Advertisement
Wave

#OpPedoChat website information- haal9000.net

Jul 12th, 2012
1,418
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.18 KB | None | 0 0
  1. ##############################################################################################
  2. Twitter -; @WaveAnonops #
  3. Moar pastes to come #
  4. Pedophiles -; Y u no expect us?! #
  5. W00T for decorative hash tags! #
  6. "If you're sitting below deck in the Lulzboat salute bitch and show some respect" -YTCracker #
  7. ---------------------------------------------------------------------------------------------#
  8. Charging Lulzcannon. #
  9. Target acquired: http://haal9000.net/ #
  10. ---------------------------------------------------------------------------------------------#
  11. DNS Servers for haal9000.net: #
  12. ns02.domaincontrol.com #
  13. ns01.domaincontrol.com #
  14. --Private Register through GoDaddy-- #
  15. ---------------------------------------------------------------------------------------------# Ports/Services: #
  16. PORT STATE SERVICE VERSION #
  17. 80/tcp open http Microsoft IIS webserver 7.0 #
  18. | robots.txt: has 1 disallowed entry #
  19. |_/ # |_html-title: HAAL9000 #
  20. Service Info: OS: Windows #
  21. #
  22. *** He must be new ;o #
  23. ---------------------------------------------------------------------------
  24. + Target IP: 66.96.131.24
  25. + Target Hostname: hal9000.net
  26. + Target Port: 80
  27. + Start Time: 2012-07-13 16:49:37
  28. ---------------------------------------------------------------------------
  29. + Server: Nginx / Varnish
  30. + Number of sections in the version string differ from those in the database, the server reports: nginx/varnish while the database has: 0.8.45. This may cause false positives.
  31. + ETag header found on server, inode: 3912398, size: 2538, mtime: 0x4b039013a8984
  32. + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE
  33. + OSVDB-396: /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted.
  34. + Default account found for 'Enter descriptive name here' at /pw/storemgr.pw (ID '', PW '_Cisco'). Cisco device.
  35. + OSVDB-28260: /_vti_bin/shtml.exe/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611: Gives info about server settings.
  36. + OSVDB-3092: /_vti_bin/_vti_aut/author.exe?method=list+documents%3a3%2e0%2e2%2e1706&service%5fname=&listHiddenDocs=true&listExplorerDocs=true&listRecurse=false&listFiles=true&listFolders=true&listLinkInfo=true&listIncludeParent=true&listDerivedT=false&listBorders=fals: We seem to have authoring access to the FrontPage web.
  37. + OSVDB-3093: /cgi-bin//_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
  38. + OSVDB-3233: /_vti_bin/shtml.exe/_vti_rpc: FrontPage may be installed.
  39. + 6448 items checked: 10 error(s) and 9 item(s) reported on remote host
  40. + End Time: 2012-07-13 17:15:28 (1551 seconds)
  41. ---------------------------------------------------------------------------
  42. + 1 host(s) tested
  43.  
  44.  
  45. Low findings :/
  46. -------------------------------------------------------------
  47. #We are Anonymous
  48. #We are Legion
  49. #We do not forgive
  50. #We do not forget
  51. #Expect us
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement