Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- Nom de l'hôte candydollchan.net FAI Serverius Holding B.V.
- Continent Europe Drapeau
- NL
- Pays Pays-Bas Code du pays NL
- Région Flevoland Heure locale 22 Sep 2018 20:42 CEST
- Ville Dronten Code Postal 8254
- Adresse IP 185.20.184.50 Latitude 52.525
- Longitude 5.724
- #######################################################################################################################################
- HostIP:185.20.184.50
- HostName:candydollchan.net
- Gathered Inet-whois information for 185.20.184.50
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 185.20.184.0 - 185.20.185.255
- netname: DELTAHOST-NET
- descr: DELTAHOST-NET
- remarks: ====================================
- remarks: DeltaHost - VPS, VDS, dedicated servers
- remarks: in Ukraine & Netherlands
- remarks: http://deltahost.com
- remarks: ====================================
- remarks: Complaints: abuse@deltahost.com.ua
- remarks: ====================================
- org: ORG-FZDL2-RIPE
- country: NL
- admin-c: ZDL2-RIPE
- admin-c: ARUD-RIPE
- tech-c: ZDL2-RIPE
- tech-c: ARUD-RIPE
- status: ASSIGNED PA
- mnt-by: DELTAHOST-MNT
- mnt-routes: SERVERIUS-MNT
- mnt-domains: DELTAHOST-MNT
- created: 2013-03-15T22:02:55Z
- last-modified: 2017-02-24T22:37:21Z
- source: RIPE
- organisation: ORG-FZDL2-RIPE
- org-name: Zemlyaniy Dmitro Leonidovich
- org-type: LIR
- address: Schevchenko 22/30, 12
- address: 39600
- address: Kremenchug
- address: UKRAINE
- phone: +380935366459
- abuse-c: DLTH1111-RIPE
- mnt-ref: RIPE-NCC-HM-MNT
- mnt-ref: DELTAHOST-MNT
- mnt-by: RIPE-NCC-HM-MNT
- mnt-by: DELTAHOST-MNT
- created: 2013-03-04T13:19:53Z
- last-modified: 2017-10-18T08:57:29Z
- source: RIPE # Filtered
- person: Oleksandr Serhiyovych Rudenko
- address: Ukraine, Kremenchuk
- phone: +380632096212
- nic-hdl: ARUD-RIPE
- mnt-by: DELTAHOST-MNT
- created: 2015-02-13T16:37:16Z
- last-modified: 2017-10-30T22:44:11Z
- source: RIPE
- person: Zemlyaniy Dmitro Leonidovich
- address: Ukraine, Kremenchuk
- phone: +380935366459
- nic-hdl: ZDL2-RIPE
- mnt-by: DELTAHOST-MNT
- created: 2009-05-02T11:46:55Z
- last-modified: 2017-10-30T22:05:30Z
- source: RIPE # Filtered
- % Information related to '185.20.184.0/23AS50673'
- route: 185.20.184.0/23
- descr: DeltaHost Route Object
- origin: AS50673
- mnt-by: DELTAHOST-MNT
- created: 2013-03-18T11:33:06Z
- last-modified: 2015-02-13T19:39:58Z
- source: RIPE
- % This query was served by the RIPE Database Query Service version 1.92.6 (BLAARKOP)
- Gathered Inic-whois information for candydollchan.net
- ---------------------------------------------------------------------------------------------------------------------------------------
- Domain Name: CANDYDOLLCHAN.NET
- Registry Domain ID: 1987658926_DOMAIN_NET-VRSN
- Registrar WHOIS Server: whois.nic.ru
- Registrar URL: http://nic.ru
- Updated Date: 2018-02-16T18:08:25Z
- Creation Date: 2015-12-16T07:57:08Z
- Registry Expiry Date: 2018-12-16T07:57:08Z
- Registrar: Regional Network Information Center, JSC dba RU-CENTER
- Registrar IANA ID: 463
- Registrar Abuse Contact Email: tld-abuse@nic.ru
- Registrar Abuse Contact Phone: +7 (495) 994-46-01
- Domain Status: clientTransferProhibited https�U@://ic��h`an�n.org/t��R�epU@p#cliz��R�en�U@tTran�������sferPro�U@hibited
- Name Server: NS1.DYNU.COM
- Name Server: NS2.DYNU.COM
- Name Server: NS3.DYNU.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2018-09-22T19:05:56Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- NOTICE: The expiration date displayed in this record is the date the
- registrar's sponsorship of the domain name regisYV@trati�
- �h`onC in the��R� rXV@egist ��R�rygV@ is
- currently set to expire. This date does not necessarily reflect the expiration
- date of the domain name registrant's agreement w�U@ith t��h`heP sponso���R�riU@ng
- registrar. Users may consult the sponsoring registrar's Whois database to
- view the registrar's reported date of expiration for this registration.
- TERMS OF USE: You are not authorized to access or query our Whois
- database through the use of electronic processes that are high-volume and
- automated except as reasonably necessary to register domain names or
- modify existing registrations; the Data in VeriSign Global Registry
- Services' ("VeriSign") Whois database is provide�U@d by ��h`Ve�riSign D��R�foU@r
- information purposes only, and to assist persons in obtaining information
- about or related to a domain name registration record. VeriSign does not
- guarantee its accuracy. By submitting a Whois query, you agree to abide
- by the following terms of use: You agree that you may use this Data only
- for lawful purposes and that under no circumstances will you use this Data
- to: (1) allow, enable, or otherwise support the transmission of mass
- unsolicited, commercial advertising or solicitatYV@ions �
- ������� e-mai��R�l,XV@ tele,��R�phgV@one,
- or facsimile; or (2) enable high volume, automated, electronic processes
- that apply to VeriSign (or its computer systems). The compilation,
- repackaging, dissemination or other use of this �U@Data ��h`is� expre<��R�ssU@ly
- prohibited without the prior written consent of VeriSign. You agree not to
- use electronic processes that are automated and high-volume to access or
- query the Whois database except as reasonably necessary to register
- domain names or modify existing registrations. VeriSign reserves the right
- to restrict your access to the Whois database in its sole discretion to ensure
- U@erational stability. VeriSign may restrict or�U@r acc��h`ess to thѺ�R�e
- Whois database for failure to abide by these terms of use. VeriSign
- reserves the right to modify these terms at any time.
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- Gathered Netcraft information for candydollchan.net
- ---------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for candydollchan.net
- Netcraft.com Information gathered
- Gathered Subdomain information for candydollchan.net
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- HostName:mail.candydollchan.net
- HostIP:80.82.64.193
- HostName:scamanalyze.candydollchan.net
- HostIP:185.20.184.50
- HostName:www.simplywhois.candydollchan.net
- HostIP:185.20.184.50
- HostName:www.candydollchan.net
- HostIP:185.20.184.50
- Searching Altavista.com:80...
- Found 4 possible subdomain(s) for host candydollchan.net, Searched 0 pages containing 0 results
- Gathered E-Mail information for candydollchan.net
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host candydollchan.net, Searched 0 pages containing 0 results
- Gathered TCP Port information for 185.20.184.50
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 22/tcp open
- 80/tcp open
- #######################################################################################################################################
- [i] Scanning Site: http://candydollchan.net
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: Candydoll Downloads - Candydollchan
- [+] IP address: 185.20.184.50
- [+] Web Server: nginx/1.12.2
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Disallow:
- Host: candydollchan.net
- Sitemap: http://candydollchan.net/sitemap.xml
- -----------[end of contents]-------------
- W H O I S L O O K U P
- =======================================================================================================================================
- Domain Name: CANDYDOLLCHAN.NET
- Registry Domain ID: 1987658926_DOMAIN_NET-VRSN
- Registrar WHOIS Server: whois.nic.ru
- Registrar URL: http://nic.ru
- Updated Date: 2018-02-16T18:08:25Z
- Creation Date: 2015-12-16T07:57:08Z
- Registry Expiry Date: 2018-12-16T07:57:08Z
- Registrar: Regional Network Information Center, JSC dba RU-CENTER
- Registrar IANA ID: 463
- Registrar Abuse Contact Email: tld-abuse@nic.ru
- Registrar Abuse Contact Phone: +7 (495) 994-46-01
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Name Server: NS1.DYNU.COM
- Name Server: NS2.DYNU.COM
- Name Server: NS3.DYNU.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2018-09-22T19:06:25Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- NOTICE: The expiration date displayed in this record is the date the
- registrar's sponsorship of the domain name registration in the registry is
- currently set to expire. This date does not necessarily reflect the expiration
- date of the domain name registrant's agreement with the sponsoring
- registrar. Users may consult the sponsoring registrar's Whois database to
- view the registrar's reported date of expiration for this registration.
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 185.20.184.50
- [i] Country: NL
- [i] State: Flevoland
- [i] City: Dronten
- [i] Latitude: 52.524700
- [i] Longitude: 5.723700
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 200 OK
- [i] Server: nginx/1.12.2
- [i] Date: Sat, 22 Sep 2018 19:06:36 GMT
- [i] Content-Type: text/html
- [i] Connection: close
- [i] Upgrade: h2,h2c
- [i] Accept-Ranges: bytes
- [i] Vary: Accept-Encoding,User-Agent
- D N S L O O K U P
- =======================================================================================================================================
- ;; Truncated, retrying in TCP mode.
- candydollchan.net. 90 IN MX 10 mail.candydollchan.net.
- candydollchan.net. 90 IN NS ns4.dynu.com.
- candydollchan.net. 90 IN NS ns6.dynu.com.
- candydollchan.net. 120 IN A 185.20.184.50
- candydollchan.net. 90 IN NS ns5.dynu.com.
- candydollchan.net. 90 IN NS ns3.dynu.com.
- candydollchan.net. 90 IN NS ns1.dynu.com.
- candydollchan.net. 90 IN TXT "v=spf1 a mx ip4:80.82.64.110 ~all"
- candydollchan.net. 90 IN NS ns2.dynu.com.
- candydollchan.net. 120 IN SOA ns1.dynu.com. administrator.dynu.com. 6 1800 300 86400 300
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 185.20.184.50
- Network = 185.20.184.50 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 185.20.184.50 - 185.20.184.50 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2018-09-22 19:06 UTC
- Nmap scan report for candydollchan.net (185.20.184.50)
- Host is up (0.079s latency).
- rDNS record for 185.20.184.50: 185-20-184-50.rev.serverhub.ru
- PORT STATE SERVICE
- 21/tcp closed ftp
- 22/tcp open ssh
- 23/tcp closed telnet
- 80/tcp open http
- 110/tcp closed pop3
- 143/tcp closed imap
- 443/tcp closed https
- 3389/tcp closed ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 0.25 seconds
- S U B - D O M A I N F I N D E R
- =======================================================================================================================================
- [i] Total Subdomains Found : 1
- [+] Subdomain: mail.candydollchan.net
- [-] IP: 80.82.64.193
- #######################################################################################################################################
- [?] Enter the target: http://candydollchan.net
- [!] IP Address : 185.20.184.50
- [!] Server: nginx/1.12.2
- [+] Clickjacking protection is not in place.
- [!] candydollchan.net doesn't seem to use a CMS
- [+] Honeypot Probabilty: 30%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for candydollchan.net
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/candydollchan.net
- --------------------------------------------------------------------------------------------------------------------------------------
- [+] Robots.txt retrieved
- User-agent: *
- Disallow:
- Host: candydollchan.net
- Sitemap: http://candydollchan.net/sitemap.xml
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp closed ftp
- 22/tcp open ssh
- 23/tcp closed telnet
- 80/tcp open http
- 110/tcp closed pop3
- 143/tcp closed imap
- 443/tcp closed https
- 3389/tcp closed ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 0.21 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- ns1.dynu.com. (207.38.70.2) AS63252 NextFort Ventures Chandler, LLC United States
- ns2.dynu.com. (199.233.237.18) AS46261 QuickPacket, LLC United States
- ns3.dynu.com. (45.79.219.7) AS63949 Linode, LLC United States
- ns4.dynu.com. (198.58.127.179) AS63949 Linode, LLC United States
- ns5.dynu.com. (107.191.107.47) AS3842 RamNode LLC United States
- ns6.dynu.com. (173.255.227.222) AS63949 Linode, LLC United States
- [+] MX Records
- 10 (80.82.64.193) AS29073 Quasi Networks LTD. Netherlands
- [+] Host Records (A)
- candydollchan.net (185-20-184-50.rev.serverhub.ru) (185.20.184.501) AS50673 Serverius Holding B.V. Ukraine
- mail.candydollchan.netHTTP: (no-reverse-dns-configured.com) (80.82.64.193) AS29073 Quasi Networks LTD. Netherlands
- [+] TXT Records
- "v=spf1 a mx ip4:80.82.64.110 ~all"
- [+] DNS Map: https://dnsdumpster.com/static/map/candydollchan.net.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- [+] Emails found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- pixel-1537643215355248-web-@candydollchan.net
- pixel-1537643219261913-web-@candydollchan.net
- [+] Hosts found in search engines:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- 80.82.64.193:mail.candydollchan.net
- 185.20.184.50:www.candydollchan.net
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- 80.82.64.193 www.stella.artmodeling-studios.org
- 80.82.64.193 trixie.artmodeling-studios.xyz
- 80.82.64.193 cutie.artmodeling-studios.xyz
- 80.82.64.193 nnbook.net
- 80.82.64.193 bianka.artmodeling-studios.xyz
- 80.82.64.193 sparkle.artmodeling-studios.xyz
- 80.82.64.193 forever.artmodeling-studios.org
- 80.82.64.193 www.trixie.artmodeling-studios.org
- 80.82.64.193 www.cherish.artmodeling-studios.org
- 80.82.64.193 www.liliana.artmodeling-studios.org
- 80.82.64.193 darling.artmodeling-studios.org
- 80.82.64.193 www.lolly.artmodeling-studios.org
- 80.82.64.193 www.artmodeling-studios
- 80.82.64.193 liliana.artmodeling-studios.xyz
- 80.82.64.193 www.artpicsgirls.xyz
- 185.20.184.50 candydollchan.net
- 185.20.184.50 candydollchan
- 185.20.184.50 sharechann.net
- 185.20.184.50 sharechann
- 185.20.184.50 1000models.net
- [~] Crawling the target for fuzzable URLs
- [-] No fuzzable URLs found
- #######################################################################################################################################
- [+] Hosting Info for Website: candydollchan.net
- [+] Visitors per day: 4,100
- [+] IP Address: ...
- [+] IP Reverse DNS (Host): 185-20-184-50.rev.serverhub.ru
- [+] Hosting IP Range: 185.20.184.0 - 185.20.185.255 (512 ip)
- [+] Hosting Address: Schevchenko 22/30, 12, 39600, Kremenchug, Ukraine
- [+] Hosting Country: UKR
- [+] Hosting Phone: +380935366459, +380632096212
- [+] Hosting Website: www.alligator.link
- [+] Hosting CIDR: 185.20.184.0/23
- [+] NS: ns6.dynu.com
- [+] NS: ns1.dynu.com
- [+] NS: ns2.dynu.com
- [+] NS: ns3.dynu.com
- [+] NS: ns4.dynu.com
- [+] NS: ns5.dynu.com
- #######################################################################################################################################
- Start: 2018-09-23T14:40:24+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.201 0.0% 3 1.4 1.0 0.7 1.4 0.3
- 2.|-- 45.79.12.4 0.0% 3 0.9 0.9 0.6 1.2 0.3
- 3.|-- 45.79.12.8 0.0% 3 0.7 0.8 0.5 1.3 0.4
- 4.|-- hu0-7-0-7.ccr41.dfw03.atlas.cogentco.com 0.0% 3 1.6 1.6 1.6 1.7 0.1
- 5.|-- be2764.ccr32.dfw01.atlas.cogentco.com 0.0% 3 1.8 1.8 1.6 2.0 0.2
- 6.|-- be2433.ccr22.mci01.atlas.cogentco.com 0.0% 3 11.9 11.9 11.7 12.0 0.2
- 7.|-- be2832.ccr42.ord01.atlas.cogentco.com 0.0% 3 23.8 23.8 23.4 24.1 0.4
- 8.|-- be2718.ccr22.cle04.atlas.cogentco.com 0.0% 3 30.4 30.4 30.2 30.4 0.1
- 9.|-- be2994.ccr32.yyz02.atlas.cogentco.com 0.0% 3 38.1 38.2 37.8 38.6 0.4
- 10.|-- be3260.ccr22.ymq01.atlas.cogentco.com 0.0% 3 45.3 45.4 45.3 45.7 0.2
- 11.|-- be3043.ccr22.lpl01.atlas.cogentco.com 0.0% 3 121.6 118.0 114.7 121.6 3.5
- 12.|-- be2183.ccr42.ams03.atlas.cogentco.com 0.0% 3 130.2 129.7 129.3 130.2 0.4
- 13.|-- be3458.ccr21.ams04.atlas.cogentco.com 0.0% 3 129.4 129.5 129.3 129.7 0.2
- 14.|-- 149.11.38.6 0.0% 3 129.6 129.9 129.4 130.6 0.6
- 15.|-- 178.21.17.21 0.0% 3 133.4 133.3 133.2 133.4 0.1
- 16.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: candydollchan.net
- [!] Wildcard resolution is enabled on this domain
- [!] It is resolving to 185.20.184.50
- [!] All queries will resolve to this address!!
- [-] DNSSEC is not configured for candydollchan.net
- [*] SOA ns1.dynu.com 207.38.70.2
- [*] NS ns1.dynu.com 207.38.70.2
- [*] NS ns1.dynu.com 2602:ff23:0:8888::2
- [*] NS ns2.dynu.com 199.233.237.18
- [*] NS ns2.dynu.com 2607:3f00:11:18::18
- [*] NS ns3.dynu.com 45.79.219.7
- [*] NS ns3.dynu.com 2600:3c02::f03c:91ff:fe74:8f00
- [*] NS ns4.dynu.com 198.58.127.179
- [*] NS ns4.dynu.com 2600:3c00::f03c:91ff:fe95:bb9f
- [*] NS ns5.dynu.com 107.191.107.47
- [*] NS ns5.dynu.com 2604:180:1:858::8888
- [*] NS ns6.dynu.com 173.255.227.222
- [*] NS ns6.dynu.com 2600:3c03::f03c:91ff:fe1f:950e
- [*] MX mail.candydollchan.net 80.82.64.193
- [*] A candydollchan.net 185.20.184.50
- [*] TXT candydollchan.net v=spf1 a mx ip4:80.82.64.110 ~all
- [*] Enumerating SRV Records
- [-] No SRV Records Found for candydollchan.net
- [+] 0 Records Found
- #######################################################################################################################################
- [+] Getting nameservers
- 207.38.70.2 - ns1.dynu.com
- 199.233.237.18 - ns2.dynu.com
- 45.79.219.7 - ns3.dynu.com
- 198.58.127.179 - ns4.dynu.com
- 107.191.107.47 - ns5.dynu.com
- 173.255.227.222 - ns6.dynu.com
- [-] Zone transfer failed
- [+] TXT records found
- "v=spf1 a mx ip4:80.82.64.110 ~all"
- [+] MX records found, added to target list
- 10 mail.candydollchan.net.
- [+] Wildcard domain found - 185.20.184.50
- [*] Scanning candydollchan.net for A records
- 80.82.64.193 - ftp.candydollchan.net
- 127.0.0.1 - localhost.candydollchan.net
- 80.82.64.193 - mail.candydollchan.net
- 80.82.64.193 - pop.candydollchan.net
- 80.82.64.193 - smtp.candydollchan.net
- #######################################################################################################################################
- ftp.candydollchan.net
- IP address #1: 80.82.64.193
- localhost.candydollchan.net
- IPv6 address #1: ::1
- localhost.candydollchan.net
- IP address #1: 127.0.0.1
- [+] warning: domain might be vulnerable to "same site" scripting (http://snipurl.com/etbcv)
- mail.candydollchan.net
- IP address #1: 80.82.64.193
- pop.candydollchan.net
- IP address #1: 80.82.64.193
- smtp.candydollchan.net
- IP address #1: 80.82.64.193
- #######################################################################################################################################
- Original* candydollchan.net 185.20.184.50 NS:ns1.dynu.com MX:mail.candydollchan.net
- Subdomain candydol.lchan.net 118.69.80.42
- Subdomain candydoll.chan.net 64.99.80.121
- Subdomain candydollc.han.net 184.168.221.104 NS:ns1.afternic.com
- Subdomain candydollch.an.net 72.52.4.119 NS:ns1.sedoparking.com MX:localhost
- #######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 185.20.184.50 host alterwind.candydollchan.net
- 185.20.184.50 host av.candydollchan.net
- 185.20.184.50 host b.auth-ns.candydollchan.net
- 185.20.184.50 host b1.candydollchan.net
- 185.20.184.50 host banking.candydollchan.net
- 185.20.184.50 host broker.candydollchan.net
- 185.20.184.50 host courses.candydollchan.net
- 185.20.184.50 host cust110.candydollchan.net
- 185.20.184.50 host developers.candydollchan.net
- 185.20.184.50 host dilbert.candydollchan.net
- 185.20.184.50 host eh.candydollchan.net
- 185.20.184.50 400 host ftp_.candydollchan.net nginx/1.12.2
- 127.0.0.1 host localhost.candydollchan.net
- 185.20.184.50 400 host ns_.candydollchan.net nginx/1.12.2
- 185.20.184.50 200 host www.candydollchan.net nginx/1.12.2
- 185.20.184.50 400 host www_.candydollchan.net nginx/1.12.2
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- candydollchan.net -----
- Host's addresses:
- __________________
- candydollchan.net. 116 IN A 185.20.184.50
- Wildcard detection using: yqwciujuyoka
- _______________________________________
- yqwciujuyoka.candydollchan.net. 119 IN A 185.20.184.50
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!
- Wildcards detected, all subdomains will point to the same IP address
- Omitting results containing 185.20.184.50.
- Maybe you are using OpenDNS servers.
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!
- Name Servers:
- ______________
- ns6.dynu.com. 18897 IN A 173.255.227.222
- ns4.dynu.com. 18843 IN A 198.58.127.179
- ns2.dynu.com. 3136 IN A 199.233.237.18
- ns3.dynu.com. 21599 IN A 45.79.219.7
- ns5.dynu.com. 20756 IN A 107.191.107.47
- ns1.dynu.com. 13123 IN A 207.38.70.2
- Mail (MX) Servers:
- ___________________
- mail.candydollchan.net. 89 IN A 80.82.64.193
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for candydollchan.net on ns6.dynu.com ...
- Trying Zone Transfer for candydollchan.net on ns4.dynu.com ...
- Trying Zone Transfer for candydollchan.net on ns2.dynu.com ...
- Trying Zone Transfer for candydollchan.net on ns3.dynu.com ...
- Trying Zone Transfer for candydollchan.net on ns5.dynu.com ...
- Trying Zone Transfer for candydollchan.net on ns1.dynu.com ...
- brute force file not specified, bay.
- #######################################################################################################################################
- Domain Name: CANDYDOLLCHAN.NET
- Registry Domain ID: 1987658926_DOMAIN_NET-VRSN
- Registrar WHOIS Server: whois.nic.ru
- Registrar URL: http://nic.ru
- Updated Date: 2018-02-16T18:08:25Z
- Creation Date: 2015-12-16T07:57:08Z
- Registry Expiry Date: 2018-12-16T07:57:08Z
- Registrar: Regional Network Information Center, JSC dba RU-CENTER
- Registrar IANA ID: 463
- Registrar Abuse Contact Email: tld-abuse@nic.ru
- Registrar Abuse Contact Phone: +7 (495) 994-46-01
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Name Server: NS1.DYNU.COM
- Name Server: NS2.DYNU.COM
- Name Server: NS3.DYNU.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2018-09-23T14:38:08Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- NOTICE: The expiration date displayed in this record is the date the
- registrar's sponsorship of the domain name registration in the registry is
- currently set to expire. This date does not necessarily reflect the expiration
- date of the domain name registrant's agreement with the sponsoring
- registrar. Users may consult the sponsoring registrar's Whois database to
- view the registrar's reported date of expiration for this registration.
- TERMS OF USE: You are not authorized to access or query our Whois
- database through the use of electronic processes that are high-volume and
- automated except as reasonably necessary to register domain names or
- modify existing registrations; the Data in VeriSign Global Registry
- Services' ("VeriSign") Whois database is provided by VeriSign for
- information purposes only, and to assist persons in obtaining information
- about or related to a domain name registration record. VeriSign does not
- guarantee its accuracy. By submitting a Whois query, you agree to abide
- by the following terms of use: You agree that you may use this Data only
- for lawful purposes and that under no circumstances will you use this Data
- to: (1) allow, enable, or otherwise support the transmission of mass
- unsolicited, commercial advertising or solicitations via e-mail, telephone,
- or facsimile; or (2) enable high volume, automated, electronic processes
- that apply to VeriSign (or its computer systems). The compilation,
- repackaging, dissemination or other use of this Data is expressly
- prohibited without the prior written consent of VeriSign. You agree not to
- use electronic processes that are automated and high-volume to access or
- query the Whois database except as reasonably necessary to register
- domain names or modify existing registrations. VeriSign reserves the right
- to restrict your access to the Whois database in its sole discretion to ensure
- operational stability. VeriSign may restrict or terminate your access to the
- Whois database for failure to abide by these terms of use. VeriSign
- reserves the right to modify these terms at any time.
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- Domain Name: CANDYDOLLCHAN.NET
- Registry Domain ID: 1987658926_DOMAIN_NET-VRSN
- Registrar WHOIS Server: whois.nic.ru
- Registrar URL: http://www.nic.ru
- Updated Date: 2018-02-16T18:08:25Z
- Creation Date: 2015-12-16T07:57:08Z
- Registrar Registration Expiration Date: 2018-12-15T21:00:00Z
- Registrar: Regional Network Information Center, JSC dba RU-CENTER
- Registrar IANA ID: 463
- Registrar Abuse Contact Email: tld-abuse@nic.ru
- Registrar Abuse Contact Phone: +7.4959944601
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Registry Registrant ID:
- Registrant Name: Chaplenko Yuri
- Registrant Organization: Chaplenko Yuri
- Registrant Street: Karadzhicha st. 13-35
- Registrant City: Lvov
- Registrant State/Province: Lvovskaya
- Registrant Postal Code: 79054
- Registrant Country: UA
- Registrant Phone: +380.672306256
- Registrant Phone Ext:
- Registrant Email: ychaplenko@inbox.ru
- Registry Admin ID:
- Admin Name: Chaplenko Yuri
- Admin Organization: Chaplenko Yuri
- Admin Street: Karadzhicha st. 13-35
- Admin City: Lvov
- Admin State/Province: Lvovskaya
- Admin Postal Code: 79054
- Admin Country: UA
- Admin Phone: +380.672306256
- Admin Phone Ext:
- Admin Email: ychaplenko@inbox.ru
- Registry Tech ID:
- Tech Name: Chaplenko Yuri
- Tech Organization: Chaplenko Yuri
- Tech Street: Karadzhicha st. 13-35
- Tech City: Lvov
- Tech State/Province: Lvovskaya
- Tech Postal Code: 79054
- Tech Country: UA
- Tech Phone: +380.672306256
- Tech Phone Ext:
- Tech Email: ychaplenko@inbox.ru
- Name Server: ns1.dynu.com
- Name Server: ns2.dynu.com
- Name Server: ns3.dynu.com
- DNSSEC: unsigned
- URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
- For more information on Whois status codes, please visit: https://icann.org/epp
- >>> Last update of WHOIS database: 2018.09.23T14:38:16Z <<<
- ######################################################################################################################################
- [-] Enumerating subdomains now for candydollchan.net
- [-] verbosity is enabled, will show the subdomains results in realtime
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- Virustotal: www.candydollchan.net
- Virustotal: mail.candydollchan.net
- DNSdumpster: mail.candydollchan.net
- [-] Saving results to file: /usr/share/sniper/loot/candydollchan.net/domains/domains-candydollchan.net.txt
- [-] Total Unique Subdomains Found: 2
- www.candydollchan.net
- mail.candydollchan.net
- #######################################################################################################################################
- [*] Found SPF record:
- [*] v=spf1 a mx ip4:80.82.64.110 ~all
- [*] SPF record contains an All item: ~all
- [*] No DMARC record found. Looking for organizational record
- [+] No organizational DMARC record
- [+] Spoofing possible for candydollchan.net!
- #######################################################################################################################################
- __
- ____ _____ ___ ______ _/ /_____ ____ ___
- / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
- / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
- \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
- /_/ discover v0.5.0 - by @michenriksen
- Identifying nameservers for candydollchan.net... Done
- Using nameservers:
- - 207.38.70.2
- - 199.233.237.18
- - 45.79.219.7
- - 198.58.127.179
- - 107.191.107.47
- - 173.255.227.222
- Checking for wildcard DNS... Wildcard detected!
- Identifying wildcard IPs... Done
- Filtering out hosts resolving to wildcard IPs
- Running collector: PassiveTotal... Skipped
- -> Key 'passivetotal_key' has not been set
- Running collector: PTRArchive... Error
- -> PTRArchive returned unexpected response code: 404
- Running collector: Dictionary... Done (22 hosts)
- Running collector: Wayback Machine... Error
- -> 765: unexpected token at 'org.archive.util.io.RuntimeIOException: org.archive.wayback.exception.AdministrativeAccessControlException: Blocked Site Error
- '
- Running collector: Netcraft... Done (0 hosts)
- Running collector: Threat Crowd... Done (0 hosts)
- Running collector: Certificate Search... Done (0 hosts)
- Running collector: Google Transparency Report... Done (0 hosts)
- Running collector: VirusTotal... Skipped
- -> Key 'virustotal' has not been set
- Running collector: Riddler... Skipped
- -> Key 'riddler_username' has not been set
- Running collector: DNSDB... Error
- -> DNSDB returned unexpected response code: 503
- Running collector: Censys... Skipped
- -> Key 'censys_secret' has not been set
- Running collector: HackerTarget... Done (2 hosts)
- Running collector: PublicWWW... Done (0 hosts)
- Running collector: Shodan... Skipped
- -> Key 'shodan' has not been set
- Resolving 24 unique hosts...
- 80.82.64.193 mail.candydollchan.net
- Found subnets:
- Wrote 1 hosts to:
- - file:///root/aquatone/candydollchan.net/hosts.txt
- - file:///root/aquatone/candydollchan.net/hosts.json
- __
- ____ _____ ___ ______ _/ /_____ ____ ___
- / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
- / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
- \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
- /_/ takeover v0.5.0 - by @michenriksen
- Loaded 1 hosts from /root/aquatone/candydollchan.net/hosts.json
- Loaded 25 domain takeover detectors
- Identifying nameservers for candydollchan.net... Done
- Using nameservers:
- - 207.38.70.2
- - 199.233.237.18
- - 45.79.219.7
- - 198.58.127.179
- - 107.191.107.47
- - 173.255.227.222
- Checking hosts for domain takeover vulnerabilities...
- Finished checking hosts:
- - Vulnerable : 0
- - Not Vulnerable : 1
- Wrote 0 potential subdomain takeovers to:
- - file:///root/aquatone/candydollchan.net/takeovers.json
- __
- ____ _____ ___ ______ _/ /_____ ____ ___
- / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
- / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
- \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
- /_/ scan v0.5.0 - by @michenriksen
- Loaded 1 hosts from /root/aquatone/candydollchan.net/hosts.json
- Probing 2 ports...
- 80/tcp 80.82.64.193 mail.candydollchan.net
- Wrote open ports to file:///root/aquatone/candydollchan.net/open_ports.txt
- Wrote URLs to file:///root/aquatone/candydollchan.net/urls.txt
- __
- ____ _____ ___ ______ _/ /_____ ____ ___
- / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
- / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
- \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
- /_/ gather v0.5.0 - by @michenriksen
- Installing Nightmare.js package, please wait... Done
- Processing 1 pages...
- Processed: http://80.82.64.193/ (mail.candydollchan.net) - 200 OK
- Finished processing pages:
- - Successful : 1
- - Failed : 0
- Generating report...done
- Report pages generated:
- - file:///root/aquatone/candydollchan.net/report/report_page_0.html
- #######################################################################################################################################
- INFO[0003] Starting to process queue....
- INFO[0003] Starting to process permutations....
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.136.123:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.136.123:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.136.123:80: getsockopt: connection refused
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41624->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41670->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41672->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41668->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41666->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41664->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41662->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41740->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41680->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41684->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41688->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41738->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41690->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41732->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41734->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41736->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41522->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41516->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41514->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41510->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41512->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41508->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41492->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41498->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41496->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41494->52.216.136.123:80: read: connection reset by peer
- ERRO[0004] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.33:41490->52.216.136.123:80: read: connection reset by peer
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-23 10:45 EDT
- Nmap scan report for candydollchan.net (185.20.184.50)
- Host is up (0.45s latency).
- rDNS record for 185.20.184.50: 185-20-184-50.rev.serverhub.ru
- Not shown: 463 closed ports, 6 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 587/tcp open submission
- 8080/tcp open http-proxy
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-23 10:45 EDT
- Nmap scan report for candydollchan.net (185.20.184.50)
- Host is up.
- rDNS record for 185.20.184.50: 185-20-184-50.rev.serverhub.ru
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp open|filtered netbios-ns
- 138/udp open|filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- + -- --=[Port 21 opened... running tests...
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-23 10:45 EDT
- Nmap scan report for candydollchan.net (185.20.184.50)
- Host is up (0.25s latency).
- rDNS record for 185.20.184.50: 185-20-184-50.rev.serverhub.ru
- PORT STATE SERVICE VERSION
- 21/tcp open tcpwrapped
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: WAP
- Running: D-Link embedded, TRENDnet embedded
- OS CPE: cpe:/h:dlink:dwl-624%2b cpe:/h:dlink:dwl-2000ap cpe:/h:trendnet:tew-432brp
- OS details: D-Link DWL-624+ or DWL-2000AP, or TRENDnet TEW-432BRP WAP
- Network Distance: 1 hop
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 231.87 ms 185-20-184-50.rev.serverhub.ru (185.20.184.50)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 608.11 seconds
- .~+P``````-o+:. -o+:.
- .+oooyysyyssyyssyddh++os-````` ``````````````` `
- +++++++++++++++++++++++sydhyoyso/:.````...`...-///::+ohhyosyyosyy/+om++:ooo///o
- ++++///////~~~~///////++++++++++++++++ooyysoyysosso+++++++++++++++++++///oossosy
- --.` .-.-...-////+++++++++++++++////////~~//////++++++++++++///
- `...............` `...-/////...`
- .::::::::::-. .::::::-
- .hmMMMMMMMMMMNddds\...//M\\.../hddddmMMMMMMNo
- :Nm-/NMMMMMMMMMMMMM$$NMMMMm&&MMMMMMMMMMMMMMy
- .sm/`-yMMMMMMMMMMMM$$MMMMMN&&MMMMMMMMMMMMMh`
- -Nd` :MMMMMMMMMMM$$MMMMMN&&MMMMMMMMMMMMh`
- -Nh` .yMMMMMMMMMM$$MMMMMN&&MMMMMMMMMMMm/
- `oo/``-hd: `` .sNd :MMMMMMMMMM$$MMMMMN&&MMMMMMMMMMm/
- .yNmMMh//+syysso-`````` -mh` :MMMMMMMMMM$$MMMMMN&&MMMMMMMMMMd
- .shMMMMN//dmNMMMMMMMMMMMMs` `:```-o++++oooo+:/ooooo+:+o+++oooo++/
- `///omh//dMMMMMMMMMMMMMMMN/:::::/+ooso--/ydh//+s+/ossssso:--syN///os:
- /MMMMMMMMMMMMMMMMMMd. `/++-.-yy/...osydh/-+oo:-`o//...oyodh+
- -hMMmssddd+:dMMmNMMh. `.-=mmk.//^^^\\.^^`:++:^^o://^^^\\`::
- .sMMmo. -dMd--:mN/` ||--X--|| ||--X--||
- ........../yddy/:...+hmo-...hdd:............\\=v=//............\\=v=//.........
- ================================================================================
- =====================+--------------------------------+=========================
- =====================| Session one died of dysentery. |=========================
- =====================+--------------------------------+=========================
- ================================================================================
- Press ENTER to size up the situation
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%% Date: April 25, 1848 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %%%%%%%%%%%%%%%%%%%%%%%%%% Weather: It's always cool in the lab %%%%%%%%%%%%%%%%
- %%%%%%%%%%%%%%%%%%%%%%%%%%% Health: Overweight %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %%%%%%%%%%%%%%%%%%%%%%%%% Caffeine: 12975 mg %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %%%%%%%%%%%%%%%%%%%%%%%%%%% Hacked: All the things %%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- Press SPACE BAR to continue
- =[ metasploit v4.17.14-dev ]
- + -- --=[ 1809 exploits - 1030 auxiliary - 313 post ]
- + -- --=[ 539 payloads - 42 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- RHOST => candydollchan.net
- RHOSTS => candydollchan.net
- [*] candydollchan.net:21 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] candydollchan.net:21 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] candydollchan.net:21 - Exploit failed: EOFError EOFError
- [*] Exploit completed, but no session was created.
- [*] Started reverse TCP double handler on 10.211.1.33:4444
- [-] candydollchan.net:21 - Exploit failed: EOFError EOFError
- [*] Exploit completed, but no session was created.
- + -- --=[Port 22 opened... running tests...
- modes/normal.sh: ligne 258 : [: trop d'arguments
- # general
- (gen) banner: SSH-2.0-OpenSSH_7.4
- (gen) software: OpenSSH 7.4
- (gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) curve25519-sha256 -- [warn] unknown algorithm
- (kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
- (kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
- (key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
- (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (key) ssh-ed25519 -- [info] available since OpenSSH 6.5
- # encryption algorithms (ciphers)
- (enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
- `- [info] default cipher since OpenSSH 6.9.
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
- (enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- # message authentication code algorithms
- (mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 6.2
- (mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 6.2
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- # algorithm recommendations (for OpenSSH 7.4)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
- (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-sha2-512 -- mac algorithm to remove
- (rec) -umac-128@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha2-256 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- (rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
- (rec) -umac-64-etm@openssh.com -- mac algorithm to remove
- ftp is a valid user!
- mail is a valid user!
- nobody is a valid user!
- postfix is a valid user!
- root is a valid user!
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-23 10:57 EDT
- Nmap scan report for candydollchan.net (185.20.184.50)
- Host is up (0.080s latency).
- rDNS record for 185.20.184.50: 185-20-184-50.rev.serverhub.ru
- PORT STATE SERVICE VERSION
- 22/tcp filtered ssh
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 ... 30
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 17.05 seconds
- . .
- .
- dBBBBBBb dBBBP dBBBBBBP dBBBBBb . o
- ' dB' BBP
- dB'dB'dB' dBBP dBP dBP BB
- dB'dB'dB' dBP dBP dBP BB
- dB'dB'dB' dBBBBP dBP dBBBBBBB
- dBBBBBP dBBBBBb dBP dBBBBP dBP dBBBBBBP
- . . dB' dBP dB'.BP
- | dBP dBBBB' dBP dB'.BP dBP dBP
- --o-- dBP dBP dBP dB'.BP dBP dBP
- | dBBBBP dBP dBBBBP dBBBBP dBP dBP
- .
- .
- o To boldly go where no
- shell has gone before
- =[ metasploit v4.17.14-dev ]
- + -- --=[ 1809 exploits - 1030 auxiliary - 313 post ]
- + -- --=[ 539 payloads - 42 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- USER_FILE => /brutex/wordlists/simple-users.txt
- RHOSTS => candydollchan.net
- RHOST => candydollchan.net
- [+] 185.20.184.50:22 - SSH server version: SSH-2.0-OpenSSH_7.4 ( service.version=7.4 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.cpe23=cpe:/a:openbsd:openssh:{service.version} service.protocol=ssh fingerprint_db=ssh.banner )
- [*] candydollchan.net:22 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE.
- [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE, KEY_FILE.
- [+] 185.20.184.50:22 - SSH server version: SSH-2.0-OpenSSH_7.4 ( service.version=7.4 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.cpe23=cpe:/a:openbsd:openssh:{service.version} service.protocol=ssh fingerprint_db=ssh.banner )
- [*] candydollchan.net:22 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- + -- --=[Port 23 closed... skipping.
- + -- --=[Port 25 closed... skipping.
- + -- --=[Port 53 closed... skipping.
- + -- --=[Port 67 closed... skipping.
- + -- --=[Port 68 closed... skipping.
- + -- --=[Port 69 closed... skipping.
- + -- --=[Port 79 closed... skipping.
- + -- --=[Port 80 opened... running tests...
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://candydollchan.net
- Generic Detection results:
- The site http://candydollchan.net seems to be behind a WAF or some sort of security solution
- Reason: Blocking is being done at connection/packet level.
- Number of requests: 13
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://candydollchan.net...
- __________________ SITE INFO __________________
- IP Title
- 185.20.184.50 Website is forbidden!
- ___________________ VERSION ___________________
- Name Versions Type
- phpMyAdmin CMS
- PHP 5.3.29 Platform
- nginx 1.12.2 Platform
- _______________________________________________
- Time: 144.6 sec Urls: 594 Fingerprints: 40401
- ######################################################################################################################################
- HTTP/1.1 200 OK
- Server: nginx/1.12.2
- Date: Sun, 23 Sep 2018 15:00:54 GMT
- Content-Type: text/html
- Connection: keep-alive
- Upgrade: h2,h2c
- Accept-Ranges: bytes
- Vary: Accept-Encoding,User-Agent
- ######################################################################################################################################
- -------------------------------------------------------------------------------------------------------------------------------------
- [ ! ] Starting SCANNER INURLBR 2.1 at [23-09-2018 11:01:36]
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-candydollchan.net.txt ]
- [ INFO ][ DORK ]::[ site:candydollchan.net ]
- [ INFO ][ SEARCHING ]:: {
- [ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.gi ]
- [ INFO ][ SEARCHING ]::
- -[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE API ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.ec ID: 007843865286850066037:b0heuatvay8 ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ TOTAL FOUND VALUES ]:: [ 0 ]
- [ INFO ] Not a satisfactory result was found!
- [ INFO ] [ Shutting down ]
- [ INFO ] [ End of process INURLBR at [23-09-2018 11:01:54]
- [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
- [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-candydollchan.net.txt ]
- |_________________________________________________________________________________________
- \_________________________________________________________________________________________/
- + -- --=[Port 110 opened... running tests...
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-23 11:01 EDT
- Nmap scan report for candydollchan.net (185.20.184.50)
- Host is up (0.46s latency).
- rDNS record for 185.20.184.50: 185-20-184-50.rev.serverhub.ru
- PORT STATE SERVICE VERSION
- 110/tcp open tcpwrapped
- | pop3-brute:
- | Accounts: No valid accounts found
- | Statistics: Performed 5 guesses in 11 seconds, average tps: 0.5
- |_ ERROR: Failed to connect.
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: WAP
- Running: D-Link embedded, TRENDnet embedded
- OS CPE: cpe:/h:dlink:dwl-624%2b cpe:/h:dlink:dwl-2000ap cpe:/h:trendnet:tew-432brp
- OS details: D-Link DWL-624+ or DWL-2000AP, or TRENDnet TEW-432BRP WAP
- Network Distance: 1 hop
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 552.49 ms 185-20-184-50.rev.serverhub.ru (185.20.184.50)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 17.90 seconds
- + -- --=[Port 111 closed... skipping.
- + -- --=[Port 123 closed... skipping.
- + -- --=[Port 135 closed... skipping.
- + -- --=[Port 137 closed... skipping.
- + -- --=[Port 139 closed... skipping.
- + -- --=[Port 161 closed... skipping.
- + -- --=[Port 162 closed... skipping.
- + -- --=[Port 389 closed... skipping.
- + -- --=[Port 443 closed... skipping.
- + -- --=[Port 445 closed... skipping.
- + -- --=[Port 512 closed... skipping.
- + -- --=[Port 513 closed... skipping.
- + -- --=[Port 514 closed... skipping.
- + -- --=[Port 623 closed... skipping.
- + -- --=[Port 624 closed... skipping.
- + -- --=[Port 1099 closed... skipping.
- + -- --=[Port 1433 closed... skipping.
- + -- --=[Port 2049 closed... skipping.
- + -- --=[Port 2121 closed... skipping.
- + -- --=[Port 3306 closed... skipping.
- + -- --=[Port 3310 closed... skipping.
- + -- --=[Port 3128 closed... skipping.
- + -- --=[Port 3389 closed... skipping.
- + -- --=[Port 3632 closed... skipping.
- + -- --=[Port 4443 closed... skipping.
- + -- --=[Port 5432 closed... skipping.
- + -- --=[Port 5555 closed... skipping.
- + -- --=[Port 5800 closed... skipping.
- + -- --=[Port 5900 closed... skipping.
- + -- --=[Port 5984 closed... skipping.
- + -- --=[Port 6000 closed... skipping.
- + -- --=[Port 6667 closed... skipping.
- + -- --=[Port 7001 closed... skipping.
- + -- --=[Port 8000 closed... skipping.
- + -- --=[Port 8100 closed... skipping.
- + -- --=[Port 8080 opened... running tests...
- #####################################################################################################################################
- # cowsay++
- ____________
- < metasploit >
- ------------
- \ ,__,
- \ (oo)____
- (__) )\
- ||--|| *
- =[ metasploit v4.17.14-dev ]
- + -- --=[ 1809 exploits - 1030 auxiliary - 313 post ]
- + -- --=[ 539 payloads - 42 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- RHOSTS => candydollchan.net
- RHOST => candydollchan.net
- [-] WAR file not found
- [*] Auxiliary module execution completed
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- RPORT => 8080
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] Attempting to connect to 185.20.184.50:8080
- [+] No File(s) found
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] http://185.20.184.50:8080/admin/j_security_check - Checking j_security_check...
- [-] http://185.20.184.50:8080/admin/j_security_check - Unable to enumerate users with this URI
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] The connection was refused by the remote host (185.20.184.50:8080).
- [-] The connection was refused by the remote host (185.20.184.50:8080).
- [-] http://185.20.184.50:8080/manager/html - No response
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] Exploit aborted due to failure: not-found: The target server fingerprint "" does not match "(?-mix:Apache.*(Coyote|Tomcat))", use 'set FingerprintCheck false' to disable this check.
- [*] Exploit completed, but no session was created.
- USERNAME => tomcat
- PASSWORD => tomcat
- ######################################################################################################################################
- * --- JexBoss: Jboss verify and EXploitation Tool --- *
- | * And others Java Deserialization Vulnerabilities * |
- | |
- | @author: João Filho Matos Figueiredo |
- | @contact: joaomatosf@gmail.com |
- | |
- | @update: https://github.com/joaomatosf/jexboss |
- #______________________________________________________#
- @version: 1.2.4
- * Checking for updates in: http://joaomatosf.com/rnp/releases.txt **
- ** Checking Host: http://candydollchan.net:8080 **
- [*] Checking admin-console:
- * An error occurred while connecting to the host http://candydollchan.net:8080 (HTTPConnectionPool(host='candydollchan.net', port=8080): Max retries exceeded with url: /admin-console/ (Caused by NewConnectionError('<urllib3.connection.HTTPConnection object at 0x7fdb826a0210>: Failed to establish a new connection: [Errno 111] Connection refused',)))
- [*] Checking Struts2:
- * An error occurred while connecting to the host http://candydollchan.net:8080 (HTTPConnectionPool(host='candydollchan.net', port=8080): Max retries exceeded with url: / (Caused by NewConnectionError('<urllib3.connection.HTTPConnection object at 0x7fdb823e0650>: Failed to establish a new connection: [Errno 111] Connection refused',)))
- [*] Checking Servlet Deserialization: [ OK ]
- [*] Checking Application Deserialization: [ OK ]
- [*] Checking Jenkins: [ OK ]
- [*] Checking web-console:
- * An error occurred while connecting to the host http://candydollchan.net:8080 (HTTPConnectionPool(host='candydollchan.net', port=8080): Max retries exceeded with url: /web-console/Invoker (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))))
- [*] Checking jmx-console:
- * An error occurred while connecting to the host http://candydollchan.net:8080 (HTTPConnectionPool(host='candydollchan.net', port=8080): Max retries exceeded with url: /jmx-console/HtmlAdaptor?action=inspectMBean&name=jboss.system:type=ServerInfo (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))))
- [*] Checking JMXInvokerServlet:
- * An error occurred while connecting to the host http://candydollchan.net:8080 (HTTPConnectionPool(host='candydollchan.net', port=8080): Max retries exceeded with url: /invoker/JMXInvokerServlet (Caused by NewConnectionError('<urllib3.connection.HTTPConnection object at 0x7fdb82418550>: Failed to establish a new connection: [Errno 111] Connection refused',)))
- #####################################################################################################################################
- I, [2018-09-23T11:03:49.180191 #17425] INFO -- : Initiating port scan
- I, [2018-09-23T11:04:44.368240 #17425] INFO -- : Using nmap scan output file logs/nmap_output_2018-09-23_11-03-49.xml
- I, [2018-09-23T11:04:44.386067 #17425] INFO -- : Discovered tcpwrapped port: 185.20.184.50:21
- I, [2018-09-23T11:04:46.218792 #17425] INFO -- : Discovered tcpwrapped port: 185.20.184.50:21
- I, [2018-09-23T11:04:49.912000 #17425] INFO -- : Discovered tcpwrapped port: 185.20.184.50:110
- I, [2018-09-23T11:04:51.555060 #17425] INFO -- : Discovered tcpwrapped port: 185.20.184.50:110
- I, [2018-09-23T11:04:54.885384 #17425] INFO -- : Discovered tcpwrapped port: 185.20.184.50:143
- I, [2018-09-23T11:04:56.517458 #17425] INFO -- : Discovered tcpwrapped port: 185.20.184.50:143
- I, [2018-09-23T11:05:00.013149 #17425] INFO -- : Discovered tcpwrapped port: 185.20.184.50:587
- I, [2018-09-23T11:05:01.627109 #17425] INFO -- : Discovered tcpwrapped port: 185.20.184.50:587
- W, [2018-09-23T11:05:04.863525 #17425] WARN -- : Yasuo did not find any potential hosts to enumerate
- #######################################################################################################################################
- --------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 185.20.184.50
- + Target Hostname: candydollchan.net
- + Target Port: 80
- + Start Time: 2018-09-23 10:42:27 (GMT-4)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: No banner retrieved
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Server banner has changed from '' to 'nginx/1.12.2' which may suggest a WAF, load balancer or proxy is in place
- + ERROR: Error limit (20) reached for host, giving up. Last error: error reading HTTP response
- + Scan terminated: 6 error(s) and 3 item(s) reported on remote host
- + End Time: 2018-09-23 10:46:43 (GMT-4) (256 seconds)
- --------------------------------------------------------------------------------------------------------------------------------------
- ######################################################################################################################################
- Anonymous JTSEC #OpDeathEathers full Recon #15
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement