Advertisement
Guest User

Untitled

a guest
Jul 13th, 2017
603
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.81 KB | None | 0 0
  1. + -- ----------------------------=[Running Nslookup]=------------------------ -- +
  2. Server: 192.168.0.254
  3. Address: 192.168.0.254#53
  4.  
  5. Non-authoritative answer:
  6. Name: plutonia.fr
  7. Address: 104.31.83.54
  8. Name: plutonia.fr
  9. Address: 104.31.82.54
  10.  
  11. plutonia.fr has address 104.31.82.54
  12. plutonia.fr has address 104.31.83.54
  13. plutonia.fr has IPv6 address 2400:cb00:2048:1::681f:5236
  14. plutonia.fr has IPv6 address 2400:cb00:2048:1::681f:5336
  15. plutonia.fr mail is handled by 5 alt1.aspmx.l.google.com.
  16. + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
  17.  
  18. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  19.  
  20. [+] Target is plutonia.fr
  21. [+] Loading modules.
  22. [+] Following modules are loaded:
  23. [x] [1] ping:icmp_ping - ICMP echo discovery module
  24. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  25. [x] [3] ping:udp_ping - UDP-based ping discovery module
  26. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  27. [x] [5] infogather:portscan - TCP and UDP PortScanner
  28. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  29. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  30. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  31. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  32. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  33. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  34. [x] [12] fingerprint:smb - SMB fingerprinting module
  35. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  36. [+] 13 modules registered
  37. [+] Initializing scan engine
  38. [+] Running scan engine
  39. [-] ping:tcp_ping module: no closed/open TCP ports known on 104.31.83.54. Module test failed
  40. [-] ping:udp_ping module: no closed/open UDP ports known on 104.31.83.54. Module test failed
  41. [-] No distance calculation. 104.31.83.54 appears to be dead or no ports known
  42. [+] Host: 104.31.83.54 is up (Guess probability: 50%)
  43. [+] Target: 104.31.83.54 is alive. Round-Trip Time: 0.50534 sec
  44. [+] Selected safe Round-Trip Time value is: 1.01069 sec
  45. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  46. [-] fingerprint:smb need either TCP port 139 or 445 to run
  47. [-] fingerprint:snmp: need UDP port 161 open
  48. [+] Primary guess:
  49. [+] Host 104.31.83.54 Running OS: (Guess probability: 91%)
  50. [+] Other guesses:
  51. [+] Host 104.31.83.54 Running OS: (Guess probability: 91%)
  52. [+] Host 104.31.83.54 Running OS: (Guess probability: 91%)
  53. [+] Host 104.31.83.54 Running OS: (Guess probability: 91%)
  54. [+] Host 104.31.83.54 Running OS: (Guess probability: 91%)
  55. [+] Host 104.31.83.54 Running OS: (Guess probability: 91%)
  56. [+] Host 104.31.83.54 Running OS: (Guess probability: 91%)
  57. [+] Host 104.31.83.54 Running OS: (Guess probability: 91%)
  58. [+] Host 104.31.83.54 Running OS: (Guess probability: 91%)
  59. [+] Host 104.31.83.54 Running OS: (Guess probability: 91%)
  60. [+] Cleaning up scan engine
  61. [+] Modules deinitialized
  62. [+] Execution completed.
  63. + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
  64. %%
  65. %% This is the AFNIC Whois server.
  66. %%
  67. %% complete date format : DD/MM/YYYY
  68. %% short date format : DD/MM
  69. %% version : FRNIC-2.5
  70. %%
  71. %% Rights restricted by copyright.
  72. %% See https://www.afnic.fr/en/products-and-services/services/whois/whois-special-notice/
  73. %%
  74. %% Use '-h' option to obtain more information about this service.
  75. %%
  76. %% [2a01:0e34:edc9:9380:004c:ac18:48f0:257a REQUEST] >> -V Md5.2 plutonia.fr
  77. %%
  78. %% RL Net [##########] - RL IP [#########.]
  79. %%
  80.  
  81. domain: plutonia.fr
  82. status: ACTIVE
  83. hold: NO
  84. holder-c: ANO00-FRNIC
  85. admin-c: OVH5-FRNIC
  86. tech-c: OVH5-FRNIC
  87. zone-c: NFC1-FRNIC
  88. nsl-id: NSL41520-FRNIC
  89. registrar: OVH
  90. Expiry Date: 13/03/2018
  91. created: 13/03/2017
  92. last-update: 29/06/2017
  93. source: FRNIC
  94.  
  95. ns-list: NSL41520-FRNIC
  96. nserver: jeff.ns.cloudflare.com
  97. nserver: cheryl.ns.cloudflare.com
  98. source: FRNIC
  99.  
  100. registrar: OVH
  101. type: Isp Option 1
  102. address: 2 Rue Kellermann
  103. address: ROUBAIX
  104. country: FR
  105. phone: +33 8 99 70 17 61
  106. fax-no: +33 3 20 20 09 58
  107. e-mail: support@ovh.net
  108. website: http://www.ovh.com
  109. anonymous: NO
  110. registered: 21/10/1999
  111. source: FRNIC
  112.  
  113. nic-hdl: ANO00-FRNIC
  114. type: PERSON
  115. contact: Ano Nymous
  116. remarks: -------------- WARNING --------------
  117. remarks: While the registrar knows him/her,
  118. remarks: this person chose to restrict access
  119. remarks: to his/her personal data. So PLEASE,
  120. remarks: don't send emails to Ano Nymous. This
  121. remarks: address is bogus and there is no hope
  122. remarks: of a reply.
  123. remarks: -------------- WARNING --------------
  124. registrar: OVH
  125. changed: 13/03/2017 anonymous@anonymous
  126. anonymous: YES
  127. obsoleted: NO
  128. source: FRNIC
  129.  
  130. nic-hdl: OVH5-FRNIC
  131. type: ROLE
  132. contact: OVH NET
  133. address: OVH
  134. address: 140, quai du Sartel
  135. address: 59100 Roubaix
  136. country: FR
  137. phone: +33 8 99 70 17 61
  138. e-mail: tech@ovh.net
  139. trouble: Information: http://www.ovh.fr
  140. trouble: Questions: mailto:tech@ovh.net
  141. trouble: Spam: mailto:abuse@ovh.net
  142. admin-c: OK217-FRNIC
  143. tech-c: OK217-FRNIC
  144. notify: tech@ovh.net
  145. registrar: OVH
  146. changed: 11/10/2006 tech@ovh.net
  147. anonymous: NO
  148. obsoleted: NO
  149. source: FRNIC
  150.  
  151. + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
  152.  
  153. *******************************************************************
  154. * *
  155. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  156. * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  157. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  158. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  159. * *
  160. * TheHarvester Ver. 2.7 *
  161. * Coded by Christian Martorella *
  162. * Edge-Security Research *
  163. * cmartorella@edge-security.com *
  164. *******************************************************************
  165.  
  166.  
  167. [-] Searching in Bing:
  168. Searching 50 results...
  169. Searching 100 results...
  170.  
  171.  
  172. [+] Emails found:
  173. ------------------
  174. No emails found
  175.  
  176. [+] Hosts found in search engines:
  177. ------------------------------------
  178. [-] Resolving hostnames IPs...
  179. 104.31.82.54:forum.plutonia.fr
  180. 193.70.80.81:ts.plutonia.fr
  181. 213.186.33.5:www.plutonia.fr
  182. + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
  183.  
  184. ; <<>> DiG 9.10.3-P4-Debian <<>> -x plutonia.fr
  185. ;; global options: +cmd
  186. ;; Got answer:
  187. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16819
  188. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  189.  
  190. ;; OPT PSEUDOSECTION:
  191. ; EDNS: version: 0, flags:; udp: 4096
  192. ;; QUESTION SECTION:
  193. ;fr.plutonia.in-addr.arpa. IN PTR
  194.  
  195. ;; AUTHORITY SECTION:
  196. in-addr.arpa. 1800 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017042793 1800 900 604800 3600
  197.  
  198. ;; Query time: 50 msec
  199. ;; SERVER: 192.168.0.254#53(192.168.0.254)
  200. ;; WHEN: Thu Jul 13 23:52:15 CEST 2017
  201. ;; MSG SIZE rcvd: 121
  202.  
  203. dnsenum.pl VERSION:1.2.3
  204.  
  205. ----- plutonia.fr -----
  206.  
  207.  
  208. Host's addresses:
  209. __________________
  210.  
  211. plutonia.fr. 101 IN A 104.31.82.54
  212. plutonia.fr. 101 IN A 104.31.83.54
  213.  
  214.  
  215. Name Servers:
  216. ______________
  217.  
  218. cheryl.ns.cloudflare.com. 73234 IN A 173.245.58.83
  219. jeff.ns.cloudflare.com. 86400 IN A 173.245.59.124
  220.  
  221.  
  222. Mail (MX) Servers:
  223. ___________________
  224.  
  225. alt1.aspmx.l.google.com. 23 IN A 64.233.164.27
  226.  
  227.  
  228. Trying Zone Transfers and getting Bind Versions:
  229. _________________________________________________
  230.  
  231.  
  232. Trying Zone Transfer for plutonia.fr on cheryl.ns.cloudflare.com ...
  233. AXFR record query failed: FORMERR
  234.  
  235. Trying Zone Transfer for plutonia.fr on jeff.ns.cloudflare.com ...
  236. AXFR record query failed: FORMERR
  237.  
  238. brute force file not specified, bay.
  239. + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
  240.  
  241. ____ _ _ _ _ _____
  242. / ___| _ _| |__ | (_)___| |_|___ / _ __
  243. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  244. ___) | |_| | |_) | | \__ \ |_ ___) | |
  245. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  246.  
  247. # Coded By Ahmed Aboul-Ela - @aboul3la
  248.  
  249. [-] Enumerating subdomains now for plutonia.fr
  250. [-] verbosity is enabled, will show the subdomains results in realtime
  251. [-] Searching now in Baidu..
  252. [-] Searching now in Yahoo..
  253. [-] Searching now in Google..
  254. [-] Searching now in Bing..
  255. [-] Searching now in Ask..
  256. [-] Searching now in Netcraft..
  257. [-] Searching now in DNSdumpster..
  258. [-] Searching now in Virustotal..
  259. [-] Searching now in ThreatCrowd..
  260. [-] Searching now in SSL Certificates..
  261. [-] Searching now in PassiveDNS..
  262. Bing: forum.plutonia.fr
  263. SSL Certificates: manager.plutonia.fr
  264. SSL Certificates: auth.plutonia.fr
  265. SSL Certificates: sandbox.plutonia.fr
  266. SSL Certificates: mg.plutonia.fr
  267. SSL Certificates: launcher.plutonia.fr
  268. SSL Certificates: forum.plutonia.fr
  269. SSL Certificates: www.mg.plutonia.fr
  270. Google: forum.plutonia.fr
  271. Google: ts.plutonia.fr
  272. Virustotal: mc1.plutonia.fr
  273. Virustotal: www.plutonia.fr
  274. Virustotal: forum.plutonia.fr
  275. Virustotal: launcher.plutonia.fr
  276. Yahoo: www.plutonia.fr
  277. ThreatCrowd: launcher.plutonia.fr
  278. Yahoo: forum.plutonia.fr
  279. [!] Error: Google probably now is blocking our requests
  280. [~] Finished now the Google Enumeration ...
  281. [-] Saving results to file: /usr/share/sniper/loot/domains/domains-plutonia.fr.txt
  282. [-] Total Unique Subdomains Found: 10
  283. www.plutonia.fr
  284. auth.plutonia.fr
  285. forum.plutonia.fr
  286. launcher.plutonia.fr
  287. manager.plutonia.fr
  288. mc1.plutonia.fr
  289. mg.plutonia.fr
  290. www.mg.plutonia.fr
  291. sandbox.plutonia.fr
  292. ts.plutonia.fr
  293.  
  294. ╔═╗╦═╗╔╦╗╔═╗╦ ╦
  295. ║ ╠╦╝ ║ ╚═╗╠═╣
  296. ╚═╝╩╚═ ╩o╚═╝╩ ╩
  297. + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
  298.  
  299. auth.plutonia.fr
  300. forum.plutonia.fr
  301. launcher.plutonia.fr
  302. manager.plutonia.fr
  303. mg.plutonia.fr
  304. *.plutonia.fr
  305. sandbox.plutonia.fr
  306. www.mg.plutonia.fr
  307. [+] Domains saved to: /usr/share/sniper/loot/domains/domains-plutonia.fr-full.txt
  308.  
  309. + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
  310. + -- ----------------------------=[Checking Email Security]=----------------- -- +
  311.  
  312. + -- ----------------------------=[Pinging host]=---------------------------- -- +
  313. PING plutonia.fr(2400:cb00:2048:1::681f:5336 (2400:cb00:2048:1::681f:5336)) 56 data bytes
  314. 64 bytes from 2400:cb00:2048:1::681f:5336 (2400:cb00:2048:1::681f:5336): icmp_seq=1 ttl=57 time=71.3 ms
  315.  
  316. --- plutonia.fr ping statistics ---
  317. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  318. rtt min/avg/max/mdev = 71.383/71.383/71.383/0.000 ms
  319.  
  320. + -- ----------------------------=[Running TCP port scan]=------------------- -- +
  321.  
  322. Starting Nmap 7.50 ( https://nmap.org ) at 2017-07-13 23:52 CEST
  323. Nmap scan report for plutonia.fr (104.31.82.54)
  324. Host is up (0.036s latency).
  325. Other addresses for plutonia.fr (not scanned): 2400:cb00:2048:1::681f:5236 2400:cb00:2048:1::681f:5336 104.31.83.54
  326. Not shown: 45 filtered ports
  327. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  328. PORT STATE SERVICE
  329. 80/tcp open http
  330. 443/tcp open https
  331. 8080/tcp open http-proxy
  332. 8443/tcp open https-alt
  333.  
  334. Nmap done: 1 IP address (1 host up) scanned in 21.68 seconds
  335.  
  336. + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
  337. + -- --=[Port 21 closed... skipping.
  338. + -- --=[Port 22 closed... skipping.
  339. + -- --=[Port 23 closed... skipping.
  340. + -- --=[Port 25 closed... skipping.
  341. + -- --=[Port 53 closed... skipping.
  342. + -- --=[Port 79 closed... skipping.
  343. + -- --=[Port 80 opened... running tests...
  344. + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  345.  
  346. ^ ^
  347. _ __ _ ____ _ __ _ _ ____
  348. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  349. | V V // o // _/ | V V // 0 // 0 // _/
  350. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  351. <
  352. ...'
  353.  
  354. WAFW00F - Web Application Firewall Detection Tool
  355.  
  356. By Sandro Gauci && Wendel G. Henrique
  357.  
  358. Checking http://plutonia.fr
  359. The site http://plutonia.fr is behind a CloudFlare
  360. Number of requests: 1
  361.  
  362. + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  363. http://plutonia.fr [503 Service Unavailable] CloudFlare, Cookies[__cfduid], Country[UNITED STATES][US], HTML5, HTTPServer[cloudflare-nginx], HttpOnly[__cfduid], IP[104.31.83.54], Script[text/javascript], Title[Just a moment...], UncommonHeaders[cf-ray], X-Frame-Options[SAMEORIGIN], X-UA-Compatible[IE=Edge]
  364.  
  365. __ ______ _____
  366. \ \/ / ___|_ _|
  367. \ /\___ \ | |
  368. / \ ___) || |
  369. /_/\_|____/ |_|
  370.  
  371. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  372. + -- --=[Target: plutonia.fr:80
  373. + -- --=[Site not vulnerable to Cross-Site Tracing!
  374. + -- --=[Site not vulnerable to Host Header Injection!
  375. + -- --=[Site not vulnerable to Cross-Frame Scripting!
  376. + -- --=[Site not vulnerable to Clickjacking!
  377.  
  378. HTTP/1.1 405 Not Allowed
  379. Date: Thu, 13 Jul 2017 21:53:00 GMT
  380. Content-Type: text/html
  381. Content-Length: 177
  382. Connection: close
  383. Server: -nginx
  384. CF-RAY: -
  385.  
  386. <html>
  387. <head><title>405 Not Allowed</title></head>
  388. <body bgcolor="white">
  389. <center><h1>405 Not Allowed</h1></center>
  390. <hr><center>cloudflare-nginx</center>
  391. </body>
  392. </html>
  393.  
  394. HTTP/1.1 503 Service Temporarily Unavailable
  395. Date: Thu, 13 Jul 2017 21:53:00 GMT
  396. Content-Type: text/html; charset=UTF-8
  397. Transfer-Encoding: chunked
  398. Connection: close
  399. Set-Cookie: __cfduid=d90ff31d1ed791e2efd7151c77edece371499982780; expires=Fri, 13-Jul-18 21:53:00 GMT; path=/; domain=.plutonia.fr; HttpOnly
  400. X-Frame-Options: SAMEORIGIN
  401. Refresh: 8;URL=/cdn-cgi/l/chk_jschl?pass=1499982784.818-g5hi0Sw/Sn
  402. Cache-Control: no-cache
  403. Server: cloudflare-nginx
  404. CF-RAY: 37df78fbc47314e5-CDG
  405.  
  406. 111b
  407. <!DOCTYPE HTML>
  408. <html lang="en-US">
  409. <head>
  410. <meta charset="UTF-8" />
  411. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
  412. <meta http-equiv="X-UA-Compatible" content="IE=Edge,chrome=1" />
  413. <meta name="robots" content="noindex, nofollow" />
  414. <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1" />
  415. <title>Just a moment...</title>
  416. <style type="text/css">
  417. html, body {width: 100%; height: 100%; margin: 0; padding: 0;}
  418. body {background-color: #ffffff; font-famil
  419.  
  420.  
  421.  
  422. + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
  423. + -- --=[Checking if X-Content options are enabled on plutonia.fr...
  424.  
  425. + -- --=[Checking if X-Frame options are enabled on plutonia.fr...
  426. X-Frame-Options: SAMEORIGIN
  427.  
  428. + -- --=[Checking if X-XSS-Protection header is enabled on plutonia.fr...
  429.  
  430. + -- --=[Checking HTTP methods on plutonia.fr...
  431.  
  432. + -- --=[Checking if TRACE method is enabled on plutonia.fr...
  433.  
  434. + -- --=[Checking for META tags on plutonia.fr...
  435. <meta charset="UTF-8" />
  436. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
  437. <meta http-equiv="X-UA-Compatible" content="IE=Edge,chrome=1" />
  438. <meta name="robots" content="noindex, nofollow" />
  439. <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1" />
  440.  
  441. + -- --=[Checking for open proxy on plutonia.fr...
  442.  
  443. + -- --=[Enumerating software on plutonia.fr...
  444. Server: cloudflare-nginx
  445.  
  446. + -- --=[Checking if Strict-Transport-Security is enabled on plutonia.fr...
  447.  
  448. + -- --=[Checking for Flash cross-domain policy on plutonia.fr...
  449. <a href="https://www.cloudflare.com/5xx-error-landing?utm_source=iuam" target="_blank" style="font-size: 12px;">DDoS protection by Cloudflare</a>
  450. <br>
  451. Ray ID: 37df7907746569ca
  452. </div>
  453. </td>
  454.  
  455. </tr>
  456. </table>
  457. </body>
  458. </html>
  459.  
  460. + -- --=[Checking for Silverlight cross-domain policy on plutonia.fr...
  461. <a href="https://www.cloudflare.com/5xx-error-landing?utm_source=iuam" target="_blank" style="font-size: 12px;">DDoS protection by Cloudflare</a>
  462. <br>
  463. Ray ID: 37df7908925b68ba
  464. </div>
  465. </td>
  466.  
  467. </tr>
  468. </table>
  469. </body>
  470. </html>
  471.  
  472. + -- --=[Checking for HTML5 cross-origin resource sharing on plutonia.fr...
  473.  
  474. + -- --=[Retrieving robots.txt on plutonia.fr...
  475. <a href="https://www.cloudflare.com/5xx-error-landing?utm_source=iuam" target="_blank" style="font-size: 12px;">DDoS protection by Cloudflare</a>
  476. <br>
  477. Ray ID: 37df790ad3613c3b
  478. </div>
  479. </td>
  480.  
  481. </tr>
  482. </table>
  483. </body>
  484. </html>
  485.  
  486. + -- --=[Retrieving sitemap.xml on plutonia.fr...
  487. <a href="https://www.cloudflare.com/5xx-error-landing?utm_source=iuam" target="_blank" style="font-size: 12px;">DDoS protection by Cloudflare</a>
  488. <br>
  489. Ray ID: 37df790c059668d8
  490. </div>
  491. </td>
  492.  
  493. </tr>
  494. </table>
  495. </body>
  496. </html>
  497.  
  498. + -- --=[Checking cookie attributes on plutonia.fr...
  499. Set-Cookie: __cfduid=d8e6e04e8e1bc4a17e091fc50e29c79161499982783; expires=Fri, 13-Jul-18 21:53:03 GMT; path=/; domain=.plutonia.fr; HttpOnly
  500.  
  501. + -- --=[Checking for ASP.NET Detailed Errors on plutonia.fr...
  502. <a href="https://www.cloudflare.com/5xx-error-landing?utm_source=iuam" target="_blank" style="font-size: 12px;">DDoS protection by Cloudflare</a>
  503. <a href="https://www.cloudflare.com/5xx-error-landing?utm_source=iuam" target="_blank" style="font-size: 12px;">DDoS protection by Cloudflare</a>
  504.  
  505.  
  506. + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
  507. - Nikto v2.1.6
  508. ---------------------------------------------------------------------------
  509. + Target IP: 104.31.82.54
  510. + Target Hostname: plutonia.fr
  511. + Target Port: 80
  512. + Start Time: 2017-07-13 23:53:01 (GMT2)
  513. ---------------------------------------------------------------------------
  514. + Server: cloudflare-nginx
  515. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  516. + Uncommon header 'cf-ray' found, with contents: 37df7912c1af69ca-CDG
  517. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  518. + All CGI directories 'found', use '-C none' to test none
  519. + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement