Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ##############################################################################################
- Twitter -; @WaveAnonops #
- Moar pastes to come #
- Pedophiles -; Y u no expect us?! #
- W00T for decorative hash tags! #
- "If you're sitting below deck in the Lulzboat salute bitch and show some respect" -YTCracker #
- ---------------------------------------------------------------------------------------------#
- Charging Lulzcannon. #
- Target acquired: http://haal9000.net/ #
- ---------------------------------------------------------------------------------------------#
- DNS Servers for haal9000.net: #
- ns02.domaincontrol.com #
- ns01.domaincontrol.com #
- --Private Register through GoDaddy-- #
- ---------------------------------------------------------------------------------------------# Ports/Services: #
- PORT STATE SERVICE VERSION #
- 80/tcp open http Microsoft IIS webserver 7.0 #
- | robots.txt: has 1 disallowed entry #
- |_/ # |_html-title: HAAL9000 #
- Service Info: OS: Windows #
- #
- *** He must be new ;o #
- ---------------------------------------------------------------------------
- + Target IP: 66.96.131.24
- + Target Hostname: hal9000.net
- + Target Port: 80
- + Start Time: 2012-07-13 16:49:37
- ---------------------------------------------------------------------------
- + Server: Nginx / Varnish
- + Number of sections in the version string differ from those in the database, the server reports: nginx/varnish while the database has: 0.8.45. This may cause false positives.
- + ETag header found on server, inode: 3912398, size: 2538, mtime: 0x4b039013a8984
- + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE
- + OSVDB-396: /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted.
- + Default account found for 'Enter descriptive name here' at /pw/storemgr.pw (ID '', PW '_Cisco'). Cisco device.
- + OSVDB-28260: /_vti_bin/shtml.exe/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611: Gives info about server settings.
- + OSVDB-3092: /_vti_bin/_vti_aut/author.exe?method=list+documents%3a3%2e0%2e2%2e1706&service%5fname=&listHiddenDocs=true&listExplorerDocs=true&listRecurse=false&listFiles=true&listFolders=true&listLinkInfo=true&listIncludeParent=true&listDerivedT=false&listBorders=fals: We seem to have authoring access to the FrontPage web.
- + OSVDB-3093: /cgi-bin//_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3233: /_vti_bin/shtml.exe/_vti_rpc: FrontPage may be installed.
- + 6448 items checked: 10 error(s) and 9 item(s) reported on remote host
- + End Time: 2012-07-13 17:15:28 (1551 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- Low findings :/
- -------------------------------------------------------------
- #We are Anonymous
- #We are Legion
- #We do not forgive
- #We do not forget
- #Expect us
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement