Advertisement
AstroDeX

Untitled

Jul 14th, 2015
1,190
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
C++ 97.65 KB | None | 0 0
  1. # Uniscan project                  #
  2. # http://uniscan.sourceforge.net/  #
  3. ####################################
  4. V. 6.2
  5.  
  6.  
  7. Scan date: 9-7-2015 13:20:57
  8. ===================================================================================================
  9. | Domain: http://fbi.gov/
  10. | Server: ATLAS Platform
  11. | IP: 69.58.186.114
  12. ===================================================================================================
  13. ===================================================================================================
  14. | Looking for Drupal plugins/modules
  15. |
  16. ===================================================================================================
  17. | WEB SERVICES
  18. |
  19. ===================================================================================================
  20. | FAVICON.ICO
  21. |
  22. ===================================================================================================
  23. | ERROR INFORMATION
  24. |
  25. ===================================================================================================
  26. | TYPE ERROR
  27. |
  28. ===================================================================================================
  29. | SERVER MOBILE
  30. |
  31. ===================================================================================================
  32. | LANGUAGE
  33. |
  34. | xml:lang="en-us"
  35. | lang="en-us"
  36. ===================================================================================================
  37. | INTERESTING STRINGS IN HTML
  38. |
  39. | a href="https://bankrobbers.fbi.gov/">Bank Robbers
  40. | script type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-1603990-1']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https' : 'http') + '://www.fbi.gov/urchin.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })();
  41. | a href="https://twitter.com/FBI" title="FBI Twitter">
  42. | a href="http://twitter.com/FBI" title="Twitter">Twitter
  43. | a href="http://www.facebook.com/FBI" title="FBI Facebook">
  44. | a href="http://www.facebook.com/FBI" title="Facebook">Facebook
  45. | label for="login">
  46. | style type="text/css" media="print">@import url(https://www.fbi.gov/portal_css/FBI%202010%20Theme/print-cachekey-5df8ff797f0afb73f823f8daab1c84a9.css);
  47. | style type="text/css" media="screen">@import url(https://www.fbi.gov/portal_css/FBI%202010%20Theme/base-cachekey-f1019f5890f765731a3a75be920e1c81.css);
  48. | style type="text/css">@import url(https://www.fbi.gov/portal_css/FBI%202010%20Theme/deprecated-cachekey-58f8be95b079ec2b704aab409d863a4d.css);
  49. | style type="text/css" media="all">@import url(https://www.fbi.gov/portal_css/FBI%202010%20Theme/ploneCustom-cachekey-5570b8b557b2e5a987a871b7512c4120.css);
  50. | style type="text/css">@import url(https://www.fbi.gov/portal_css/FBI%202010%20Theme/IEAllVersions-cachekey-47fe4aec844750fe79784dbdf0d9d18f.css);
  51. | style type="text/css" media="screen">@import url(https://www.fbi.gov/portal_css/FBI%202010%20Theme/ie8fixes-cachekey-474305edd4ddbe01843a7bb92da1f6ae.css);
  52. | style type="text/css" media="print">@import url(https://www.fbi.gov/portal_css/FBI%202010%20Theme/ie_print-cachekey-4581b058cf3f4a5b59c00a7a2e7a74b9.css);
  53. ===================================================================================================
  54. | WHOIS
  55. |
  56. | % DOTGOV WHOIS Server ready
  57. |
  58. |    Domain Name: FBI.GOV
  59. |
  60. |    Status: ACTIVE
  61. |
  62. |
  63. |
  64. | >>> Last update of whois database: 2015-07-09T20:20:54Z <<<
  65. |
  66. | Please be advised that this whois server only contains information pertaining
  67. |
  68. | to the .GOV domain. For information for other domains please use the whois
  69. |
  70. | server at RS.INTERNIC.NET.
  71. |
  72. ===================================================================================================
  73. | BANNER GRABBING:
  74. | X-Meta-Generator: Plone - http://plone.org
  75. | X-Meta-Location:
  76. ===================================================================================================
  77. ===================================================================================================
  78. | PING
  79. |
  80. | PING fbi.gov (69.58.186.114) 56(84) bytes of data.
  81. |
  82. | --- fbi.gov ping statistics ---
  83. | 4 packets transmitted, 0 received, 100% packet loss, time 3024ms
  84. |
  85. ===================================================================================================
  86. | TRACEROUTE
  87. |
  88. ===================================================================================================
  89. | NSLOOKUP
  90. |
  91. | Server:       127.0.1.1
  92. | Address:  127.0.1.1#53
  93. |
  94. | Non-authoritative answer:
  95. | fbi.gov   mail exchanger = 10 smtpc.fbi.gov.
  96. | Authoritative answers can be found from:
  97. | *** Can't find fbi.gov: No answer
  98. | fbi.gov   nameserver = a3.fbi.gov.
  99. | fbi.gov   nameserver = a2.fbi.gov.
  100. | fbi.gov   nameserver = a1.fbi.gov.
  101. | Name: fbi.gov
  102. | Address: 69.58.186.114
  103. | fbi.gov
  104. |   origin = a1.fbi.gov
  105. |   mail addr = mdnshelp.verisign.com
  106. |   serial = 1415239807
  107. |   refresh = 600
  108. |   retry = 1800
  109. |   expire = 1209600
  110. |   minimum = 1800
  111. | fbi.gov   text = "v=spf1 +mx ip4:153.31.0.0/16 -all"
  112. ===================================================================================================
  113. | NMAP
  114. |
  115. |
  116. | Starting Nmap 6.46 ( http://nmap.org ) at 2015-07-09 13:21 PDT
  117. | NSE: Loaded 120 scripts for scanning.
  118. | NSE: Script Pre-scanning.
  119. | Initiating Ping Scan at 13:21
  120. | Scanning fbi.gov (69.58.186.114) [4 ports]
  121. | Completed Ping Scan at 13:21, 3.05s elapsed (1 total hosts)
  122. | Nmap scan report for fbi.gov (69.58.186.114) [host down]
  123. | NSE: Script Post-scanning.
  124. | Read data files from: /usr/local/bin/../share/nmap
  125. | Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
  126. | Nmap done: 1 IP address (0 hosts up) scanned in 4.68 seconds
  127. |            Raw packets sent: 8 (304B) | Rcvd: 0 (0B)
  128. ===================================================================================================
  129. |
  130. | Directory check:
  131. | Skipped because http://fbi.gov/uniscan529/ did not return the code 404
  132. ===================================================================================================
  133. |                                                                                                  
  134. | File check:
  135. | Skipped because http://fbi.gov/uniscan816/ did not return the code 404
  136. ===================================================================================================
  137. |
  138. | Check robots.txt:
  139. |
  140. | Check sitemap.xml:
  141. ===================================================================================================
  142. |
  143. | Crawler Started:
  144. | Plugin name: FCKeditor upload test v.1 Loaded.
  145. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  146. | Plugin name: Code Disclosure v.1.1 Loaded.
  147. | Plugin name: E-mail Detection v.1.1 Loaded.
  148. | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
  149. | Plugin name: External Host Detect v.1.2 Loaded.
  150. | Plugin name: phpinfo() Disclosure v.1 Loaded.
  151. | Plugin name: Upload Form Detect v.1.1 Loaded.
  152. | [+] Crawling finished, 1 URL's found!
  153. |
  154. | FCKeditor File Upload:
  155. |
  156. | Timthumb:
  157. |
  158. | Source Code Disclosure:
  159. |
  160. | E-mails:
  161. |
  162. | Web Backdoors:
  163. |
  164. | External hosts:
  165. |
  166. | PHPinfo() Disclosure:
  167. |
  168. | File Upload Forms:
  169. |
  170. | Ignored Files:
  171. ===================================================================================================
  172. | Dynamic tests:
  173. | Plugin name: Learning New Directories v.1.2 Loaded.
  174. | Plugin name: FCKedior tests v.1.1 Loaded.
  175. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  176. | Plugin name: Find Backup Files v.1.2 Loaded.
  177. | Plugin name: Blind SQL-injection tests v.1.3 Loaded.
  178. | Plugin name: Local File Include tests v.1.1 Loaded.
  179. | Plugin name: PHP CGI Argument Injection v.1.1 Loaded.
  180. | Plugin name: Remote Command Execution tests v.1.1 Loaded.
  181. | Plugin name: Remote File Include tests v.1.2 Loaded.
  182. | Plugin name: SQL-injection tests v.1.2 Loaded.
  183. | Plugin name: Cross-Site Scripting tests v.1.2 Loaded.
  184. | Plugin name: Web Shell Finder v.1.3 Loaded.
  185. | [+] 0 New directories added
  186. |                                                                                                  
  187. |                                                                                                  
  188. | FCKeditor tests:
  189. | Skipped because http://fbi.gov/testing123 did not return the code 404
  190. |                                                                                                  
  191. |                                                                                                  
  192. | Timthumb < 1.33 vulnerability:
  193. |                                                                                                  
  194. |                                                                                                  
  195. | Backup Files:
  196. | Skipped because http://fbi.gov/testing123 did not return the code 404
  197. |                                                                                                  
  198. |                                                                                                  
  199. | Blind SQL Injection:
  200. |                                                                                                  
  201. |                                                                                                  
  202. | Local File Include:
  203. |                                                                                                  
  204. |                                                                                                  
  205. | PHP CGI Argument Injection:
  206. |                                                                                                  
  207. |                                                                                                  
  208. | Remote Command Execution:
  209. |                                                                                                  
  210. |                                                                                                  
  211. | Remote File Include:
  212. |                                                                                                  
  213. |                                                                                                  
  214. | SQL Injection:
  215. |                                                                                                  
  216. |                                                                                                  
  217. | Cross-Site Scripting (XSS):
  218. |                                                                                                  
  219. |                                                                                                  
  220. | Web Shell Finder:
  221. ===================================================================================================
  222. | Static tests:
  223. | Plugin name: Local File Include tests v.1.1 Loaded.
  224. | Plugin name: Remote Command Execution tests v.1.1 Loaded.
  225. | Plugin name: Remote File Include tests v.1.1 Loaded.
  226. |                                                                                                  
  227. |                                                                                                  
  228. | Local File Include:
  229. |                                                                                                  
  230. |                                                                                                  
  231. | Remote Command Execution:
  232. |                                                                                                  
  233. |                                                                                                  
  234. | Remote File Include:
  235. ####################################
  236. # Uniscan project                  #
  237. # http://uniscan.sourceforge.net/  #
  238. ####################################
  239. V. 6.2
  240.  
  241.  
  242. Scan date: 9-7-2015 13:24:58
  243. ===================================================================================================
  244. | [*] http://cia.gov/ redirected to http://www.cia.gov/
  245. | [*] New target is: http://www.cia.gov/
  246. ===================================================================================================
  247. | Domain: http://www.cia.gov/
  248. | IP: 23.203.216.96
  249. ===================================================================================================
  250. ===================================================================================================
  251. | Looking for Drupal plugins/modules
  252. |
  253. ===================================================================================================
  254. | WEB SERVICES
  255. |
  256. ===================================================================================================
  257. | FAVICON.ICO
  258. |
  259. ===================================================================================================
  260. | ERROR INFORMATION
  261. |
  262. ===================================================================================================
  263. | TYPE ERROR
  264. |
  265. | http://www.cia.gov/ha4J]en|O{CVN2s-">F.php responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .php doesn't exist! any results from this server may be void
  266. | http://www.cia.gov/jH}]^x(Xc9L0/BG(%@8.html responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .html doesn't exist! any results from this server may be void
  267. | http://www.cia.gov/]!"Y_7/xW<}R5wsafP|5.htm responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .htm doesn't exist! any results from this server may be void
  268. | http://www.cia.gov/@h5\xe}<P-du'0\WmPv.aspx responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .aspx doesn't exist! any results from this server may be void
  269. | http://www.cia.gov/ti^(;H`OPbB>j=jf3w].asp responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .asp doesn't exist! any results from this server may be void
  270. | http://www.cia.gov/V"KZ:0uf]WQNNxyqQ[nm.jsp responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .jsp doesn't exist! any results from this server may be void
  271. | http://www.cia.gov/Zg(Wg.s6VF[Jvb:7:5S(.cgi responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .cgi doesn't exist! any results from this server may be void
  272. ===================================================================================================
  273. | SERVER MOBILE
  274. |
  275. ===================================================================================================
  276. | LANGUAGE
  277. |
  278. | lang="en"
  279. | xml:lang="en"
  280. | lang="ar"
  281. | xml:lang="ar"
  282. | lang="zh-cn"
  283. | xml:lang="zh-cn"
  284. | lang="fr"
  285. | xml:lang="fr"
  286. | lang="ru"
  287. | xml:lang="ru"
  288. | lang="es"
  289. | xml:lang="es"
  290. ===================================================================================================
  291. | INTERESTING STRINGS IN HTML
  292. |
  293. | a class="icon-twitter hide-text" href="https://twitter.com/CIA">Twitter
  294. | a class="twitter-timeline" data-dnt="true" width="235" height="322" href="https://twitter.com/CIA" data-widget-id="497085799548993536">Tweets by @CIA
  295. | script> setTimeout(function () { !function (d, s, id) { var js, fjs = d.getElementsByTagName(s)[0], p = /^http:/.test(d.location) ? 'http' : 'https'; if (!d.getElementById(id)) { js = d.createElement(s); js.id = id; js.src = p + "://platform.twitter.com/widgets.js"; fjs.parentNode.insertBefore(js, fjs); } } (document, "script", "twitter-wjs"); }, 500);
  296. | a class="social-6" href="https://twitter.com/CIA">CIA Twitter
  297. | a class="icon-facebook hide-text" href="https://www.facebook.com/Central.Intelligence.Agency">Facebook
  298. | a class="social-5" href="https://www.facebook.com/Central.Intelligence.Agency">CIA Facebook
  299. ===================================================================================================
  300. | WHOIS
  301. |
  302. | % DOTGOV WHOIS Server ready
  303. |
  304. | No match for "WWW.CIA.GOV".
  305. |
  306. |
  307. |
  308. | >>> Last update of whois database: 2015-07-09T20:24:55Z <<<
  309. |
  310. | Please be advised that this whois server only contains information pertaining
  311. |
  312. | to the .GOV domain. For information for other domains please use the whois
  313. |
  314. | server at RS.INTERNIC.NET.
  315. |
  316. ===================================================================================================
  317. | BANNER GRABBING:
  318. ===================================================================================================
  319. ===================================================================================================
  320. | PING
  321. |
  322. | PING e6221.dscna.akamaiedge.net (23.203.216.96) 56(84) bytes of data.
  323. | 64 bytes from a23-203-216-96.deploy.static.akamaitechnologies.com (23.203.216.96): icmp_seq=1 ttl=53 time=27.6 ms
  324. | 64 bytes from a23-203-216-96.deploy.static.akamaitechnologies.com (23.203.216.96): icmp_seq=2 ttl=53 time=33.0 ms
  325. | 64 bytes from a23-203-216-96.deploy.static.akamaitechnologies.com (23.203.216.96): icmp_seq=3 ttl=53 time=31.4 ms
  326. | 64 bytes from a23-203-216-96.deploy.static.akamaitechnologies.com (23.203.216.96): icmp_seq=4 ttl=54 time=74.0 ms
  327. |
  328. | --- e6221.dscna.akamaiedge.net ping statistics ---
  329. | 4 packets transmitted, 4 received, 0% packet loss, time 3003ms
  330. | rtt min/avg/max/mdev = 27.691/41.582/74.066/18.857 ms
  331. ===================================================================================================
  332. | TRACEROUTE
  333. |
  334. ===================================================================================================
  335. | NSLOOKUP
  336. |
  337. | Server:       127.0.1.1
  338. | Address:  127.0.1.1#53
  339. |
  340. | Non-authoritative answer:
  341. | www.cia.gov   canonical name = www.cia.gov.edgekey.net.
  342. | www.cia.gov.edgekey.net   canonical name = e6221.dscna.akamaiedge.net.
  343. | Authoritative answers can be found from:
  344. | Name: e6221.dscna.akamaiedge.net
  345. | Address: 23.203.216.96
  346. ===================================================================================================
  347. | NMAP
  348. |
  349. |
  350. | Starting Nmap 6.46 ( http://nmap.org ) at 2015-07-09 13:25 PDT
  351. | NSE: Loaded 120 scripts for scanning.
  352. | NSE: Script Pre-scanning.
  353. | Initiating Ping Scan at 13:25
  354. | Scanning www.cia.gov (23.203.216.96) [4 ports]
  355. | Completed Ping Scan at 13:25, 1.03s elapsed (1 total hosts)
  356. | Initiating Parallel DNS resolution of 1 host. at 13:25
  357. | Completed Parallel DNS resolution of 1 host. at 13:25, 0.00s elapsed
  358. | Initiating SYN Stealth Scan at 13:25
  359. | Scanning www.cia.gov (23.203.216.96) [1000 ports]
  360. | Discovered open port 554/tcp on 23.203.216.96
  361. | Discovered open port 21/tcp on 23.203.216.96
  362. | Discovered open port 80/tcp on 23.203.216.96
  363. | Discovered open port 443/tcp on 23.203.216.96
  364. | Discovered open port 7070/tcp on 23.203.216.96
  365. | Completed SYN Stealth Scan at 13:26, 51.22s elapsed (1000 total ports)
  366. | Initiating Service scan at 13:26
  367. | Scanning 5 services on www.cia.gov (23.203.216.96)
  368. | Service scan Timing: About 60.00% done; ETC: 13:29 (0:01:28 remaining)
  369. | Completed Service scan at 13:28, 133.42s elapsed (5 services on 1 host)
  370. | Initiating OS detection (try #1) against www.cia.gov (23.203.216.96)
  371. | Retrying OS detection (try #2) against www.cia.gov (23.203.216.96)
  372. | Initiating Traceroute at 13:28
  373. | Completed Traceroute at 13:28, 0.03s elapsed
  374. | NSE: Script scanning 23.203.216.96.
  375. | Initiating NSE at 13:28
  376. | Completed NSE at 13:29, 75.46s elapsed
  377. | Nmap scan report for www.cia.gov (23.203.216.96)
  378. | Host is up (0.019s latency).
  379. | rDNS record for 23.203.216.96: a23-203-216-96.deploy.static.akamaitechnologies.com
  380. | Not shown: 995 filtered ports
  381. | PORT     STATE SERVICE     VERSION
  382. | 21/tcp   open  ftp?
  383. | |_ftp-bounce: no banner
  384. | 80/tcp   open  http        AkamaiGHost (Akamai's HTTP Acceleration/Mirror service)
  385. | |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  386. | |_http-title: Did not follow redirect to https://www.cia.gov/
  387. | 443/tcp  open  ssl/http    AkamaiGHost (Akamai's HTTP Acceleration/Mirror service)
  388. | |_http-favicon: Unknown favicon MD5: C0E9990D1233AE79509FF2E4F2D840F4
  389. | |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  390. | | http-title: Welcome to the CIA Web Site \xE2\x80\x94 Central Intelligence Agency
  391. | |_Requested resource was https://www.cia.gov/index.html
  392. | | ssl-cert: Subject: commonName=www.cia.gov/organizationName=Central Intelligence Agency/stateOrProvinceName=Virginia/countryName=US
  393. | | Issuer: commonName=Symantec Class 3 EV SSL CA - G3/organizationName=Symantec Corporation/countryName=US
  394. | | Public Key type: rsa
  395. | | Public Key bits: 2048
  396. | | Not valid before: 2015-04-01T00:00:00
  397. | | Not valid after:  2016-04-11T23:59:59
  398. | | MD5:   23ca 3805 cff2 7a57 2892 547b 3653 dbc3
  399. | |_SHA-1: 4c8a 6b27 3c38 5b92 05d6 3508 629b 737c 73f0 690a
  400. | 554/tcp  open  rtsp?
  401. | 7070/tcp open  realserver?
  402. | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  403. | OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
  404. | No OS matches for host
  405. | Network Distance: 1 hop
  406. | TCP Sequence Prediction: Difficulty=213 (Good luck!)
  407. | IP ID Sequence Generation: Incremental
  408. |
  409. | TRACEROUTE (using port 554/tcp)
  410. | HOP RTT      ADDRESS
  411. | 1   12.66 ms a23-203-216-96.deploy.static.akamaitechnologies.com (23.203.216.96)
  412. |
  413. | NSE: Script Post-scanning.
  414. | Read data files from: /usr/local/bin/../share/nmap
  415. | OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  416. | Nmap done: 1 IP address (1 host up) scanned in 268.65 seconds
  417. |            Raw packets sent: 3104 (139.174KB) | Rcvd: 126 (10.403KB)
  418. ===================================================================================================
  419. |
  420. | Directory check:
  421. | Skipped because http://www.cia.gov/uniscan40/ did not return the code 404
  422. ===================================================================================================
  423. |                                                                                                  
  424. | File check:
  425. | Skipped because http://www.cia.gov/uniscan694/ did not return the code 404
  426. ===================================================================================================
  427. |
  428. | Check robots.txt:
  429. |
  430. | Check sitemap.xml:
  431. ===================================================================================================
  432. |
  433. | Crawler Started:
  434. | Plugin name: FCKeditor upload test v.1 Loaded.
  435. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  436. | Plugin name: Code Disclosure v.1.1 Loaded.
  437. | Plugin name: E-mail Detection v.1.1 Loaded.
  438. | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
  439. | Plugin name: External Host Detect v.1.2 Loaded.
  440. | Plugin name: phpinfo() Disclosure v.1 Loaded.
  441. | Plugin name: Upload Form Detect v.1.1 Loaded.
  442. ===================================================================================================
  443. | Stress tests:
  444. | Plugin name: Mini Stress Test v.1.1 Loaded.
  445. |                                                                                                  
  446. |                                                                                                  
  447. | Mini Stress Test:
  448. | Looking for best cost:
  449. | Cost: [1] http://fbi.gov/a
  450. | Using http://fbi.gov/a as target
  451. | [+] Crawling finished, 139 URL's found!
  452. |
  453. | FCKeditor File Upload:
  454. |
  455. | Timthumb:
  456. |
  457. | Source Code Disclosure:
  458. |
  459. | E-mails:
  460. |
  461. | Web Backdoors:
  462. |
  463. | External hosts:
  464. | [+] External Host Found: https://twitter.com
  465. | [+] External Host Found: http://www.usa.gov
  466. | [+] External Host Found: http://www.dni.gov
  467. | [+] External Host Found: http://www.foia.cia.gov
  468. | [+] External Host Found: http://get.adobe.com
  469. | [+] External Host Found: http://www.microsoft.com
  470. | [+] External Host Found: http://www.youtube.com
  471. | [+] External Host Found: https://www.youtube.com
  472. | [+] External Host Found: https://www.facebook.com
  473. | [+] External Host Found: https://www.flickr.com
  474. | [+] External Host Found: http://www.flickr.com
  475. |
  476. | PHPinfo() Disclosure:
  477. |
  478. | File Upload Forms:
  479. |
  480. | Ignored Files:
  481. ===================================================================================================
  482. | Dynamic tests:
  483. | Plugin name: Learning New Directories v.1.2 Loaded.
  484. | Plugin name: FCKedior tests v.1.1 Loaded.
  485. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  486. | Plugin name: Find Backup Files v.1.2 Loaded.
  487. | Plugin name: Blind SQL-injection tests v.1.3 Loaded.
  488. | Plugin name: Local File Include tests v.1.1 Loaded.
  489. | Plugin name: PHP CGI Argument Injection v.1.1 Loaded.
  490. | Plugin name: Remote Command Execution tests v.1.1 Loaded.
  491. | Plugin name: Remote File Include tests v.1.2 Loaded.
  492. | Plugin name: SQL-injection tests v.1.2 Loaded.
  493. | Plugin name: Cross-Site Scripting tests v.1.2 Loaded.
  494. | Plugin name: Web Shell Finder v.1.3 Loaded.
  495. | [+] 1 New directories added
  496. |                                                                                                  
  497. |                                                                                                  
  498. | FCKeditor tests:
  499. | Skipped because http://www.cia.gov/++theme++contextual.agencytheme/css/testing123 did not return the code 404
  500. |                                                                                                  
  501. |                                                                                                  
  502. | Timthumb < 1.33 vulnerability:
  503. |                                                                                                  
  504. |                                                                                                  
  505. | Backup Files:
  506. | Skipped because http://www.cia.gov/++theme++contextual.agencytheme/css/testing123 did not return the code 404
  507. |                                                                                                  
  508. |                                                                                                  
  509. | Blind SQL Injection:
  510. | Mini Stress Test End.                              
  511. ===================================================================================================
  512. Scan end date: 9-7-2015 13:31:42
  513.  
  514.  
  515.  
  516. HTML report saved in: report/fbi.gov.html
  517. |                                                                                                  
  518. |                                                                                                  
  519. | Local File Include:
  520. |                                                                                                  
  521. |                                                                                                  
  522. | PHP CGI Argument Injection:
  523. |                                                                                                  
  524. |                                                                                                  
  525. | Remote Command Execution:
  526. |                                                                                                  
  527. |                                                                                                  
  528. | Remote File Include:
  529. |                                                                                                  
  530. |                                                                                                  
  531. | SQL Injection:
  532. |                                                                                                  
  533. |                                                                                                  
  534. | Cross-Site Scripting (XSS):
  535. |                                                                                                  
  536. |                                                                                                  
  537. | Web Shell Finder:
  538. ####################################
  539. # Uniscan project                  #
  540. # http://uniscan.sourceforge.net/  #
  541. ####################################
  542. V. 6.2
  543.  
  544.  
  545. Scan date: 9-7-2015 13:37:39
  546. ===================================================================================================
  547. | [*] http://federalreserve.gov/ redirected to http://www.federalreserve.gov/
  548. | [*] New target is: http://www.federalreserve.gov/
  549. ===================================================================================================
  550. | Domain: http://www.federalreserve.gov/
  551. | IP: 132.200.148.151
  552. ===================================================================================================
  553. ===================================================================================================
  554. | Looking for Drupal plugins/modules
  555. |
  556. ===================================================================================================
  557. | WEB SERVICES
  558. |
  559. ===================================================================================================
  560. | FAVICON.ICO
  561. |
  562. ===================================================================================================
  563. | ERROR INFORMATION
  564. |
  565. ===================================================================================================
  566. | TYPE ERROR
  567. |
  568. ===================================================================================================
  569. | SERVER MOBILE
  570. |
  571. ===================================================================================================
  572. | LANGUAGE
  573. |
  574. ===================================================================================================
  575. | INTERESTING STRINGS IN HTML
  576. |
  577. | script language="JavaScript" type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js">
  578. | script src="http://admin.brightcove.com/js/APIModules_all.js">
  579. | a href="/paymentsystems/default.htm">Payment
  580. | a href="/newsevents/press/other/20150126a.htm">Improving the U.S. Payment System
  581. | br/> Find out more about the future of the U.S. payment system and plans for collaborating with stakeholders to achieve shared goals.&#160;
  582. | a target="_self" href="http://www.federalreserve.gov/newsevents/press/other/20150126a.htm">Strategies for Improving the U.S. Payment System paper
  583. | a target="_self" href="https://fedpaymentsimprovement.org/">FedPayments Improvement website
  584. | a target="_self" href="https://fedpaymentsimprovement.org/events/">Upcoming Events
  585. | a href="http://www.federalreserve.gov/consumerinfo/independent-foreclosure-review-payment-agreement.htm" target="_self">Independent Foreclosure Review Payment Agreement
  586. | img src="/gifjpg/masthead.jpg" alt="Board of Governors of the Federal Reserve System. The Federal Reserve, the central bank of the United States, provides the nation with a safe, flexible, and stable monetary and financial system.">
  587. | a href="/bankinforeg/default.htm">Banking
  588. | a href="/newsevents/press/bcreg/20150706a.htm">Agencies announce EGRPRA outreach meeting in Kansas City focusing on rural banking issues
  589. | h5>Financial Accounts of the United States
  590. | a href="/releases/z1/">Financial Accounts of the United States - Z.1
  591. | a href="javascript:exitWindow('https://twitter.com/federalreserve','ext')">
  592. ===================================================================================================
  593. | WHOIS
  594. |
  595. | % DOTGOV WHOIS Server ready
  596. |
  597. | No match for "WWW.FEDERALRESERVE.GOV".
  598. |
  599. |
  600. |
  601. | >>> Last update of whois database: 2015-07-09T20:37:41Z <<<
  602. |
  603. | Please be advised that this whois server only contains information pertaining
  604. |
  605. | to the .GOV domain. For information for other domains please use the whois
  606. |
  607. | server at RS.INTERNIC.NET.
  608. |
  609. ===================================================================================================
  610. | BANNER GRABBING:
  611. ===================================================================================================
  612. ===================================================================================================
  613. | PING
  614. |
  615. | PING www.federalreserve.frb.akadns.net (132.200.148.151) 56(84) bytes of data.
  616. |
  617. | --- www.federalreserve.frb.akadns.net ping statistics ---
  618. | 4 packets transmitted, 0 received, 100% packet loss, time 3022ms
  619. |
  620. ===================================================================================================
  621. | TRACEROUTE
  622. |
  623. ===================================================================================================
  624. | NSLOOKUP
  625. |
  626. | Server:       127.0.1.1
  627. | Address:  127.0.1.1#53
  628. |
  629. | Non-authoritative answer:
  630. | www.federalreserve.gov    canonical name = www.federalreserve.frb.akadns.net.
  631. | Authoritative answers can be found from:
  632. | Name: www.federalreserve.frb.akadns.net
  633. | Address: 132.200.148.151
  634. ===================================================================================================
  635. | NMAP
  636. |
  637. ===================================================================================================
  638. | Static tests:
  639. | Plugin name: Local File Include tests v.1.1 Loaded.
  640. | Plugin name: Remote Command Execution tests v.1.1 Loaded.
  641. | Plugin name: Remote File Include tests v.1.1 Loaded.
  642. |                                                                                                  
  643. |                                                                                                  
  644. | Local File Include:
  645. |                                                                                                  
  646. |                                                                                                  
  647. | Remote Command Execution:
  648. |                                                                                                  
  649. |                                                                                                  
  650. | Remote File Include:
  651. |
  652. | Starting Nmap 6.46 ( http://nmap.org ) at 2015-07-09 13:37 PDT
  653. | NSE: Loaded 120 scripts for scanning.
  654. | NSE: Script Pre-scanning.
  655. | Initiating Ping Scan at 13:37
  656. | Scanning www.federalreserve.gov (132.200.148.151) [4 ports]
  657. | Completed Ping Scan at 13:37, 1.04s elapsed (1 total hosts)
  658. | Initiating Parallel DNS resolution of 1 host. at 13:37
  659. | Completed Parallel DNS resolution of 1 host. at 13:37, 0.38s elapsed
  660. | Initiating SYN Stealth Scan at 13:37
  661. | Scanning www.federalreserve.gov (132.200.148.151) [1000 ports]
  662. | Discovered open port 21/tcp on 132.200.148.151
  663. | Discovered open port 80/tcp on 132.200.148.151
  664. | Discovered open port 443/tcp on 132.200.148.151
  665. | Discovered open port 554/tcp on 132.200.148.151
  666. | Discovered open port 7070/tcp on 132.200.148.151
  667. | Completed SYN Stealth Scan at 13:38, 12.21s elapsed (1000 total ports)
  668. | Initiating Service scan at 13:38
  669. | Scanning 5 services on www.federalreserve.gov (132.200.148.151)
  670. | Service scan Timing: About 40.00% done; ETC: 13:43 (0:02:54 remaining)
  671. | Completed Service scan at 13:40, 131.60s elapsed (5 services on 1 host)
  672. | Initiating OS detection (try #1) against www.federalreserve.gov (132.200.148.151)
  673. | Initiating Traceroute at 13:40
  674. | Completed Traceroute at 13:40, 3.05s elapsed
  675. | Initiating Parallel DNS resolution of 11 hosts. at 13:40
  676. | Completed Parallel DNS resolution of 11 hosts. at 13:40, 0.34s elapsed
  677. | NSE: Script scanning 132.200.148.151.
  678. | Initiating NSE at 13:40
  679. | Completed NSE at 13:41, 75.58s elapsed
  680. | Nmap scan report for www.federalreserve.gov (132.200.148.151)
  681. | Host is up (0.052s latency).
  682. | Not shown: 995 filtered ports
  683. | PORT     STATE SERVICE     VERSION
  684. | 21/tcp   open  ftp?
  685. | |_ftp-bounce: no banner
  686. | 80/tcp   open  http-proxy  F5 BIG-IP load balancer http proxy
  687. | |_http-favicon: Unknown favicon MD5: E87B855CBCD39123AF0272D30E2D580A
  688. | | http-methods: OPTIONS TRACE GET HEAD POST
  689. | | Potentially risky methods: TRACE
  690. | |_See http://nmap.org/nsedoc/scripts/http-methods.html
  691. | |_http-open-proxy: Proxy might be redirecting requests
  692. | |_http-title: Board of Governors of the Federal Reserve System
  693. | 443/tcp  open  ssl/https
  694. | |_http-favicon: Unknown favicon MD5: E87B855CBCD39123AF0272D30E2D580A
  695. | | http-methods: OPTIONS TRACE GET HEAD POST
  696. | | Potentially risky methods: TRACE
  697. | |_See http://nmap.org/nsedoc/scripts/http-methods.html
  698. | | http-server-header: Software version grabbed from Server header.
  699. | | Consider submitting a service fingerprint.
  700. | |_Run with --script-args http-server-header.skip
  701. | |_http-title: Board of Governors of the Federal Reserve System
  702. | | ssl-cert: Subject: commonName=*.federalreserve.gov/organizationName=Federal Reserve System/stateOrProvinceName=District of Columbia/countryName=US
  703. | | Issuer: commonName=Symantec Class 3 Secure Server CA - G4/organizationName=Symantec Corporation/countryName=US
  704. | | Public Key type: rsa
  705. | | Public Key bits: 2048
  706. | | Not valid before: 2015-03-10T00:00:00
  707. | | Not valid after:  2017-03-10T23:59:59
  708. | | MD5:   a567 96c8 f26d c402 ea2f 0d60 2508 ccbd
  709. | |_SHA-1: 7cbf 099b 0f9c 2faa bcad bdef a220 89b3 8ebb d4fd
  710. | 554/tcp  open  rtsp?
  711. | 7070/tcp open  realserver?
  712. | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  713. | Device type: WAP|storage-misc
  714. | Running: Apple embedded
  715. | OS CPE: cpe:/h:apple:airport_extreme
  716. | OS details: Apple AirPort Extreme WAP or Time Capsule NAS device
  717. | Network Distance: 14 hops
  718. | TCP Sequence Prediction: Difficulty=211 (Good luck!)
  719. | IP ID Sequence Generation: Busy server or unknown class
  720. | Service Info: Device: load balancer
  721. |
  722. | TRACEROUTE (using port 443/tcp)
  723. | HOP RTT       ADDRESS
  724. | 1   33.32 ms  10.0.1.1
  725. | 2   ...
  726. | 3   33.51 ms  dtr04mtpkca-tge-0-0-0-13.mtpk.ca.charter.com (96.34.101.229)
  727. | 4   33.53 ms  crr02mtpkca-tge-0-4-0-1.mtpk.ca.charter.com (96.34.98.98)
  728. | 5   33.54 ms  bbr01mtpkca-bue-3.mtpk.ca.charter.com (96.34.2.26)
  729. | 6   36.23 ms  be4016.ccr23.lax05.atlas.cogentco.com (38.104.84.101)
  730. | 7   36.23 ms  be2179.ccr22.lax01.atlas.cogentco.com (154.54.41.81)
  731. | 8   36.25 ms  be2017.ccr21.lax04.atlas.cogentco.com (154.54.0.237)
  732. | 9   ...
  733. | 10  107.64 ms ae-5-5.car1.Baltimore1.Level3.net (4.69.134.102)
  734. | 11  121.18 ms 4.34.2.54
  735. | 12  ...
  736. | 13  121.11 ms 132.200.132.44
  737. | 14  121.03 ms 132.200.148.151
  738. |
  739. | NSE: Script Post-scanning.
  740. | Read data files from: /usr/local/bin/../share/nmap
  741. | OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  742. | Nmap done: 1 IP address (1 host up) scanned in 228.79 seconds
  743. |            Raw packets sent: 2070 (93.576KB) | Rcvd: 1750 (145.634KB)
  744. ===================================================================================================
  745. |
  746. | Directory check:
  747. ===================================================================================================
  748. | Stress tests:
  749. | Plugin name: Mini Stress Test v.1.1 Loaded.
  750. |                                                                                                  
  751. |                                                                                                  
  752. | Mini Stress Test:
  753. | Looking for best cost:
  754. | Cost: [1] http://www.cia.gov/
  755. | [+] CODE: 200 URL: http://www.federalreserve.gov/bios/
  756. | Cost: [8] http://www.cia.gov/about-cia/leadership
  757. | [+] CODE: 200 URL: http://www.federalreserve.gov/careers/
  758. | [+] CODE: 200 URL: http://www.federalreserve.gov/feeds/
  759. | Using http://www.cia.gov/about-cia/leadership as target
  760. | [+] CODE: 200 URL: http://www.federalreserve.gov/open/
  761. | [+] CODE: 200 URL: http://www.federalreserve.gov/publications/
  762. | [+] CODE: 200 URL: http://www.federalreserve.gov/releases/
  763. | Mini Stress Test End.                              
  764. ===================================================================================================
  765. Scan end date: 9-7-2015 13:44:9
  766.  
  767.  
  768.  
  769. HTML report saved in: report/www.cia.gov.html
  770. | [+] CODE: 200 URL: http://www.federalreserve.gov/support/
  771. ####################################
  772. # Uniscan project                  #
  773. # http://uniscan.sourceforge.net/  #
  774. ####################################
  775. V. 6.2
  776.  
  777.  
  778. Scan date: 9-7-2015 13:44:28
  779. ===================================================================================================
  780. | Domain: http://en.kremlin.ru/
  781. | Server: nginx
  782. | IP: 95.173.136.70
  783. ===================================================================================================
  784. ===================================================================================================
  785. | Looking for Drupal plugins/modules
  786. |
  787. ===================================================================================================
  788. | WEB SERVICES
  789. |
  790. ===================================================================================================
  791. | FAVICON.ICO
  792. |
  793. ===================================================================================================
  794. | ERROR INFORMATION
  795. |
  796. ===================================================================================================
  797. | TYPE ERROR
  798. |
  799. ===================================================================================================
  800. | SERVER MOBILE
  801. |
  802. ===================================================================================================
  803. |                                                                                                  
  804. | File check:
  805. ===================================================================================================
  806. | LANGUAGE
  807. |
  808. | lang="en"
  809. | hreflang="ru"
  810. | hreflang="en"
  811. ===================================================================================================
  812. | INTERESTING STRINGS IN HTML
  813. |
  814. | div class="events_index__block is-active" data-block="admin">
  815. | a href="/events/administration">Presidential Executive Office
  816. | a href="/events/administration/49898" itemprop="url">
  817. | a href="/events/administration/49882" itemprop="url">
  818. | a href="/events/administration/49868" itemprop="url">
  819. | a href="/events/administration/49859" itemprop="url">
  820. | a href="/events/administration/49879" itemprop="url">
  821. | a href="/events/administration/49752" itemprop="url">
  822. | a class="link__at_section" href="/events/administration">All news of the Presidential Executive Office
  823. | a href="http://twitter.com/KremlinRussia_E" rel="me" target="_blank">Twitter
  824. | a href="http://twitter.com/KremlinRussia_E" class="sidebar__special" itemprop="url" tabindex="0" rel="me" target="_blank" >
  825. ===================================================================================================
  826. | WHOIS
  827. |
  828. | % By submitting a query to RIPN's Whois Service
  829. |
  830. | % you agree to abide by the following terms of use:
  831. |
  832. | % http://www.ripn.net/about/servpol.html#3.2 (in Russian)
  833. |
  834. | % http://www.ripn.net/about/en/servpol.html#3.2 (in English).
  835. |
  836. |
  837. |
  838. | No entries found for the selected source(s).
  839. |
  840. |
  841. |
  842. | Last updated on 2015.07.09 23:41:34 MSK
  843. |
  844. |
  845. |
  846. ===================================================================================================
  847. | BANNER GRABBING:
  848. ===================================================================================================
  849. ===================================================================================================
  850. | PING
  851. |
  852. | PING en.kremlin.ru (95.173.136.70) 56(84) bytes of data.
  853. |
  854. | --- en.kremlin.ru ping statistics ---
  855. | 4 packets transmitted, 0 received, 100% packet loss, time 3024ms
  856. |
  857. ===================================================================================================
  858. | TRACEROUTE
  859. |
  860. ===================================================================================================
  861. | NSLOOKUP
  862. |
  863. | Server:       127.0.1.1
  864. | Address:  127.0.1.1#53
  865. |
  866. | Non-authoritative answer:
  867. | *** Can't find en.kremlin.ru: No answer
  868. | Authoritative answers can be found from:
  869. | Name: en.kremlin.ru
  870. | Address: 95.173.136.70
  871. | Address: 95.173.136.71
  872. | Address: 95.173.136.72
  873. ===================================================================================================
  874. | NMAP
  875. |
  876. | [+] CODE: 200 URL: http://www.federalreserve.gov/default.aspx
  877. | [+] CODE: 200 URL: http://www.federalreserve.gov/favicon.ico
  878. | [+] CODE: 200 URL: http://www.federalreserve.gov/install/install.aspx
  879. | [+] CODE: 200 URL: http://www.federalreserve.gov/junk.aspx
  880. | [+] CODE: 200 URL: http://www.federalreserve.gov/login.aspx
  881. | [+] CODE: 200 URL: http://www.federalreserve.gov/maint.aspx
  882. | [+] CODE: 200 URL: http://www.federalreserve.gov/maintenance.aspx
  883. | [+] CODE: 200 URL: http://www.federalreserve.gov/test.aspx
  884. | [+] CODE: 200 URL: http://www.federalreserve.gov/trace.axd
  885. ===================================================================================================
  886. |
  887. | Check robots.txt:
  888. |
  889. | Check sitemap.xml:
  890. ===================================================================================================
  891. |
  892. | Crawler Started:
  893. | Plugin name: FCKeditor upload test v.1 Loaded.
  894. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  895. | Plugin name: Code Disclosure v.1.1 Loaded.
  896. | Plugin name: E-mail Detection v.1.1 Loaded.
  897. | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
  898. | Plugin name: External Host Detect v.1.2 Loaded.
  899. | Plugin name: phpinfo() Disclosure v.1 Loaded.
  900. | Plugin name: Upload Form Detect v.1.1 Loaded.
  901. ####################################
  902. # Uniscan project                  #
  903. # http://uniscan.sourceforge.net/  #
  904. ####################################
  905. V. 6.2
  906.  
  907.  
  908. Scan date: 9-7-2015 13:48:8
  909. ===================================================================================================
  910. | [*] http://www.snsbank.nl/ redirected to http://www.snsbank.nl/particulier/
  911. | [*] New target is: http://www.snsbank.nl/particulier/
  912. ===================================================================================================
  913. | Domain: http://www.snsbank.nl/particulier/
  914. | IP: 194.53.208.72
  915. ===================================================================================================
  916. ===================================================================================================
  917. | Looking for Drupal plugins/modules
  918. |
  919. ===================================================================================================
  920. | WEB SERVICES
  921. |
  922. ===================================================================================================
  923. | FAVICON.ICO
  924. |
  925. ===================================================================================================
  926. | ERROR INFORMATION
  927. |
  928. ===================================================================================================
  929. | TYPE ERROR
  930. |
  931. ===================================================================================================
  932. | SERVER MOBILE
  933. |
  934. | index page reqested with an Iphone UserAgent is diferent then with a regular UserAgent. This Host may have a mobile site
  935. ===================================================================================================
  936. | LANGUAGE
  937. |
  938. | xml:lang="nl"
  939. | lang="nl"
  940. ===================================================================================================
  941. | INTERESTING STRINGS IN HTML
  942. |
  943. | title>Voor sparen, een betaalrekening, verzekeringen of een hypotheek: SNS Bank
  944. | link rel="shortcut icon" href="/static/snsbank/img/icons/favicon.ico" type="image/x-icon" />
  945. | meta name="description" content="Hoge spaarrente, rente op je betaalrekening, een voordelige (inboedel)verzekering en een passende hypotheek? Allemaal eenvoudig geregeld bij SNS Bank." />
  946. | meta name="keywords" content="sparen, spaarrekening, rente, betaalrekening, verzekering(en), hypotheek, internetbankieren, online afsluiten, veilig, service, spaarrente, winkels , rentetarieven, bankzaken, geldautomaten" />
  947. | link type="text/css" rel="stylesheet" media="screen, projection" href="/static/snsbank/css/home.css" />
  948. | link type="text/css" rel="stylesheet" media="screen, projection" href="/static/snsbank/css/sns_home.css" />
  949. | link type="text/css" rel="stylesheet" media="print" href="/static/snsbank/css/print.css" />
  950. | link type="text/css" rel="stylesheet" media="screen, projection" href="/static/snsbank/css/redesign-overwrite.css" />
  951. | script type="text/javascript" src="/static/snsbank/js/redesign/html5shiv.js">
  952. | link type="text/css" rel="stylesheet" href="/static/snsbank/css/lte-ie9-buttons.css" />
  953. | link type="text/css" rel="stylesheet" href="/static/snsbank/css/ie-webfont-fix.css" />
  954. | link type="text/css" media="screen,projection" rel="stylesheet" href="/static/snsbank/css/home-ie7-corrections.css" />
  955. | link type="text/css" rel="stylesheet" href="/static/snsbank/css/gx-ie-overrule.css" />
  956. | script src="/static/snsbank/js/sns_home.js" type="text/javascript">
  957. | script src="/static/snsbank/js/unloadswf.js" type="text/javascript">
  958. | a name="Meer informatie" class="" href="https://www.snsbank.nl/particulier/klantenservice/besturingssystemen-en-browsers-snsbank.nl.html">Kijk hier voor meer informatie
  959. | script src="/static/snsbank/js/omniture/s_code.min.js" type="text/javascript">
  960. | img src="/static/snsbank/img/restyle/logo-new.png" alt="SNS Bank" width="171" height="60" />
  961. | a href="https://heelnormaal.snsbank.nl">
  962. | a href="/" id="homeLink" title="SNS bank logo - link naar home">
  963. | img class="" src="/static/snsbank/img/restyle/logo-new.png" alt="SNS bank logo - link naar home" width="171" height="60" />
  964. | script type="text/javascript"> $( document ).ready(function() { var gsa_site = $("#gsa_site_input").val(); if (gsa_site.length == 0) {gsa_site = "snsbank_particulier";} $(".gsa_searchKeyWords").autocomplete({ source: function( request, response ) { $.ajax({ type: "POST", url: "/web/wcbservlet/gsaservlet/suggest?q=" + request.term + "&max=10&site=" + gsa_site + "&client=snsbank_web&access=p&format=rich", dataType: "json", success: function(data){ //The results are not really in the format jQuery UI expects var finalData =$.map(data.results, function(item) { return { label:item.name, value:item.name } }); response(finalData); } }); }, select: function(event, ui) { if(ui.item){ $('.gsa_searchKeyWords').val(ui.item.value); } $('#gsa_site_input').val(gsa_site); $('.headerSearchForm').submit(); }, minLength: 1 }); });
  965. | input type="hidden" name="site" value="snsbank_particulier" id="gsa_site_input" />
  966. | input type="hidden" name="client" value="snsbank_web" id="gsa_client_input" />
  967. | input type="submit" id="submitlogout" value="Inloggen internetbankieren"/>
  968. | a class="bullet" href="https://www.snsbank.nl/particulier/klantenservice/mijn-sns/mijn-sns-aanvragen.html">Mijn SNS aanvragen
  969. | a title="SNS Bank drempelvrij internetbankieren" href="http://www.snsbank.nl/drempelvrij" onclick="window.open(this.href).opener=null;return false;">
  970. | img class="drempelvrijGroen" src="/static/snsbank/img/hyperlinks/drempelvrijGroen.png" alt="SNS Bank drempelvrij internetbankieren" />
  971. | a href="https://www.snsbank.nl/web/file?uuid=c2c2f843-8d48-474b-a704-b60658d389a5&owner=d5fe9abf-6784-4174-8c82-bc8310dcc108&contentid=9977">actievoorwaarden
  972. | a href="https://www.snsbank.nl/particulier/klantenservice/contact/contact-met-sns.html" class="decorated-link" title="https://www.snsbank.nl/particulier/klantenservice/contact/contact-met-sns.html">Telefoon & e-mail
  973. | a href="https://www.snsbank.nl/particulier/klantenservice/banken/zoek-een-winkel.html" class="decorated-link" title="https://www.snsbank.nl/particulier/klantenservice/banken/zoek-een-winkel.html">SNS Winkels
  974. | a href="https://www.snsbank.nl/particulier/klantenservice/zoek-een-winkel.html" class="decorated-link" title="https://www.snsbank.nl/particulier/klantenservice/zoek-een-winkel.html">SNS Geldautomaten
  975. | a href="http://www.facebook.com/snsbank?promo=smed_fb" class="decorated-link" title="http://www.facebook.com/snsbank?promo=smed_fb">Facebook
  976. | a href="http://www.twitter.com/snsbank?promo=smed_tw" class="decorated-link" title="http://www.twitter.com/snsbank?promo=smed_tw">Twitter
  977. | a href="http://community.snsbank.nl/" class="decorated-link" title="http://community.snsbank.nl/">SNS Community
  978. | a href="https://www.snsbank.nl/particulier/klantenservice/contact/contact-met-sns.html" class="decorated-link" title="https://www.snsbank.nl/particulier/klantenservice/contact/contact-met-sns.html">Alle contactgegevens
  979. | a href="https://www.snsbank.nl/particulier/klantenservice/mijn-sns/bankieren-met-je-mobiel.html" class="bullet" title="https://www.snsbank.nl/particulier/klantenservice/mijn-sns/bankieren-met-je-mobiel.html">SNS Mobiel bankieren app
  980. | a href="http://www.snsbank.nl/particulier/klantenservice.html" class="bullet" title="http://www.snsbank.nl/particulier/klantenservice.html">Meer klantenservice
  981. | h2>Over SNS Bank
  982. | a href="/particulier/over-sns/werken-bij-sns-bank.html" class="bullet" title="Werken bij SNS Bank">Vacatures
  983. | a href="http://www.snsbank.nl/particulier/over-sns-bank/veilig-bankieren.html" class="bullet" title="http://www.snsbank.nl/particulier/over-sns-bank/veilig-bankieren.html">Veilig bankieren
  984. | a href="/particulier/over-sns.html" class="bullet" title="Over ons">Meer over SNS Bank
  985. | a title="SNS Bank" rel="nofollow" href="http://www.snsbank.nl">SNS Bank
  986. | a id="thuiswinkel-logo" href="https://www.thuiswinkel.org/leden/sns-bank/certificaat" rel="nofollow">
  987. | a id="reaal-logo-link" href="http://www.snsbank.nl/particulier/over-sns-bank/drempelvrij.html">
  988. | script language="JavaScript" type="text/javascript"> s.un="advsnsbanklive"; s.pageName="Particulier:Home"; var page = "Home"; if(page == "Pagina niet gevonden"){ s.pageType = "errorPage";} if(page == "Gebruikersnaam gewijzigd"){ s.prop32 = "naam"; s.eVar45 = "instellingen gewijzigd"; s.events = "event32"; } //page Type s.prop26="Home"; s.prop26=""; if(typeof stepNumber == "string" && typeof (stepName) !== "undefined"){ s.pageName = s.pageName + ":" + stepNumber + ":" + stepName; } s.prop1="particulier"; s.prop3="976048"; s.prop4="15482930"; var loginstatus = 'niet ingelogd'; s.prop27 = loginstatus; s.eVar4=""; s.server = "www.snsbank.nl"; s.prop6 = '2015/07/09 22:48'; var productname=";;1"; if (productname == ";") { s.products=""; } else { s.products=";;1"; } var cookieVal = document.cookie.substring(document.cookie.indexOf('=')+1,document.cookie.indexOf(';')); var gender; if(loginstatus == 'ingelogd'){ s.eVar44 = ''; s.prop40 = ''; s.prop41 = ''; s.eVar15 = ''; s.eVar34 = ''; s.eVar16 = ''; gender = ''; if(gender=='M'){ s.eVar17='man';} else if(gender=='V'){ s.eVar17='vrouw';} else{ s.eVar17='other';} s.eVar35 = ''; }else{ s.eVar35 = cookieVal; } /************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/ var s_code=s.t();if(s_code)document.write(s_code)
  989. | script src="/static/snsbank/js/snsafterbodyload_home.js" type="text/javascript">
  990. | img id="jsenabled" src="/static/snsbank/img/blank.gif" width="0" height="0" alt="" />
  991. | script type="text/javascript"> $(document).ready(function(){ var gsaUrl='//www.snsbank.nl/web/file?uuid=6326ab14-7108-4250-9bdd-3e1ad3c50de6&owner=d5fe9abf-6784-4174-8c82-bc8310dcc108&contentid=9789'; if(gsaUrl.lengh== 0 || gsaUrl == 'gsa_json_suggestion_url'){ gsaUrl = '//www.snsbank.nl/web/file'; } $.getJSON(gsaUrl, function(data) { //autocomplete $( ".gsa_searchKeyWords" ).autocomplete({ source: function(request, response) { var results = $.ui.autocomplete.filter(data, request.term); response(results.slice(0, 8)); }, minLength: 3, select: function(t, n) { if (n.item) { $(".gsa_searchKeyWords").val(n.item.value) } $("[name='headerSearchForm']").submit() } }) // Overrides the default autocomplete filter function to search only from the beginning of the string $.ui.autocomplete.filter = function (array, term) { var matcher = new RegExp("^" + $.ui.autocomplete.escapeRegex(term), "i"); return $.grep(array, function (value) { return matcher.test(value.label || value.value || value); }); }; }); });
  992. | form action="/mijnsns/secure/login.html" method="get">
  993. ===================================================================================================
  994. | WHOIS
  995. |
  996. | Error: invalid domain name
  997. |
  998. ===================================================================================================
  999. | BANNER GRABBING:
  1000. | X-XSS-Protection: 1; mode=block
  1001. ===================================================================================================
  1002. ===================================================================================================
  1003. | PING
  1004. |
  1005. | PING www.snsbank.nl (194.53.208.72) 56(84) bytes of data.
  1006. |
  1007. | --- www.snsbank.nl ping statistics ---
  1008. | 4 packets transmitted, 0 received, 100% packet loss, time 3023ms
  1009. |
  1010. ===================================================================================================
  1011. | TRACEROUTE
  1012. |
  1013. ===================================================================================================
  1014. | NSLOOKUP
  1015. |
  1016. | Server:       127.0.1.1
  1017. | Address:  127.0.1.1#53
  1018. |
  1019. | Non-authoritative answer:
  1020. | *** Can't find www.snsbank.nl: No answer
  1021. | Authoritative answers can be found from:
  1022. | Name: www.snsbank.nl
  1023. | Address: 194.53.208.72
  1024. ===================================================================================================
  1025. | NMAP
  1026. |
  1027. |
  1028. | Starting Nmap 6.46 ( http://nmap.org ) at 2015-07-09 13:44 PDT
  1029. | NSE: Loaded 120 scripts for scanning.
  1030. | NSE: Script Pre-scanning.
  1031. | Initiating Ping Scan at 13:44
  1032. | Scanning en.kremlin.ru (95.173.136.70) [4 ports]
  1033. | Completed Ping Scan at 13:44, 1.32s elapsed (1 total hosts)
  1034. | Initiating Parallel DNS resolution of 1 host. at 13:44
  1035. | Completed Parallel DNS resolution of 1 host. at 13:44, 0.71s elapsed
  1036. | Initiating SYN Stealth Scan at 13:44
  1037. | Scanning en.kremlin.ru (95.173.136.70) [1000 ports]
  1038. | Discovered open port 21/tcp on 95.173.136.70
  1039. | Discovered open port 554/tcp on 95.173.136.70
  1040. | Discovered open port 80/tcp on 95.173.136.70
  1041. | Discovered open port 7070/tcp on 95.173.136.70
  1042. | Completed SYN Stealth Scan at 13:45, 20.75s elapsed (1000 total ports)
  1043. | Initiating Service scan at 13:45
  1044. | Scanning 4 services on en.kremlin.ru (95.173.136.70)
  1045. | Service scan Timing: About 50.00% done; ETC: 13:49 (0:02:11 remaining)
  1046. | Completed Service scan at 13:47, 131.18s elapsed (4 services on 1 host)
  1047. | Initiating OS detection (try #1) against en.kremlin.ru (95.173.136.70)
  1048. | Retrying OS detection (try #2) against en.kremlin.ru (95.173.136.70)
  1049. | Initiating Traceroute at 13:47
  1050. | Completed Traceroute at 13:47, 3.06s elapsed
  1051. | Initiating Parallel DNS resolution of 13 hosts. at 13:47
  1052. | Completed Parallel DNS resolution of 13 hosts. at 13:47, 0.67s elapsed
  1053. | NSE: Script scanning 95.173.136.70.
  1054. | Initiating NSE at 13:47
  1055. | Completed NSE at 13:48, 75.10s elapsed
  1056. | Nmap scan report for en.kremlin.ru (95.173.136.70)
  1057. | Host is up (0.098s latency).
  1058. | Other addresses for en.kremlin.ru (not scanned): 95.173.136.71 95.173.136.72
  1059. | Not shown: 995 filtered ports
  1060. | PORT     STATE  SERVICE     VERSION
  1061. | 21/tcp   open   ftp?
  1062. | |_ftp-bounce: no banner
  1063. | 80/tcp   open   http        nginx
  1064. | |_http-favicon: Unknown favicon MD5: A43DD8031096B0DC66E1A876F671A81C
  1065. | |_http-methods: No Allow or Public header in OPTIONS response (status code 405)
  1066. | | http-robots.txt: 11 disallowed entries
  1067. | | /search /subscribe/sms/send /subscribe/sms/check
  1068. | | /subscribe/sms/save /subscribe/sms/unsubscribe /subscribe/daily/send
  1069. | | /subscribe/daily/subscribe /subscribe/daily/unsubscribe /subscribe/weekly/send
  1070. | |_/subscribe/weekly/unsubscribe /subscribe/weekly/save
  1071. | |_http-title: President of\xC2\xA0Russia
  1072. | 443/tcp  closed https
  1073. | 554/tcp  open   rtsp?
  1074. | 7070/tcp open   realserver?
  1075. | Device type: WAP|storage-misc|general purpose|printer|broadband router
  1076. | Running (JUST GUESSING): Apple embedded (93%), NetBSD 4.X (93%), Ricoh embedded (88%), Apple NetBSD 4.X (85%), Motorola embedded (85%)
  1077. | OS CPE: cpe:/h:apple:airport_extreme cpe:/o:netbsd:netbsd:4.0 cpe:/h:ricoh:aficio_mp_c6000 cpe:/h:ricoh:aficio_mp_gx3050n cpe:/h:apple:airport_express cpe:/o:apple:netbsd:4 cpe:/h:motorola:surfboard_sb5101
  1078. | Aggressive OS guesses: Apple AirPort Extreme WAP or Time Capsule NAS device (93%), Apple AirPort Extreme WAP (93%), NetBSD 4.0 (93%), Apple AirPort Extreme WAP or Time Capsule NAS device (NetBSD 4.99) (88%), Ricoh Aficio MP C6000 or GX3050N printer (88%), Apple AirPort Express WAP (NetBSD) (85%), Apple Time Capsule NAS device (NetBSD 4.99) (85%), Motorola SURFboard SB5101 cable modem (85%)
  1079. | No exact OS matches for host (test conditions non-ideal).
  1080. | Network Distance: 15 hops
  1081. | TCP Sequence Prediction: Difficulty=212 (Good luck!)
  1082. | IP ID Sequence Generation: Incremental
  1083. |
  1084. | TRACEROUTE (using port 443/tcp)
  1085. | HOP RTT       ADDRESS
  1086. | 1   3.53 ms   10.0.1.1
  1087. | 2   ...
  1088. | 3   25.04 ms  dtr04mtpkca-tge-0-0-0-13.mtpk.ca.charter.com (96.34.101.229)
  1089. | 4   26.05 ms  crr02mtpkca-tge-0-4-0-0.mtpk.ca.charter.com (96.34.98.96)
  1090. | 5   25.56 ms  bbr01mtpkca-bue-3.mtpk.ca.charter.com (96.34.2.26)
  1091. | 6   29.19 ms  prr01lsanca-bue-2.lsan.ca.charter.com (96.34.3.5)
  1092. | 7   29.21 ms  v104.core1.lax1.he.net (64.71.191.253)
  1093. | 8   106.83 ms 100ge11-2.core1.ash1.he.net (184.105.80.201)
  1094. | 9   189.12 ms 10ge7-11.core1.par2.he.net (184.105.213.94)
  1095. | 10  189.12 ms 100ge5-2.core1.fra1.he.net (72.52.92.14)
  1096. | 11  293.33 ms 216.66.87.134
  1097. | 12  284.95 ms 95.167.93.162
  1098. | 13  288.30 ms 188.254.31.82
  1099. | 14  ...
  1100. | 15  292.97 ms 95.173.136.70
  1101. |
  1102. | NSE: Script Post-scanning.
  1103. | Read data files from: /usr/local/bin/../share/nmap
  1104. | OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  1105. | Nmap done: 1 IP address (1 host up) scanned in 243.72 seconds
  1106. |            Raw packets sent: 2111 (97.820KB) | Rcvd: 1875 (179.566KB)
  1107. ===================================================================================================
  1108. |
  1109. | Directory check:
  1110. |
  1111. | Starting Nmap 6.46 ( http://nmap.org ) at 2015-07-09 13:48 PDT
  1112. | NSE: Loaded 120 scripts for scanning.
  1113. | NSE: Script Pre-scanning.
  1114. | Initiating Ping Scan at 13:48
  1115. | Scanning www.snsbank.nl (194.53.208.72) [4 ports]
  1116. | Completed Ping Scan at 13:48, 1.01s elapsed (1 total hosts)
  1117. | Initiating Parallel DNS resolution of 1 host. at 13:48
  1118. | Completed Parallel DNS resolution of 1 host. at 13:48, 0.76s elapsed
  1119. | Initiating SYN Stealth Scan at 13:48
  1120. | Scanning www.snsbank.nl (194.53.208.72) [1000 ports]
  1121. | Discovered open port 554/tcp on 194.53.208.72
  1122. | Discovered open port 80/tcp on 194.53.208.72
  1123. | Discovered open port 21/tcp on 194.53.208.72
  1124. | Discovered open port 7070/tcp on 194.53.208.72
  1125. | Discovered open port 443/tcp on 194.53.208.72
  1126. | Completed SYN Stealth Scan at 13:49, 32.99s elapsed (1000 total ports)
  1127. | Initiating Service scan at 13:49
  1128. | Scanning 5 services on www.snsbank.nl (194.53.208.72)
  1129. | Service scan Timing: About 60.00% done; ETC: 13:53 (0:01:27 remaining)
  1130. | Completed Service scan at 13:51, 131.28s elapsed (5 services on 1 host)
  1131. | Initiating OS detection (try #1) against www.snsbank.nl (194.53.208.72)
  1132. | Initiating Traceroute at 13:51
  1133. | Completed Traceroute at 13:51, 6.18s elapsed
  1134. | Initiating Parallel DNS resolution of 15 hosts. at 13:51
  1135. | Completed Parallel DNS resolution of 15 hosts. at 13:51, 0.77s elapsed
  1136. | NSE: Script scanning 194.53.208.72.
  1137. | Initiating NSE at 13:51
  1138. | Completed NSE at 13:53, 76.27s elapsed
  1139. | Nmap scan report for www.snsbank.nl (194.53.208.72)
  1140. | Host is up (0.067s latency).
  1141. | Not shown: 995 filtered ports
  1142. | PORT     STATE SERVICE     VERSION
  1143. | 21/tcp   open  ftp?
  1144. | |_ftp-bounce: no banner
  1145. | 80/tcp   open  http        Apache httpd
  1146. | |_http-favicon: Unknown favicon MD5: B66B97AE26AFA00F4E48CF8060CEA764
  1147. | |_http-methods: No Allow or Public header in OPTIONS response (status code 403)
  1148. | | http-robots.txt: 1 disallowed entry
  1149. | |_/mijnsns/
  1150. | | http-title: Voor sparen, een betaalrekening, verzekeringen of een hypothee...
  1151. | |_Requested resource was http://www.snsbank.nl/particulier/home.html
  1152. | 443/tcp  open  ssl/http    Apache httpd
  1153. | |_http-favicon: Unknown favicon MD5: B66B97AE26AFA00F4E48CF8060CEA764
  1154. | |_http-methods: No Allow or Public header in OPTIONS response (status code 403)
  1155. | | http-robots.txt: 1 disallowed entry
  1156. | |_/mijnsns/
  1157. | | http-title: Voor sparen, een betaalrekening, verzekeringen of een hypothee...
  1158. | |_Requested resource was https://www.snsbank.nl/particulier/home.html
  1159. | | ssl-cert: Subject: commonName=www.snsbank.nl/organizationName=SNS Bank N.V./stateOrProvinceName=Utrecht/countryName=NL
  1160. | | Issuer: commonName=Symantec Class 3 EV SSL CA - G3/organizationName=Symantec Corporation/countryName=US
  1161. | | Public Key type: rsa
  1162. | | Public Key bits: 2048
  1163. | | Not valid before: 2014-09-17T00:00:00
  1164. | | Not valid after:  2015-09-18T23:59:59
  1165. | | MD5:   baf0 c673 1ab7 1f70 089c 1ac7 0f7d 6cab
  1166. | |_SHA-1: 1721 68d1 44e1 fa7b 813d 72dc 6194 e29c faab 3a28
  1167. | |_ssl-date: 2015-07-09T20:51:44+00:00; -1s from local time.
  1168. | 554/tcp  open  rtsp?
  1169. | 7070/tcp open  realserver?
  1170. | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1171. | Device type: WAP|storage-misc
  1172. | Running: Apple embedded
  1173. | OS CPE: cpe:/h:apple:airport_extreme
  1174. | OS details: Apple AirPort Extreme WAP or Time Capsule NAS device
  1175. | TCP Sequence Prediction: Difficulty=217 (Good luck!)
  1176. | IP ID Sequence Generation: Incremental
  1177. |
  1178. | TRACEROUTE (using port 443/tcp)
  1179. | HOP RTT       ADDRESS
  1180. | 1   7.87 ms   10.0.1.1
  1181. | 2   ...
  1182. | 3   26.76 ms  dtr04mtpkca-tge-0-0-0-13.mtpk.ca.charter.com (96.34.101.229)
  1183. | 4   30.89 ms  crr02mtpkca-tge-0-3-0-4.mtpk.ca.charter.com (96.34.97.228)
  1184. | 5   34.52 ms  bbr01mtpkca-bue-3.mtpk.ca.charter.com (96.34.2.26)
  1185. | 6   40.28 ms  bbr01rvsdca-bue-1.rvsd.ca.charter.com (96.34.0.22)
  1186. | 7   89.57 ms  bbr01dllstx-bue-6.dlls.tx.charter.com (96.34.0.20)
  1187. | 8   120.81 ms bbr01blvlil-bue-4.blvl.il.charter.com (96.34.0.16)
  1188. | 9   76.18 ms  bbr01olvemo-bue-3.olve.mo.charter.com (96.34.0.14)
  1189. | 10  89.62 ms  bbr02chcgil-bue-2.chcg.il.charter.com (96.34.0.12)
  1190. | 11  111.33 ms prr01chcgil-bue-4.chcg.il.charter.com (96.34.3.11)
  1191. | 12  88.27 ms  96-34-152-58.static.unas.mo.charter.com (96.34.152.58)
  1192. | 13  207.24 ms 84.116.137.50
  1193. | 14  205.60 ms nl-ams05a-rd2-xe-2-0-2.aorta.net (84.116.130.121)
  1194. | 15  212.47 ms 84-116-130-126.aorta.net (84.116.130.126)
  1195. | 16  208.50 ms 84.116.244.22
  1196. | 17  ... 30
  1197. |
  1198. | NSE: Script Post-scanning.
  1199. | Read data files from: /usr/local/bin/../share/nmap
  1200. | OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  1201. | Nmap done: 1 IP address (1 host up) scanned in 254.62 seconds
  1202. |            Raw packets sent: 3113 (139.468KB) | Rcvd: 3932 (373.993KB)
  1203. ===================================================================================================
  1204. |
  1205. | Directory check:
  1206. ===================================================================================================
  1207. |                                                                                                  
  1208. | File check:
  1209. | Skipped because http://en.kremlin.ru/uniscan617/ did not return the code 404
  1210. ===================================================================================================
  1211. |
  1212. | Check robots.txt:
  1213. | [+] User-agent: *
  1214. | [+] # news
  1215. | [+] Disallow: /search
  1216. | [+] # subscription
  1217. | [+] Disallow: /subscribe/sms/send
  1218. | [+] Disallow: /subscribe/sms/check
  1219. | [+] Disallow: /subscribe/sms/save
  1220. | [+] Disallow: /subscribe/sms/unsubscribe
  1221. | [+] Disallow: /subscribe/daily/send
  1222. | [+] Disallow: /subscribe/daily/subscribe
  1223. | [+] Disallow: /subscribe/daily/unsubscribe
  1224. | [+] Disallow: /subscribe/weekly/send
  1225. | [+] Disallow: /subscribe/weekly/unsubscribe
  1226. | [+] Disallow: /subscribe/weekly/save
  1227. |
  1228. | Check sitemap.xml:
  1229. ===================================================================================================
  1230. |
  1231. | Crawler Started:
  1232. | Plugin name: FCKeditor upload test v.1 Loaded.
  1233. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  1234. | Plugin name: Code Disclosure v.1.1 Loaded.
  1235. | Plugin name: E-mail Detection v.1.1 Loaded.
  1236. | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
  1237. | Plugin name: External Host Detect v.1.2 Loaded.
  1238. | Plugin name: phpinfo() Disclosure v.1 Loaded.
  1239. | Plugin name: Upload Form Detect v.1.1 Loaded.
  1240. ####################################
  1241. # Uniscan project                  #
  1242. # http://uniscan.sourceforge.net/  #
  1243. ####################################
  1244. V. 6.2
  1245.  
  1246.  
  1247. Scan date: 9-7-2015 13:53:54
  1248. | [+] Crawling finished, 1 URL's found!
  1249. |
  1250. | FCKeditor File Upload:
  1251. |
  1252. | Timthumb:
  1253. |
  1254. | Source Code Disclosure:
  1255. |
  1256. | E-mails:
  1257. |
  1258. | Web Backdoors:
  1259. |
  1260. | External hosts:
  1261. |
  1262. | PHPinfo() Disclosure:
  1263. |
  1264. | File Upload Forms:
  1265. |
  1266. | Ignored Files:
  1267. ===================================================================================================
  1268. | Dynamic tests:
  1269. | Plugin name: Learning New Directories v.1.2 Loaded.
  1270. | Plugin name: FCKedior tests v.1.1 Loaded.
  1271. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  1272. | Plugin name: Find Backup Files v.1.2 Loaded.
  1273. | Plugin name: Blind SQL-injection tests v.1.3 Loaded.
  1274. | Plugin name: Local File Include tests v.1.1 Loaded.
  1275. | Plugin name: PHP CGI Argument Injection v.1.1 Loaded.
  1276. | Plugin name: Remote Command Execution tests v.1.1 Loaded.
  1277. | Plugin name: Remote File Include tests v.1.2 Loaded.
  1278. | Plugin name: SQL-injection tests v.1.2 Loaded.
  1279. | Plugin name: Cross-Site Scripting tests v.1.2 Loaded.
  1280. | Plugin name: Web Shell Finder v.1.3 Loaded.
  1281. | [+] 0 New directories added
  1282. |                                                                                                  
  1283. |                                                                                                  
  1284. | FCKeditor tests:
  1285. ===================================================================================================
  1286. | [*] http://ovh.com/ redirected to http://www.ovh.com/us/
  1287. | [*] New target is: http://www.ovh.com/us/
  1288. ===================================================================================================
  1289. | Domain: http://www.ovh.com/us/
  1290. | Skipped because http://en.kremlin.ru/testing123 did not return the code 404
  1291. |                                                                                                  
  1292. |                                                                                                  
  1293. | Timthumb < 1.33 vulnerability:
  1294. | IP: 198.27.92.1
  1295. ===================================================================================================
  1296. ===================================================================================================
  1297. | Looking for Drupal plugins/modules
  1298. |
  1299. ===================================================================================================
  1300. | WEB SERVICES
  1301. |
  1302. ===================================================================================================
  1303. | FAVICON.ICO
  1304. |
  1305. |                                                                                                  
  1306. |                                                                                                  
  1307. | Backup Files:
  1308. ===================================================================================================
  1309. | ERROR INFORMATION
  1310. |
  1311. | Skipped because http://en.kremlin.ru/testing123 did not return the code 404
  1312. |                                                                                                  
  1313. |                                                                                                  
  1314. | Blind SQL Injection:
  1315. ===================================================================================================
  1316. | TYPE ERROR
  1317. |
  1318. |                                                                                                  
  1319. |                                                                                                  
  1320. | Local File Include:
  1321. |                                                                                                  
  1322. |                                                                                                  
  1323. | PHP CGI Argument Injection:
  1324. |                                                                                                  
  1325. |                                                                                                  
  1326. | Remote Command Execution:
  1327. |                                                                                                  
  1328. |                                                                                                  
  1329. | Remote File Include:
  1330. |                                                                                                  
  1331. |                                                                                                  
  1332. | SQL Injection:
  1333. |                                                                                                  
  1334. |                                                                                                  
  1335. | Cross-Site Scripting (XSS):
  1336. |                                                                                                  
  1337. |                                                                                                  
  1338. | Web Shell Finder:
  1339. ===================================================================================================
  1340. | SERVER MOBILE
  1341. |
  1342. ===================================================================================================
  1343. | LANGUAGE
  1344. |
  1345. | lang="en"
  1346. ===================================================================================================
  1347. | INTERESTING STRINGS IN HTML
  1348. |
  1349. | a href="https://us.ovh.com/us/cgi-bin/order/renew.cgi" qtlid="667797">Renew
  1350. | a href="/us/dedicated-servers/sql_server_2012.xml" class="" style="" name="Menu/distrib-More/sql" onclick="trackMenu(this);">Databases
  1351. | a href="https://twitter.com/OVH" class="shareThis shareTT" name="HomePage/Social-Twitter" onclick="trackHome(this);" target="_blank">
  1352. | a class="twitter-timeline" href="https://twitter.com/OVH" data-widget-id="474484984405688320" qtlid="920243" lang="en">@OVH tweets
  1353. | script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");
  1354. | script language="javascript" type="text/javascript"> function sendCodes(){ var nic = document.login_form.reloging_nic.value; document.location = '/fr/support/send_codes.pl?reloging_nic='+nic; } function trackHome(elem){ function SendPk(elem){ var ValueOfTrack = $(elem).name; _paq.push(['trackPageView', ValueOfTrack]); } if(!!Browser.firefox || !!Browser.safari){ setTimeout(SendPk, 50, elem); } else { SendPk(elem); } }
  1355. | a href="https://ca.ovh.com/manager/login.html" class="manager">
  1356. ===================================================================================================
  1357. | WHOIS
  1358. |
  1359. |
  1360. |
  1361. | Whois Server Version 2.0
  1362. |
  1363. |
  1364. |
  1365. |
  1366. |
  1367. |
  1368. |
  1369. |
  1370. |
  1371. |
  1372. |
  1373. | No match for "WWW.OVH.COM".
  1374. |
  1375. | >>> Last update of whois database: Thu, 09 Jul 2015 20:53:43 GMT <<<
  1376. |
  1377. |
  1378. |
  1379. |
  1380. |
  1381. |
  1382. |
  1383. |
  1384. |
  1385. |
  1386. |
  1387. |
  1388. |
  1389. |
  1390. |
  1391. |
  1392. |
  1393. |
  1394. |
  1395. |
  1396. |
  1397. | Registrars.
  1398. |
  1399. |
  1400. |
  1401. | For more information on Whois status codes, please visit
  1402. |
  1403. | https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en.
  1404. |
  1405. ===================================================================================================
  1406. | BANNER GRABBING:
  1407. ===================================================================================================
  1408. ===================================================================================================
  1409. | PING
  1410. |
  1411. ===================================================================================================
  1412. | Static tests:
  1413. | Plugin name: Local File Include tests v.1.1 Loaded.
  1414. | Plugin name: Remote Command Execution tests v.1.1 Loaded.
  1415. | PING www.ovh.com (198.27.92.1) 56(84) bytes of data.
  1416. | 64 bytes from www.ovh.com (198.27.92.1): icmp_seq=1 ttl=244 time=30.3 ms
  1417. | 64 bytes from www.ovh.com (198.27.92.1): icmp_seq=2 ttl=244 time=29.2 ms
  1418. | 64 bytes from www.ovh.com (198.27.92.1): icmp_seq=3 ttl=244 time=30.6 ms
  1419. | 64 bytes from www.ovh.com (198.27.92.1): icmp_seq=4 ttl=244 time=29.4 ms
  1420. |
  1421. | --- www.ovh.com ping statistics ---
  1422. | 4 packets transmitted, 4 received, 0% packet loss, time 3002ms
  1423. | rtt min/avg/max/mdev = 29.297/29.935/30.620/0.589 ms
  1424. ===================================================================================================
  1425. | TRACEROUTE
  1426. |
  1427. | Plugin name: Remote File Include tests v.1.1 Loaded.
  1428. ===================================================================================================
  1429. | NSLOOKUP
  1430. |
  1431. |                                                                                                  
  1432. |                                                                                                  
  1433. | Local File Include:
  1434. | Server:       127.0.1.1
  1435. | Address:  127.0.1.1#53
  1436. |
  1437. | Non-authoritative answer:
  1438. | *** Can't find www.ovh.com: No answer
  1439. | Authoritative answers can be found from:
  1440. | Name: www.ovh.com
  1441. | Address: 198.27.92.1
  1442. ===================================================================================================
  1443. | NMAP
  1444. |
  1445. |                                                                                                  
  1446. |                                                                                                  
  1447. | Remote Command Execution:
  1448. |                                                                                                  
  1449. |                                                                                                  
  1450. | Remote File Include:
  1451. ===================================================================================================
  1452. | Stress tests:
  1453. | Plugin name: Mini Stress Test v.1.1 Loaded.
  1454. |                                                                                                  
  1455. |                                                                                                  
  1456. | Mini Stress Test:
  1457. | Looking for best cost:
  1458. | Cost: [1] http://en.kremlin.ru/a
  1459. | Using http://en.kremlin.ru/a as target
  1460. | Mini Stress Test End.                              
  1461. ===================================================================================================
  1462. Scan end date: 9-7-2015 13:59:12
  1463.  
  1464.  
  1465.  
  1466. HTML report saved in: report/en.kremlin.ru.html
  1467. |
  1468. | Starting Nmap 6.46 ( http://nmap.org ) at 2015-07-09 13:54 PDT
  1469. | NSE: Loaded 120 scripts for scanning.
  1470. | NSE: Script Pre-scanning.
  1471. | Initiating Ping Scan at 13:54
  1472. | Scanning www.ovh.com (198.27.92.1) [4 ports]
  1473. | Completed Ping Scan at 13:54, 1.03s elapsed (1 total hosts)
  1474. | Initiating Parallel DNS resolution of 1 host. at 13:54
  1475. | Completed Parallel DNS resolution of 1 host. at 13:54, 0.01s elapsed
  1476. | Initiating SYN Stealth Scan at 13:54
  1477. | Scanning www.ovh.com (198.27.92.1) [1000 ports]
  1478. | Discovered open port 21/tcp on 198.27.92.1
  1479. | Discovered open port 554/tcp on 198.27.92.1
  1480. | Discovered open port 443/tcp on 198.27.92.1
  1481. | Discovered open port 80/tcp on 198.27.92.1
  1482. | Increasing send delay for 198.27.92.1 from 0 to 5 due to 25 out of 82 dropped probes since last increase.
  1483. | Increasing send delay for 198.27.92.1 from 5 to 10 due to 146 out of 486 dropped probes since last increase.
  1484. | Increasing send delay for 198.27.92.1 from 10 to 20 due to 11 out of 25 dropped probes since last increase.
  1485. | Increasing send delay for 198.27.92.1 from 20 to 40 due to 11 out of 22 dropped probes since last increase.
  1486. | Increasing send delay for 198.27.92.1 from 40 to 80 due to max_successful_tryno increase to 4
  1487. | Increasing send delay for 198.27.92.1 from 80 to 160 due to 30 out of 99 dropped probes since last increase.
  1488. | Discovered open port 7070/tcp on 198.27.92.1
  1489. | Increasing send delay for 198.27.92.1 from 160 to 320 due to 46 out of 153 dropped probes since last increase.
  1490. | Completed SYN Stealth Scan at 13:56, 148.94s elapsed (1000 total ports)
  1491. | Initiating Service scan at 13:56
  1492. | Scanning 5 services on www.ovh.com (198.27.92.1)
  1493. | Completed Service scan at 13:58, 110.03s elapsed (5 services on 1 host)
  1494. | Initiating OS detection (try #1) against www.ovh.com (198.27.92.1)
  1495. | Retrying OS detection (try #2) against www.ovh.com (198.27.92.1)
  1496. | Initiating Traceroute at 13:58
  1497. | Completed Traceroute at 13:58, 3.02s elapsed
  1498. | Initiating Parallel DNS resolution of 10 hosts. at 13:58
  1499. | Completed Parallel DNS resolution of 10 hosts. at 13:58, 0.64s elapsed
  1500. | NSE: Script scanning 198.27.92.1.
  1501. | Initiating NSE at 13:58
  1502. | Completed NSE at 13:59, 30.62s elapsed
  1503. | Nmap scan report for www.ovh.com (198.27.92.1)
  1504. | Host is up (0.033s latency).
  1505. | Not shown: 991 closed ports
  1506. | PORT     STATE    SERVICE        VERSION
  1507. | 21/tcp   open     tcpwrapped
  1508. | 80/tcp   open     tcpwrapped
  1509. | |_http-favicon: Unknown favicon MD5: E5A2FDFC2A827E425F15662C07F2276F
  1510. | |_http-methods: No Allow or Public header in OPTIONS response (status code 302)
  1511. | | http-robots.txt: 43 disallowed entries (15 shown)
  1512. | | /cgi-bin/ /images/ /fr/images/ /javascripts/ /js/
  1513. | | /fr/images.xml /themes/ /fr/themes/ /autoedit/ /banners/
  1514. | |_/flashbanners/ /flashBanners/ /errors/ /templates/ /tmp/
  1515. | | http-title: Web Hosting, Cloud and Dedicated Servers - OVH
  1516. | |_Requested resource was http://www.ovh.com/us/index.xml
  1517. | 135/tcp  filtered msrpc
  1518. | 139/tcp  filtered netbios-ssn
  1519. | 443/tcp  open     ssl/https
  1520. | |_http-favicon: Unknown favicon MD5: E5A2FDFC2A827E425F15662C07F2276F
  1521. | |_http-methods: No Allow or Public header in OPTIONS response (status code 302)
  1522. | | http-robots.txt: 43 disallowed entries (15 shown)
  1523. | | /cgi-bin/ /images/ /fr/images/ /javascripts/ /js/
  1524. | | /fr/images.xml /themes/ /fr/themes/ /autoedit/ /banners/
  1525. | |_/flashbanners/ /flashBanners/ /errors/ /templates/ /tmp/
  1526. | | http-server-header: Software version grabbed from Server header.
  1527. | | Consider submitting a service fingerprint.
  1528. | |_Run with --script-args http-server-header.skip
  1529. | | http-title: Web Hosting, Cloud and Dedicated Servers - OVH
  1530. | |_Requested resource was https://www.ovh.com/us/index.xml
  1531. | | ssl-cert: Subject: commonName=www.ovh.com/organizationName=OVH SAS/stateOrProvinceName=Nord/countryName=FR
  1532. | | Issuer: commonName=Symantec Class 3 EV SSL CA - G3/organizationName=Symantec Corporation/countryName=US
  1533. | | Public Key type: rsa
  1534. | | Public Key bits: 2048
  1535. | | Not valid before: 2015-04-20T00:00:00
  1536. | | Not valid after:  2017-05-05T23:59:59
  1537. | | MD5:   8de3 7b3d 927a 32ba 0db6 7297 210a 6f2a
  1538. | |_SHA-1: 795c 78ac c491 135a 01ff f517 4038 c914 ea5d 5ab3
  1539. | 445/tcp  filtered microsoft-ds
  1540. | 554/tcp  open     tcpwrapped
  1541. | 593/tcp  filtered http-rpc-epmap
  1542. | 7070/tcp open     tcpwrapped
  1543. | Device type: WAP|storage-misc|general purpose|printer
  1544. | Running (JUST GUESSING): Apple embedded (92%), NetBSD 4.X (92%), Ricoh embedded (87%)
  1545. | OS CPE: cpe:/h:apple:airport_extreme cpe:/o:netbsd:netbsd:4.0 cpe:/h:ricoh:aficio_mp_c6000 cpe:/h:ricoh:aficio_mp_gx3050n
  1546. | Aggressive OS guesses: Apple AirPort Extreme WAP or Time Capsule NAS device (92%), Apple AirPort Extreme WAP (92%), NetBSD 4.0 (92%), Apple AirPort Extreme WAP or Time Capsule NAS device (NetBSD 4.99) (87%), Ricoh Aficio MP C6000 or GX3050N printer (87%)
  1547. | No exact OS matches for host (test conditions non-ideal).
  1548. | Network Distance: 11 hops
  1549. | TCP Sequence Prediction: Difficulty=205 (Good luck!)
  1550. | IP ID Sequence Generation: Busy server or unknown class
  1551. |
  1552. | TRACEROUTE (using port 111/tcp)
  1553. | HOP RTT      ADDRESS
  1554. | 1   16.48 ms 10.0.1.1
  1555. | 2   ...
  1556. | 3   36.63 ms dtr04mtpkca-tge-0-0-0-13.mtpk.ca.charter.com (96.34.101.229)
  1557. | 4   44.24 ms crr02mtpkca-tge-0-4-0-1.mtpk.ca.charter.com (96.34.98.98)
  1558. | 5   68.89 ms bbr01mtpkca-bue-3.mtpk.ca.charter.com (96.34.2.26)
  1559. | 6   71.52 ms bbr01snloca-bue-1.snlo.ca.charter.com (96.34.0.27)
  1560. | 7   50.51 ms bbr02snloca-bue-4.snlo.ca.charter.com (96.34.0.29)
  1561. | 8   40.15 ms bbr01snjsca-bue-6.snjs.ca.charter.com (96.34.0.0)
  1562. | 9   69.03 ms prr02snjsca-bue-2.snjs.ca.charter.com (96.34.3.93)
  1563. | 10  36.83 ms snj-1-6k.ca.us (178.32.135.92)
  1564. | 11  41.40 ms www.ovh.com (198.27.92.1)
  1565. |
  1566. | NSE: Script Post-scanning.
  1567. | Read data files from: /usr/local/bin/../share/nmap
  1568. | OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  1569. | Nmap done: 1 IP address (1 host up) scanned in 303.13 seconds
  1570. |            Raw packets sent: 1981 (91.994KB) | Rcvd: 3941 (310.381KB)
  1571. ===================================================================================================
  1572. |
  1573. | Directory check:
  1574. | [+] CODE: 200 URL: http://www.ovh.com/us/about/
  1575. | [+] CODE: 200 URL: http://www.ovh.com/us/aboutus/
  1576. | [+] CODE: 200 URL: http://www.ovh.com/us/blog/
  1577. | [+] CODE: 200 URL: http://www.ovh.com/us/community/
  1578. | [+] CODE: 200 URL: http://www.ovh.com/us/conseils/
  1579. | [+] CODE: 200 URL: http://www.ovh.com/us/email/
  1580. | [+] CODE: 200 URL: http://www.ovh.com/us/emails/
  1581. | [+] CODE: 200 URL: http://www.ovh.com/us/es/
  1582. | [+] CODE: 200 URL: http://www.ovh.com/us/images/
  1583. | [+] CODE: 200 URL: http://www.ovh.com/us/javascripts/
  1584. | [+] CODE: 200 URL: http://www.ovh.com/us/news/
  1585. | [+] CODE: 200 URL: http://www.ovh.com/us/solutions/
  1586. | [+] CODE: 200 URL: http://www.ovh.com/us/support/
  1587. | [+] CODE: 200 URL: http://www.ovh.com/us/themes/
  1588. | [+] CODE: 200 URL: http://www.ovh.com/us/us/
  1589. | [+] CODE: 200 URL: http://www.ovh.com/us/web/
  1590. ===================================================================================================
  1591. |                                                                                                  
  1592. | File check:
  1593. | [+] CODE: 200 URL: http://www.ovh.com/us/favicon.ico
  1594. | [+] CODE: 200 URL: http://www.ovh.com/us/robots.txt
  1595. | [+] CODE: 200 URL: http://www.ovh.com/us/sitemap.xml
  1596. ===================================================================================================
  1597. |
  1598. | Check robots.txt:
  1599. | [+] User-agent: *
  1600. | [+]
  1601. | [+] Disallow: /*?
  1602. | [+] Disallow: /cgi-bin/
  1603. | [+] Disallow: /us/cgi-bin/
  1604. |
  1605. | Check sitemap.xml:
  1606. ===================================================================================================
  1607. |
  1608. | Crawler Started:
  1609. | Plugin name: FCKeditor upload test v.1 Loaded.
  1610. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  1611. | Plugin name: Code Disclosure v.1.1 Loaded.
  1612. | Plugin name: E-mail Detection v.1.1 Loaded.
  1613. | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
  1614. | Plugin name: External Host Detect v.1.2 Loaded.
  1615. | Plugin name: phpinfo() Disclosure v.1 Loaded.
  1616. | Plugin name: Upload Form Detect v.1.1 Loaded.
  1617. ####################################
  1618. # Uniscan project                  #
  1619. # http://uniscan.sourceforge.net/  #
  1620. ####################################
  1621. V. 6.2
  1622.  
  1623.  
  1624. Scan date: 9-7-2015 14:12:15
  1625. ===================================================================================================
  1626. | Domain: http://nsa.gov/
  1627. | IP:
  1628. ===================================================================================================
  1629. ===================================================================================================
  1630. | Looking for Drupal plugins/modules
  1631. |
  1632. | BANNER GRABBING:
  1633. ===================================================================================================
  1634. ===================================================================================================
  1635. | PING
  1636. |
  1637. ===================================================================================================
  1638. | TRACEROUTE
  1639. |
  1640. ===================================================================================================
  1641. | NSLOOKUP
  1642. |
  1643. | Server:       127.0.1.1
  1644. | Address:  127.0.1.1#53
  1645. |
  1646. | Non-authoritative answer:
  1647. | nsa.gov   mail exchanger = 20 emvm-gh1-uea09.nsa.gov.
  1648. | nsa.gov   mail exchanger = 20 emvm-gh1-uea08.nsa.gov.
  1649. | Authoritative answers can be found from:
  1650. | *** Can't find nsa.gov: No answer
  1651. | nsa.gov   nameserver = dsdn-gh1-uea06.nsa.gov.
  1652. | nsa.gov   nameserver = dsdn-gh1-uea05.nsa.gov.
  1653. | nsa.gov
  1654. |   origin = dsdn-gh1-uea05.nsa.gov
  1655. |   mail addr = please_set_email.absolutely.nowhere
  1656. |   serial = 2011061518
  1657. |   refresh = 10800
  1658. |   retry = 3600
  1659. |   expire = 2419200
  1660. |   minimum = 900
  1661. | nsa.gov   text = "MS=ms94088313"
  1662. ===================================================================================================
  1663. | NMAP
  1664. |
  1665. |
  1666. | Starting Nmap 6.46 ( http://nmap.org ) at 2015-07-09 14:12 PDT
  1667. | NSE: Loaded 120 scripts for scanning.
  1668. | NSE: Script Pre-scanning.
  1669. | NSE: Script Post-scanning.
  1670. | Read data files from: /usr/local/bin/../share/nmap
  1671. | Nmap done: 0 IP addresses (0 hosts up) scanned in 2.20 seconds
  1672. |            Raw packets sent: 0 (0B) | Rcvd: 0 (0B)
  1673. ===================================================================================================
  1674. |
  1675. | Directory check:
  1676. | Skipped because http://nsa.gov/uniscan653/ did not return the code 404
  1677. ===================================================================================================
  1678. |                                                                                                  
  1679. | File check:
  1680. | Skipped because http://nsa.gov/uniscan975/ did not return the code 404
  1681. ===================================================================================================
  1682. |
  1683. | Check robots.txt:
  1684. |
  1685. | Check sitemap.xml:
  1686. ===================================================================================================
  1687. |
  1688. | Crawler Started:
  1689. | Plugin name: FCKeditor upload test v.1 Loaded.
  1690. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  1691. | Plugin name: Code Disclosure v.1.1 Loaded.
  1692. | Plugin name: E-mail Detection v.1.1 Loaded.
  1693. | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
  1694. | Plugin name: External Host Detect v.1.2 Loaded.
  1695. | Plugin name: phpinfo() Disclosure v.1 Loaded.
  1696. | Plugin name: Upload Form Detect v.1.1 Loaded.
  1697. | [+] Crawling finished, 1 URL's found!
  1698. |
  1699. | FCKeditor File Upload:
  1700. |
  1701. | Timthumb:
  1702. |
  1703. | Source Code Disclosure:
  1704. |
  1705. | E-mails:
  1706. |
  1707. | Web Backdoors:
  1708. |
  1709. | External hosts:
  1710. |
  1711. | PHPinfo() Disclosure:
  1712. |
  1713. | File Upload Forms:
  1714. |
  1715. | Ignored Files:
  1716. ===================================================================================================
  1717. | Dynamic tests:
  1718. | Plugin name: Learning New Directories v.1.2 Loaded.
  1719. | Plugin name: FCKedior tests v.1.1 Loaded.
  1720. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  1721. | Plugin name: Find Backup Files v.1.2 Loaded.
  1722. | Plugin name: Blind SQL-injection tests v.1.3 Loaded.
  1723. | Plugin name: Local File Include tests v.1.1 Loaded.
  1724. | Plugin name: PHP CGI Argument Injection v.1.1 Loaded.
  1725. | Plugin name: Remote Command Execution tests v.1.1 Loaded.
  1726. | Plugin name: Remote File Include tests v.1.2 Loaded.
  1727. | Plugin name: SQL-injection tests v.1.2 Loaded.
  1728. | Plugin name: Cross-Site Scripting tests v.1.2 Loaded.
  1729. | Plugin name: Web Shell Finder v.1.3 Loaded.
  1730. | [+] 0 New directories added
  1731. |                                                                                                  
  1732. |                                                                                                  
  1733. | FCKeditor tests:
  1734. | Skipped because http://nsa.gov/testing123 did not return the code 404
  1735. |                                                                                                  
  1736. |                                                                                                  
  1737. | Timthumb < 1.33 vulnerability:
  1738. |                                                                                                  
  1739. |                                                                                                  
  1740. | Backup Files:
  1741. | Skipped because http://nsa.gov/testing123 did not return the code 404
  1742. |                                                                                                  
  1743. |                                                                                                  
  1744. | Blind SQL Injection:
  1745. |                                                                                                  
  1746. |                                                                                                  
  1747. | Local File Include:
  1748. |                                                                                                  
  1749. |                                                                                                  
  1750. | PHP CGI Argument Injection:
  1751. |                                                                                                  
  1752. |                                                                                                  
  1753. | Remote Command Execution:
  1754. |                                                                                                  
  1755. |                                                                                                  
  1756. | Remote File Include:
  1757. |                                                                                                  
  1758. |                                                                                                  
  1759. | SQL Injection:
  1760. |                                                                                                  
  1761. |                                                                                                  
  1762. | Cross-Site Scripting (XSS):
  1763. |                                                                                                  
  1764. |                                                                                                  
  1765. | Web Shell Finder:
  1766. ===================================================================================================
  1767. | Stress tests:
  1768. | Plugin name: Mini Stress Test v.1.1 Loaded.
  1769. |                                                                                                  
  1770. |                                                                                                  
  1771. | Mini Stress Test:
  1772. | Looking for best cost:
  1773. | Using a as target
  1774. ####################################
  1775. # Uniscan project                  #
  1776. # http://uniscan.sourceforge.net/  #
  1777. ####################################
  1778. V. 6.2
  1779.  
  1780.  
  1781. Scan date: 9-7-2015 14:13:48
  1782. ===================================================================================================
  1783. | [*] http://cloudflare.com/ redirected to http://www.cloudflare.com/
  1784. | [*] New target is: http://www.cloudflare.com/
  1785. ===================================================================================================
  1786. | Domain: http://www.cloudflare.com/
  1787. | Server: cloudflare-nginx
  1788. | IP: 198.41.215.163
  1789. ===================================================================================================
  1790. ===================================================================================================
  1791. | Looking for Drupal plugins/modules
  1792. |
  1793. ===================================================================================================
  1794. | WEB SERVICES
  1795. |
  1796. | Web service Found: site uses google analytics
  1797. ===================================================================================================
  1798. | FAVICON.ICO
  1799. |
  1800. ===================================================================================================
  1801. | ERROR INFORMATION
  1802. |
  1803. |  www.cloudflare.com | 404 - Page Cannot Be Found The page you are looking for cannot be found. Similar results are provided below, or you can try another search Search site To find the missing content, try these steps: Visit the domain home page Reload this page Search for the missing content with the search box above Loading... SmartErrors powered by CloudFlarePrivacy policy
  1804. ===================================================================================================
  1805. | TYPE ERROR
  1806. |
  1807. ===================================================================================================
  1808. | SERVER MOBILE
  1809. |
  1810. | index page reqested with an Iphone UserAgent is diferent then with a regular UserAgent. This Host may have a mobile site
  1811. ===================================================================================================
  1812. | LANGUAGE
  1813. |
  1814. | lang="en-US"
  1815. ===================================================================================================
  1816. | INTERESTING STRINGS IN HTML
  1817. |
  1818. | script data-cfasync="true" type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-10218544-2']); _gaq.push(['_setDomainName', 'none']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })();
  1819. | a id="footer-twitter" href="https://twitter.com/cloudflare" target="_blank" rel="noreferrer">
  1820. | a id="footer-facebook" href="https://www.facebook.com/CloudFlare?ref=ts" target="_blank" rel="noreferrer">
  1821. | li class="login">
  1822. | a href="https://www.cloudflare.com/a/login" target="_self">Login
  1823. | script>$.cf.data = {"login":false};
  1824. ===================================================================================================
  1825. | WHOIS
  1826. |
  1827. |
  1828. |
  1829. | Whois Server Version 2.0
  1830. |
  1831. |
  1832. |
  1833. |
  1834. |
  1835. |
  1836. |
  1837. |
  1838. |
  1839. |
  1840. |
  1841. |    Server Name: WWW.CLOUDFLARE.COM.CASHNMONEY.COM
  1842. |
  1843. |    IP Address: 107.170.23.95
  1844. |
  1845. |    Registrar: GODADDY.COM, LLC
  1846. |
  1847. |    Whois Server: whois.godaddy.com
  1848. |
  1849. |    Referral URL: http://registrar.godaddy.com
  1850. |
  1851. |
  1852. |
  1853. | >>> Last update of whois database: Thu, 09 Jul 2015 21:13:37 GMT <<<
  1854. |
  1855. |
  1856. |
  1857. |
  1858. |
  1859. |
  1860. |
  1861. |
  1862. |
  1863. |
  1864. |
  1865. |
  1866. |
  1867. |
  1868. |
  1869. |
  1870. |
  1871. |
  1872. |
  1873. |
  1874. |
  1875. | Registrars.
  1876. |
  1877. |
  1878. |
  1879. | For more information on Whois status codes, please visit
  1880. |
  1881. | https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en.
  1882. |
  1883. ===================================================================================================
  1884. | BANNER GRABBING:
  1885. ===================================================================================================
  1886. ===================================================================================================
  1887. | PING
  1888. |
  1889. | PING www.cloudflare.com.cdn.cloudflare.net (198.41.215.163) 56(84) bytes of data.
  1890. | 64 bytes from 198.41.215.163: icmp_seq=1 ttl=53 time=16.5 ms
  1891. | 64 bytes from 198.41.215.163: icmp_seq=2 ttl=53 time=19.2 ms
  1892. | 64 bytes from 198.41.215.163: icmp_seq=3 ttl=57 time=17.5 ms
  1893. | 64 bytes from 198.41.215.163: icmp_seq=4 ttl=53 time=18.4 ms
  1894. |
  1895. | --- www.cloudflare.com.cdn.cloudflare.net ping statistics ---
  1896. | 4 packets transmitted, 4 received, 0% packet loss, time 3003ms
  1897. | rtt min/avg/max/mdev = 16.555/17.938/19.241/1.004 ms
  1898. ===================================================================================================
  1899. | TRACEROUTE
  1900. |
  1901. ===================================================================================================
  1902. | NSLOOKUP
  1903. |
  1904. | Server:       127.0.1.1
  1905. | Address:  127.0.1.1#53
  1906. |
  1907. | Non-authoritative answer:
  1908. | www.cloudflare.com    canonical name = www.cloudflare.com.cdn.cloudflare.net.
  1909. | Authoritative answers can be found from:
  1910. | Name: www.cloudflare.com.cdn.cloudflare.net
  1911. | Address: 198.41.215.163
  1912. | Address: 198.41.214.163
  1913. ===================================================================================================
  1914. | NMAP
  1915. |
  1916. | Mini Stress Test End.                              
  1917. ===================================================================================================
  1918. Scan end date: 9-7-2015 14:14:23
  1919.  
  1920.  
  1921.  
  1922. HTML report saved in: report/nsa.gov.html
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement