SHARE
TWEET

William Adams

a guest Nov 3rd, 2011 18,000 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. scans of William Adams work website.. do what you want..there seems to be 1 open port.. take advantage of that.. take him out..
  2.  
  3.  
  4. HOME:
  5. 717 Magnolia Street Rockport, TX 78382
  6. Home: (361) 729-3452
  7. Cell phone: (361) 729-3452
  8.  
  9. WORK:
  10. Aransas County Sheriff’s Office: Sheriff William “Bill” Mills
  11. 301 N. Live Oak St.Rockport, TX 78382
  12.  
  13. Phone numbers:
  14. (361) 729-2222
  15. (361) 790-0100
  16. (361) 790-0138
  17.  
  18.  
  19. By_-  Above info from Linuz Torvalds
  20.  
  21.  
  22.  
  23. ---------------------------------------------------------------------------------------
  24.  
  25. Target website= website of william adams= http://www.aransascountytx.gov/main/
  26.  
  27.  
  28. *scans*
  29.  
  30.  
  31.  
  32.  
  33. Starting Nmap 5.51 ( http://nmap.org ) at 2011-11-03 16:32 Eastern Daylight Time
  34.  
  35. Nmap scan report for www.aransascountytx.gov (72.167.35.47)
  36.  
  37. Host is up (0.060s latency).
  38.  
  39. rDNS record for 72.167.35.47: ip-72-167-35-47.ip.secureserver.net
  40.  
  41. Not shown: 998 filtered ports
  42.  
  43. PORT     STATE  SERVICE
  44.  
  45. 53/tcp   open   domain
  46.  
  47. 1723/tcp closed pptp
  48.  
  49.  
  50.  
  51. Nmap done: 1 IP address (1 host up) scanned in 9.67 seconds
  52.  
  53.  
  54.  
  55. ------------------------------------------------------------------------------------------
  56.  
  57.  
  58.  
  59. Starting Nmap 5.51 ( http://nmap.org ) at 2011-11-03 16:35 Eastern Daylight Time
  60.  
  61. Initiating Parallel DNS resolution of 1 host. at 16:35
  62.  
  63. Completed Parallel DNS resolution of 1 host. at 16:35, 0.05s elapsed
  64.  
  65. Initiating SYN Stealth Scan at 16:35
  66.  
  67. Scanning www.aransascountytx.gov (72.167.35.47) [1000 ports]
  68.  
  69. Discovered open port 53/tcp on 72.167.35.47
  70.  
  71. Completed SYN Stealth Scan at 16:35, 6.97s elapsed (1000 total ports)
  72.  
  73. Nmap scan report for www.aransascountytx.gov (72.167.35.47)
  74.  
  75. Host is up (0.062s latency).
  76.  
  77. rDNS record for 72.167.35.47: ip-72-167-35-47.ip.secureserver.net
  78.  
  79. Not shown: 998 filtered ports
  80.  
  81. PORT     STATE  SERVICE
  82.  
  83. 53/tcp   open   domain
  84.  
  85. 1723/tcp closed pptp
  86.  
  87.  
  88.  
  89. Read data files from: C:\Program Files\Nmap
  90.  
  91. Nmap done: 1 IP address (1 host up) scanned in 7.75 seconds
  92.  
  93.            Raw packets sent: 2002 (88.088KB) | Rcvd: 6 (248B)
  94.  
  95.  
  96.  
  97. ----------------------------------------------------------------------------------------
  98.  
  99.  
  100.  
  101.  
  102. Starting Nmap 5.51 ( http://nmap.org ) at 2011-11-03 16:38 Eastern Daylight Time
  103.  
  104. NSE: Loaded 57 scripts for scanning.
  105.  
  106. Initiating Ping Scan at 16:38
  107.  
  108. Scanning www.aransascountytx.gov (72.167.35.47) [4 ports]
  109.  
  110. Completed Ping Scan at 16:38, 0.25s elapsed (1 total hosts)
  111.  
  112. Initiating Parallel DNS resolution of 1 host. at 16:38
  113.  
  114. Completed Parallel DNS resolution of 1 host. at 16:38, 0.03s elapsed
  115.  
  116. Initiating SYN Stealth Scan at 16:38
  117.  
  118. Scanning www.aransascountytx.gov (72.167.35.47) [65535 ports]
  119.  
  120. Discovered open port 53/tcp on 72.167.35.47
  121.  
  122. SYN Stealth Scan Timing: About 16.49% done; ETC: 16:41 (0:02:37 remaining)
  123.  
  124. SYN Stealth Scan Timing: About 34.35% done; ETC: 16:41 (0:01:57 remaining)
  125.  
  126. SYN Stealth Scan Timing: About 52.36% done; ETC: 16:41 (0:01:23 remaining)
  127.  
  128. SYN Stealth Scan Timing: About 67.31% done; ETC: 16:41 (0:00:59 remaining)
  129.  
  130. SYN Stealth Scan Timing: About 82.03% done; ETC: 16:41 (0:00:33 remaining)
  131.  
  132. Completed SYN Stealth Scan at 16:41, 170.56s elapsed (65535 total ports)
  133.  
  134. Initiating Service scan at 16:41
  135.  
  136. Scanning 1 service on www.aransascountytx.gov (72.167.35.47)
  137.  
  138. Completed Service scan at 16:41, 11.23s elapsed (1 service on 1 host)
  139.  
  140. Initiating OS detection (try #1) against www.aransascountytx.gov (72.167.35.47)
  141.  
  142. Retrying OS detection (try #2) against www.aransascountytx.gov (72.167.35.47)
  143.  
  144. Initiating Traceroute at 16:41
  145.  
  146. Completed Traceroute at 16:41, 0.13s elapsed
  147.  
  148. Initiating Parallel DNS resolution of 15 hosts. at 16:41
  149.  
  150. Completed Parallel DNS resolution of 15 hosts. at 16:42, 16.50s elapsed
  151.  
  152. NSE: Script scanning 72.167.35.47.
  153.  
  154. Initiating NSE at 16:42
  155.  
  156. Completed NSE at 16:42, 4.17s elapsed
  157.  
  158. Nmap scan report for www.aransascountytx.gov (72.167.35.47)
  159.  
  160. Host is up (0.068s latency).
  161.  
  162. rDNS record for 72.167.35.47: ip-72-167-35-47.ip.secureserver.net
  163.  
  164. Not shown: 65533 filtered ports
  165.  
  166. PORT     STATE  SERVICE VERSION
  167.  
  168. 53/tcp   open   domain
  169.  
  170. 1723/tcp closed pptp
  171.  
  172. Aggressive OS guesses: Linux 2.6.18 (95%), Linux 2.6.9 (93%), Linux 2.6.9 - 2.6.27 (92%), Linux 2.6.28 (91%), Linux 2.6.30 (91%), Riverbed Steelhead 200 proxy server (91%), Linux 2.6.22.1-32.fc6 (x86, SMP) (89%), Linux 2.6.11 (89%), Linux 2.6.9 (CentOS 4.4) (89%), FreeBSD 6.2-RELEASE (88%)
  173.  
  174. No exact OS matches for host (test conditions non-ideal).
  175.  
  176. Network Distance: 16 hops
  177.  
  178.  
  179.  
  180. TRACEROUTE (using port 1723/tcp)
  181.  
  182. HOP RTT      ADDRESS
  183.  
  184. 1   0.00 ms  192.168.1.254
  185.  
  186. 2   31.00 ms adsl-72-152-144-1.asm.bellsouth.net (72.152.144.1)
  187.  
  188. 3   31.00 ms 70.159.177.159
  189.  
  190. 4   31.00 ms 12.81.16.28
  191.  
  192. 5   31.00 ms 12.81.16.13
  193.  
  194. 6   15.00 ms 74.175.192.86
  195.  
  196. 7   15.00 ms cr2.attga.ip.att.net (12.122.140.186)
  197.  
  198. 8   15.00 ms attga01jt.ip.att.net (12.122.80.185)
  199.  
  200. 9   15.00 ms 192.205.35.90
  201.  
  202. 10  62.00 ms po2-20G.ar2.PHX1.gblx.net (67.16.132.70)
  203.  
  204. 11  63.00 ms 64.210.13.110
  205.  
  206. 12  63.00 ms ip-97-74-253-94.ip.secureserver.net (97.74.253.94)
  207.  
  208. 13  62.00 ms ip-97-74-253-94.ip.secureserver.net (97.74.253.94)
  209.  
  210. 14  78.00 ms 97.74.253.98
  211.  
  212. 15  78.00 ms ip-208-109-113-174.ip.secureserver.net (208.109.113.174)
  213.  
  214. 16  78.00 ms ip-72-167-35-47.ip.secureserver.net (72.167.35.47)
  215.  
  216.  
  217.  
  218. Read data files from: C:\Program Files\Nmap
  219.  
  220. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  221.  
  222. Nmap done: 1 IP address (1 host up) scanned in 210.97 seconds
  223.  
  224.            Raw packets sent: 131304 (5.782MB) | Rcvd: 276 (12.018KB)
  225.  
  226.  
  227. There are Php redirects on the site.. so if you can SQL inject do it and do what you want.. we will be working on it also.
  228.  
  229.  
  230. -The Infinitive Hackers-
  231.  
  232.  
  233.  
  234.  
  235.  
  236.  
  237.  
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top