) against a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1281. Initiating Traceroute at 20:48
  1282. Completed Traceroute at 20:48, 7.28s elapsed
  1283. Initiating Parallel DNS resolution of 1 host. at 20:48
  1284. Completed Parallel DNS resolution of 1 host. at 20:48, 0.02s elapsed
  1285. NSE: Script scanning 104.72.70.183.
  1286. Initiating NSE at 20:48
  1287. Completed NSE at 20:48, 20.24s elapsed
  1288. Initiating NSE at 20:48
  1289. Completed NSE at 20:48, 1.61s elapsed
  1290. Nmap scan report for a104-72-70-183.deploy.static.akamaitechnologies.com (104.72.70.183)
  1291. Host is up (0.28s latency).
  1292.  
  1293. PORT STATE SERVICE VERSION
  1294. 53/udp closed domain
  1295. 67/udp open|filtered dhcps
  1296. 68/udp open|filtered dhcpc
  1297. 69/udp open|filtered tftp
  1298. 88/udp open|filtered kerberos-sec
  1299. 123/udp open|filtered ntp
  1300. 137/udp filtered netbios-ns
  1301. 138/udp filtered netbios-dgm
  1302. 139/udp open|filtered netbios-ssn
  1303. 161/udp open|filtered snmp
  1304. 162/udp open|filtered snmptrap
  1305. 389/udp open|filtered ldap
  1306. 520/udp open|filtered route
  1307. 2049/udp open|filtered nfs
  1308. Too many fingerprints match this host to give specific OS details
  1309. Network Distance: 10 hops
  1310.  
  1311. TRACEROUTE (using port 137/udp)
  1312. HOP RTT ADDRESS
  1313. 1 228.07 ms 10.245.200.1
  1314. 2 ... 3
  1315. 4 228.51 ms 10.245.200.1
  1316. 5 229.80 ms 10.245.200.1
  1317. 6 229.63 ms 10.245.200.1
  1318. 7 229.63 ms 10.245.200.1
  1319. 8 229.63 ms 10.245.200.1
  1320. 9 229.63 ms 10.245.200.1
  1321. 10 229.65 ms 10.245.200.1
  1322. 11 ... 18
  1323. 19 228.76 ms 10.245.200.1
  1324. 20 228.06 ms 10.245.200.1
  1325. 21 ... 27
  1326. 28 229.23 ms 10.245.200.1
  1327. 29 ...
  1328. 30 227.87 ms 10.245.200.1
  1329.  
  1330. NSE: Script Post-scanning.
  1331. Initiating NSE at 20:48
  1332. Completed NSE at 20:48, 0.00s elapsed
  1333. Initiating NSE at 20:48
  1334. Completed NSE at 20:48, 0.00s elapsed
  1335. Read data files from: /usr/bin/../share/nmap
  1336. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1337. Nmap done: 1 IP address (1 host up) scanned in 138.51 seconds
  1338. Raw packets sent: 113 (8.276KB) | Rcvd: 58 (5.809KB)
  1339. #######################################################################################################################################
  1340. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:28 EST
  1341. Nmap scan report for a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1342. Host is up (0.37s latency).
  1343. Not shown: 471 filtered ports, 3 closed ports
  1344. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  1345. PORT STATE SERVICE
  1346. 80/tcp open http
  1347. 443/tcp open https
  1348. #######################################################################################################################################
  1349. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:31 EST
  1350. Nmap scan report for a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1351. Host is up (0.23s latency).
  1352. Not shown: 2 filtered ports
  1353. PORT STATE SERVICE
  1354. 53/udp open|filtered domain
  1355. 67/udp open|filtered dhcps
  1356. 68/udp open|filtered dhcpc
  1357. 69/udp open|filtered tftp
  1358. 88/udp open|filtered kerberos-sec
  1359. 123/udp open|filtered ntp
  1360. 139/udp open|filtered netbios-ssn
  1361. 161/udp open|filtered snmp
  1362. 162/udp open|filtered snmptrap
  1363. 389/udp open|filtered ldap
  1364. 520/udp open|filtered route
  1365. 2049/udp open|filtered nfs
  1366. #######################################################################################################################################
  1367. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:31 EST
  1368. Nmap scan report for a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1369. Host is up (0.15s latency).
  1370.  
  1371. PORT STATE SERVICE VERSION
  1372. 67/udp open|filtered dhcps
  1373. |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
  1374. Too many fingerprints match this host to give specific OS details
  1375. Network Distance: 11 hops
  1376.  
  1377. TRACEROUTE (using proto 1/icmp)
  1378. HOP RTT ADDRESS
  1379. 1 228.91 ms 10.245.200.1
  1380. 2 228.96 ms v106.ce01.hkg-10.hk.leaseweb.net (43.249.36.188)
  1381. 3 230.25 ms te-0-0-0-0.br02.hkg-10.hk.leaseweb.net (43.249.36.10)
  1382. 4 231.50 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
  1383. 5 231.46 ms ae-101.bb10.hkg-12.leaseweb.net (31.31.38.192)
  1384. 6 369.54 ms 4826.hkg.equinix.com (119.27.63.115)
  1385. 7 369.59 ms Te-0-1-0-2-1.cor02.syd04.nsw.VOCUS.net.au (119.161.84.21)
  1386. 8 369.98 ms BE-1.cor01.syd11.nsw.VOCUS.net.au (114.31.192.40)
  1387. 9 370.97 ms 114.31.192.39
  1388. 10 377.02 ms as20940.bdr02.syd03.nsw.VOCUS.net.au (175.45.124.226)
  1389. 11 367.24 ms a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1390. #######################################################################################################################################
  1391. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:33 EST
  1392. Nmap scan report for a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1393. Host is up (0.15s latency).
  1394.  
  1395. PORT STATE SERVICE VERSION
  1396. 68/udp open|filtered dhcpc
  1397. Too many fingerprints match this host to give specific OS details
  1398. Network Distance: 11 hops
  1399.  
  1400. TRACEROUTE (using proto 1/icmp)
  1401. HOP RTT ADDRESS
  1402. 1 229.49 ms 10.245.200.1
  1403. 2 229.51 ms v106.ce01.hkg-10.hk.leaseweb.net (43.249.36.188)
  1404. 3 230.86 ms te-0-0-0-0.br02.hkg-10.hk.leaseweb.net (43.249.36.10)
  1405. 4 230.89 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
  1406. 5 230.90 ms ae-101.bb10.hkg-12.leaseweb.net (31.31.38.192)
  1407. 6 369.48 ms 4826.hkg.equinix.com (119.27.63.115)
  1408. 7 369.52 ms Te-0-1-0-2-1.cor02.syd04.nsw.VOCUS.net.au (119.161.84.21)
  1409. 8 370.15 ms BE-1.cor01.syd11.nsw.VOCUS.net.au (114.31.192.40)
  1410. 9 370.20 ms 114.31.192.39
  1411. 10 370.24 ms as20940.bdr02.syd03.nsw.VOCUS.net.au (175.45.124.226)
  1412. 11 368.69 ms a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1413. #######################################################################################################################################
  1414. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:35 EST
  1415. Nmap scan report for a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1416. Host is up (0.15s latency).
  1417.  
  1418. PORT STATE SERVICE VERSION
  1419. 69/udp open|filtered tftp
  1420. Too many fingerprints match this host to give specific OS details
  1421. Network Distance: 11 hops
  1422.  
  1423. TRACEROUTE (using proto 1/icmp)
  1424. HOP RTT ADDRESS
  1425. 1 228.01 ms 10.245.200.1
  1426. 2 228.05 ms v106.ce01.hkg-10.hk.leaseweb.net (43.249.36.188)
  1427. 3 228.83 ms te-0-0-0-0.br02.hkg-10.hk.leaseweb.net (43.249.36.10)
  1428. 4 229.63 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
  1429. 5 229.66 ms ae-101.bb10.hkg-12.leaseweb.net (31.31.38.192)
  1430. 6 368.09 ms 4826.hkg.equinix.com (119.27.63.115)
  1431. 7 368.12 ms Te-0-1-0-2-1.cor02.syd04.nsw.VOCUS.net.au (119.161.84.21)
  1432. 8 368.96 ms BE-1.cor01.syd11.nsw.VOCUS.net.au (114.31.192.40)
  1433. 9 368.99 ms 114.31.192.39
  1434. 10 372.77 ms as20940.bdr02.syd03.nsw.VOCUS.net.au (175.45.124.226)
  1435. 11 369.01 ms a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1436. #######################################################################################################################################
  1437.  
  1438. ^ ^
  1439. _ __ _ ____ _ __ _ _ ____
  1440. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  1441. | V V // o // _/ | V V // 0 // 0 // _/
  1442. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  1443. <
  1444. ...'
  1445.  
  1446. WAFW00F - Web Application Firewall Detection Tool
  1447.  
  1448. By Sandro Gauci && Wendel G. Henrique
  1449.  
  1450. Checking http://104.72.70.116
  1451. Generic Detection results:
  1452. No WAF detected by the generic detection
  1453. Number of requests: 14
  1454. #######################################################################################################################################
  1455. wig - WebApp Information Gatherer
  1456.  
  1457.  
  1458. Scanning http://104.72.70.116...
  1459. _____________________ SITE INFO ______________________
  1460. IP Title
  1461. 104.72.70.116
  1462.  
  1463. ______________________ VERSION _______________________
  1464. Name Versions Type
  1465.  
  1466. ____________________ INTERESTING _____________________
  1467. URL Note Type
  1468. /readme.html Readme file Interesting
  1469. /install.php Installation file Interesting
  1470. /test.php Test file Interesting
  1471. /test.htm Test file Interesting
  1472.  
  1473. ______________________________________________________
  1474. Time: 50.2 sec Urls: 598 Fingerprints: 40401
  1475. #######################################################################################################################################
  1476. HTTP/1.1 400 Bad Request
  1477. Mime-Version: 1.0
  1478. Content-Type: text/html
  1479. Content-Length: 207
  1480. Expires: Sat, 26 Jan 2019 01:39:26 GMT
  1481. Date: Sat, 26 Jan 2019 01:39:26 GMT
  1482. Connection: keep-alive
  1483.  
  1484. HTTP/1.1 400 Bad Request
  1485. Mime-Version: 1.0
  1486. Content-Type: text/html
  1487. Content-Length: 207
  1488. Expires: Sat, 26 Jan 2019 01:39:27 GMT
  1489. Date: Sat, 26 Jan 2019 01:39:27 GMT
  1490. Connection: keep-alive
  1491. #######################################################################################################################################
  1492. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:39 EST
  1493. Nmap scan report for a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1494. Host is up (0.15s latency).
  1495.  
  1496. PORT STATE SERVICE VERSION
  1497. 123/udp open|filtered ntp
  1498. Too many fingerprints match this host to give specific OS details
  1499. Network Distance: 11 hops
  1500.  
  1501. TRACEROUTE (using proto 1/icmp)
  1502. HOP RTT ADDRESS
  1503. 1 229.29 ms 10.245.200.1
  1504. 2 229.35 ms v106.ce01.hkg-10.hk.leaseweb.net (43.249.36.188)
  1505. 3 229.37 ms te-0-0-0-0.br02.hkg-10.hk.leaseweb.net (43.249.36.10)
  1506. 4 230.66 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
  1507. 5 230.70 ms ae-101.bb10.hkg-12.leaseweb.net (31.31.38.192)
  1508. 6 369.36 ms 4826.hkg.equinix.com (119.27.63.115)
  1509. 7 369.38 ms Te-0-1-0-2-1.cor02.syd04.nsw.VOCUS.net.au (119.161.84.21)
  1510. 8 369.61 ms BE-1.cor01.syd11.nsw.VOCUS.net.au (114.31.192.40)
  1511. 9 370.79 ms 114.31.192.39
  1512. 10 781.16 ms as20940.bdr02.syd03.nsw.VOCUS.net.au (175.45.124.226)
  1513. 11 367.90 ms a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1514. #######################################################################################################################################
  1515. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:41 EST
  1516. Nmap scan report for a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1517. Host is up (0.30s latency).
  1518.  
  1519. PORT STATE SERVICE VERSION
  1520. 161/tcp filtered snmp
  1521. 161/udp open|filtered snmp
  1522. Too many fingerprints match this host to give specific OS details
  1523. Network Distance: 11 hops
  1524.  
  1525. TRACEROUTE (using proto 1/icmp)
  1526. HOP RTT ADDRESS
  1527. 1 229.18 ms 10.245.200.1
  1528. 2 229.21 ms v106.ce01.hkg-10.hk.leaseweb.net (43.249.36.188)
  1529. 3 229.23 ms te-0-0-0-0.br02.hkg-10.hk.leaseweb.net (43.249.36.10)
  1530. 4 230.60 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
  1531. 5 230.63 ms ae-101.bb10.hkg-12.leaseweb.net (31.31.38.192)
  1532. 6 368.69 ms 4826.hkg.equinix.com (119.27.63.115)
  1533. 7 368.73 ms Te-0-1-0-2-1.cor02.syd04.nsw.VOCUS.net.au (119.161.84.21)
  1534. 8 370.13 ms BE-1.cor01.syd11.nsw.VOCUS.net.au (114.31.192.40)
  1535. 9 370.10 ms 114.31.192.39
  1536. 10 370.70 ms as20940.bdr02.syd03.nsw.VOCUS.net.au (175.45.124.226)
  1537. 11 367.36 ms a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1538. #######################################################################################################################################
  1539. Version: 1.11.12-static
  1540. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  1541.  
  1542. Connected to 104.72.70.116
  1543.  
  1544. Testing SSL server 104.72.70.116 on port 443 using SNI name 104.72.70.116
  1545.  
  1546. TLS Fallback SCSV:
  1547. Server does not support TLS Fallback SCSV
  1548.  
  1549. TLS renegotiation:
  1550. Session renegotiation not supported
  1551.  
  1552. TLS Compression:
  1553. Compression disabled
  1554.  
  1555. Heartbleed:
  1556. TLS 1.2 not vulnerable to heartbleed
  1557. TLS 1.1 not vulnerable to heartbleed
  1558. TLS 1.0 not vulnerable to heartbleed
  1559.  
  1560. Supported Server Cipher(s):
  1561. #######################################################################################################################################
  1562. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:47 EST
  1563. NSE: Loaded 148 scripts for scanning.
  1564. NSE: Script Pre-scanning.
  1565. NSE: Starting runlevel 1 (of 2) scan.
  1566. Initiating NSE at 20:47
  1567. Completed NSE at 20:47, 0.00s elapsed
  1568. NSE: Starting runlevel 2 (of 2) scan.
  1569. Initiating NSE at 20:47
  1570. Completed NSE at 20:47, 0.00s elapsed
  1571. Initiating Ping Scan at 20:47
  1572. Scanning 104.72.70.116 [4 ports]
  1573. Completed Ping Scan at 20:47, 0.27s elapsed (1 total hosts)
  1574. Initiating Parallel DNS resolution of 1 host. at 20:47
  1575. Completed Parallel DNS resolution of 1 host. at 20:47, 0.03s elapsed
  1576. Initiating Connect Scan at 20:47
  1577. Scanning a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116) [1000 ports]
  1578. Discovered open port 80/tcp on 104.72.70.116
  1579. Discovered open port 443/tcp on 104.72.70.116
  1580. Completed Connect Scan at 20:47, 12.56s elapsed (1000 total ports)
  1581. Initiating Service scan at 20:47
  1582. Scanning 2 services on a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1583. Service scan Timing: About 50.00% done; ETC: 20:48 (0:00:36 remaining)
  1584. Completed Service scan at 20:48, 37.40s elapsed (2 services on 1 host)
  1585. Initiating OS detection (try #1) against a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1586. Retrying OS detection (try #2) against a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1587. Initiating Traceroute at 20:48
  1588. Completed Traceroute at 20:48, 0.61s elapsed
  1589. Initiating Parallel DNS resolution of 11 hosts. at 20:48
  1590. Completed Parallel DNS resolution of 11 hosts. at 20:48, 16.50s elapsed
  1591. NSE: Script scanning 104.72.70.116.
  1592. NSE: Starting runlevel 1 (of 2) scan.
  1593. Initiating NSE at 20:48
  1594. NSE Timing: About 99.28% done; ETC: 20:49 (0:00:00 remaining)
  1595. NSE Timing: About 99.64% done; ETC: 20:49 (0:00:00 remaining)
  1596. NSE Timing: About 99.64% done; ETC: 20:50 (0:00:00 remaining)
  1597. Completed NSE at 20:50, 91.93s elapsed
  1598. NSE: Starting runlevel 2 (of 2) scan.
  1599. Initiating NSE at 20:50
  1600. Completed NSE at 20:50, 0.75s elapsed
  1601. Nmap scan report for a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1602. Host is up, received reset ttl 64 (0.21s latency).
  1603. Scanned at 2019-01-25 20:47:25 EST for 167s
  1604. Not shown: 995 filtered ports
  1605. Reason: 995 no-responses
  1606. PORT STATE SERVICE REASON VERSION
  1607. 25/tcp closed smtp conn-refused
  1608. 80/tcp open http-proxy syn-ack Squid http proxy
  1609. |_http-open-proxy: Proxy might be redirecting requests
  1610. |_http-title: Invalid URL
  1611. 139/tcp closed netbios-ssn conn-refused
  1612. 443/tcp open https? syn-ack
  1613. 445/tcp closed microsoft-ds conn-refused
  1614. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  1615. SF-Port443-TCP:V=7.70%I=7%D=1/25%Time=5C4BBC41%P=x86_64-pc-linux-gnu%r(SSL
  1616. SF:SessionReq,7,"\x15\x03\x04\0\x02\x02P")%r(TLSSessionReq,7,"\x15\x03\x04
  1617. SF:\0\x02\x02P")%r(SSLv23SessionReq,7,"\x15\x03\x04\0\x02\x02P");
  1618. Device type: general purpose|storage-misc|broadband router|WAP|phone
  1619. Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (87%), Google Android 4.X (87%)
  1620. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:hp:p2000_g3 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/h:asus:rt-ac66u cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:google:android:4.0
  1621. OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
  1622. Aggressive OS guesses: Linux 3.16 - 4.6 (94%), Linux 3.10 - 4.11 (92%), Linux 3.13 (92%), Linux 3.13 or 4.2 (92%), Linux 4.2 (92%), Linux 4.4 (92%), Linux 3.18 (91%), HP P2000 G3 NAS device (91%), Linux 3.2 - 4.9 (90%), Linux 3.16 (90%)
  1623. No exact OS matches for host (test conditions non-ideal).
  1624. TCP/IP fingerprint:
  1625. SCAN(V=7.70%E=4%D=1/25%OT=80%CT=25%CU=%PV=N%DS=11%DC=T%G=N%TM=5C4BBCD4%P=x86_64-pc-linux-gnu)
  1626. SEQ(SP=100%GCD=1%ISR=10A%TI=Z%CI=Z%TS=8)
  1627. OPS(O1=M4B3ST11NW7%O2=M4B3ST11NW7%O3=M4B3NNT11NW7%O4=M4B3ST11NW7%O5=M4B3ST11NW7%O6=M4B3ST11)
  1628. WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7120)
  1629. ECN(R=Y%DF=Y%TG=40%W=7210%O=M4B3NNSNW7%CC=Y%Q=)
  1630. T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
  1631. T2(R=N)
  1632. T3(R=N)
  1633. T4(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
  1634. T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
  1635. T6(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
  1636. T7(R=N)
  1637. U1(R=N)
  1638. IE(R=Y%DFI=N%TG=40%CD=S)
  1639.  
  1640. Uptime guess: 42.407 days (since Fri Dec 14 11:03:56 2018)
  1641. Network Distance: 11 hops
  1642. TCP Sequence Prediction: Difficulty=256 (Good luck!)
  1643. IP ID Sequence Generation: All zeros
  1644.  
  1645. TRACEROUTE (using proto 1/icmp)
  1646. HOP RTT ADDRESS
  1647. 1 229.51 ms 10.245.200.1
  1648. 2 229.53 ms v106.ce01.hkg-10.hk.leaseweb.net (43.249.36.188)
  1649. 3 230.53 ms te-0-0-0-0.br02.hkg-10.hk.leaseweb.net (43.249.36.10)
  1650. 4 231.32 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
  1651. 5 231.13 ms ae-101.bb10.hkg-12.leaseweb.net (31.31.38.192)
  1652. 6 369.94 ms 4826.hkg.equinix.com (119.27.63.115)
  1653. 7 369.97 ms Te-0-1-0-2-1.cor02.syd04.nsw.VOCUS.net.au (119.161.84.21)
  1654. 8 370.00 ms BE-1.cor01.syd11.nsw.VOCUS.net.au (114.31.192.40)
  1655. 9 370.00 ms 114.31.192.39
  1656. 10 378.06 ms as20940.bdr02.syd03.nsw.VOCUS.net.au (175.45.124.226)
  1657. 11 367.33 ms a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1658.  
  1659. NSE: Script Post-scanning.
  1660. NSE: Starting runlevel 1 (of 2) scan.
  1661. Initiating NSE at 20:50
  1662. Completed NSE at 20:50, 0.00s elapsed
  1663. NSE: Starting runlevel 2 (of 2) scan.
  1664. Initiating NSE at 20:50
  1665. Completed NSE at 20:50, 0.00s elapsed
  1666. Read data files from: /usr/bin/../share/nmap
  1667. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1668. Nmap done: 1 IP address (1 host up) scanned in 167.20 seconds
  1669. Raw packets sent: 84 (7.248KB) | Rcvd: 46 (3.562KB)
  1670. #######################################################################################################################################
  1671. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-25 20:50 EST
  1672. NSE: Loaded 148 scripts for scanning.
  1673. NSE: Script Pre-scanning.
  1674. Initiating NSE at 20:50
  1675. Completed NSE at 20:50, 0.00s elapsed
  1676. Initiating NSE at 20:50
  1677. Completed NSE at 20:50, 0.00s elapsed
  1678. Initiating Parallel DNS resolution of 1 host. at 20:50
  1679. Completed Parallel DNS resolution of 1 host. at 20:50, 0.02s elapsed
  1680. Initiating UDP Scan at 20:50
  1681. Scanning a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116) [14 ports]
  1682. Completed UDP Scan at 20:50, 3.11s elapsed (14 total ports)
  1683. Initiating Service scan at 20:50
  1684. Scanning 12 services on a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1685. Service scan Timing: About 8.33% done; ETC: 21:09 (0:17:47 remaining)
  1686. Completed Service scan at 20:51, 102.58s elapsed (12 services on 1 host)
  1687. Initiating OS detection (try #1) against a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1688. Retrying OS detection (try #2) against a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1689. Initiating Traceroute at 20:52
  1690. Completed Traceroute at 20:52, 7.28s elapsed
  1691. Initiating Parallel DNS resolution of 1 host. at 20:52
  1692. Completed Parallel DNS resolution of 1 host. at 20:52, 0.02s elapsed
  1693. NSE: Script scanning 104.72.70.116.
  1694. Initiating NSE at 20:52
  1695. Completed NSE at 20:52, 20.32s elapsed
  1696. Initiating NSE at 20:52
  1697. Completed NSE at 20:52, 1.74s elapsed
  1698. Nmap scan report for a104-72-70-116.deploy.static.akamaitechnologies.com (104.72.70.116)
  1699. Host is up (0.29s latency).
  1700.  
  1701. PORT STATE SERVICE VERSION
  1702. 53/udp open|filtered domain
  1703. 67/udp open|filtered dhcps
  1704. 68/udp open|filtered dhcpc
  1705. 69/udp open|filtered tftp
  1706. 88/udp open|filtered kerberos-sec
  1707. 123/udp open|filtered ntp
  1708. 137/udp filtered netbios-ns
  1709. 138/udp filtered netbios-dgm
  1710. 139/udp open|filtered netbios-ssn
  1711. 161/udp open|filtered snmp
  1712. 162/udp open|filtered snmptrap
  1713. 389/udp open|filtered ldap
  1714. 520/udp open|filtered route
  1715. 2049/udp open|filtered nfs
  1716. Too many fingerprints match this host to give specific OS details
  1717.  
  1718. TRACEROUTE (using port 138/udp)
  1719. HOP RTT ADDRESS
  1720. 1 227.77 ms 10.245.200.1
  1721. 2 ... 3
  1722. 4 230.59 ms 10.245.200.1
  1723. 5 229.61 ms 10.245.200.1
  1724. 6 229.61 ms 10.245.200.1
  1725. 7 229.60 ms 10.245.200.1
  1726. 8 229.60 ms 10.245.200.1
  1727. 9 229.59 ms 10.245.200.1
  1728. 10 229.63 ms 10.245.200.1
  1729. 11 ... 18
  1730. 19 228.95 ms 10.245.200.1
  1731. 20 227.54 ms 10.245.200.1
  1732. 21 ... 27
  1733. 28 228.82 ms 10.245.200.1
  1734. 29 ...
  1735. 30 227.60 ms 10.245.200.1
  1736.  
  1737. NSE: Script Post-scanning.
  1738. Initiating NSE at 20:52
  1739. Completed NSE at 20:52, 0.00s elapsed
  1740. Initiating NSE at 20:52
  1741. Completed NSE at 20:52, 0.00s elapsed
  1742. Read data files from: /usr/bin/../share/nmap
  1743. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1744. Nmap done: 1 IP address (1 host up) scanned in 143.22 seconds
  1745. Raw packets sent: 135 (8.008KB) | Rcvd: 35 (3.519KB)
  1746. #######################################################################################################################################
  1747. Anonymous JTSEC #OpDomesticTerrorism Full Recon #1
Advertisement
Add Comment
Please, Sign In to add comment