Advertisement
Guest User

Untitled

a guest
Feb 24th, 2020
131
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.17 KB | None | 0 0
  1. Web Server Detected By Zwatch7 | IES-TEAM
  2. website team:https://ies-team.net
  3.  
  4. Greetz To : Gh05t666Include | Mr.Fotolio | MR.W4HYU | Red-z1 | ./Hades
  5. ___Web Server Detection____
  6. http://googlespider.weebly.com/google-hacks.html
  7. https://www.cnblogs.com/heycomputer/articles/10229689.html
  8. https://www.bishopfox.com/dictionaries/Google Queries.txt
  9. https://www.219.me/posts/2176.html
  10. https://vdocuments.site/ggle-hack.html
  11. https://baixardoc.com/documents/google-hacking-for-penetration-testers-israel-vega-5d1527a7aa893
  12. http://www.google-dorking.com/
  13. http://retrogod.altervista.org/GHDB.TXT
  14. https://ta.knsankar.in/2009/10/blog-post.html
  15. https://archive.cyberguerrilla.org/a/2014/?p=18537
  16. https://epdf.pub/snort-21-intrusion-detection.html
  17. https://pdfslide.net/documents/packetstorm-google-dorks-list.html
  18. https://vibdoc.com/syngress3d1bdac3fc4da19105adf35bf17ed6ba62653.html
  19. [×]Web server Detection [×]
  20. _[ - ]::----------------------------------------------
  21. |_[ + ] [ 5 / 35 ]-[09:07:04] [ ! ]
  22. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) http://googlespider.weebly.com/google-hacks.html ]
  23. |_[ + ] Exploit::
  24. |_[ + ] Information Server:: HTTP/1.1 200 OK , Server: Apache , IP:199.34.228.54:80
  25. |_[ + ] More details:: / - / , ISP:
  26. |_[ + ] Found:: MYSQL-03 - VALUE: Warning: mysql_
  27. |_[ + ] VALUE SAVED IN THE FILE::
  28.  
  29. _[ - ]::----------------------------------------------
  30. |_[ + ] [ 6 / 35 ]-[09:07:10] [ ! ]
  31. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) https://www.cnblogs.com/heycomputer/articles/10229689.html ]
  32. |_[ + ] Exploit::
  33. |_[ + ] Information Server:: HTTP/2 200 , Server: &ndash; Database: information_schema &ndash; Table: SCHEMA_PRIVILEGES &middot; Browse &middot; Structure &middot; SQL &middot; Search &middot; Export<br /> , IP:118.31.180.41:443
  34. |_[ + ] More details:: / - / , ISP:
  35. |_[ + ] Found:: ZEND-FRAMEWORK-04 - VALUE: db.params.password
  36. |_[ + ] VALUE SAVED IN THE FILE::
  37.  
  38. _[ - ]::----------------------------------------------
  39. |_[ + ] [ 7 / 35 ]-[09:07:14] [ ! ]
  40. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) https://www.bishopfox.com/dictionaries/Google Queries.txt ]
  41. |_[ + ] Exploit::
  42. |_[ + ] Information Server:: HTTP/2 200 , , IP:104.25.22.18:443
  43. |_[ + ] More details:: / - / , ISP:
  44. |_[ + ] Found:: LOCAL-FILE-INCLUSION-01 - VALUE: /root:/
  45. |_[ + ] VALUE SAVED IN THE FILE::
  46.  
  47. _[ - ]::----------------------------------------------
  48. |_[ + ] [ 8 / 35 ]-[09:07:20] [ ! ]
  49. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) https://www.219.me/posts/2176.html ]
  50. |_[ + ] Exploit::
  51. |_[ + ] Information Server:: HTTP/2 200 , , IP:58.218.208.15:443
  52. |_[ + ] More details:: / - / , ISP:
  53. |_[ + ] Found:: LOCAL-FILE-INCLUSION-01 - VALUE: /root:/
  54. |_[ + ] VALUE SAVED IN THE FILE::
  55.  
  56. _[ - ]::-----------------------------------------------
  57. |_[ + ] [ 10 / 35 ]-[09:07:25] [ ! ]
  58. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) https://vdocuments.site/ggle-hack.html ]
  59. |_[ + ] Exploit::
  60. |_[ + ] Information Server:: HTTP/2 200 , , IP:104.28.6.156:443
  61. |_[ + ] More details:: / - / , ISP:
  62. |_[ + ] Found:: MYSQL-01 - VALUE: mysql_
  63. |_[ + ] VALUE SAVED IN THE FILE::
  64.  
  65. _[ - ]::----------------------------------------------
  66. |_[ + ] [ 11 / 35 ]-[09:07:29] [ ! ]
  67. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) https://baixardoc.com/documents/google-hacking-for-penetration-testers-israel-vega-5d1527a7aa893 ]
  68. |_[ + ] Exploit::
  69. |_[ + ] Information Server:: HTTP/2 200 , Server: GWS/2.1 Via: 1.1 netcachejhb-2 (NetCache NetApp/5.5R6) , IP:104.27.131.190:443
  70. |_[ + ] More details:: / - / , ISP:
  71. |_[ + ] Found:: MYSQL-03 - VALUE: Warning: mysql_
  72. |_[ + ] VALUE SAVED IN THE FILE::
  73.  
  74. _[ - ]::-----------------------------------------------
  75. |_[ + ] [ 13 / 35 ]-[09:07:35] [ ! ]
  76. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) http://www.google-dorking.com/ ]
  77. |_[ + ] Exploit::
  78. |_[ + ] Information Server:: HTTP/1.1 200 OK , Server: cloudflare , IP:104.18.50.2:80
  79. |_[ + ] More details:: / - / , ISP:
  80. |_[ + ] Found:: LOCAL-FILE-INCLUSION-01 - VALUE: /root:/
  81. |_[ + ] VALUE SAVED IN THE FILE::
  82.  
  83. _[ - ]::-----------------------------------------------l
  84. |_[ + ] [ 15 / 35 ]-[09:07:45] [ ! ]
  85. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) http://retrogod.altervista.org/GHDB.TXT ]
  86. |_[ + ] Exploit::
  87. |_[ + ] Information Server:: HTTP/1.1 200 OK , Server: Apache , IP:138.201.222.27:80
  88. |_[ + ] More details:: / - / , ISP:
  89. |_[ + ] Found:: MYSQL-03 - VALUE: Warning: mysql_
  90. |_[ + ] VALUE SAVED IN THE FILE::
  91.  
  92. _[ - ]::----------------------------------------------
  93. |_[ + ] [ 16 / 35 ]-[09:07:48] [ ! ]
  94. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) https://ta.knsankar.in/2009/10/blog-post.html ]
  95. |_[ + ] Exploit::
  96. |_[ + ] Information Server:: HTTP/2 200 , , IP:216.58.196.51:443
  97. |_[ + ] More details:: / - / , ISP:
  98. |_[ + ] Found:: MYSQL-01 - VALUE: mysql_
  99. |_[ + ] VALUE SAVED IN THE FILE::
  100.  
  101. _[ - ]::-----------------------------------------------
  102. |_[ + ] [ 21 / 35 ]-[09:08:08] [ ! ]
  103. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) https://archive.cyberguerrilla.org/a/2014/?p=18537 ]
  104. |_[ + ] Exploit::
  105. |_[ + ] Information Server:: HTTP/2 200 , Server: Web&#8230;</td> , IP:88.99.141.214:443
  106. |_[ + ] More details:: / - / , ISP:
  107. |_[ + ] Found:: LOCAL-FILE-INCLUSION-01 - VALUE: /root:/
  108. |_[ + ] VALUE SAVED IN THE FILE::
  109.  
  110. _[ - ]::-----------------------------------------------
  111. |_[ + ] [ 25 / 35 ]-[09:08:31] [ ! ]
  112. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) https://pdfslide.net/documents/packetstorm-google-dorks-list.html ]
  113. |_[ + ] Exploit::
  114. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.16.1 , IP:78.46.67.66:443
  115. |_[ + ] More details:: / - / , ISP:
  116. |_[ + ] Found:: MYSQL-01 - VALUE: mysql_
  117. |_[ + ] VALUE SAVED IN THE FILE::
  118.  
  119. _[ - ]::-----------------------------------------------
  120. |_[ + ] [ 27 / 35 ]-[09:08:40] [ ! ]
  121. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) https://vibdoc.com/syngress3d1bdac3fc4da19105adf35bf17ed6ba62653.html ]
  122. |_[ + ] Exploit::
  123. |_[ + ] Information Server:: HTTP/2 200 , Server: GWS/2.1 Via: 1.1 netcachejhb-2 (NetCache NetApp/5.5R6)<br /> , IP:104.18.38.49:443
  124. |_[ + ] More details:: / - / , ISP:
  125. |_[ + ] Found:: MYSQL-03 - VALUE: Warning: mysql_
  126. |_[ + ] VALUE SAVED IN THE FILE::
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement