Advertisement
JTSEC1333

Anonymous JTSEC #OpAssange Full Recon #27

Sep 5th, 2019
2,781
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 152.27 KB | None | 0 0
  1. #######################################################################################################################################
  2. =======================================================================================================================================
  3. Hostname www.mundesley-pc.gov.uk ISP Gyron Internet Ltd
  4. Continent Europe Flag
  5. GB
  6. Country United Kingdom Country Code GB
  7. Region Unknown Local time 05 Sep 2019 06:24 BST
  8. City Unknown Postal Code Unknown
  9. IP Address 89.145.78.0 Latitude 51.496
  10. Longitude -0.122
  11. =======================================================================================================================================
  12. #######################################################################################################################################
  13. > www.mundesley-pc.gov.uk
  14. Server: 38.132.106.139
  15. Address: 38.132.106.139#53
  16.  
  17. Non-authoritative answer:
  18. Name: www.mundesley-pc.gov.uk
  19. Address: 89.145.78.0
  20. >
  21. #######################################################################################################################################
  22.  
  23. Domain:
  24. mundesley-pc.gov.uk
  25.  
  26. Registered For:
  27. Mundesley Parish Council
  28.  
  29. Domain Owner:
  30. Mundesley Parish Council
  31.  
  32. Registered By:
  33. Fasthosts Internet Ltd
  34.  
  35. Servers:
  36. ns1.livedns.co.uk
  37. ns2.livedns.co.uk
  38.  
  39. Registrant Contact:
  40. Doreen Joy
  41.  
  42. Registrant Address:
  43. Mundesley Parish Council
  44. The Old Fire Station
  45. Back Street
  46. Mundesley
  47. Norfolk
  48. NR11 8JJ
  49. United Kingdom
  50. +44 1263 720 603 (Phone)
  51.  
  52. Renewal date:
  53. Monday 25th Oct 2021
  54.  
  55. Entry updated:
  56. Thursday 1st August 2019
  57.  
  58. Entry created:
  59. Thursday 26th October 2017
  60.  
  61. #######################################################################################################################################
  62. [+] Target : www.mundesley-pc.gov.uk
  63.  
  64. [+] IP Address : 89.145.78.0
  65.  
  66. [+] Headers :
  67.  
  68. [+] Connection : close
  69. [+] Cache-Control : no-cache, no-store, must-revalidate
  70. [+] Pragma : no-cache
  71. [+] Expires : 0
  72. [+] Server : Apache/2.2.16 (Debian)
  73. [+] Content-Length : 188982
  74.  
  75. [+] SSL Certificate Information :
  76.  
  77. [+] commonName : mundesley-pc.gov.uk
  78. [+] countryName : US
  79. [+] organizationName : Let's Encrypt
  80. [+] commonName : Let's Encrypt Authority X3
  81. [+] Version : 3
  82. [+] Serial Number : 037EA441FD8A12F1B15F7E9085E0FCF09480
  83. [+] Not Before : Jul 18 20:18:36 2019 GMT
  84. [+] Not After : Oct 16 20:18:36 2019 GMT
  85. [+] OCSP : ('http://ocsp.int-x3.letsencrypt.org',)
  86. [+] subject Alt Name : (('DNS', 'mundesley-pc.gov.uk'), ('DNS', 'www.mundesley-pc.gov.uk'))
  87. [+] CA Issuers : ('http://cert.int-x3.letsencrypt.org/',)
  88.  
  89. [+] Whois Lookup :
  90.  
  91. [+] NIR : None
  92. [+] ASN Registry : ripencc
  93. [+] ASN : 29017
  94. [+] ASN CIDR : 89.145.64.0/18
  95. [+] ASN Country Code : GB
  96. [+] ASN Date : 2006-01-31
  97. [+] ASN Description : GYRON ====, GB
  98. [+] cidr : 89.145.76.0/22
  99. [+] name : G-CUS-MW01
  100. [+] handle : GAT1-RIPE
  101. [+] range : 89.145.76.0 - 89.145.79.255
  102. [+] description : United Hosting IPv4 Assignment
  103. This space is statically assigned
  104. [+] country : GB
  105. [+] state : None
  106. [+] city : None
  107. [+] address : Gyron Internet Ltd
  108. 3 Centro
  109. Boundary Way
  110. Hemel Hempstead
  111. HP2 7SU
  112. United Kingdom
  113. [+] postal_code : None
  114. [+] emails : ['[email protected]']
  115. [+] created : 2006-10-18T11:50:01Z
  116. [+] updated : 2011-02-03T10:53:53Z
  117.  
  118. [+] Crawling Target...
  119.  
  120. [-] Error : 403
  121. [+] Completed!
  122. #######################################################################################################################################
  123. [+] Starting At 2019-09-05 02:21:33.229471
  124. [+] Collecting Information On: https://www.mundesley-pc.gov.uk/
  125. [#] Status: 403
  126. --------------------------------------------------
  127. [#] Web Server Detected: Apache/2.2.16 (Debian)
  128. [!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
  129. - Cache-Control: no-cache, no-store, must-revalidate
  130. - Pragma: no-cache
  131. - Expires: 0
  132. - Server: Apache/2.2.16 (Debian)
  133. - Content-Length: 188983
  134. --------------------------------------------------
  135. [#] Finding Location..!
  136. [#] as: AS29017 Gyron Internet Ltd
  137. [#] city: Hemel Hempstead
  138. [#] country: United Kingdom
  139. [#] countryCode: GB
  140. [#] isp: GYRON Gyron Internet Ltd AS29017
  141. [#] lat: 51.7643
  142. [#] lon: -0.432563
  143. [#] org: Gyron Internet Ltd
  144. [#] query: 89.145.78.0
  145. [#] region: ENG
  146. [#] regionName: England
  147. [#] status: success
  148. [#] timezone: Europe/London
  149. [#] zip: HP2 7SU
  150. --------------------------------------------------
  151. [x] Didn't Detect WAF Presence on: https://www.mundesley-pc.gov.uk/
  152. --------------------------------------------------
  153. [#] Starting Reverse DNS
  154. [-] Failed ! Fail
  155. --------------------------------------------------
  156. [!] Scanning Open Port
  157. [#] 19/tcp open chargen
  158. [#] 20/tcp open ftp-data
  159. [#] 21/tcp open ftp
  160. [#] 23/tcp open telnet
  161. [#] 53/tcp open domain
  162. [#] 79/tcp open finger
  163. [#] 80/tcp open http
  164. [#] 119/tcp open nntp
  165. [#] 407/tcp open timbuktu
  166. [#] 416/tcp open silverplatter
  167. [#] 443/tcp open https
  168. [#] 464/tcp open kpasswd5
  169. [#] 545/tcp open ekshell
  170. [#] 555/tcp open dsf
  171. [#] 617/tcp open sco-dtmgr
  172. [#] 636/tcp open ldapssl
  173. [#] 666/tcp open doom
  174. [#] 700/tcp open epp
  175. [#] 900/tcp open omginitialrefs
  176. [#] 1001/tcp open webpush
  177. [#] 1002/tcp open windows-icfw
  178. [#] 1022/tcp open exp2
  179. [#] 1025/tcp open NFS-or-IIS
  180. [#] 1026/tcp open LSA-or-nterm
  181. [#] 1028/tcp open unknown
  182. [#] 1041/tcp open danf-ak2
  183. [#] 1117/tcp open ardus-mtrns
  184. [#] 1165/tcp open qsm-gui
  185. [#] 1169/tcp open tripwire
  186. [#] 1218/tcp open aeroflight-ads
  187. [#] 1233/tcp open univ-appserver
  188. [#] 1247/tcp open visionpyramid
  189. [#] 1272/tcp open cspmlockmgr
  190. [#] 1719/tcp open h323gatestat
  191. [#] 1720/tcp open h323q931
  192. [#] 1723/tcp open pptp
  193. [#] 1840/tcp open netopia-vo2
  194. [#] 1862/tcp open mysql-cm-agent
  195. [#] 1864/tcp open paradym-31
  196. [#] 1914/tcp open elm-momentum
  197. [#] 1972/tcp open intersys-cache
  198. [#] 2000/tcp open cisco-sccp
  199. [#] 2005/tcp open deslogin
  200. [#] 2020/tcp open xinupageserver
  201. [#] 2033/tcp open glogger
  202. [#] 2034/tcp open scoremgr
  203. [#] 2046/tcp open sdfunc
  204. [#] 2068/tcp open avocentkvm
  205. [#] 2105/tcp open eklogin
  206. [#] 2106/tcp open ekshell
  207. [#] 2222/tcp open EtherNetIP-1
  208. [#] 2910/tcp open tdaccess
  209. [#] 3017/tcp open event_listener
  210. [#] 3261/tcp open winshadow
  211. [#] 3737/tcp open xpanel
  212. [#] 5000/tcp open upnp
  213. [#] 5432/tcp open postgresql
  214. [#] 5550/tcp open sdadmind
  215. [#] 5718/tcp open dpm
  216. [#] 5801/tcp open vnc-http-1
  217. [#] 5900/tcp open vnc
  218. [#] 5998/tcp open ncd-diag
  219. [#] 6004/tcp open X11:4
  220. [#] 6005/tcp open X11:5
  221. [#] 6025/tcp open x11
  222. [#] 6059/tcp open X11:59
  223. [#] 6106/tcp open isdninfo
  224. [#] 6667/tcp open irc
  225. [#] 6669/tcp open irc
  226. [#] 6969/tcp open acmsoda
  227. [#] 7000/tcp open afs3-fileserver
  228. [#] 8022/tcp open oa-system
  229. [#] 8080/tcp open http-proxy
  230. [#] 8089/tcp open unknown
  231. [#] 8383/tcp open m2mservices
  232. [#] 8899/tcp open ospf-lite
  233. [#] 9002/tcp open dynamid
  234. [#] 9009/tcp open pichat
  235. [#] 9010/tcp open sdr
  236. [#] 9091/tcp open xmltec-xmlmail
  237. [#] 9102/tcp open jetdirect
  238. [#] 9535/tcp open man
  239. [#] 9594/tcp open msgsys
  240. [#] 10003/tcp open documentum_s
  241. [#] 12345/tcp open netbus
  242. [#] 31337/tcp open Elite
  243. [#] 32778/tcp open sometimes-rpc19
  244. [#] 32780/tcp open sometimes-rpc23
  245. [#] 49400/tcp open compaqdiag
  246. --------------------------------------------------
  247. [+] Collecting Information Disclosure!
  248. [#] Detecting sitemap.xml file
  249. [!] sitemap.xml File Found: https://www.mundesley-pc.gov.uk//sitemap.xml
  250. [#] Detecting robots.txt file
  251. [!] robots.txt File Found: https://www.mundesley-pc.gov.uk//robots.txt
  252. [#] Detecting GNU Mailman
  253. [-] GNU Mailman App Not Detected!?
  254. --------------------------------------------------
  255. [+] Crawling Url Parameter On: https://www.mundesley-pc.gov.uk/
  256. --------------------------------------------------
  257. [#] Searching Html Form !
  258. [+] Html Form Discovered
  259. [#] action: /verify.php
  260. [#] class: None
  261. [#] id: None
  262. [#] method: post
  263. --------------------------------------------------
  264. [!] Found 1 dom parameter
  265. [#] https://www.mundesley-pc.gov.uk//#
  266. --------------------------------------------------
  267. [!] 15 Internal Dynamic Parameter Discovered
  268. [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20Haxplorer/1.php?param=honey
  269. [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20PHP%20Ping/php-ping.php?param=honey
  270. [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20PHP%20Shell/phpshell.php?param=honey
  271. [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20PHPBB%20Install/phpBB2/install/install.php?param=honey
  272. [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20PHPFM/index.php?param=honey
  273. [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20PhpSysInfo/index.php?param=honey
  274. [+] https://www.mundesley-pc.gov.uk//demo/GHH%20-%20SquirrelMail/src/login.php?param=honey
  275. [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - WebUtil 2.7
  276. [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - .mdb/admin.mdb
  277. [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - .sql/create.sql
  278. [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - AIM BuddyList/BuddyList.blt
  279. [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - File Upload Manager/
  280. [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - passlist.txt/passlist.txt
  281. [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - passwd.txt/passwd.txt
  282. [+] https://www.mundesley-pc.gov.uk///demo/?GHH v1.1 - WebUtil 2.7/webutil.pl
  283. --------------------------------------------------
  284. [-] No external Dynamic Paramter Found!?
  285. --------------------------------------------------
  286. [!] 3 Internal links Discovered
  287. [+] https://www.mundesley-pc.gov.uk///css/flag.css
  288. [+] https://www.mundesley-pc.gov.uk//mailto:[email protected]
  289. [+] https://www.mundesley-pc.gov.uk//mailto:[email protected]
  290. --------------------------------------------------
  291. [-] No External Link Found!?
  292. --------------------------------------------------
  293. [#] Mapping Subdomain..
  294. [!] Found 3 Subdomain
  295. - mail.mundesley-pc.gov.uk
  296. - mundesley-pc.gov.uk
  297. - www.mundesley-pc.gov.uk
  298. --------------------------------------------------
  299. [!] Done At 2019-09-05 02:26:28.524817
  300. ######################################################################################################################################
  301. [i] Scanning Site: https://www.mundesley-pc.gov.uk
  302.  
  303.  
  304.  
  305. B A S I C I N F O
  306. ====================
  307.  
  308.  
  309. [+] Site Title:
  310. [+] IP address: 89.145.78.0
  311. [+] Web Server: Apache/2.2.16 (Debian)
  312. [+] CMS: Could Not Detect
  313. [+] Cloudflare: Not Detected
  314. [+] Robots File: Found
  315.  
  316. -------------[ contents ]----------------
  317. User-agent: *
  318. Disallow: /
  319.  
  320. User-agent: MJ12bot
  321. Disallow: /
  322.  
  323. User-agent: rogerbot
  324. Disallow: /
  325.  
  326. User-agent: dotbot
  327. Disallow: /
  328. -----------[end of contents]-------------
  329.  
  330.  
  331.  
  332. W H O I S L O O K U P
  333. ========================
  334.  
  335.  
  336. Domain:
  337. mundesley-pc.gov.uk
  338.  
  339. Registered For:
  340. Mundesley Parish Council
  341.  
  342. Domain Owner:
  343. Mundesley Parish Council
  344.  
  345. Registered By:
  346. Fasthosts Internet Ltd
  347.  
  348. Servers:
  349. ns1.livedns.co.uk
  350. ns2.livedns.co.uk
  351.  
  352. Registrant Contact:
  353. Doreen Joy
  354.  
  355. Registrant Address:
  356. Mundesley Parish Council
  357. The Old Fire Station
  358. Back Street
  359. Mundesley
  360. Norfolk
  361. NR11 8JJ
  362. United Kingdom
  363. +44 1263 720 603 (Phone)
  364.  
  365. Renewal date:
  366. Monday 25th Oct 2021
  367.  
  368. Entry updated:
  369. Thursday 1st August 2019
  370.  
  371. Entry created:
  372. Thursday 26th October 2017
  373.  
  374.  
  375.  
  376.  
  377.  
  378. G E O I P L O O K U P
  379. =========================
  380.  
  381. [i] IP Address: 89.145.78.0
  382. [i] Country: United Kingdom
  383. [i] State:
  384. [i] City:
  385. [i] Latitude: 51.4964
  386. [i] Longitude: -0.1224
  387.  
  388.  
  389.  
  390.  
  391. H T T P H E A D E R S
  392. =======================
  393.  
  394.  
  395. [i] HTTP/1.1 403 Forbidden
  396. [i] Connection: close
  397. [i] Cache-Control: no-cache, no-store, must-revalidate
  398. [i] Pragma: no-cache
  399. [i] Expires: 0
  400. [i] Server: Apache/2.2.16 (Debian)
  401. [i] Content-Length: 188983
  402.  
  403.  
  404.  
  405.  
  406. D N S L O O K U P
  407. ===================
  408.  
  409. mundesley-pc.gov.uk. 3599 IN A 89.145.78.0
  410. mundesley-pc.gov.uk. 3599 IN NS ns1.livedns.co.uk.
  411. mundesley-pc.gov.uk. 3599 IN NS ns2.livedns.co.uk.
  412. mundesley-pc.gov.uk. 3599 IN NS ns3.livedns.co.uk.
  413. mundesley-pc.gov.uk. 3599 IN SOA ns1.livedns.co.uk. admin.mundesley-pc.gov.uk. 1524990353 10800 3600 604800 3600
  414. mundesley-pc.gov.uk. 3599 IN MX 0 mundesleypc-gov-uk02c.mail.protection.outlook.com.
  415. mundesley-pc.gov.uk. 3599 IN TXT "MS=ms57028444"
  416. mundesley-pc.gov.uk. 3599 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
  417.  
  418.  
  419.  
  420.  
  421. S U B N E T C A L C U L A T I O N
  422. ====================================
  423.  
  424. Address = 89.145.78.0
  425. Network = 89.145.78.0 / 32
  426. Netmask = 255.255.255.255
  427. Broadcast = not needed on Point-to-Point links
  428. Wildcard Mask = 0.0.0.0
  429. Hosts Bits = 0
  430. Max. Hosts = 1 (2^0 - 0)
  431. Host Range = { 89.145.78.0 - 89.145.78.0 }
  432.  
  433.  
  434.  
  435. N M A P P O R T S C A N
  436. ============================
  437.  
  438. Starting Nmap 7.70 ( https://nmap.org ) at 2019-09-05 06:21 UTC
  439. Nmap scan report for mundesley-pc.gov.uk (89.145.78.0)
  440. Host is up (0.070s latency).
  441. rDNS record for 89.145.78.0: pegasus.terrassl.net
  442.  
  443. PORT STATE SERVICE
  444. 21/tcp open ftp
  445. 22/tcp filtered ssh
  446. 23/tcp open telnet
  447. 80/tcp open http
  448. 110/tcp filtered pop3
  449. 143/tcp filtered imap
  450. 443/tcp open https
  451. 3389/tcp filtered ms-wbt-server
  452.  
  453. Nmap done: 1 IP address (1 host up) scanned in 2.39 seconds
  454.  
  455.  
  456.  
  457. S U B - D O M A I N F I N D E R
  458. ==================================
  459.  
  460.  
  461. [i] Total Subdomains Found : 2
  462.  
  463. [+] Subdomain: mail.mundesley-pc.gov.uk
  464. [-] IP: 213.171.216.40
  465.  
  466. [+] Subdomain: www.mundesley-pc.gov.uk
  467. [-] IP: 89.145.78.0
  468. #######################################################################################################################################
  469. Trying "mundesley-pc.gov.uk"
  470. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49398
  471. ;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 3, ADDITIONAL: 3
  472.  
  473. ;; QUESTION SECTION:
  474. ;mundesley-pc.gov.uk. IN ANY
  475.  
  476. ;; ANSWER SECTION:
  477. mundesley-pc.gov.uk. 3600 IN TXT "MS=ms57028444"
  478. mundesley-pc.gov.uk. 3600 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
  479. mundesley-pc.gov.uk. 3600 IN MX 0 mundesleypc-gov-uk02c.mail.protection.outlook.com.
  480. mundesley-pc.gov.uk. 3600 IN SOA ns1.livedns.co.uk. admin.mundesley-pc.gov.uk. 1524990353 10800 3600 604800 3600
  481. mundesley-pc.gov.uk. 3600 IN A 89.145.78.0
  482. mundesley-pc.gov.uk. 3600 IN NS ns2.livedns.co.uk.
  483. mundesley-pc.gov.uk. 3600 IN NS ns1.livedns.co.uk.
  484. mundesley-pc.gov.uk. 3600 IN NS ns3.livedns.co.uk.
  485.  
  486. ;; AUTHORITY SECTION:
  487. mundesley-pc.gov.uk. 3600 IN NS ns2.livedns.co.uk.
  488. mundesley-pc.gov.uk. 3600 IN NS ns1.livedns.co.uk.
  489. mundesley-pc.gov.uk. 3600 IN NS ns3.livedns.co.uk.
  490.  
  491. ;; ADDITIONAL SECTION:
  492. ns1.livedns.co.uk. 34785 IN A 217.160.81.244
  493. ns2.livedns.co.uk. 10090 IN A 217.160.82.244
  494. ns3.livedns.co.uk. 11923 IN A 217.160.83.244
  495.  
  496. Received 400 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 1182 ms
  497. #######################################################################################################################################
  498.  
  499. ; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace mundesley-pc.gov.uk
  500. ;; global options: +cmd
  501. . 85001 IN NS i.root-servers.net.
  502. . 85001 IN NS h.root-servers.net.
  503. . 85001 IN NS l.root-servers.net.
  504. . 85001 IN NS e.root-servers.net.
  505. . 85001 IN NS k.root-servers.net.
  506. . 85001 IN NS j.root-servers.net.
  507. . 85001 IN NS g.root-servers.net.
  508. . 85001 IN NS f.root-servers.net.
  509. . 85001 IN NS c.root-servers.net.
  510. . 85001 IN NS b.root-servers.net.
  511. . 85001 IN NS m.root-servers.net.
  512. . 85001 IN NS d.root-servers.net.
  513. . 85001 IN NS a.root-servers.net.
  514. . 85001 IN RRSIG NS 8 0 518400 20190917170000 20190904160000 59944 . kJzCa4mgmQtUH+7dsVMu4/C6/jIQxEQDEXuU796OWvahRokNyKlHUZEG lmo2VzR1knfamOY3e5m1lQm4ML/bT6wnvw6oFxBOHYw6ICOG6zuxn6S4 j3i8auNLT9LmPKGdGBawaN1lZQDogx2BcSGSfIv5oCFzlsfsSePa2jse L7x2Ah2D4eXZsOeXOknM13u20zcFpriyqRw2+WFQ9+UZGubU2H/Wfgvt J7nmNzVDJPr/Pnxdor73aHkqrTdjHwxaf+/nCYG6t1diLtymapgfzERf VwzyGxUrrgFJcjCf1mZeWZZmxkSUWBCvy3IuFmwETUlc7pIs9wWdA1vQ wc3u/g==
  515. ;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 170 ms
  516.  
  517. uk. 172800 IN NS nsa.nic.uk.
  518. uk. 172800 IN NS dns1.nic.uk.
  519. uk. 172800 IN NS dns2.nic.uk.
  520. uk. 172800 IN NS dns3.nic.uk.
  521. uk. 172800 IN NS dns4.nic.uk.
  522. uk. 172800 IN NS nsc.nic.uk.
  523. uk. 172800 IN NS nsd.nic.uk.
  524. uk. 172800 IN NS nsb.nic.uk.
  525. uk. 86400 IN DS 43876 8 2 A107ED2AC1BD14D924173BC7E827A1153582072394F9272BA37E2353 BC659603
  526. uk. 86400 IN RRSIG DS 8 1 86400 20190918050000 20190905040000 59944 . pTy1O0qnDa8QFnjHG8uLA3kE0LSl2chxPki1H6PCgfvqlq6urZWHhyhc 2+VXYtadahxfxtJHtbbmNaYfMV5NHsPACxeuYBBah2/JCqAxmNre1HYJ RbsD/W7IQ0iVtdUsOAV9Px8HYf2W48OIri4QfiXuGyfPpPu1C3fsHlwI Ucun+8yt5L5Ph0VEsm9ZICfb/630i2L8GhYiOP+JplMVkHgI9HnHwu0B wDJux9KI5PIbGcdV2dpyDVLOKARfY6jH5SXNyV5K3qvd8LXBbFR/2WM9 FVXhgA2fNopv6pt1vY+Is1Y1UIGR5og/4SGDkMQSHIeFIuy/cO+jiCbq qUDcZw==
  527. ;; Received 803 bytes from 2001:dc3::35#53(m.root-servers.net) in 89 ms
  528.  
  529. gov.uk. 172800 IN NS ns0.ja.net.
  530. gov.uk. 172800 IN NS ns1.surfnet.nl.
  531. gov.uk. 172800 IN NS ns2.ja.net.
  532. gov.uk. 172800 IN NS ns3.ja.net.
  533. gov.uk. 172800 IN NS ns4.ja.net.
  534. gov.uk. 172800 IN NS auth00.ns.de.uu.net.
  535. gov.uk. 172800 IN NS auth50.ns.de.uu.net.
  536. gov.uk. 300 IN DS 17539 8 2 2F0A0A65DB9E930F5B2C0425F67DF66416C076124652A281D9A8FFA7 73828F57
  537. gov.uk. 300 IN RRSIG DS 8 2 300 20190918101947 20190904095516 43056 uk. THIHDoQWrvY90/IJqLD5/7cTTZ5KEmGhoKCmvmMkEvjYPCtm8ygot9Un VffuzT3bFkykND6ldeIA0baGeew7qWD1Ue0aAO1f2admT/5CM9RV9wvI RuYp8CvnvqG0qO9EQaADFAtdesDrha13dhqgg40kDPBCgHrYrBOyuIqC uF0=
  538. ;; Received 415 bytes from 2a01:618:404::1#53(dns3.nic.uk) in 105 ms
  539.  
  540. mundesley-pc.gov.uk. 86400 IN NS ns1.livedns.co.uk.
  541. mundesley-pc.gov.uk. 86400 IN NS ns2.livedns.co.uk.
  542. KKLL3AB3UP9O8E7NBCPIOE643RP1FEUG.gov.uk. 14400 IN NSEC3 1 0 10 - KKORTM598IFOR37DSAO5MUFI90788C6V NS
  543. KKLL3AB3UP9O8E7NBCPIOE643RP1FEUG.gov.uk. 14400 IN RRSIG NSEC3 8 3 14400 20191004130752 20190904130752 924 gov.uk. dqVa1/KQgioYswT4LrDvUQpVDJWaD2GIBrahiqmKu5+cyAoWd9LLQ0ur X7xW3jvMI/CPJui6Xmj/IHezb3j1seel2e+PqW41vWzeuYIEcUaLlwnO lsPWz9Iu4hORNAk+m277w4O64py+RMABRGHEv0JHDFlwVOGfuv4nLoDe ndQ=
  544. ;; Received 335 bytes from 2001:600:1c0:e000::35:6#53(auth00.ns.de.uu.net) in 119 ms
  545.  
  546. mundesley-pc.gov.uk. 3600 IN A 89.145.78.0
  547. ;; Received 64 bytes from 217.160.82.244#53(ns2.livedns.co.uk) in 107 ms
  548. #######################################################################################################################################
  549. [*] Performing General Enumeration of Domain: mundesley-pc.gov.uk
  550. [-] DNSSEC is not configured for mundesley-pc.gov.uk
  551. [*] SOA ns1.livedns.co.uk 217.160.81.244
  552. [*] NS ns2.livedns.co.uk 217.160.82.244
  553. [*] Bind Version for 217.160.82.244 Served by PowerDNS - https://www.powerdns.com/
  554. [*] NS ns1.livedns.co.uk 217.160.81.244
  555. [*] Bind Version for 217.160.81.244 Served by PowerDNS - https://www.powerdns.com/
  556. [*] MX mundesleypc-gov-uk02c.mail.protection.outlook.com 104.47.20.36
  557. [*] MX mundesleypc-gov-uk02c.mail.protection.outlook.com 104.47.21.36
  558. [*] A mundesley-pc.gov.uk 89.145.78.0
  559. [*] TXT mundesley-pc.gov.uk MS=ms57028444
  560. [*] TXT mundesley-pc.gov.uk v=spf1 include:spf.protection.outlook.com -all
  561. [*] Enumerating SRV Records
  562. [-] No SRV Records Found for mundesley-pc.gov.uk
  563. [+] 0 Records Found
  564. #######################################################################################################################################
  565. [*] Processing domain mundesley-pc.gov.uk
  566. [*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
  567. [+] Getting nameservers
  568. 217.160.82.244 - ns2.livedns.co.uk
  569. 217.160.81.244 - ns1.livedns.co.uk
  570. [-] Zone transfer failed
  571.  
  572. [+] TXT records found
  573. "MS=ms57028444"
  574. "v=spf1 include:spf.protection.outlook.com -all"
  575.  
  576. [+] MX records found, added to target list
  577. 0 mundesleypc-gov-uk02c.mail.protection.outlook.com.
  578.  
  579. [*] Scanning mundesley-pc.gov.uk for A records
  580. 89.145.78.0 - mundesley-pc.gov.uk
  581. 40.101.137.24 - autodiscover.mundesley-pc.gov.uk
  582. 40.101.138.216 - autodiscover.mundesley-pc.gov.uk
  583. 40.101.138.8 - autodiscover.mundesley-pc.gov.uk
  584. 213.171.216.40 - mail.mundesley-pc.gov.uk
  585. 213.171.216.40 - mailserver.mundesley-pc.gov.uk
  586. 213.171.216.50 - smtp.mundesley-pc.gov.uk
  587. 213.171.216.231 - webmail.mundesley-pc.gov.uk
  588. 89.145.78.0 - www.mundesley-pc.gov.uk
  589. #######################################################################################################################################
  590.  
  591.  
  592.  
  593. AVAILABLE PLUGINS
  594. -----------------
  595.  
  596. RobotPlugin
  597. OpenSslCipherSuitesPlugin
  598. HeartbleedPlugin
  599. FallbackScsvPlugin
  600. SessionRenegotiationPlugin
  601. OpenSslCcsInjectionPlugin
  602. SessionResumptionPlugin
  603. HttpHeadersPlugin
  604. EarlyDataPlugin
  605. CertificateInfoPlugin
  606. CompressionPlugin
  607.  
  608.  
  609.  
  610. CHECKING HOST(S) AVAILABILITY
  611. -----------------------------
  612.  
  613. 89.145.78.0:443 => 89.145.78.0
  614.  
  615.  
  616.  
  617.  
  618. SCAN RESULTS FOR 89.145.78.0:443 - 89.145.78.0
  619. ----------------------------------------------
  620.  
  621. * Deflate Compression:
  622. OK - Compression disabled
  623.  
  624. * Certificate Information:
  625. Content
  626. SHA1 Fingerprint: 1e26051a4de5c5c3f77be8a14de7b73ca71e8490
  627. Common Name: bench-memorial-plaques.co.uk
  628. Issuer: Let's Encrypt Authority X3
  629. Serial Number: 274404741044414810180390160691012314592224
  630. Not Before: 2019-07-22 20:11:07
  631. Not After: 2019-10-20 20:11:07
  632. Signature Algorithm: sha256
  633. Public Key Algorithm: RSA
  634. Key Size: 2048
  635. Exponent: 65537 (0x10001)
  636. DNS Subject Alternative Names: ['bench-memorial-plaques.co.uk', 'cpanel.bench-memorial-plaques.co.uk', 'mail.bench-memorial-plaques.co.uk', 'webdisk.bench-memorial-plaques.co.uk', 'webmail.bench-memorial-plaques.co.uk', 'www.bench-memorial-plaques.co.uk']
  637.  
  638. Trust
  639. Hostname Validation: FAILED - Certificate does NOT match 89.145.78.0
  640. Android CA Store (9.0.0_r9): OK - Certificate is trusted
  641. Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
  642. Java CA Store (jdk-12.0.1): OK - Certificate is trusted
  643. Mozilla CA Store (2019-03-14): OK - Certificate is trusted
  644. Windows CA Store (2019-05-27): OK - Certificate is trusted
  645. Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
  646. Received Chain: bench-memorial-plaques.co.uk --> Let's Encrypt Authority X3
  647. Verified Chain: bench-memorial-plaques.co.uk --> Let's Encrypt Authority X3 --> DST Root CA X3
  648. Received Chain Contains Anchor: OK - Anchor certificate not sent
  649. Received Chain Order: OK - Order is valid
  650. Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
  651.  
  652. Extensions
  653. OCSP Must-Staple: NOT SUPPORTED - Extension not found
  654. Certificate Transparency: WARNING - Only 2 SCTs included but Google recommends 3 or more
  655.  
  656. OCSP Stapling
  657. NOT SUPPORTED - Server did not send back an OCSP response
  658.  
  659. * OpenSSL Heartbleed:
  660. OK - Not vulnerable to Heartbleed
  661.  
  662. * TLSV1 Cipher Suites:
  663. Server rejected all cipher suites.
  664.  
  665. * Downgrade Attacks:
  666. TLS_FALLBACK_SCSV: OK - Supported
  667.  
  668. * TLSV1_1 Cipher Suites:
  669. Forward Secrecy OK - Supported
  670. RC4 OK - Not Supported
  671.  
  672. Preferred:
  673. TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
  674. Accepted:
  675. TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 403 Forbidden
  676. TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 403 Forbidden
  677. TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
  678. TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
  679. TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 403 Forbidden
  680. TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
  681. TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
  682. TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 403 Forbidden
  683. TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 403 Forbidden
  684. TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 403 Forbidden
  685. TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
  686. TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
  687.  
  688. * TLS 1.2 Session Resumption Support:
  689. With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
  690. With TLS Tickets: OK - Supported
  691.  
  692. * Session Renegotiation:
  693. Client-initiated Renegotiation: OK - Rejected
  694. Secure Renegotiation: OK - Supported
  695.  
  696. * TLSV1_2 Cipher Suites:
  697. Forward Secrecy OK - Supported
  698. RC4 OK - Not Supported
  699.  
  700. Preferred:
  701. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 403 Forbidden
  702. Accepted:
  703. TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 403 Forbidden
  704. TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 403 Forbidden
  705. TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 403 Forbidden
  706. TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 403 Forbidden
  707. TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
  708. TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 403 Forbidden
  709. TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 403 Forbidden
  710. TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
  711. TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 403 Forbidden
  712. TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 403 Forbidden
  713. TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 403 Forbidden
  714. TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
  715. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 403 Forbidden
  716. TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 403 Forbidden
  717. TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
  718. TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 403 Forbidden
  719. TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 403 Forbidden
  720. TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 403 Forbidden
  721. TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 403 Forbidden
  722. TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 403 Forbidden
  723. TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
  724. TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 403 Forbidden
  725. TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 403 Forbidden
  726. TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
  727.  
  728. * OpenSSL CCS Injection:
  729. OK - Not vulnerable to OpenSSL CCS injection
  730.  
  731. * SSLV2 Cipher Suites:
  732. Server rejected all cipher suites.
  733.  
  734. * TLSV1_3 Cipher Suites:
  735. Server rejected all cipher suites.
  736.  
  737. * SSLV3 Cipher Suites:
  738. Server rejected all cipher suites.
  739.  
  740. * ROBOT Attack:
  741. OK - Not vulnerable
  742.  
  743.  
  744. SCAN COMPLETED IN 32.80 S
  745. -------------------------
  746. #######################################################################################################################################
  747.  
  748.  
  749. Domains still to check: 1
  750. Checking if the hostname mundesley-pc.gov.uk. given is in fact a domain...
  751.  
  752. Analyzing domain: mundesley-pc.gov.uk.
  753. Checking NameServers using system default resolver...
  754. IP: 217.160.82.244 (Germany)
  755. HostName: ns2.livedns.co.uk Type: NS
  756. HostName: ns2.livedns.co.uk Type: PTR
  757. IP: 217.160.81.244 (Germany)
  758. HostName: ns1.livedns.co.uk Type: NS
  759. HostName: ns1.livedns.co.uk Type: PTR
  760.  
  761. Checking MailServers using system default resolver...
  762. IP: 104.47.21.36 (United States)
  763. HostName: mundesleypc-gov-uk02c.mail.protection.outlook.com Type: MX
  764. HostName: mail-lo2gbr010036.inbound.protection.outlook.com Type: PTR
  765. IP: 104.47.20.36 (United States)
  766. HostName: mundesleypc-gov-uk02c.mail.protection.outlook.com Type: MX
  767. HostName: mail-cwlgbr010036.inbound.protection.outlook.com Type: PTR
  768.  
  769. Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
  770. No zone transfer found on nameserver 217.160.82.244
  771. No zone transfer found on nameserver 217.160.81.244
  772.  
  773. Checking SPF record...
  774.  
  775. Checking SPF record...
  776. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 207.46.100.0/24, but only the network IP
  777. New IP found: 207.46.100.0
  778. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 207.46.163.0/24, but only the network IP
  779. New IP found: 207.46.163.0
  780. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 65.55.169.0/24, but only the network IP
  781. New IP found: 65.55.169.0
  782. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 157.56.110.0/23, but only the network IP
  783. New IP found: 157.56.110.0
  784. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 157.55.234.0/24, but only the network IP
  785. New IP found: 157.55.234.0
  786. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 213.199.154.0/24, but only the network IP
  787. New IP found: 213.199.154.0
  788. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 213.199.180.128/26, but only the network IP
  789. New IP found: 213.199.180.128
  790. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.100.0.0/14, but only the network IP
  791. New IP found: 52.100.0.0
  792.  
  793. Checking SPF record...
  794. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 157.56.112.0/24, but only the network IP
  795. New IP found: 157.56.112.0
  796. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 207.46.51.64/26, but only the network IP
  797. New IP found: 207.46.51.64
  798. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 64.4.22.64/26, but only the network IP
  799. New IP found: 64.4.22.64
  800. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.92.0.0/15, but only the network IP
  801. New IP found: 40.92.0.0
  802. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.107.0.0/16, but only the network IP
  803. New IP found: 40.107.0.0
  804. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 134.170.140.0/24, but only the network IP
  805. New IP found: 134.170.140.0
  806.  
  807. Checking SPF record...
  808. There are no IPv4 addresses in the SPF. Maybe IPv6.
  809. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.103.128.0/19, but only the network IP
  810. New IP found: 23.103.128.0
  811. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.103.198.0/23, but only the network IP
  812. New IP found: 23.103.198.0
  813. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 65.55.88.0/24, but only the network IP
  814. New IP found: 65.55.88.0
  815. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 104.47.0.0/17, but only the network IP
  816. New IP found: 104.47.0.0
  817. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.103.200.0/21, but only the network IP
  818. New IP found: 23.103.200.0
  819. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.103.208.0/21, but only the network IP
  820. New IP found: 23.103.208.0
  821. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.103.191.0/24, but only the network IP
  822. New IP found: 23.103.191.0
  823. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 216.32.180.0/23, but only the network IP
  824. New IP found: 216.32.180.0
  825. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 94.245.120.64/26, but only the network IP
  826. New IP found: 94.245.120.64
  827. New hostname found: 2202::/48
  828. There are no IPv4 addresses in the SPF. Maybe IPv6.
  829.  
  830. Checking 193 most common hostnames using system default resolver...
  831. IP: 89.145.78.0 (United Kingdom)
  832. HostName: www.mundesley-pc.gov.uk. Type: A
  833. IP: 213.171.216.40 (United Kingdom)
  834. HostName: mail.mundesley-pc.gov.uk. Type: A
  835. IP: 213.171.216.231 (United Kingdom)
  836. HostName: webmail.mundesley-pc.gov.uk. Type: A
  837. IP: 213.171.216.50 (United Kingdom)
  838. HostName: smtp.mundesley-pc.gov.uk. Type: A
  839.  
  840. Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
  841. Checking netblock 65.55.169.0
  842. Checking netblock 52.100.0.0
  843. Checking netblock 89.145.78.0
  844. Checking netblock 65.55.88.0
  845. Checking netblock 207.46.100.0
  846. Checking netblock 157.55.234.0
  847. Checking netblock 94.245.120.0
  848. Checking netblock 216.32.180.0
  849. Checking netblock 213.171.216.0
  850. Checking netblock 217.160.81.0
  851. Checking netblock 23.103.128.0
  852. Checking netblock 64.4.22.0
  853. Checking netblock 157.56.110.0
  854. Checking netblock 23.103.208.0
  855. Checking netblock 23.103.198.0
  856. Checking netblock 207.46.163.0
  857. Checking netblock 104.47.21.0
  858. Checking netblock 134.170.140.0
  859. Checking netblock 213.199.154.0
  860. Checking netblock 23.103.191.0
  861. Checking netblock 40.107.0.0
  862. Checking netblock 40.92.0.0
  863. Checking netblock 157.56.112.0
  864. Checking netblock 207.46.51.0
  865. Checking netblock 104.47.0.0
  866. Checking netblock 213.199.180.0
  867. Checking netblock 217.160.82.0
  868. Checking netblock 23.103.200.0
  869. Checking netblock 104.47.20.0
  870.  
  871. Searching for mundesley-pc.gov.uk. emails in Google
  872.  
  873. Checking 31 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
  874. Host 65.55.169.0 is up (reset ttl 64)
  875. Host 52.100.0.0 is up (reset ttl 64)
  876. Host 89.145.78.0 is up (reset ttl 64)
  877. Host 65.55.88.0 is up (reset ttl 64)
  878. Host 207.46.100.0 is up (reset ttl 64)
  879. Host 157.55.234.0 is up (reset ttl 64)
  880. Host 94.245.120.64 is up (reset ttl 64)
  881. Host 216.32.180.0 is up (reset ttl 64)
  882. Host 213.171.216.231 is up (echo-reply ttl 246)
  883. Host 217.160.81.244 is up (reset ttl 64)
  884. Host 23.103.128.0 is up (reset ttl 64)
  885. Host 213.171.216.50 is up (reset ttl 64)
  886. Host 64.4.22.64 is up (reset ttl 64)
  887. Host 157.56.110.0 is up (reset ttl 64)
  888. Host 23.103.208.0 is up (reset ttl 64)
  889. Host 23.103.198.0 is up (reset ttl 64)
  890. Host 207.46.163.0 is up (reset ttl 64)
  891. Host 213.171.216.40 is up (echo-reply ttl 246)
  892. Host 104.47.21.36 is up (reset ttl 64)
  893. Host 134.170.140.0 is up (reset ttl 64)
  894. Host 213.199.154.0 is up (reset ttl 64)
  895. Host 23.103.191.0 is up (reset ttl 64)
  896. Host 40.107.0.0 is up (reset ttl 64)
  897. Host 40.92.0.0 is up (reset ttl 64)
  898. Host 157.56.112.0 is up (reset ttl 64)
  899. Host 207.46.51.64 is up (reset ttl 64)
  900. Host 104.47.0.0 is up (reset ttl 64)
  901. Host 213.199.180.128 is up (reset ttl 64)
  902. Host 217.160.82.244 is up (echo-reply ttl 59)
  903. Host 23.103.200.0 is up (reset ttl 64)
  904. Host 104.47.20.36 is up (reset ttl 64)
  905.  
  906. Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
  907. Scanning ip 65.55.169.0 ():
  908. Scanning ip 52.100.0.0 ():
  909. Scanning ip 89.145.78.0 (www.mundesley-pc.gov.uk.):
  910. 53/tcp open domain syn-ack ttl 50 ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
  911. | dns-nsid:
  912. |_ bind.version: 9.11.4-P2-RedHat-9.11.4-9.P2.el7
  913. Running (JUST GUESSING): Linux 2.6.X|4.X|3.X (91%)
  914. OS Info: Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
  915. Scanning ip 65.55.88.0 ():
  916. Scanning ip 207.46.100.0 ():
  917. Scanning ip 157.55.234.0 ():
  918. Scanning ip 94.245.120.64 ():
  919. Scanning ip 216.32.180.0 ():
  920. Scanning ip 213.171.216.231 (webmail.mundesley-pc.gov.uk.):
  921. 80/tcp open http syn-ack ttl 55 nginx
  922. |_http-favicon: Unknown favicon MD5: C158FFDB11844ECC3EE02B86AA8E1A0B
  923. | http-methods:
  924. |_ Supported Methods: GET HEAD POST OPTIONS
  925. |_http-title: Webmail :: Welcome to Webmail
  926. 443/tcp open ssl/http syn-ack ttl 55 nginx
  927. | http-methods:
  928. |_ Supported Methods: GET HEAD POST OPTIONS
  929. |_http-title: Webmail :: Welcome to Webmail
  930. | ssl-cert: Subject: commonName=webmail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
  931. | Subject Alternative Name: DNS:webmail.livemail.co.uk
  932. | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
  933. | Public Key type: rsa
  934. | Public Key bits: 2048
  935. | Signature Algorithm: sha256WithRSAEncryption
  936. | Not valid before: 2018-12-10T00:00:00
  937. | Not valid after: 2020-12-09T12:00:00
  938. | MD5: e6ce 8502 b7b4 cf72 ac63 d3ab 19d7 acad
  939. |_SHA-1: cd2f e5b3 1740 fd64 335d 9b7f 9861 6b65 4a8c 5709
  940. |_ssl-date: TLS randomness does not represent time
  941. | tls-alpn:
  942. |_ http/1.1
  943. | tls-nextprotoneg:
  944. |_ http/1.1
  945. Device type: general purpose|storage-misc|media device|WAP
  946. Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (87%), HP embedded (85%), Infomir embedded (85%), Ubiquiti embedded (85%), Ubiquiti AirOS 5.X (85%)
  947. Scanning ip 217.160.81.244 (ns1.livedns.co.uk (PTR)):
  948. 53/tcp open domain syn-ack ttl 59 PowerDNS 3.3 or later
  949. | dns-nsid:
  950. | NSID: dns-pub-nl-ams-nkf04.server.lan (646e732d7075622d6e6c2d616d732d6e6b6630342e7365727665722e6c616e)
  951. | id.server: dns-pub-nl-ams-nkf04.server.lan
  952. |_ bind.version: Served by PowerDNS - https://www.powerdns.com/
  953. Scanning ip 23.103.128.0 ():
  954. Scanning ip 213.171.216.50 (smtp.mundesley-pc.gov.uk.):
  955. 465/tcp open ssl/smtps? syn-ack ttl 55
  956. |_smtp-commands: Couldn't establish connection on port 465
  957. 587/tcp open smtp syn-ack ttl 57 Postfix smtpd
  958. |_smtp-commands: smtp.livemail.co.uk, PIPELINING, SIZE 153600000, VRFY, ETRN, STARTTLS, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
  959. |_ssl-date: TLS randomness does not represent time
  960. Device type: storage-misc|general purpose
  961. Running (JUST GUESSING): HP embedded (85%), Linux 3.X|4.X (85%)
  962. OS Info: Service Info: Host: smtp.livemail.co.uk
  963. Scanning ip 64.4.22.64 ():
  964. Scanning ip 157.56.110.0 ():
  965. Scanning ip 23.103.208.0 ():
  966. Scanning ip 23.103.198.0 ():
  967. Scanning ip 207.46.163.0 ():
  968. Scanning ip 213.171.216.40 (mail.mundesley-pc.gov.uk.):
  969. 110/tcp open pop3 syn-ack ttl 55 Dovecot pop3d
  970. |_pop3-capabilities: STLS RESP-CODES AUTH-RESP-CODE UIDL PIPELINING USER SASL(PLAIN) TOP CAPA
  971. | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
  972. | Subject Alternative Name: DNS:mail.livemail.co.uk
  973. | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
  974. | Public Key type: rsa
  975. | Public Key bits: 2048
  976. | Signature Algorithm: sha256WithRSAEncryption
  977. | Not valid before: 2018-12-06T00:00:00
  978. | Not valid after: 2020-12-06T12:00:00
  979. | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
  980. |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
  981. 143/tcp open imap syn-ack ttl 55 Dovecot imapd
  982. |_imap-capabilities: more STARTTLS LOGIN-REFERRALS have SASL-IR listed IDLE LITERAL+ OK post-login capabilities ID ENABLE IMAP4rev1 AUTH=PLAINA0001 Pre-login
  983. | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
  984. | Subject Alternative Name: DNS:mail.livemail.co.uk
  985. | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
  986. | Public Key type: rsa
  987. | Public Key bits: 2048
  988. | Signature Algorithm: sha256WithRSAEncryption
  989. | Not valid before: 2018-12-06T00:00:00
  990. | Not valid after: 2020-12-06T12:00:00
  991. | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
  992. |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
  993. 993/tcp open ssl/imap syn-ack ttl 55 Dovecot imapd
  994. |_imap-capabilities: have LOGIN-REFERRALS more SASL-IR listed IDLE LITERAL+ OK post-login capabilities ID ENABLE IMAP4rev1 AUTH=PLAINA0001 Pre-login
  995. | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
  996. | Subject Alternative Name: DNS:mail.livemail.co.uk
  997. | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
  998. | Public Key type: rsa
  999. | Public Key bits: 2048
  1000. | Signature Algorithm: sha256WithRSAEncryption
  1001. | Not valid before: 2018-12-06T00:00:00
  1002. | Not valid after: 2020-12-06T12:00:00
  1003. | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
  1004. |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
  1005. 995/tcp open ssl/pop3 syn-ack ttl 57 Dovecot pop3d
  1006. |_pop3-capabilities: UIDL RESP-CODES PIPELINING USER AUTH-RESP-CODE SASL(PLAIN) TOP CAPA
  1007. | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
  1008. | Subject Alternative Name: DNS:mail.livemail.co.uk
  1009. | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
  1010. | Public Key type: rsa
  1011. | Public Key bits: 2048
  1012. | Signature Algorithm: sha256WithRSAEncryption
  1013. | Not valid before: 2018-12-06T00:00:00
  1014. | Not valid after: 2020-12-06T12:00:00
  1015. | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
  1016. |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
  1017. Device type: general purpose|storage-misc
  1018. Scanning ip 104.47.21.36 (mail-lo2gbr010036.inbound.protection.outlook.com (PTR)):
  1019. Scanning ip 134.170.140.0 ():
  1020. Scanning ip 213.199.154.0 ():
  1021. Scanning ip 23.103.191.0 ():
  1022. Scanning ip 40.107.0.0 ():
  1023. Scanning ip 40.92.0.0 ():
  1024. Scanning ip 157.56.112.0 ():
  1025. Scanning ip 207.46.51.64 ():
  1026. Scanning ip 104.47.0.0 ():
  1027. Scanning ip 213.199.180.128 ():
  1028. Scanning ip 217.160.82.244 (ns2.livedns.co.uk (PTR)):
  1029. 53/tcp open domain syn-ack ttl 59 PowerDNS 3.3 or later
  1030. | dns-nsid:
  1031. | NSID: dns-pub-nl-ams-nkf03.server.lan (646e732d7075622d6e6c2d616d732d6e6b6630332e7365727665722e6c616e)
  1032. | id.server: dns-pub-nl-ams-nkf03.server.lan
  1033. |_ bind.version: Served by PowerDNS - https://www.powerdns.com/
  1034. Scanning ip 23.103.200.0 ():
  1035. Scanning ip 104.47.20.36 (mail-cwlgbr010036.inbound.protection.outlook.com (PTR)):
  1036. WebCrawling domain's web servers... up to 50 max links.
  1037.  
  1038. + URL to crawl: http://webmail.mundesley-pc.gov.uk.
  1039. + Date: 2019-09-05
  1040.  
  1041. + Crawling URL: http://webmail.mundesley-pc.gov.uk.:
  1042. + Links:
  1043. + Crawling http://webmail.mundesley-pc.gov.uk.
  1044. + Crawling http://webmail.mundesley-pc.gov.uk./skins/googie_larry/styles.css?s=1426489652 (File! Not crawling it.)
  1045. + Crawling http://webmail.mundesley-pc.gov.uk./skins/googie_larry/svggradients.css?s=1401897190 (File! Not crawling it.)
  1046. + Crawling http://webmail.mundesley-pc.gov.uk./skins/googie_larry/iehacks.css?s=1401897190 (File! Not crawling it.)
  1047. + Crawling http://webmail.mundesley-pc.gov.uk./skins/googie_larry/ie7hacks.css?s=1401897190 (File! Not crawling it.)
  1048. + Crawling http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/larry/jquery-ui.css?s=1566991207 (File! Not crawling it.)
  1049. + Crawling http://webmail.mundesley-pc.gov.uk./skins/googie_larry/ui.js?s=1401897190 (File! Not crawling it.)
  1050. + Crawling http://webmail.mundesley-pc.gov.uk./fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,800,700,600,300 (404 Not Found)
  1051. + Crawling http://webmail.mundesley-pc.gov.uk./program/js/jquery.min.js?s=1566991445 (File! Not crawling it.)
  1052. + Crawling http://webmail.mundesley-pc.gov.uk./program/js/common.min.js?s=1566991207 (File! Not crawling it.)
  1053. + Crawling http://webmail.mundesley-pc.gov.uk./program/js/app.min.js?s=1566991207 (File! Not crawling it.)
  1054. + Crawling http://webmail.mundesley-pc.gov.uk./program/js/jstz.min.js?s=1566991446 (File! Not crawling it.)
  1055. + Crawling http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/jquery-ui.min.js?s=1566991207 (File! Not crawling it.)
  1056. + Crawling http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/i18n/jquery.ui.datepicker-en-GB.js?s=1566991207 (File! Not crawling it.)
  1057. + Searching for directories...
  1058. - Found: http://webmail.mundesley-pc.gov.uk./fonts.googleapis.com/
  1059. - Found: http://webmail.mundesley-pc.gov.uk./skins/
  1060. - Found: http://webmail.mundesley-pc.gov.uk./skins/googie_larry/
  1061. - Found: http://webmail.mundesley-pc.gov.uk./skins/googie_larry/images/
  1062. - Found: http://webmail.mundesley-pc.gov.uk./branding/
  1063. - Found: http://webmail.mundesley-pc.gov.uk./branding/fasthosts/
  1064. - Found: http://webmail.mundesley-pc.gov.uk./plugins/
  1065. - Found: http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/
  1066. - Found: http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/
  1067. - Found: http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/larry/
  1068. - Found: http://webmail.mundesley-pc.gov.uk./program/
  1069. - Found: http://webmail.mundesley-pc.gov.uk./program/js/
  1070. - Found: http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/
  1071. - Found: http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/i18n/
  1072. + Searching open folders...
  1073. - http://webmail.mundesley-pc.gov.uk./fonts.googleapis.com/ (404 Not Found)
  1074. - http://webmail.mundesley-pc.gov.uk./skins/ (403 Forbidden)
  1075. - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/ (403 Forbidden)
  1076. - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/images/ (403 Forbidden)
  1077. - http://webmail.mundesley-pc.gov.uk./branding/ (403 Forbidden)
  1078. - http://webmail.mundesley-pc.gov.uk./branding/fasthosts/ (403 Forbidden)
  1079. - http://webmail.mundesley-pc.gov.uk./plugins/ (403 Forbidden)
  1080. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/ (403 Forbidden)
  1081. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/ (403 Forbidden)
  1082. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/larry/ (403 Forbidden)
  1083. - http://webmail.mundesley-pc.gov.uk./program/ (403 Forbidden)
  1084. - http://webmail.mundesley-pc.gov.uk./program/js/ (403 Forbidden)
  1085. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/ (403 Forbidden)
  1086. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/i18n/ (403 Forbidden)
  1087. + Crawl finished successfully.
  1088. ----------------------------------------------------------------------
  1089. Summary of http://http://webmail.mundesley-pc.gov.uk.
  1090. ----------------------------------------------------------------------
  1091. + Links crawled:
  1092. - http://webmail.mundesley-pc.gov.uk.
  1093. - http://webmail.mundesley-pc.gov.uk./fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,800,700,600,300 (404 Not Found)
  1094. Total links crawled: 2
  1095.  
  1096. + Links to files found:
  1097. - http://webmail.mundesley-pc.gov.uk./branding/fasthosts/whitelabel.jpg
  1098. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/i18n/jquery.ui.datepicker-en-GB.js?s=1566991207
  1099. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/jquery-ui.min.js?s=1566991207
  1100. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/larry/jquery-ui.css?s=1566991207
  1101. - http://webmail.mundesley-pc.gov.uk./program/js/app.min.js?s=1566991207
  1102. - http://webmail.mundesley-pc.gov.uk./program/js/common.min.js?s=1566991207
  1103. - http://webmail.mundesley-pc.gov.uk./program/js/jquery.min.js?s=1566991445
  1104. - http://webmail.mundesley-pc.gov.uk./program/js/jstz.min.js?s=1566991446
  1105. - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/ie7hacks.css?s=1401897190
  1106. - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/iehacks.css?s=1401897190
  1107. - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/images/favicon.ico
  1108. - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/styles.css?s=1426489652
  1109. - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/svggradients.css?s=1401897190
  1110. - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/ui.js?s=1401897190
  1111. Total links to files: 14
  1112.  
  1113. + Externals links found:
  1114. Total external links: 0
  1115.  
  1116. + Email addresses found:
  1117. Total email address found: 0
  1118.  
  1119. + Directories found:
  1120. - http://webmail.mundesley-pc.gov.uk./branding/ (403 Forbidden)
  1121. - http://webmail.mundesley-pc.gov.uk./branding/fasthosts/ (403 Forbidden)
  1122. - http://webmail.mundesley-pc.gov.uk./fonts.googleapis.com/ (404 Not Found)
  1123. - http://webmail.mundesley-pc.gov.uk./plugins/ (403 Forbidden)
  1124. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/ (403 Forbidden)
  1125. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/ (403 Forbidden)
  1126. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/js/i18n/ (403 Forbidden)
  1127. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/ (403 Forbidden)
  1128. - http://webmail.mundesley-pc.gov.uk./plugins/jqueryui/themes/larry/ (403 Forbidden)
  1129. - http://webmail.mundesley-pc.gov.uk./program/ (403 Forbidden)
  1130. - http://webmail.mundesley-pc.gov.uk./program/js/ (403 Forbidden)
  1131. - http://webmail.mundesley-pc.gov.uk./skins/ (403 Forbidden)
  1132. - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/ (403 Forbidden)
  1133. - http://webmail.mundesley-pc.gov.uk./skins/googie_larry/images/ (403 Forbidden)
  1134. Total directories: 14
  1135.  
  1136. + Directory indexing found:
  1137. Total directories with indexing: 0
  1138.  
  1139. ----------------------------------------------------------------------
  1140.  
  1141.  
  1142. + URL to crawl: https://webmail.mundesley-pc.gov.uk.
  1143. + Date: 2019-09-05
  1144.  
  1145. + Crawling URL: https://webmail.mundesley-pc.gov.uk.:
  1146. + Links:
  1147. + Crawling https://webmail.mundesley-pc.gov.uk.
  1148. + Searching for directories...
  1149. + Searching open folders...
  1150.  
  1151. --Finished--
  1152. Summary information for domain mundesley-pc.gov.uk.
  1153. -----------------------------------------
  1154.  
  1155. Domain Ips Information:
  1156. IP: 65.55.169.0
  1157. Type: SPF
  1158. Is Active: True (reset ttl 64)
  1159. IP: 52.100.0.0
  1160. Type: SPF
  1161. Is Active: True (reset ttl 64)
  1162. IP: 89.145.78.0
  1163. HostName: www.mundesley-pc.gov.uk. Type: A
  1164. Country: United Kingdom
  1165. Is Active: True (reset ttl 64)
  1166. Port: 53/tcp open domain syn-ack ttl 50 ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
  1167. Script Info: | dns-nsid:
  1168. Script Info: |_ bind.version: 9.11.4-P2-RedHat-9.11.4-9.P2.el7
  1169. Script Info: Running (JUST GUESSING): Linux 2.6.X|4.X|3.X (91%)
  1170. Os Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
  1171. IP: 65.55.88.0
  1172. Type: SPF
  1173. Is Active: True (reset ttl 64)
  1174. IP: 207.46.100.0
  1175. Type: SPF
  1176. Is Active: True (reset ttl 64)
  1177. IP: 157.55.234.0
  1178. Type: SPF
  1179. Is Active: True (reset ttl 64)
  1180. IP: 94.245.120.64
  1181. Type: SPF
  1182. Is Active: True (reset ttl 64)
  1183. IP: 216.32.180.0
  1184. Type: SPF
  1185. Is Active: True (reset ttl 64)
  1186. IP: 213.171.216.231
  1187. HostName: webmail.mundesley-pc.gov.uk. Type: A
  1188. Country: United Kingdom
  1189. Is Active: True (echo-reply ttl 246)
  1190. Port: 80/tcp open http syn-ack ttl 55 nginx
  1191. Script Info: |_http-favicon: Unknown favicon MD5: C158FFDB11844ECC3EE02B86AA8E1A0B
  1192. Script Info: | http-methods:
  1193. Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
  1194. Script Info: |_http-title: Webmail :: Welcome to Webmail
  1195. Port: 443/tcp open ssl/http syn-ack ttl 55 nginx
  1196. Script Info: | http-methods:
  1197. Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
  1198. Script Info: |_http-title: Webmail :: Welcome to Webmail
  1199. Script Info: | ssl-cert: Subject: commonName=webmail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
  1200. Script Info: | Subject Alternative Name: DNS:webmail.livemail.co.uk
  1201. Script Info: | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
  1202. Script Info: | Public Key type: rsa
  1203. Script Info: | Public Key bits: 2048
  1204. Script Info: | Signature Algorithm: sha256WithRSAEncryption
  1205. Script Info: | Not valid before: 2018-12-10T00:00:00
  1206. Script Info: | Not valid after: 2020-12-09T12:00:00
  1207. Script Info: | MD5: e6ce 8502 b7b4 cf72 ac63 d3ab 19d7 acad
  1208. Script Info: |_SHA-1: cd2f e5b3 1740 fd64 335d 9b7f 9861 6b65 4a8c 5709
  1209. Script Info: |_ssl-date: TLS randomness does not represent time
  1210. Script Info: | tls-alpn:
  1211. Script Info: |_ http/1.1
  1212. Script Info: | tls-nextprotoneg:
  1213. Script Info: |_ http/1.1
  1214. Script Info: Device type: general purpose|storage-misc|media device|WAP
  1215. Script Info: Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (87%), HP embedded (85%), Infomir embedded (85%), Ubiquiti embedded (85%), Ubiquiti AirOS 5.X (85%)
  1216. IP: 217.160.81.244
  1217. HostName: ns1.livedns.co.uk Type: NS
  1218. HostName: ns1.livedns.co.uk Type: PTR
  1219. Country: Germany
  1220. Is Active: True (reset ttl 64)
  1221. Port: 53/tcp open domain syn-ack ttl 59 PowerDNS 3.3 or later
  1222. Script Info: | dns-nsid:
  1223. Script Info: | NSID: dns-pub-nl-ams-nkf04.server.lan (646e732d7075622d6e6c2d616d732d6e6b6630342e7365727665722e6c616e)
  1224. Script Info: | id.server: dns-pub-nl-ams-nkf04.server.lan
  1225. Script Info: |_ bind.version: Served by PowerDNS - https://www.powerdns.com/
  1226. IP: 23.103.128.0
  1227. Type: SPF
  1228. Is Active: True (reset ttl 64)
  1229. IP: 213.171.216.50
  1230. HostName: smtp.mundesley-pc.gov.uk. Type: A
  1231. Country: United Kingdom
  1232. Is Active: True (reset ttl 64)
  1233. Port: 465/tcp open ssl/smtps? syn-ack ttl 55
  1234. Script Info: |_smtp-commands: Couldn't establish connection on port 465
  1235. Port: 587/tcp open smtp syn-ack ttl 57 Postfix smtpd
  1236. Script Info: |_smtp-commands: smtp.livemail.co.uk, PIPELINING, SIZE 153600000, VRFY, ETRN, STARTTLS, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
  1237. Script Info: |_ssl-date: TLS randomness does not represent time
  1238. Script Info: Device type: storage-misc|general purpose
  1239. Script Info: Running (JUST GUESSING): HP embedded (85%), Linux 3.X|4.X (85%)
  1240. Os Info: Host: smtp.livemail.co.uk
  1241. IP: 64.4.22.64
  1242. Type: SPF
  1243. Is Active: True (reset ttl 64)
  1244. IP: 157.56.110.0
  1245. Type: SPF
  1246. Is Active: True (reset ttl 64)
  1247. IP: 23.103.208.0
  1248. Type: SPF
  1249. Is Active: True (reset ttl 64)
  1250. IP: 23.103.198.0
  1251. Type: SPF
  1252. Is Active: True (reset ttl 64)
  1253. IP: 207.46.163.0
  1254. Type: SPF
  1255. Is Active: True (reset ttl 64)
  1256. IP: 213.171.216.40
  1257. HostName: mail.mundesley-pc.gov.uk. Type: A
  1258. Country: United Kingdom
  1259. Is Active: True (echo-reply ttl 246)
  1260. Port: 110/tcp open pop3 syn-ack ttl 55 Dovecot pop3d
  1261. Script Info: |_pop3-capabilities: STLS RESP-CODES AUTH-RESP-CODE UIDL PIPELINING USER SASL(PLAIN) TOP CAPA
  1262. Script Info: | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
  1263. Script Info: | Subject Alternative Name: DNS:mail.livemail.co.uk
  1264. Script Info: | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
  1265. Script Info: | Public Key type: rsa
  1266. Script Info: | Public Key bits: 2048
  1267. Script Info: | Signature Algorithm: sha256WithRSAEncryption
  1268. Script Info: | Not valid before: 2018-12-06T00:00:00
  1269. Script Info: | Not valid after: 2020-12-06T12:00:00
  1270. Script Info: | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
  1271. Script Info: |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
  1272. Port: 143/tcp open imap syn-ack ttl 55 Dovecot imapd
  1273. Script Info: |_imap-capabilities: more STARTTLS LOGIN-REFERRALS have SASL-IR listed IDLE LITERAL+ OK post-login capabilities ID ENABLE IMAP4rev1 AUTH=PLAINA0001 Pre-login
  1274. Script Info: | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
  1275. Script Info: | Subject Alternative Name: DNS:mail.livemail.co.uk
  1276. Script Info: | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
  1277. Script Info: | Public Key type: rsa
  1278. Script Info: | Public Key bits: 2048
  1279. Script Info: | Signature Algorithm: sha256WithRSAEncryption
  1280. Script Info: | Not valid before: 2018-12-06T00:00:00
  1281. Script Info: | Not valid after: 2020-12-06T12:00:00
  1282. Script Info: | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
  1283. Script Info: |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
  1284. Port: 993/tcp open ssl/imap syn-ack ttl 55 Dovecot imapd
  1285. Script Info: |_imap-capabilities: have LOGIN-REFERRALS more SASL-IR listed IDLE LITERAL+ OK post-login capabilities ID ENABLE IMAP4rev1 AUTH=PLAINA0001 Pre-login
  1286. Script Info: | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
  1287. Script Info: | Subject Alternative Name: DNS:mail.livemail.co.uk
  1288. Script Info: | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
  1289. Script Info: | Public Key type: rsa
  1290. Script Info: | Public Key bits: 2048
  1291. Script Info: | Signature Algorithm: sha256WithRSAEncryption
  1292. Script Info: | Not valid before: 2018-12-06T00:00:00
  1293. Script Info: | Not valid after: 2020-12-06T12:00:00
  1294. Script Info: | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
  1295. Script Info: |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
  1296. Port: 995/tcp open ssl/pop3 syn-ack ttl 57 Dovecot pop3d
  1297. Script Info: |_pop3-capabilities: UIDL RESP-CODES PIPELINING USER AUTH-RESP-CODE SASL(PLAIN) TOP CAPA
  1298. Script Info: | ssl-cert: Subject: commonName=mail.livemail.co.uk/organizationName=Fasthosts Internet Limited/stateOrProvinceName=Gloucestershire/countryName=GB
  1299. Script Info: | Subject Alternative Name: DNS:mail.livemail.co.uk
  1300. Script Info: | Issuer: commonName=Thawte TLS RSA CA G1/organizationName=DigiCert Inc/countryName=US
  1301. Script Info: | Public Key type: rsa
  1302. Script Info: | Public Key bits: 2048
  1303. Script Info: | Signature Algorithm: sha256WithRSAEncryption
  1304. Script Info: | Not valid before: 2018-12-06T00:00:00
  1305. Script Info: | Not valid after: 2020-12-06T12:00:00
  1306. Script Info: | MD5: fa44 ec75 70eb 9d71 2787 1022 09c3 d5f8
  1307. Script Info: |_SHA-1: 869e a9ca a4f4 f83e 1b80 9056 13db 9adc 15de c62d
  1308. Script Info: Device type: general purpose|storage-misc
  1309. IP: 104.47.21.36
  1310. HostName: mundesleypc-gov-uk02c.mail.protection.outlook.com Type: MX
  1311. HostName: mail-lo2gbr010036.inbound.protection.outlook.com Type: PTR
  1312. Country: United States
  1313. Is Active: True (reset ttl 64)
  1314. IP: 134.170.140.0
  1315. Type: SPF
  1316. Is Active: True (reset ttl 64)
  1317. IP: 213.199.154.0
  1318. Type: SPF
  1319. Is Active: True (reset ttl 64)
  1320. IP: 23.103.191.0
  1321. Type: SPF
  1322. Is Active: True (reset ttl 64)
  1323. IP: 40.107.0.0
  1324. Type: SPF
  1325. Is Active: True (reset ttl 64)
  1326. IP: 40.92.0.0
  1327. Type: SPF
  1328. Is Active: True (reset ttl 64)
  1329. IP: 157.56.112.0
  1330. Type: SPF
  1331. Is Active: True (reset ttl 64)
  1332. IP: 207.46.51.64
  1333. Type: SPF
  1334. Is Active: True (reset ttl 64)
  1335. IP: 104.47.0.0
  1336. Type: SPF
  1337. Is Active: True (reset ttl 64)
  1338. IP: 213.199.180.128
  1339. Type: SPF
  1340. Is Active: True (reset ttl 64)
  1341. IP: 217.160.82.244
  1342. HostName: ns2.livedns.co.uk Type: NS
  1343. HostName: ns2.livedns.co.uk Type: PTR
  1344. Country: Germany
  1345. Is Active: True (echo-reply ttl 59)
  1346. Port: 53/tcp open domain syn-ack ttl 59 PowerDNS 3.3 or later
  1347. Script Info: | dns-nsid:
  1348. Script Info: | NSID: dns-pub-nl-ams-nkf03.server.lan (646e732d7075622d6e6c2d616d732d6e6b6630332e7365727665722e6c616e)
  1349. Script Info: | id.server: dns-pub-nl-ams-nkf03.server.lan
  1350. Script Info: |_ bind.version: Served by PowerDNS - https://www.powerdns.com/
  1351. IP: 23.103.200.0
  1352. Type: SPF
  1353. Is Active: True (reset ttl 64)
  1354. IP: 104.47.20.36
  1355. HostName: mundesleypc-gov-uk02c.mail.protection.outlook.com Type: MX
  1356. HostName: mail-cwlgbr010036.inbound.protection.outlook.com Type: PTR
  1357. Country: United States
  1358. Is Active: True (reset ttl 64)
  1359. #######################################################################################################################################
  1360. [+] www.mundesley-pc.gov.uk has no SPF record!
  1361. [*] No DMARC record found. Looking for organizational record
  1362. [+] No organizational DMARC record
  1363. [+] Spoofing possible for www.mundesley-pc.gov.uk!
  1364. #######################################################################################################################################
  1365. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:05 EDT
  1366. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  1367. Host is up (0.17s latency).
  1368. rDNS record for 89.145.78.0: pegasus.terrassl.net
  1369. Not shown: 410 filtered ports, 36 closed ports
  1370. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  1371. PORT STATE SERVICE
  1372. 19/tcp open chargen
  1373. 21/tcp open ftp
  1374. 22/tcp open ssh
  1375. 23/tcp open telnet
  1376. 53/tcp open domain
  1377. 79/tcp open finger
  1378. 80/tcp open http
  1379. 110/tcp open pop3
  1380. 137/tcp open netbios-ns
  1381. 143/tcp open imap
  1382. 407/tcp open timbuktu
  1383. 443/tcp open https
  1384. 465/tcp open smtps
  1385. 587/tcp open submission
  1386. 617/tcp open sco-dtmgr
  1387. 993/tcp open imaps
  1388. 995/tcp open pop3s
  1389. 1158/tcp open lsnr
  1390. 1720/tcp open h323q931
  1391. 1723/tcp open pptp
  1392. 2000/tcp open cisco-sccp
  1393. 2222/tcp open EtherNetIP-1
  1394. 3306/tcp open mysql
  1395. 5000/tcp open upnp
  1396. 5432/tcp open postgresql
  1397. 5900/tcp open vnc
  1398. 6106/tcp open isdninfo
  1399. 6667/tcp open irc
  1400. 7000/tcp open afs3-fileserver
  1401. 8080/tcp open http-proxy
  1402. 8686/tcp open sun-as-jmxrmi
  1403. 8899/tcp open ospf-lite
  1404. 9002/tcp open dynamid
  1405. 9010/tcp open sdr
  1406. 10008/tcp open octopus
  1407. 12345/tcp open netbus
  1408. 22222/tcp open easyengine
  1409.  
  1410. Nmap done: 1 IP address (1 host up) scanned in 10.25 seconds
  1411. #######################################################################################################################################
  1412. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:05 EDT
  1413. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  1414. Host is up (0.076s latency).
  1415. rDNS record for 89.145.78.0: pegasus.terrassl.net
  1416. Not shown: 2 filtered ports
  1417. PORT STATE SERVICE
  1418. 53/udp open domain
  1419. 67/udp open|filtered dhcps
  1420. 68/udp open|filtered dhcpc
  1421. 69/udp open|filtered tftp
  1422. 88/udp open|filtered kerberos-sec
  1423. 123/udp open|filtered ntp
  1424. 139/udp open|filtered netbios-ssn
  1425. 161/udp open|filtered snmp
  1426. 162/udp open|filtered snmptrap
  1427. 389/udp open|filtered ldap
  1428. 500/udp open|filtered isakmp
  1429. 520/udp open|filtered route
  1430. 2049/udp open|filtered nfs
  1431.  
  1432. Nmap done: 1 IP address (1 host up) scanned in 2.03 seconds
  1433. #######################################################################################################################################
  1434. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:05 EDT
  1435. NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
  1436. NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
  1437. NSE: [ftp-brute] passwords: Time limit 3m00s exceeded.
  1438. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  1439. Host is up (0.17s latency).
  1440. rDNS record for 89.145.78.0: pegasus.terrassl.net
  1441.  
  1442. PORT STATE SERVICE VERSION
  1443. 21/tcp open ftp Pure-FTPd
  1444. | ftp-brute:
  1445. | Accounts: No valid accounts found
  1446. |_ Statistics: Performed 5835 guesses in 591 seconds, average tps: 9.7
  1447. |_ftp-libopie: ERROR: Script execution failed (use -d to debug)
  1448. |_vulscan: ERROR: Script execution failed (use -d to debug)
  1449. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1450. Device type: specialized|WAP|phone
  1451. Running: iPXE 1.X, Linux 2.4.X|2.6.X, Sony Ericsson embedded
  1452. OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:sonyericsson:u8i_vivaz
  1453. OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone
  1454.  
  1455. TRACEROUTE (using port 21/tcp)
  1456. HOP RTT ADDRESS
  1457. 1 65.77 ms 10.245.204.1
  1458. 2 97.61 ms R43.static.amanah.com (104.245.144.129)
  1459. 3 97.64 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
  1460. 4 97.66 ms te0-0-0-1.agr13.yyz02.atlas.cogentco.com (154.24.54.37)
  1461. 5 97.65 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141)
  1462. 6 97.67 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
  1463. 7 ... 8
  1464. 9 161.96 ms GLOBAL-CROS.ear2.London15.Level3.net (64.209.97.98)
  1465. 10 129.17 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
  1466. 11 156.42 ms 83-223-96-109.as29017.net (83.223.96.109)
  1467. 12 158.10 ms be11.asr01.thn.as20860.net (130.180.202.24)
  1468. 13 158.05 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  1469. 14 158.11 ms po256.net2.north.dc5.as20860.net (130.180.203.6)
  1470. 15 158.09 ms 1-103-223-83.xssl.net (83.223.103.1)
  1471. 16 ... 30
  1472. #######################################################################################################################################
  1473. # general
  1474. (gen) banner: SSH-2.0-OpenSSH_7.4
  1475. (gen) software: OpenSSH 7.4
  1476. (gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
  1477. (gen) compression: enabled ([email protected])
  1478.  
  1479. # key exchange algorithms
  1480. (kex) curve25519-sha256 -- [warn] unknown algorithm
  1481. (kex) [email protected] -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
  1482. (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
  1483. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  1484. (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
  1485. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  1486. (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
  1487. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  1488. (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
  1489. `- [info] available since OpenSSH 4.4
  1490. (kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
  1491. (kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
  1492. (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1493. `- [warn] using weak hashing algorithm
  1494. `- [info] available since OpenSSH 2.3.0
  1495. (kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
  1496. (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
  1497. `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
  1498. (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1499. `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
  1500. `- [warn] using small 1024-bit modulus
  1501. `- [warn] using weak hashing algorithm
  1502. `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
  1503.  
  1504. # host-key algorithms
  1505. (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
  1506. (key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
  1507. (key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
  1508. (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
  1509. `- [warn] using weak random number generator could reveal the key
  1510. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  1511. (key) ssh-ed25519 -- [info] available since OpenSSH 6.5
  1512.  
  1513. # encryption algorithms (ciphers)
  1514. (enc) [email protected] -- [info] available since OpenSSH 6.5
  1515. `- [info] default cipher since OpenSSH 6.9.
  1516. (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
  1517. (enc) aes192-ctr -- [info] available since OpenSSH 3.7
  1518. (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
  1519. (enc) [email protected] -- [info] available since OpenSSH 6.2
  1520. (enc) [email protected] -- [info] available since OpenSSH 6.2
  1521. (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1522. `- [warn] using weak cipher mode
  1523. `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
  1524. (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1525. `- [warn] using weak cipher mode
  1526. `- [info] available since OpenSSH 2.3.0
  1527. (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1528. `- [warn] using weak cipher mode
  1529. `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
  1530. (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1531. `- [fail] disabled since Dropbear SSH 0.53
  1532. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  1533. `- [warn] using weak cipher mode
  1534. `- [warn] using small 64-bit block size
  1535. `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
  1536. (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1537. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  1538. `- [warn] using weak cipher mode
  1539. `- [warn] using small 64-bit block size
  1540. `- [info] available since OpenSSH 2.1.0
  1541. (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1542. `- [warn] using weak cipher
  1543. `- [warn] using weak cipher mode
  1544. `- [warn] using small 64-bit block size
  1545. `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
  1546.  
  1547. # message authentication code algorithms
  1548. (mac) [email protected] -- [warn] using small 64-bit tag size
  1549. `- [info] available since OpenSSH 6.2
  1550. (mac) [email protected] -- [info] available since OpenSSH 6.2
  1551. (mac) [email protected] -- [info] available since OpenSSH 6.2
  1552. (mac) [email protected] -- [info] available since OpenSSH 6.2
  1553. (mac) [email protected] -- [warn] using weak hashing algorithm
  1554. `- [info] available since OpenSSH 6.2
  1555. (mac) [email protected] -- [warn] using encrypt-and-MAC mode
  1556. `- [warn] using small 64-bit tag size
  1557. `- [info] available since OpenSSH 4.7
  1558. (mac) [email protected] -- [warn] using encrypt-and-MAC mode
  1559. `- [info] available since OpenSSH 6.2
  1560. (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
  1561. `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
  1562. (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
  1563. `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
  1564. (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
  1565. `- [warn] using weak hashing algorithm
  1566. `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
  1567.  
  1568. # algorithm recommendations (for OpenSSH 7.4)
  1569. (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
  1570. (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
  1571. (rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
  1572. (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
  1573. (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
  1574. (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
  1575. (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
  1576. (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
  1577. (rec) -blowfish-cbc -- enc algorithm to remove
  1578. (rec) -3des-cbc -- enc algorithm to remove
  1579. (rec) -aes256-cbc -- enc algorithm to remove
  1580. (rec) -cast128-cbc -- enc algorithm to remove
  1581. (rec) -aes192-cbc -- enc algorithm to remove
  1582. (rec) -aes128-cbc -- enc algorithm to remove
  1583. (rec) -hmac-sha2-512 -- mac algorithm to remove
  1584. (rec) [email protected] -- mac algorithm to remove
  1585. (rec) -hmac-sha2-256 -- mac algorithm to remove
  1586. (rec) [email protected] -- mac algorithm to remove
  1587. (rec) -hmac-sha1 -- mac algorithm to remove
  1588. (rec) [email protected] -- mac algorithm to remove
  1589. (rec) [email protected] -- mac algorithm to remove
  1590. #######################################################################################################################################
  1591. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:16 EDT
  1592. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  1593. Host is up (0.13s latency).
  1594. rDNS record for 89.145.78.0: pegasus.terrassl.net
  1595.  
  1596. PORT STATE SERVICE VERSION
  1597. 22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
  1598. |_ssh-auth-methods: ERROR: Script execution failed (use -d to debug)
  1599. |_ssh-brute: ERROR: Script execution failed (use -d to debug)
  1600. |_ssh-publickey-acceptance: ERROR: Script execution failed (use -d to debug)
  1601. |_ssh-run: ERROR: Script execution failed (use -d to debug)
  1602. | vulners:
  1603. | cpe:/a:openbsd:openssh:7.4:
  1604. | CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
  1605. |_ CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
  1606. |_vulscan: ERROR: Script execution failed (use -d to debug)
  1607. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1608. Device type: general purpose
  1609. Running: Linux 2.6.X
  1610. OS CPE: cpe:/o:linux:linux_kernel:2.6
  1611. OS details: Linux 2.6.18 - 2.6.22
  1612.  
  1613. TRACEROUTE (using port 22/tcp)
  1614. HOP RTT ADDRESS
  1615. 1 64.44 ms 10.245.204.1
  1616. 2 96.08 ms R43.static.amanah.com (104.245.144.129)
  1617. 3 96.18 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
  1618. 4 96.17 ms te0-0-0-1.agr13.yyz02.atlas.cogentco.com (154.24.54.37)
  1619. 5 96.15 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141)
  1620. 6 96.17 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
  1621. 7 ... 8
  1622. 9 161.39 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
  1623. 10 128.14 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
  1624. 11 123.04 ms 83-223-96-111.as29017.net (83.223.96.111)
  1625. 12 180.28 ms be11.asr01.thn.as20860.net (130.180.202.24)
  1626. 13 180.28 ms be10.asr02.dc5.as20860.net (130.180.202.47)
  1627. 14 145.73 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  1628. 15 180.24 ms 1-103-223-83.xssl.net (83.223.103.1)
  1629. 16 ... 30
  1630. #######################################################################################################################################
  1631. USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
  1632. RHOSTS => www.mundesley-pc.gov.uk
  1633. RHOST => www.mundesley-pc.gov.uk
  1634. [*] 89.145.78.0:22 - SSH - Using malformed packet technique
  1635. [*] 89.145.78.0:22 - SSH - Starting scan
  1636. [-] 89.145.78.0:22 - SSH - User 'admin' on could not connect
  1637. [-] 89.145.78.0:22 - SSH - User 'administrator' on could not connect
  1638. [-] 89.145.78.0:22 - SSH - User 'anonymous' on could not connect
  1639. [-] 89.145.78.0:22 - SSH - User 'backup' on could not connect
  1640. [-] 89.145.78.0:22 - SSH - User 'bee' on could not connect
  1641. [-] 89.145.78.0:22 - SSH - User 'ftp' on could not connect
  1642. [-] 89.145.78.0:22 - SSH - User 'guest' on could not connect
  1643. [-] 89.145.78.0:22 - SSH - User 'GUEST' on could not connect
  1644. [-] 89.145.78.0:22 - SSH - User 'info' on could not connect
  1645. [-] 89.145.78.0:22 - SSH - User 'mail' on could not connect
  1646. [+] 89.145.78.0:22 - SSH - User 'mailadmin' found
  1647. [+] 89.145.78.0:22 - SSH - User 'msfadmin' found
  1648. [+] 89.145.78.0:22 - SSH - User 'mysql' found
  1649. [+] 89.145.78.0:22 - SSH - User 'nobody' found
  1650. [+] 89.145.78.0:22 - SSH - User 'oracle' found
  1651. [+] 89.145.78.0:22 - SSH - User 'owaspbwa' found
  1652. [+] 89.145.78.0:22 - SSH - User 'postfix' found
  1653. [+] 89.145.78.0:22 - SSH - User 'postgres' found
  1654. [+] 89.145.78.0:22 - SSH - User 'private' found
  1655. [+] 89.145.78.0:22 - SSH - User 'proftpd' found
  1656. [+] 89.145.78.0:22 - SSH - User 'public' found
  1657. [+] 89.145.78.0:22 - SSH - User 'root' found
  1658. [+] 89.145.78.0:22 - SSH - User 'superadmin' found
  1659. [+] 89.145.78.0:22 - SSH - User 'support' found
  1660. [-] 89.145.78.0:22 - SSH - User 'sys' on could not connect
  1661. [-] 89.145.78.0:22 - SSH - User 'system' on could not connect
  1662. [-] 89.145.78.0:22 - SSH - User 'systemadmin' on could not connect
  1663. [-] 89.145.78.0:22 - SSH - User 'systemadministrator' on could not connect
  1664. [-] 89.145.78.0:22 - SSH - User 'test' on could not connect
  1665. [-] 89.145.78.0:22 - SSH - User 'tomcat' on could not connect
  1666. [-] 89.145.78.0:22 - SSH - User 'user' on could not connect
  1667. [-] 89.145.78.0:22 - SSH - User 'webmaster' on could not connect
  1668. [-] 89.145.78.0:22 - SSH - User 'www-data' on could not connect
  1669. [-] 89.145.78.0:22 - SSH - User 'Fortimanager_Access' on could not connect
  1670. [*] Scanned 1 of 1 hosts (100% complete)
  1671. [*] Auxiliary module execution completed
  1672. #######################################################################################################################################
  1673. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:33 EDT
  1674. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  1675. Host is up.
  1676. rDNS record for 89.145.78.0: pegasus.terrassl.net
  1677.  
  1678. PORT STATE SERVICE VERSION
  1679. 23/tcp filtered telnet
  1680. Too many fingerprints match this host to give specific OS details
  1681.  
  1682. TRACEROUTE (using proto 1/icmp)
  1683. HOP RTT ADDRESS
  1684. 1 68.42 ms 10.245.204.1
  1685. 2 100.68 ms R43.static.amanah.com (104.245.144.129)
  1686. 3 100.73 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
  1687. 4 100.75 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
  1688. 5 100.73 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
  1689. 6 100.75 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
  1690. 7 ... 8
  1691. 9 167.06 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
  1692. 10 134.08 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
  1693. 11 129.24 ms 83-223-96-111.as29017.net (83.223.96.111)
  1694. 12 182.98 ms be11.asr01.thn.as20860.net (130.180.202.24)
  1695. 13 182.92 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  1696. 14 150.61 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  1697. 15 182.95 ms 1-103-223-83.xssl.net (83.223.103.1)
  1698. 16 ... 30
  1699. #######################################################################################################################################
  1700. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:34 EDT
  1701. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  1702. Host is up.
  1703. rDNS record for 89.145.78.0: pegasus.terrassl.net
  1704.  
  1705. PORT STATE SERVICE VERSION
  1706. 53/tcp filtered domain
  1707. Too many fingerprints match this host to give specific OS details
  1708.  
  1709. Host script results:
  1710. | dns-brute:
  1711. | DNS Brute-force hostnames:
  1712. | www.mundesley-pc.gov.uk - 89.145.78.0
  1713. | mail.mundesley-pc.gov.uk - 213.171.216.40
  1714. |_ smtp.mundesley-pc.gov.uk - 213.171.216.50
  1715.  
  1716. TRACEROUTE (using proto 1/icmp)
  1717. HOP RTT ADDRESS
  1718. 1 64.17 ms 10.245.204.1
  1719. 2 96.03 ms R43.static.amanah.com (104.245.144.129)
  1720. 3 96.07 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
  1721. 4 96.09 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
  1722. 5 96.07 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
  1723. 6 96.11 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
  1724. 7 ... 8
  1725. 9 160.37 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
  1726. 10 127.82 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
  1727. 11 140.47 ms 83-223-96-111.as29017.net (83.223.96.111)
  1728. 12 180.85 ms be11.asr01.thn.as20860.net (130.180.202.24)
  1729. 13 180.85 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  1730. 14 144.96 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  1731. 15 180.84 ms 1-103-223-83.xssl.net (83.223.103.1)
  1732. 16 ... 30
  1733. #######################################################################################################################################
  1734. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:34 EDT
  1735. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  1736. Host is up.
  1737. rDNS record for 89.145.78.0: pegasus.terrassl.net
  1738.  
  1739. PORT STATE SERVICE VERSION
  1740. 79/tcp filtered finger
  1741. Too many fingerprints match this host to give specific OS details
  1742.  
  1743. TRACEROUTE (using proto 1/icmp)
  1744. HOP RTT ADDRESS
  1745. 1 64.54 ms 10.245.204.1
  1746. 2 96.16 ms R43.static.amanah.com (104.245.144.129)
  1747. 3 96.16 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
  1748. 4 96.16 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
  1749. 5 96.16 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
  1750. 6 96.19 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
  1751. 7 115.89 ms ae-13-3511.ear2.London15.Level3.net (4.69.167.146)
  1752. 8 189.77 ms ae-13-3511.ear2.London15.Level3.net (4.69.167.146)
  1753. 9 160.69 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
  1754. 10 128.65 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
  1755. 11 156.97 ms 83-223-96-111.as29017.net (83.223.96.111)
  1756. 12 159.43 ms be11.asr01.thn.as20860.net (130.180.202.24)
  1757. 13 159.37 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  1758. 14 159.32 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  1759. 15 159.37 ms 1-103-223-83.xssl.net (83.223.103.1)
  1760. 16 ... 30
  1761. #######################################################################################################################################
  1762. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:34 EDT
  1763. NSE: Loaded 164 scripts for scanning.
  1764. NSE: Script Pre-scanning.
  1765. Initiating NSE at 03:34
  1766. Completed NSE at 03:34, 0.00s elapsed
  1767. Initiating NSE at 03:34
  1768. Completed NSE at 03:34, 0.00s elapsed
  1769. Initiating Parallel DNS resolution of 1 host. at 03:34
  1770. Completed Parallel DNS resolution of 1 host. at 03:34, 0.02s elapsed
  1771. Initiating SYN Stealth Scan at 03:34
  1772. Scanning www.mundesley-pc.gov.uk (89.145.78.0) [1 port]
  1773. Completed SYN Stealth Scan at 03:34, 0.54s elapsed (1 total ports)
  1774. Initiating Service scan at 03:34
  1775. Initiating OS detection (try #1) against www.mundesley-pc.gov.uk (89.145.78.0)
  1776. Retrying OS detection (try #2) against www.mundesley-pc.gov.uk (89.145.78.0)
  1777. Initiating Traceroute at 03:35
  1778. Completed Traceroute at 03:35, 6.21s elapsed
  1779. Initiating Parallel DNS resolution of 14 hosts. at 03:35
  1780. Completed Parallel DNS resolution of 14 hosts. at 03:35, 0.18s elapsed
  1781. NSE: Script scanning 89.145.78.0.
  1782. Initiating NSE at 03:35
  1783. Completed NSE at 03:35, 0.35s elapsed
  1784. Initiating NSE at 03:35
  1785. Completed NSE at 03:35, 0.00s elapsed
  1786. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  1787. Host is up.
  1788. rDNS record for 89.145.78.0: pegasus.terrassl.net
  1789.  
  1790. PORT STATE SERVICE VERSION
  1791. 80/tcp filtered http
  1792. Too many fingerprints match this host to give specific OS details
  1793.  
  1794. TRACEROUTE (using proto 1/icmp)
  1795. HOP RTT ADDRESS
  1796. 1 64.51 ms 10.245.204.1
  1797. 2 96.19 ms R43.static.amanah.com (104.245.144.129)
  1798. 3 96.24 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
  1799. 4 96.28 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
  1800. 5 96.25 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
  1801. 6 96.29 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
  1802. 7 172.27 ms ae-13-3511.ear2.London15.Level3.net (4.69.167.146)
  1803. 8 172.26 ms ae-13-3511.ear2.London15.Level3.net (4.69.167.146)
  1804. 9 172.30 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
  1805. 10 172.31 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
  1806. 11 133.23 ms 83-223-96-111.as29017.net (83.223.96.111)
  1807. 12 194.87 ms be11.asr01.thn.as20860.net (130.180.202.24)
  1808. 13 194.81 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  1809. 14 162.54 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  1810. 15 194.81 ms 1-103-223-83.xssl.net (83.223.103.1)
  1811. 16 ... 30
  1812.  
  1813. NSE: Script Post-scanning.
  1814. Initiating NSE at 03:35
  1815. Completed NSE at 03:35, 0.00s elapsed
  1816. Initiating NSE at 03:35
  1817. Completed NSE at 03:35, 0.00s elapsed
  1818. #######################################################################################################################################
  1819. HTTP/1.1 403 Forbidden
  1820. Connection: close
  1821. Cache-Control: no-cache, no-store, must-revalidate
  1822. Pragma: no-cache
  1823. Expires: 0
  1824. Server: Apache/2.2.16 (Debian)
  1825. Content-Length: 188986
  1826.  
  1827. HTTP/1.1 403 Forbidden
  1828. Connection: close
  1829. Cache-Control: no-cache, no-store, must-revalidate
  1830. Pragma: no-cache
  1831. Expires: 0
  1832. Server: Apache/2.2.16 (Debian)
  1833. Content-Length: 188986
  1834. #######################################################################################################################################
  1835. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:38 EDT
  1836. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  1837. Host is up (0.20s latency).
  1838. rDNS record for 89.145.78.0: pegasus.terrassl.net
  1839.  
  1840. PORT STATE SERVICE VERSION
  1841. 110/tcp filtered pop3
  1842. Too many fingerprints match this host to give specific OS details
  1843. Network Distance: 16 hops
  1844.  
  1845. TRACEROUTE (using port 80/tcp)
  1846. HOP RTT ADDRESS
  1847. 1 107.44 ms 10.245.204.1
  1848. 2 140.33 ms R43.static.amanah.com (104.245.144.129)
  1849. 3 140.40 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
  1850. 4 140.42 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
  1851. 5 140.39 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
  1852. 6 140.41 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
  1853. 7 113.60 ms ae-12-3510.ear2.London15.Level3.net (4.69.167.142)
  1854. 8 189.68 ms ae-12-3510.ear2.London15.Level3.net (4.69.167.142)
  1855. 9 191.30 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
  1856. 10 140.52 ms ae2.core-1.maylands.hml.uk.as29017.net (89.145.125.77)
  1857. 11 137.99 ms 83-223-96-111.as29017.net (83.223.96.111)
  1858. 12 193.17 ms be11.asr01.ld5.as20860.net (130.180.202.26)
  1859. 13 193.12 ms be10.asr02.dc5.as20860.net (130.180.202.47)
  1860. 14 161.14 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  1861. 15 193.12 ms 1-103-223-83.xssl.net (83.223.103.1)
  1862. 16 193.03 ms pegasus.terrassl.net (89.145.78.0)
  1863. #######################################################################################################################################
  1864. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:40 EDT
  1865. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  1866. Host is up (0.15s latency).
  1867. rDNS record for 89.145.78.0: pegasus.terrassl.net
  1868.  
  1869. PORT STATE SERVICE VERSION
  1870. 137/tcp open ftp ProFTPD 1.3.1
  1871. | vulners:
  1872. | cpe:/a:proftpd:proftpd:1.3.1:
  1873. | CVE-2011-4130 9.0 https://vulners.com/cve/CVE-2011-4130
  1874. | CVE-2010-3867 7.1 https://vulners.com/cve/CVE-2010-3867
  1875. | CVE-2010-4652 6.8 https://vulners.com/cve/CVE-2010-4652
  1876. | CVE-2009-0543 6.8 https://vulners.com/cve/CVE-2009-0543
  1877. | CVE-2009-3639 5.8 https://vulners.com/cve/CVE-2009-3639
  1878. | CVE-2011-1137 5.0 https://vulners.com/cve/CVE-2011-1137
  1879. | CVE-2008-7265 4.0 https://vulners.com/cve/CVE-2008-7265
  1880. |_ CVE-2012-6095 1.2 https://vulners.com/cve/CVE-2012-6095
  1881. |_vulscan: ERROR: Script execution failed (use -d to debug)
  1882. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1883. Device type: general purpose|specialized|storage-misc
  1884. Running (JUST GUESSING): Linux 3.X|4.X (91%), Crestron 2-Series (87%), HP embedded (85%), Oracle VM Server 3.X (85%)
  1885. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:crestron:2_series cpe:/h:hp:p2000_g3 cpe:/o:oracle:vm_server:3.4.2 cpe:/o:linux:linux_kernel:4.1
  1886. Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.2 - 4.9 (91%), Linux 3.18 (87%), Crestron XPanel control system (87%), Linux 3.16 (86%), HP P2000 G3 NAS device (85%), Oracle VM Server 3.4.2 (Linux 4.1) (85%)
  1887. No exact OS matches for host (test conditions non-ideal).
  1888. Network Distance: 16 hops
  1889. Service Info: OS: Unix
  1890.  
  1891. TRACEROUTE (using port 80/tcp)
  1892. HOP RTT ADDRESS
  1893. 1 120.87 ms 10.245.204.1
  1894. 2 152.66 ms R43.static.amanah.com (104.245.144.129)
  1895. 3 152.76 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
  1896. 4 152.78 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
  1897. 5 152.74 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
  1898. 6 152.76 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
  1899. 7 ... 8
  1900. 9 206.49 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
  1901. 10 152.79 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
  1902. 11 124.99 ms 83-223-96-111.as29017.net (83.223.96.111)
  1903. 12 174.64 ms be11.asr01.thn.as20860.net (130.180.202.24)
  1904. 13 174.65 ms be10.asr02.dc5.as20860.net (130.180.202.47)
  1905. 14 174.68 ms po256.net2.north.dc5.as20860.net (130.180.203.6)
  1906. 15 174.65 ms 1-103-223-83.xssl.net (83.223.103.1)
  1907. 16 174.56 ms pegasus.terrassl.net (89.145.78.0)
  1908. #######################################################################################################################################
  1909. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:41 EDT
  1910. NSE: Loaded 164 scripts for scanning.
  1911. NSE: Script Pre-scanning.
  1912. Initiating NSE at 03:41
  1913. Completed NSE at 03:41, 0.00s elapsed
  1914. Initiating NSE at 03:41
  1915. Completed NSE at 03:41, 0.00s elapsed
  1916. Initiating Parallel DNS resolution of 1 host. at 03:41
  1917. Completed Parallel DNS resolution of 1 host. at 03:41, 0.03s elapsed
  1918. Initiating SYN Stealth Scan at 03:41
  1919. Scanning www.mundesley-pc.gov.uk (89.145.78.0) [1 port]
  1920. Discovered open port 443/tcp on 89.145.78.0
  1921. Completed SYN Stealth Scan at 03:41, 0.15s elapsed (1 total ports)
  1922. Initiating Service scan at 03:41
  1923. Scanning 1 service on www.mundesley-pc.gov.uk (89.145.78.0)
  1924. Completed Service scan at 03:41, 13.53s elapsed (1 service on 1 host)
  1925. Initiating OS detection (try #1) against www.mundesley-pc.gov.uk (89.145.78.0)
  1926. Retrying OS detection (try #2) against www.mundesley-pc.gov.uk (89.145.78.0)
  1927. Initiating Traceroute at 03:41
  1928. Completed Traceroute at 03:41, 0.36s elapsed
  1929. Initiating Parallel DNS resolution of 16 hosts. at 03:41
  1930. Completed Parallel DNS resolution of 16 hosts. at 03:41, 0.27s elapsed
  1931. NSE: Script scanning 89.145.78.0.
  1932. Initiating NSE at 03:41
  1933. NSE: [http-wordpress-enum 89.145.78.0:443] got no answers from pipelined queries
  1934. Completed NSE at 03:49, 487.78s elapsed
  1935. Initiating NSE at 03:49
  1936. Completed NSE at 03:49, 2.00s elapsed
  1937. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  1938. Host is up (0.14s latency).
  1939. rDNS record for 89.145.78.0: pegasus.terrassl.net
  1940.  
  1941. PORT STATE SERVICE VERSION
  1942. 443/tcp open ssl/http Apache httpd 2.2.16 ((Debian))
  1943. |_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
  1944. | http-brute:
  1945. |_ Path "/" does not require authentication
  1946. |_http-chrono: Request times for /; avg: 16202.77ms; min: 16170.08ms; max: 16280.27ms
  1947. |_http-csrf: Couldn't find any CSRF vulnerabilities.
  1948. |_http-devframework: Wordpress detected. Found common traces on /
  1949. |_http-dombased-xss: Couldn't find any DOM based XSS.
  1950. |_http-errors: ERROR: Script execution failed (use -d to debug)
  1951. |_http-feed: Couldn't find any feeds.
  1952. |_http-fetch: Please enter the complete path of the directory to save data in.
  1953. |_http-jsonp-detection: Couldn't find any JSONP endpoints.
  1954. |_http-mobileversion-checker: No mobile version detected.
  1955. | http-robots.txt: 1 disallowed entry
  1956. |_/
  1957. | http-security-headers:
  1958. | Strict_Transport_Security:
  1959. | HSTS not configured in HTTPS Server
  1960. | Cache_Control:
  1961. | Header: Cache-Control: no-cache, no-store, must-revalidate
  1962. | Pragma:
  1963. | Header: Pragma: no-cache
  1964. | Expires:
  1965. |_ Header: Expires: 0
  1966. | http-sitemap-generator:
  1967. | Directory structure:
  1968. | Longest directory structure:
  1969. | Depth: 0
  1970. | Dir: /
  1971. | Total files found (by extension):
  1972. |_
  1973. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
  1974. |_http-traceroute: ERROR: Script execution failed (use -d to debug)
  1975. | http-vhosts:
  1976. | 51 names had status 403
  1977. |_76 names had status ERROR
  1978. |_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
  1979. |_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
  1980. |_http-xssed: No previously reported XSS vuln.
  1981. | vulners:
  1982. | cpe:/a:apache:http_server:2.2.16:
  1983. | CVE-2011-3192 7.8 https://vulners.com/cve/CVE-2011-3192
  1984. | CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
  1985. | CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
  1986. | CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
  1987. | CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
  1988. | CVE-2013-2249 7.5 https://vulners.com/cve/CVE-2013-2249
  1989. | CVE-2012-0883 6.9 https://vulners.com/cve/CVE-2012-0883
  1990. | CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
  1991. | CVE-2013-1862 5.1 https://vulners.com/cve/CVE-2013-1862
  1992. | CVE-2014-0231 5.0 https://vulners.com/cve/CVE-2014-0231
  1993. | CVE-2014-0098 5.0 https://vulners.com/cve/CVE-2014-0098
  1994. | CVE-2013-6438 5.0 https://vulners.com/cve/CVE-2013-6438
  1995. | CVE-2012-4557 5.0 https://vulners.com/cve/CVE-2012-4557
  1996. | CVE-2011-3368 5.0 https://vulners.com/cve/CVE-2011-3368
  1997. | CVE-2012-0031 4.6 https://vulners.com/cve/CVE-2012-0031
  1998. | CVE-2011-3607 4.4 https://vulners.com/cve/CVE-2011-3607
  1999. | CVE-2016-4975 4.3 https://vulners.com/cve/CVE-2016-4975
  2000. | CVE-2013-1896 4.3 https://vulners.com/cve/CVE-2013-1896
  2001. | CVE-2012-4558 4.3 https://vulners.com/cve/CVE-2012-4558
  2002. | CVE-2012-3499 4.3 https://vulners.com/cve/CVE-2012-3499
  2003. | CVE-2012-0053 4.3 https://vulners.com/cve/CVE-2012-0053
  2004. | CVE-2011-4317 4.3 https://vulners.com/cve/CVE-2011-4317
  2005. | CVE-2011-3639 4.3 https://vulners.com/cve/CVE-2011-3639
  2006. | CVE-2011-3348 4.3 https://vulners.com/cve/CVE-2011-3348
  2007. | CVE-2011-0419 4.3 https://vulners.com/cve/CVE-2011-0419
  2008. | CVE-2016-8612 3.3 https://vulners.com/cve/CVE-2016-8612
  2009. | CVE-2012-2687 2.6 https://vulners.com/cve/CVE-2012-2687
  2010. |_ CVE-2011-4415 1.2 https://vulners.com/cve/CVE-2011-4415
  2011. |_vulscan: ERROR: Script execution failed (use -d to debug)
  2012. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  2013. Device type: general purpose|specialized|storage-misc
  2014. Running (JUST GUESSING): Linux 3.X|4.X (91%), Crestron 2-Series (87%), HP embedded (85%)
  2015. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:crestron:2_series cpe:/h:hp:p2000_g3
  2016. Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.2 - 4.9 (91%), Linux 3.18 (89%), Crestron XPanel control system (87%), Linux 3.16 (86%), HP P2000 G3 NAS device (85%)
  2017. No exact OS matches for host (test conditions non-ideal).
  2018. Uptime guess: 16.730 days (since Mon Aug 19 10:18:22 2019)
  2019. Network Distance: 16 hops
  2020. TCP Sequence Prediction: Difficulty=254 (Good luck!)
  2021. IP ID Sequence Generation: All zeros
  2022.  
  2023. TRACEROUTE (using port 443/tcp)
  2024. HOP RTT ADDRESS
  2025. 1 119.16 ms 10.245.204.1
  2026. 2 158.49 ms R43.static.amanah.com (104.245.144.129)
  2027. 3 158.45 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
  2028. 4 158.50 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
  2029. 5 158.43 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
  2030. 6 158.50 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
  2031. 7 236.40 ms ae-12-3510.ear2.London15.Level3.net (4.69.167.142)
  2032. 8 202.18 ms ae-13-3511.ear2.London15.Level3.net (4.69.167.146)
  2033. 9 236.47 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
  2034. 10 158.66 ms ae2.core-1.maylands.hml.uk.as29017.net (89.145.125.77)
  2035. 11 146.79 ms 83-223-96-111.as29017.net (83.223.96.111)
  2036. 12 194.51 ms be11.asr01.ld5.as20860.net (130.180.202.26)
  2037. 13 160.22 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  2038. 14 194.34 ms po256.net2.north.dc5.as20860.net (130.180.203.6)
  2039. 15 194.28 ms 1-103-223-83.xssl.net (83.223.103.1)
  2040. 16 194.33 ms pegasus.terrassl.net (89.145.78.0)
  2041.  
  2042. NSE: Script Post-scanning.
  2043. Initiating NSE at 03:49
  2044. Completed NSE at 03:49, 0.00s elapsed
  2045. Initiating NSE at 03:49
  2046. Completed NSE at 03:49, 0.00s elapsed
  2047. #######################################################################################################################################
  2048. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:55 EDT
  2049. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  2050. Host is up.
  2051. rDNS record for 89.145.78.0: pegasus.terrassl.net
  2052.  
  2053. PORT STATE SERVICE VERSION
  2054. 3306/tcp filtered mysql
  2055. Too many fingerprints match this host to give specific OS details
  2056.  
  2057. TRACEROUTE (using proto 1/icmp)
  2058. HOP RTT ADDRESS
  2059. 1 64.50 ms 10.245.204.1
  2060. 2 96.22 ms R43.static.amanah.com (104.245.144.129)
  2061. 3 96.32 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
  2062. 4 96.34 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
  2063. 5 96.31 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
  2064. 6 96.33 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
  2065. 7 ... 8
  2066. 9 160.48 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
  2067. 10 128.35 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
  2068. 11 121.24 ms 83-223-96-111.as29017.net (83.223.96.111)
  2069. 12 176.73 ms be11.asr01.thn.as20860.net (130.180.202.24)
  2070. 13 176.66 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  2071. 14 144.44 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  2072. 15 176.66 ms 1-103-223-83.xssl.net (83.223.103.1)
  2073. 16 ... 30
  2074. #######################################################################################################################################
  2075. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:55 EDT
  2076. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  2077. Host is up.
  2078. rDNS record for 89.145.78.0: pegasus.terrassl.net
  2079.  
  2080. PORT STATE SERVICE VERSION
  2081. 5432/tcp filtered postgresql
  2082. Too many fingerprints match this host to give specific OS details
  2083.  
  2084. TRACEROUTE (using proto 1/icmp)
  2085. HOP RTT ADDRESS
  2086. 1 117.53 ms 10.245.204.1
  2087. 2 149.44 ms R43.static.amanah.com (104.245.144.129)
  2088. 3 149.53 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
  2089. 4 149.55 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
  2090. 5 149.51 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
  2091. 6 149.54 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
  2092. 7 ... 8
  2093. 9 226.90 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
  2094. 10 149.68 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
  2095. 11 137.32 ms 83-223-96-111.as29017.net (83.223.96.111)
  2096. 12 185.30 ms be11.asr01.thn.as20860.net (130.180.202.24)
  2097. 13 185.24 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  2098. 14 185.18 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  2099. 15 185.24 ms 1-103-223-83.xssl.net (83.223.103.1)
  2100. 16 ... 30
  2101. #######################################################################################################################################
  2102. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 03:58 EDT
  2103. Nmap scan report for www.mundesley-pc.gov.uk (89.145.78.0)
  2104. Host is up.
  2105. rDNS record for 89.145.78.0: pegasus.terrassl.net
  2106.  
  2107. PORT STATE SERVICE VERSION
  2108. 6667/tcp filtered irc
  2109. Too many fingerprints match this host to give specific OS details
  2110.  
  2111. TRACEROUTE (using proto 1/icmp)
  2112. HOP RTT ADDRESS
  2113. 1 64.60 ms 10.245.204.1
  2114. 2 96.43 ms R43.static.amanah.com (104.245.144.129)
  2115. 3 96.48 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
  2116. 4 96.52 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
  2117. 5 96.54 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
  2118. 6 96.51 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
  2119. 7 ... 8
  2120. 9 172.20 ms GYRON-INTER.ear2.London15.Level3.net (64.209.96.150)
  2121. 10 172.21 ms ae2.core-2.maylands.hml.uk.as29017.net (89.145.125.69)
  2122. 11 133.51 ms 83-223-96-111.as29017.net (83.223.96.111)
  2123. 12 200.21 ms be11.asr01.thn.as20860.net (130.180.202.24)
  2124. 13 200.13 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  2125. 14 165.86 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  2126. 15 200.16 ms 1-103-223-83.xssl.net (83.223.103.1)
  2127. 16 ... 30
  2128. #######################################################################################################################################
  2129. dnsenum VERSION:1.2.4
  2130.  
  2131. ----- 89.145.78.0 -----
  2132.  
  2133.  
  2134. Host's addresses:
  2135. __________________
  2136.  
  2137.  
  2138.  
  2139. Name Servers:
  2140. ______________
  2141.  
  2142. dns3.xssl.net. 1800 IN A 217.194.223.66
  2143. dns1.xssl.net. 1799 IN A 82.145.61.87
  2144. dns2.xssl.net. 1800 IN A 185.181.126.158
  2145.  
  2146.  
  2147. Mail (MX) Servers:
  2148. ___________________
  2149.  
  2150.  
  2151.  
  2152. Trying Zone Transfers and getting Bind Versions:
  2153. _________________________________________________
  2154.  
  2155.  
  2156. Trying Zone Transfer for 89.145.78.0 on dns3.xssl.net ...
  2157.  
  2158. Trying Zone Transfer for 89.145.78.0 on dns1.xssl.net ...
  2159.  
  2160. Trying Zone Transfer for 89.145.78.0 on dns2.xssl.net ...
  2161.  
  2162. brute force file not specified, bay.
  2163. #######################################################################################################################################
  2164. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:28 EDT
  2165. Nmap scan report for pegasus.terrassl.net (89.145.78.0)
  2166. Host is up (0.19s latency).
  2167. Not shown: 451 filtered ports, 3 closed ports
  2168. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  2169. PORT STATE SERVICE
  2170. 19/tcp open chargen
  2171. 21/tcp open ftp
  2172. 23/tcp open telnet
  2173. 53/tcp open domain
  2174. 79/tcp open finger
  2175. 80/tcp open http
  2176. 137/tcp open netbios-ns
  2177. 407/tcp open timbuktu
  2178. 443/tcp open https
  2179. 617/tcp open sco-dtmgr
  2180. 1158/tcp open lsnr
  2181. 1720/tcp open h323q931
  2182. 1723/tcp open pptp
  2183. 2000/tcp open cisco-sccp
  2184. 2222/tcp open EtherNetIP-1
  2185. 5000/tcp open upnp
  2186. 5432/tcp open postgresql
  2187. 5900/tcp open vnc
  2188. 6106/tcp open isdninfo
  2189. 6667/tcp open irc
  2190. 7000/tcp open afs3-fileserver
  2191. 8080/tcp open http-proxy
  2192. 8686/tcp open sun-as-jmxrmi
  2193. 8899/tcp open ospf-lite
  2194. 9002/tcp open dynamid
  2195. 9010/tcp open sdr
  2196. 10008/tcp open octopus
  2197. 12345/tcp open netbus
  2198. 22222/tcp open easyengine
  2199.  
  2200. Nmap done: 1 IP address (1 host up) scanned in 13.16 seconds
  2201. #######################################################################################################################################
  2202. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:29 EDT
  2203. Nmap scan report for pegasus.terrassl.net (89.145.78.0)
  2204. Host is up (0.15s latency).
  2205. Not shown: 2 filtered ports
  2206. PORT STATE SERVICE
  2207. 53/udp open domain
  2208. 67/udp open|filtered dhcps
  2209. 68/udp open|filtered dhcpc
  2210. 69/udp open|filtered tftp
  2211. 88/udp open|filtered kerberos-sec
  2212. 123/udp open|filtered ntp
  2213. 139/udp open|filtered netbios-ssn
  2214. 161/udp open|filtered snmp
  2215. 162/udp open|filtered snmptrap
  2216. 389/udp open|filtered ldap
  2217. 500/udp open|filtered isakmp
  2218. 520/udp open|filtered route
  2219. 2049/udp open|filtered nfs
  2220.  
  2221. Nmap done: 1 IP address (1 host up) scanned in 2.56 seconds
  2222. #######################################################################################################################################
  2223. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:29 EDT
  2224. Nmap scan report for pegasus.terrassl.net (89.145.78.0)
  2225. Host is up (0.24s latency).
  2226.  
  2227. PORT STATE SERVICE VERSION
  2228. 21/tcp open ftp?
  2229. | fingerprint-strings:
  2230. | DNSStatusRequestTCP, DNSVersionBindReqTCP, JavaRMI, LANDesk-RC, LDAPBindReq, NCP, NULL, NotesRPC, RPCCheck, SMBProgNeg, TerminalServer, X11Probe:
  2231. | 220 BitNinja FTP CAPTCHA server
  2232. | FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SIPOptions, SSLSessionReq, TLSSessionReq, TerminalServerCookie:
  2233. | 220 BitNinja FTP CAPTCHA server
  2234. |_ logged in.
  2235. |_ftp-bounce: bounce working!
  2236. | ftp-brute:
  2237. | Accounts:
  2238. | admin:admin - Valid credentials
  2239. | sysadmin:123456 - Valid credentials
  2240. | guest:123456 - Valid credentials
  2241. | user:123456 - Valid credentials
  2242. | web:123456789 - Valid credentials
  2243. | administrator:<empty> - Valid credentials
  2244. | netadmin:netadmin - Valid credentials
  2245. | root:<empty> - Valid credentials
  2246. | webadmin:webadmin - Valid credentials
  2247. | test:123456789 - Valid credentials
  2248. |_ Statistics: Performed 45 guesses in 11 seconds, average tps: 4.1
  2249. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  2250. SF-Port21-TCP:V=7.80%I=7%D=9/5%Time=5D70AB39%P=x86_64-pc-linux-gnu%r(NULL,
  2251. SF:20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n")%r(GenericLines,33,"
  2252. SF:220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20logged\x20in
  2253. SF:\.\n")%r(Help,33,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x20N
  2254. SF:ot\x20logged\x20in\.\n")%r(GetRequest,33,"220\x20BitNinja\x20FTP\x20CAP
  2255. SF:TCHA\x20server\n530\x20Not\x20logged\x20in\.\n")%r(HTTPOptions,33,"220\
  2256. SF:x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20logged\x20in\.\n
  2257. SF:")%r(RTSPRequest,33,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x
  2258. SF:20Not\x20logged\x20in\.\n")%r(RPCCheck,20,"220\x20BitNinja\x20FTP\x20CA
  2259. SF:PTCHA\x20server\n")%r(DNSVersionBindReqTCP,20,"220\x20BitNinja\x20FTP\x
  2260. SF:20CAPTCHA\x20server\n")%r(DNSStatusRequestTCP,20,"220\x20BitNinja\x20FT
  2261. SF:P\x20CAPTCHA\x20server\n")%r(SSLSessionReq,33,"220\x20BitNinja\x20FTP\x
  2262. SF:20CAPTCHA\x20server\n530\x20Not\x20logged\x20in\.\n")%r(TerminalServerC
  2263. SF:ookie,33,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20lo
  2264. SF:gged\x20in\.\n")%r(TLSSessionReq,33,"220\x20BitNinja\x20FTP\x20CAPTCHA\
  2265. SF:x20server\n530\x20Not\x20logged\x20in\.\n")%r(Kerberos,33,"220\x20BitNi
  2266. SF:nja\x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20logged\x20in\.\n")%r(SMB
  2267. SF:ProgNeg,20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n")%r(X11Probe,
  2268. SF:20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n")%r(FourOhFourRequest
  2269. SF:,33,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20logged\
  2270. SF:x20in\.\n")%r(LPDString,33,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server
  2271. SF:\n530\x20Not\x20logged\x20in\.\n")%r(LDAPSearchReq,33,"220\x20BitNinja\
  2272. SF:x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20logged\x20in\.\n")%r(LDAPBin
  2273. SF:dReq,20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n")%r(SIPOptions,3
  2274. SF:3,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n530\x20Not\x20logged\x2
  2275. SF:0in\.\n")%r(LANDesk-RC,20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\
  2276. SF:n")%r(TerminalServer,20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n"
  2277. SF:)%r(NCP,20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n")%r(NotesRPC,
  2278. SF:20,"220\x20BitNinja\x20FTP\x20CAPTCHA\x20server\n")%r(JavaRMI,20,"220\x
  2279. SF:20BitNinja\x20FTP\x20CAPTCHA\x20server\n");
  2280. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  2281. Device type: general purpose|specialized|storage-misc
  2282. Running (JUST GUESSING): Linux 3.X|4.X (91%), Crestron 2-Series (87%), HP embedded (85%), Oracle VM Server 3.X (85%)
  2283. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:crestron:2_series cpe:/h:hp:p2000_g3 cpe:/o:oracle:vm_server:3.4.2 cpe:/o:linux:linux_kernel:4.1
  2284. Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.2 - 4.9 (91%), Linux 3.18 (89%), Crestron XPanel control system (87%), Linux 3.16 (86%), HP P2000 G3 NAS device (85%), Oracle VM Server 3.4.2 (Linux 4.1) (85%)
  2285. No exact OS matches for host (test conditions non-ideal).
  2286. Network Distance: 12 hops
  2287.  
  2288. TRACEROUTE (using port 21/tcp)
  2289. HOP RTT ADDRESS
  2290. 1 179.57 ms 10.238.204.1
  2291. 2 190.51 ms 45.131.4.2
  2292. 3 190.50 ms 109.236.95.226
  2293. 4 190.54 ms 109.236.95.173
  2294. 5 190.57 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
  2295. 6 190.59 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
  2296. 7 190.61 ms 83-223-96-111.as29017.net (83.223.96.111)
  2297. 8 190.67 ms be11.asr01.thn.as20860.net (130.180.202.24)
  2298. 9 190.69 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  2299. 10 190.70 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  2300. 11 309.68 ms 1-103-223-83.xssl.net (83.223.103.1)
  2301. 12 299.44 ms pegasus.terrassl.net (89.145.78.0)
  2302. #######################################################################################################################################
  2303. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:33 EDT
  2304. Nmap scan report for pegasus.terrassl.net (89.145.78.0)
  2305. Host is up (0.11s latency).
  2306.  
  2307. PORT STATE SERVICE VERSION
  2308. 23/tcp open telnet?
  2309. | fingerprint-strings:
  2310. | DNSStatusRequestTCP, DNSVersionBindReqTCP, GenericLines, GetRequest, HTTPOptions, Help, RPCCheck, RTSPRequest, SSLSessionReq, tn3270:
  2311. | This is an unrestricted telnet server.
  2312. | Please do not user for production purposes
  2313. | bash: command not found
  2314. | NULL:
  2315. | This is an unrestricted telnet server.
  2316. |_ Please do not user for production purposes
  2317. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  2318. SF-Port23-TCP:V=7.80%I=7%D=9/5%Time=5D70AC30%P=x86_64-pc-linux-gnu%r(NULL,
  2319. SF:58,"This\x20is\x20an\x20unrestricted\x20telnet\x20server\.\r\nPlease\x2
  2320. SF:0do\x20not\x20user\x20for\x20production\x20purposes\r\n\r\n#\x20")%r(Ge
  2321. SF:nericLines,74,"This\x20is\x20an\x20unrestricted\x20telnet\x20server\.\r
  2322. SF:\nPlease\x20do\x20not\x20user\x20for\x20production\x20purposes\r\n\r\n#
  2323. SF:\x20\x20bash:\x20command\x20not\x20found\r\n#\x20")%r(tn3270,74,"This\x
  2324. SF:20is\x20an\x20unrestricted\x20telnet\x20server\.\r\nPlease\x20do\x20not
  2325. SF:\x20user\x20for\x20production\x20purposes\r\n\r\n#\x20\x20bash:\x20comm
  2326. SF:and\x20not\x20found\r\n#\x20")%r(GetRequest,74,"This\x20is\x20an\x20unr
  2327. SF:estricted\x20telnet\x20server\.\r\nPlease\x20do\x20not\x20user\x20for\x
  2328. SF:20production\x20purposes\r\n\r\n#\x20\x20bash:\x20command\x20not\x20fou
  2329. SF:nd\r\n#\x20")%r(HTTPOptions,74,"This\x20is\x20an\x20unrestricted\x20tel
  2330. SF:net\x20server\.\r\nPlease\x20do\x20not\x20user\x20for\x20production\x20
  2331. SF:purposes\r\n\r\n#\x20\x20bash:\x20command\x20not\x20found\r\n#\x20")%r(
  2332. SF:RTSPRequest,74,"This\x20is\x20an\x20unrestricted\x20telnet\x20server\.\
  2333. SF:r\nPlease\x20do\x20not\x20user\x20for\x20production\x20purposes\r\n\r\n
  2334. SF:#\x20\x20bash:\x20command\x20not\x20found\r\n#\x20")%r(RPCCheck,74,"Thi
  2335. SF:s\x20is\x20an\x20unrestricted\x20telnet\x20server\.\r\nPlease\x20do\x20
  2336. SF:not\x20user\x20for\x20production\x20purposes\r\n\r\n#\x20\x20bash:\x20c
  2337. SF:ommand\x20not\x20found\r\n#\x20")%r(DNSVersionBindReqTCP,74,"This\x20is
  2338. SF:\x20an\x20unrestricted\x20telnet\x20server\.\r\nPlease\x20do\x20not\x20
  2339. SF:user\x20for\x20production\x20purposes\r\n\r\n#\x20\x20bash:\x20command\
  2340. SF:x20not\x20found\r\n#\x20")%r(DNSStatusRequestTCP,74,"This\x20is\x20an\x
  2341. SF:20unrestricted\x20telnet\x20server\.\r\nPlease\x20do\x20not\x20user\x20
  2342. SF:for\x20production\x20purposes\r\n\r\n#\x20\x20bash:\x20command\x20not\x
  2343. SF:20found\r\n#\x20")%r(Help,74,"This\x20is\x20an\x20unrestricted\x20telne
  2344. SF:t\x20server\.\r\nPlease\x20do\x20not\x20user\x20for\x20production\x20pu
  2345. SF:rposes\r\n\r\n#\x20\x20bash:\x20command\x20not\x20found\r\n#\x20")%r(SS
  2346. SF:LSessionReq,74,"This\x20is\x20an\x20unrestricted\x20telnet\x20server\.\
  2347. SF:r\nPlease\x20do\x20not\x20user\x20for\x20production\x20purposes\r\n\r\n
  2348. SF:#\x20\x20bash:\x20command\x20not\x20found\r\n#\x20");
  2349. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  2350. Device type: specialized|WAP|phone
  2351. Running: iPXE 1.X, Linux 2.4.X|2.6.X, Sony Ericsson embedded
  2352. OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:sonyericsson:u8i_vivaz
  2353. OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone
  2354.  
  2355. TRACEROUTE (using port 23/tcp)
  2356. HOP RTT ADDRESS
  2357. 1 217.63 ms 10.238.204.1
  2358. 2 217.71 ms 45.131.4.3
  2359. 3 217.70 ms 109.236.95.226
  2360. 4 217.75 ms 109.236.95.167
  2361. 5 217.78 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
  2362. 6 217.81 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
  2363. 7 321.64 ms 83-223-96-111.as29017.net (83.223.96.111)
  2364. 8 321.68 ms be11.asr01.thn.as20860.net (130.180.202.24)
  2365. 9 321.70 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  2366. 10 113.47 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  2367. 11 304.14 ms 1-103-223-83.xssl.net (83.223.103.1)
  2368. 12 ... 30
  2369. #######################################################################################################################################
  2370. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:36 EDT
  2371. Nmap scan report for pegasus.terrassl.net (89.145.78.0)
  2372. Host is up (0.20s latency).
  2373.  
  2374. PORT STATE SERVICE VERSION
  2375. 53/tcp open domain ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
  2376. |_dns-fuzz: Server didn't response to our probe, can't fuzz
  2377. | dns-nsec-enum:
  2378. |_ No NSEC records found
  2379. | dns-nsec3-enum:
  2380. |_ DNSSEC NSEC3 not supported
  2381. | dns-nsid:
  2382. |_ bind.version: 9.11.4-P2-RedHat-9.11.4-9.P2.el7
  2383. |_vulscan: ERROR: Script execution failed (use -d to debug)
  2384. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  2385. Device type: general purpose
  2386. Running (JUST GUESSING): Linux 3.X|4.X (90%)
  2387. OS CPE: cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:4.4
  2388. Aggressive OS guesses: Linux 3.10 (90%), Linux 3.10 - 3.16 (90%), Linux 3.10 - 3.12 (89%), Linux 4.4 (89%), Linux 4.9 (89%), Linux 4.0 (88%)
  2389. No exact OS matches for host (test conditions non-ideal).
  2390. Network Distance: 12 hops
  2391. Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
  2392.  
  2393. Host script results:
  2394. | dns-brute:
  2395. | DNS Brute-force hostnames:
  2396. | admin.terrassl.net - 95.154.210.2
  2397. | alpha.terrassl.net - 212.113.145.34
  2398. | ns1.terrassl.net - 217.194.210.107
  2399. | ns2.terrassl.net - 84.22.166.196
  2400. | ns3.terrassl.net - 84.22.166.196
  2401. | mail.terrassl.net - 95.154.210.2
  2402. | www.terrassl.net - 95.154.210.2
  2403. |_ ftp.terrassl.net - 95.154.210.2
  2404.  
  2405. TRACEROUTE (using port 53/tcp)
  2406. HOP RTT ADDRESS
  2407. 1 217.68 ms 10.238.204.1
  2408. 2 217.72 ms 45.131.4.3
  2409. 3 217.72 ms 109.236.95.224
  2410. 4 217.74 ms 109.236.95.173
  2411. 5 322.25 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
  2412. 6 322.30 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
  2413. 7 322.35 ms 83-223-96-111.as29017.net (83.223.96.111)
  2414. 8 322.34 ms be11.asr01.thn.as20860.net (130.180.202.24)
  2415. 9 322.34 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  2416. 10 113.50 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  2417. 11 304.62 ms 1-103-223-83.xssl.net (83.223.103.1)
  2418. 12 307.93 ms pegasus.terrassl.net (89.145.78.0)
  2419. #######################################################################################################################################
  2420. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:36 EDT
  2421. Nmap scan report for pegasus.terrassl.net (89.145.78.0)
  2422. Host is up.
  2423.  
  2424. PORT STATE SERVICE VERSION
  2425. 79/tcp filtered finger
  2426. Too many fingerprints match this host to give specific OS details
  2427.  
  2428. TRACEROUTE (using proto 1/icmp)
  2429. HOP RTT ADDRESS
  2430. 1 258.91 ms 10.238.204.1
  2431. 2 258.97 ms 45.131.4.2
  2432. 3 258.96 ms 109.236.95.224
  2433. 4 259.00 ms 109.236.95.173
  2434. 5 259.02 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
  2435. 6 259.07 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
  2436. 7 259.10 ms 83-223-96-111.as29017.net (83.223.96.111)
  2437. 8 259.14 ms be11.asr01.thn.as20860.net (130.180.202.24)
  2438. 9 259.13 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  2439. 10 112.64 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  2440. 11 240.17 ms 1-103-223-83.xssl.net (83.223.103.1)
  2441. 12 ... 30
  2442. #######################################################################################################################################
  2443. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:36 EDT
  2444. NSE: Loaded 164 scripts for scanning.
  2445. NSE: Script Pre-scanning.
  2446. Initiating NSE at 02:36
  2447. Completed NSE at 02:36, 0.00s elapsed
  2448. Initiating NSE at 02:36
  2449. Completed NSE at 02:36, 0.00s elapsed
  2450. Initiating Parallel DNS resolution of 1 host. at 02:36
  2451. Completed Parallel DNS resolution of 1 host. at 02:36, 0.03s elapsed
  2452. Initiating SYN Stealth Scan at 02:36
  2453. Scanning pegasus.terrassl.net (89.145.78.0) [1 port]
  2454. Completed SYN Stealth Scan at 02:36, 0.55s elapsed (1 total ports)
  2455. Initiating Service scan at 02:36
  2456. Initiating OS detection (try #1) against pegasus.terrassl.net (89.145.78.0)
  2457. Retrying OS detection (try #2) against pegasus.terrassl.net (89.145.78.0)
  2458. Initiating Traceroute at 02:36
  2459. Completed Traceroute at 02:36, 6.27s elapsed
  2460. Initiating Parallel DNS resolution of 11 hosts. at 02:36
  2461. Completed Parallel DNS resolution of 11 hosts. at 02:36, 0.40s elapsed
  2462. NSE: Script scanning 89.145.78.0.
  2463. Initiating NSE at 02:36
  2464. Completed NSE at 02:36, 0.01s elapsed
  2465. Initiating NSE at 02:36
  2466. Completed NSE at 02:36, 0.00s elapsed
  2467. Nmap scan report for pegasus.terrassl.net (89.145.78.0)
  2468. Host is up.
  2469.  
  2470. PORT STATE SERVICE VERSION
  2471. 80/tcp filtered http
  2472. Too many fingerprints match this host to give specific OS details
  2473.  
  2474. TRACEROUTE (using proto 1/icmp)
  2475. HOP RTT ADDRESS
  2476. 1 248.46 ms 10.238.204.1
  2477. 2 248.54 ms 45.131.4.2
  2478. 3 248.53 ms 109.236.95.224
  2479. 4 248.58 ms 109.236.95.173
  2480. 5 248.60 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
  2481. 6 248.64 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
  2482. 7 248.68 ms 83-223-96-111.as29017.net (83.223.96.111)
  2483. 8 248.71 ms be11.asr01.thn.as20860.net (130.180.202.24)
  2484. 9 248.74 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  2485. 10 144.44 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  2486. 11 200.27 ms 1-103-223-83.xssl.net (83.223.103.1)
  2487. 12 ... 30
  2488.  
  2489. NSE: Script Post-scanning.
  2490. Initiating NSE at 02:36
  2491. Completed NSE at 02:36, 0.00s elapsed
  2492. Initiating NSE at 02:36
  2493. Completed NSE at 02:36, 0.00s elapsed
  2494. #######################################################################################################################################
  2495. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:42 EDT
  2496. NSE: Loaded 164 scripts for scanning.
  2497. NSE: Script Pre-scanning.
  2498. Initiating NSE at 02:42
  2499. Completed NSE at 02:42, 0.00s elapsed
  2500. Initiating NSE at 02:42
  2501. Completed NSE at 02:42, 0.00s elapsed
  2502. Initiating Parallel DNS resolution of 1 host. at 02:42
  2503. Completed Parallel DNS resolution of 1 host. at 02:42, 0.11s elapsed
  2504. Initiating SYN Stealth Scan at 02:42
  2505. Scanning pegasus.terrassl.net (89.145.78.0) [1 port]
  2506. Completed SYN Stealth Scan at 02:42, 0.54s elapsed (1 total ports)
  2507. Initiating Service scan at 02:42
  2508. Initiating OS detection (try #1) against pegasus.terrassl.net (89.145.78.0)
  2509. Retrying OS detection (try #2) against pegasus.terrassl.net (89.145.78.0)
  2510. Initiating Traceroute at 02:42
  2511. Completed Traceroute at 02:42, 6.27s elapsed
  2512. Initiating Parallel DNS resolution of 11 hosts. at 02:42
  2513. Completed Parallel DNS resolution of 11 hosts. at 02:42, 0.27s elapsed
  2514. NSE: Script scanning 89.145.78.0.
  2515. Initiating NSE at 02:42
  2516. Completed NSE at 02:42, 0.00s elapsed
  2517. Initiating NSE at 02:42
  2518. Completed NSE at 02:42, 0.00s elapsed
  2519. Nmap scan report for pegasus.terrassl.net (89.145.78.0)
  2520. Host is up.
  2521.  
  2522. PORT STATE SERVICE VERSION
  2523. 443/tcp filtered https
  2524. Too many fingerprints match this host to give specific OS details
  2525.  
  2526. TRACEROUTE (using proto 1/icmp)
  2527. HOP RTT ADDRESS
  2528. 1 145.07 ms 10.238.204.1
  2529. 2 249.16 ms 45.131.4.2
  2530. 3 249.11 ms 109.236.95.224
  2531. 4 249.20 ms 109.236.95.173
  2532. 5 249.28 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
  2533. 6 249.31 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
  2534. 7 249.34 ms 83-223-96-111.as29017.net (83.223.96.111)
  2535. 8 249.40 ms be11.asr01.thn.as20860.net (130.180.202.24)
  2536. 9 249.43 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  2537. 10 249.43 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  2538. 11 200.78 ms 1-103-223-83.xssl.net (83.223.103.1)
  2539. 12 ... 30
  2540.  
  2541. NSE: Script Post-scanning.
  2542. Initiating NSE at 02:42
  2543. Completed NSE at 02:42, 0.00s elapsed
  2544. Initiating NSE at 02:42
  2545. Completed NSE at 02:42, 0.00s elapsed
  2546. #######################################################################################################################################
  2547. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:48 EDT
  2548. Nmap scan report for pegasus.terrassl.net (89.145.78.0)
  2549. Host is up.
  2550.  
  2551. PORT STATE SERVICE VERSION
  2552. 5432/tcp filtered postgresql
  2553. Too many fingerprints match this host to give specific OS details
  2554.  
  2555. TRACEROUTE (using proto 1/icmp)
  2556. HOP RTT ADDRESS
  2557. 1 225.65 ms 10.238.204.1
  2558. 2 329.44 ms 45.131.4.2
  2559. 3 329.49 ms 109.236.95.224
  2560. 4 329.52 ms 109.236.95.173
  2561. 5 329.55 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
  2562. 6 329.58 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
  2563. 7 329.61 ms 83-223-96-111.as29017.net (83.223.96.111)
  2564. 8 329.64 ms be11.asr01.thn.as20860.net (130.180.202.24)
  2565. 9 329.68 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  2566. 10 121.43 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  2567. 11 311.67 ms 1-103-223-83.xssl.net (83.223.103.1)
  2568. 12 ... 30
  2569. #######################################################################################################################################
  2570. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:50 EDT
  2571. Nmap scan report for pegasus.terrassl.net (89.145.78.0)
  2572. Host is up.
  2573.  
  2574. PORT STATE SERVICE VERSION
  2575. 6667/tcp filtered irc
  2576. Too many fingerprints match this host to give specific OS details
  2577.  
  2578. TRACEROUTE (using proto 1/icmp)
  2579. HOP RTT ADDRESS
  2580. 1 220.94 ms 10.238.204.1
  2581. 2 324.83 ms 45.131.4.2
  2582. 3 324.80 ms 109.236.95.224
  2583. 4 324.86 ms 109.236.95.173
  2584. 5 324.88 ms ge-1-0-8.border-1.thn.lon.uk.as29017.net (80.249.209.84)
  2585. 6 324.93 ms ae3.core-2.maylands.hml.uk.as29017.net (89.145.125.34)
  2586. 7 324.91 ms 83-223-96-111.as29017.net (83.223.96.111)
  2587. 8 324.99 ms be11.asr01.thn.as20860.net (130.180.202.24)
  2588. 9 324.98 ms be10.asr01.dc5.as20860.net (130.180.202.45)
  2589. 10 116.51 ms po256.net1.north.dc5.as20860.net (130.180.203.4)
  2590. 11 307.27 ms 1-103-223-83.xssl.net (83.223.103.1)
  2591. 12 ... 30
  2592. #######################################################################################################################################
  2593. Starting Nmap 7.80 ( https://nmap.org ) at 2019-09-05 02:51 EDT
  2594. NSE: Loaded 47 scripts for scanning.
  2595. NSE: Script Pre-scanning.
  2596. Initiating NSE at 02:51
  2597. Completed NSE at 02:51, 0.00s elapsed
  2598. Initiating NSE at 02:51
  2599. Completed NSE at 02:51, 0.00s elapsed
  2600. Initiating Parallel DNS resolution of 1 host. at 02:51
  2601. Completed Parallel DNS resolution of 1 host. at 02:51, 0.02s elapsed
  2602. Initiating UDP Scan at 02:51
  2603. Scanning pegasus.terrassl.net (89.145.78.0) [15 ports]
  2604. Discovered open port 53/udp on 89.145.78.0
  2605. Completed UDP Scan at 02:51, 2.47s elapsed (15 total ports)
  2606. Initiating Service scan at 02:51
  2607. Scanning 13 services on pegasus.terrassl.net (89.145.78.0)
  2608. Service scan Timing: About 15.38% done; ETC: 03:02 (0:08:59 remaining)
  2609. Completed Service scan at 02:53, 102.59s elapsed (13 services on 1 host)
  2610. Initiating OS detection (try #1) against pegasus.terrassl.net (89.145.78.0)
  2611. Retrying OS detection (try #2) against pegasus.terrassl.net (89.145.78.0)
  2612. Initiating Traceroute at 02:53
  2613. Completed Traceroute at 02:53, 7.13s elapsed
  2614. Initiating Parallel DNS resolution of 1 host. at 02:53
  2615. Completed Parallel DNS resolution of 1 host. at 02:53, 0.00s elapsed
  2616. NSE: Script scanning 89.145.78.0.
  2617. Initiating NSE at 02:53
  2618. Completed NSE at 02:53, 7.83s elapsed
  2619. Initiating NSE at 02:53
  2620. Completed NSE at 02:53, 1.46s elapsed
  2621. Nmap scan report for pegasus.terrassl.net (89.145.78.0)
  2622. Host is up (0.19s latency).
  2623.  
  2624. PORT STATE SERVICE VERSION
  2625. 53/udp open domain ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
  2626. |_vulscan: ERROR: Script execution failed (use -d to debug)
  2627. 67/udp open|filtered dhcps
  2628. 68/udp open|filtered dhcpc
  2629. 69/udp open|filtered tftp
  2630. 88/udp open|filtered kerberos-sec
  2631. 123/udp open|filtered ntp
  2632. 137/udp filtered netbios-ns
  2633. 138/udp filtered netbios-dgm
  2634. 139/udp open|filtered netbios-ssn
  2635. 161/udp open|filtered snmp
  2636. 162/udp open|filtered snmptrap
  2637. 389/udp open|filtered ldap
  2638. 500/udp open|filtered isakmp
  2639. |_ike-version: ERROR: Script execution failed (use -d to debug)
  2640. 520/udp open|filtered route
  2641. 2049/udp open|filtered nfs
  2642. Too many fingerprints match this host to give specific OS details
  2643. Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
  2644.  
  2645. TRACEROUTE (using port 137/udp)
  2646. HOP RTT ADDRESS
  2647. 1 104.29 ms 10.238.204.1
  2648. 2 ... 3
  2649. 4 103.20 ms 10.238.204.1
  2650. 5 250.79 ms 10.238.204.1
  2651. 6 250.78 ms 10.238.204.1
  2652. 7 250.77 ms 10.238.204.1
  2653. 8 250.76 ms 10.238.204.1
  2654. 9 250.72 ms 10.238.204.1
  2655. 10 104.68 ms 10.238.204.1
  2656. 11 ... 18
  2657. 19 103.88 ms 10.238.204.1
  2658. 20 104.56 ms 10.238.204.1
  2659. 21 ... 28
  2660. 29 103.04 ms 10.238.204.1
  2661. 30 127.00 ms 10.238.204.1
  2662.  
  2663. NSE: Script Post-scanning.
  2664. Initiating NSE at 02:53
  2665. Completed NSE at 02:53, 0.00s elapsed
  2666. Initiating NSE at 02:53
  2667. Completed NSE at 02:53, 0.00s elapsed
  2668. Read data files from: /usr/bin/../share/nmap
  2669. #######################################################################################################################################
  2670. [+] URL: https://www.mundesley-pc.gov.uk/
  2671. [+] Started: Thu Sep 5 01:38:48 2019
  2672.  
  2673. Interesting Finding(s):
  2674.  
  2675. [+] https://www.mundesley-pc.gov.uk/
  2676. | Interesting Entry: Server: Apache
  2677. | Found By: Headers (Passive Detection)
  2678. | Confidence: 100%
  2679.  
  2680. [+] https://www.mundesley-pc.gov.uk/robots.txt
  2681. | Interesting Entries:
  2682. | - /wp-admin/
  2683. | - /wp-admin/admin-ajax.php
  2684. | Found By: Robots Txt (Aggressive Detection)
  2685. | Confidence: 100%
  2686.  
  2687. [+] https://www.mundesley-pc.gov.uk/xmlrpc.php
  2688. | Found By: Direct Access (Aggressive Detection)
  2689. | Confidence: 100%
  2690. | References:
  2691. | - http://codex.wordpress.org/XML-RPC_Pingback_API
  2692. | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
  2693. | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
  2694. | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
  2695. | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
  2696.  
  2697. [+] https://www.mundesley-pc.gov.uk/readme.html
  2698. | Found By: Direct Access (Aggressive Detection)
  2699. | Confidence: 100%
  2700.  
  2701. [+] https://www.mundesley-pc.gov.uk/wp-cron.php
  2702. | Found By: Direct Access (Aggressive Detection)
  2703. | Confidence: 60%
  2704. | References:
  2705. | - https://www.iplocation.net/defend-wordpress-from-ddos
  2706. | - https://github.com/wpscanteam/wpscan/issues/1299
  2707.  
  2708. [+] WordPress version 5.2.2 identified (Latest, released on 2019-06-18).
  2709. | Detected By: Meta Generator (Passive Detection)
  2710. | - https://www.mundesley-pc.gov.uk/, Match: 'WordPress 5.2.2'
  2711. | Confirmed By:
  2712. | Plugin And Theme Query Parameter In Homepage (Passive Detection)
  2713. | - https://www.mundesley-pc.gov.uk/wp-content/plugins/uk-cookie-consent/assets/css/style.css?ver=5.2.2
  2714. | - https://www.mundesley-pc.gov.uk/wp-content/plugins/ubermenu/pro/assets/css/skins/simplegreen.css?ver=5.2.2
  2715. | Rss Generator (Aggressive Detection)
  2716. | - https://www.mundesley-pc.gov.uk/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
  2717. | - https://www.mundesley-pc.gov.uk/comments/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
  2718.  
  2719. [+] WordPress theme in use: mundesleypc2017
  2720. | Location: https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/
  2721. | Style URL: https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/style.css
  2722. | Style Name: Mundesley Parish Council
  2723. | Style URI: https://www.mundesley-pc.gov.uk
  2724. | Description: A WordPress powered website with a custom theme (design)...
  2725. | Author: Josh.biz Web Design
  2726. | Author URI: http://www.josh.biz
  2727. |
  2728. | Detected By: Css Style (Passive Detection)
  2729. | Confirmed By: Urls In Homepage (Passive Detection)
  2730. |
  2731. | Version: 1.0 (80% confidence)
  2732. | Detected By: Style (Passive Detection)
  2733. | - https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/style.css, Match: 'Version: 1.0'
  2734.  
  2735. [+] Enumerating Users (via Passive and Aggressive Methods)
  2736. Brute Forcing Author IDs - Time: 00:01:00 <==> (10 / 10) 100.00% Time: 00:01:00
  2737.  
  2738. [i] User(s) Identified:
  2739.  
  2740. [+] Doreen
  2741. | Detected By: Rss Generator (Aggressive Detection)
  2742.  
  2743.  
  2744. [+] Finished: Thu Sep 5 01:47:33 2019
  2745. [+] Requests Done: 43
  2746. [+] Cached Requests: 14
  2747. [+] Data Sent: 5.981 KB
  2748. [+] Data Received: 147.783 KB
  2749. [+] Memory used: 95.906 MB
  2750. [+] Elapsed time: 00:08:44
  2751. #######################################################################################################################################
  2752. [+] URL: https://www.mundesley-pc.gov.uk/
  2753. [+] Started: Thu Sep 5 01:38:45 2019
  2754.  
  2755. Interesting Finding(s):
  2756.  
  2757. [+] https://www.mundesley-pc.gov.uk/
  2758. | Interesting Entry: Server: Apache
  2759. | Found By: Headers (Passive Detection)
  2760. | Confidence: 100%
  2761.  
  2762. [+] https://www.mundesley-pc.gov.uk/robots.txt
  2763. | Interesting Entries:
  2764. | - /wp-admin/
  2765. | - /wp-admin/admin-ajax.php
  2766. | Found By: Robots Txt (Aggressive Detection)
  2767. | Confidence: 100%
  2768.  
  2769. [+] https://www.mundesley-pc.gov.uk/xmlrpc.php
  2770. | Found By: Direct Access (Aggressive Detection)
  2771. | Confidence: 100%
  2772. | References:
  2773. | - http://codex.wordpress.org/XML-RPC_Pingback_API
  2774. | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
  2775. | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
  2776. | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
  2777. | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
  2778.  
  2779. [+] https://www.mundesley-pc.gov.uk/readme.html
  2780. | Found By: Direct Access (Aggressive Detection)
  2781. | Confidence: 100%
  2782.  
  2783. [+] https://www.mundesley-pc.gov.uk/wp-cron.php
  2784. | Found By: Direct Access (Aggressive Detection)
  2785. | Confidence: 60%
  2786. | References:
  2787. | - https://www.iplocation.net/defend-wordpress-from-ddos
  2788. | - https://github.com/wpscanteam/wpscan/issues/1299
  2789.  
  2790. [+] WordPress version 5.2.2 identified (Latest, released on 2019-06-18).
  2791. | Detected By: Meta Generator (Passive Detection)
  2792. | - https://www.mundesley-pc.gov.uk/, Match: 'WordPress 5.2.2'
  2793. | Confirmed By:
  2794. | Plugin And Theme Query Parameter In Homepage (Passive Detection)
  2795. | - https://www.mundesley-pc.gov.uk/wp-content/plugins/uk-cookie-consent/assets/css/style.css?ver=5.2.2
  2796. | - https://www.mundesley-pc.gov.uk/wp-content/plugins/ubermenu/pro/assets/css/skins/simplegreen.css?ver=5.2.2
  2797. | Rss Generator (Aggressive Detection)
  2798. | - https://www.mundesley-pc.gov.uk/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
  2799. | - https://www.mundesley-pc.gov.uk/comments/feed/, <generator>https://wordpress.org/?v=5.2.2</generator>
  2800.  
  2801. [+] WordPress theme in use: mundesleypc2017
  2802. | Location: https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/
  2803. | Style URL: https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/style.css
  2804. | Style Name: Mundesley Parish Council
  2805. | Style URI: https://www.mundesley-pc.gov.uk
  2806. | Description: A WordPress powered website with a custom theme (design)...
  2807. | Author: Josh.biz Web Design
  2808. | Author URI: http://www.josh.biz
  2809. |
  2810. | Detected By: Css Style (Passive Detection)
  2811. | Confirmed By: Urls In Homepage (Passive Detection)
  2812. |
  2813. | Version: 1.0 (80% confidence)
  2814. | Detected By: Style (Passive Detection)
  2815. | - https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/style.css, Match: 'Version: 1.0'
  2816.  
  2817. [+] Enumerating All Plugins (via Passive Methods)
  2818. [+] Checking Plugin Versions (via Passive and Aggressive Methods)
  2819.  
  2820. [i] Plugin(s) Identified:
  2821.  
  2822. [+] ari-fancy-lightbox
  2823. | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/ari-fancy-lightbox/
  2824. | Latest Version: 1.3.6 (up to date)
  2825. | Last Updated: 2019-04-06T06:31:00.000Z
  2826. |
  2827. | Detected By: Urls In Homepage (Passive Detection)
  2828. |
  2829. | Version: 1.3.6 (20% confidence)
  2830. | Detected By: Query Parameter (Passive Detection)
  2831. | - https://www.mundesley-pc.gov.uk/wp-content/plugins/ari-fancy-lightbox/assets/fancybox/jquery.fancybox.min.css?ver=1.3.6
  2832. | - https://www.mundesley-pc.gov.uk/wp-content/plugins/ari-fancy-lightbox/assets/fancybox/jquery.fancybox.min.js?ver=1.3.6
  2833.  
  2834. [+] mappress-google-maps-for-wordpress
  2835. | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/mappress-google-maps-for-wordpress/
  2836. | Latest Version: 2.53.1 (up to date)
  2837. | Last Updated: 2019-07-11T21:30:00.000Z
  2838. |
  2839. | Detected By: Urls In Homepage (Passive Detection)
  2840. | Confirmed By: Comment (Passive Detection)
  2841. |
  2842. | Version: 2.53.1 (70% confidence)
  2843. | Detected By: Comment (Passive Detection)
  2844. | - https://www.mundesley-pc.gov.uk/, Match: 'MapPress Easy Google Maps Version:2.53.1'
  2845. | Confirmed By: Query Parameter (Passive Detection)
  2846. | - https://www.mundesley-pc.gov.uk/wp-content/plugins/mappress-google-maps-for-wordpress/css/mappress.css?ver=2.53.1%20PRO
  2847.  
  2848. [+] monarch
  2849. | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/monarch/
  2850. |
  2851. | Detected By: Urls In Homepage (Passive Detection)
  2852. |
  2853. | [!] 1 vulnerability identified:
  2854. |
  2855. | [!] Title: ElegantThemes - Privilege Escalation
  2856. | Fixed in: 1.2.7
  2857. | References:
  2858. | - https://wpvulndb.com/vulnerabilities/8394
  2859. | - http://www.pritect.net/blog/elegant-themes-security-vulnerability
  2860. | - http://wptavern.com/critical-security-vulnerability-discovered-in-elegant-themes-products
  2861. |
  2862. | The version could not be determined.
  2863.  
  2864. [+] nextcellent-gallery-nextgen-legacy
  2865. | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/nextcellent-gallery-nextgen-legacy/
  2866. | Latest Version: 1.9.35 (up to date)
  2867. | Last Updated: 2017-10-16T09:19:00.000Z
  2868. |
  2869. | Detected By: Comment (Passive Detection)
  2870. |
  2871. | Version: 3.2.10 (60% confidence)
  2872. | Detected By: Comment (Passive Detection)
  2873. | - https://www.mundesley-pc.gov.uk/, Match: '<meta name="NextGEN" version="3.2.10"'
  2874.  
  2875. [+] nextgen-gallery
  2876. | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/nextgen-gallery/
  2877. | Last Updated: 2019-08-28T00:11:00.000Z
  2878. | [!] The version is out of date, the latest version is 3.2.11
  2879. |
  2880. | Detected By: Comment (Passive Detection)
  2881. |
  2882. | [!] 1 vulnerability identified:
  2883. |
  2884. | [!] Title: Nextgen Gallery < 3.2.11 - SQL Injection
  2885. | Fixed in: 3.2.11
  2886. | References:
  2887. | - https://wpvulndb.com/vulnerabilities/9816
  2888. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14314
  2889. | - https://fortiguard.com/zeroday/FG-VD-19-099
  2890. | - https://www.fortinet.com/blog/threat-research/wordpress-plugin-sql-injection-vulnerability.html
  2891. |
  2892. | Version: 3.2.10 (60% confidence)
  2893. | Detected By: Comment (Passive Detection)
  2894. | - https://www.mundesley-pc.gov.uk/, Match: '<meta name="NextGEN" version="3.2.10"'
  2895.  
  2896. [+] ubermenu
  2897. | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/ubermenu/
  2898. |
  2899. | Detected By: Urls In Homepage (Passive Detection)
  2900. |
  2901. | The version could not be determined.
  2902.  
  2903. [+] uk-cookie-consent
  2904. | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/uk-cookie-consent/
  2905. | Latest Version: 2.3.14
  2906. | Last Updated: 2019-01-16T15:16:00.000Z
  2907. |
  2908. | Detected By: Urls In Homepage (Passive Detection)
  2909. |
  2910. | [!] 1 vulnerability identified:
  2911. |
  2912. | [!] Title: UK Cookie Consent <= 2.3.9 - Authenticated Stored Cross-Site Scripting (XSS)
  2913. | Fixed in: 2.3.10
  2914. | References:
  2915. | - https://wpvulndb.com/vulnerabilities/9068
  2916. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10310
  2917. | - https://plugins.trac.wordpress.org/changeset/1863058/uk-cookie-consent
  2918. |
  2919. | The version could not be determined.
  2920.  
  2921. [+] wordfence
  2922. | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/wordfence/
  2923. | Latest Version: 7.4.0
  2924. | Last Updated: 2019-08-22T15:25:00.000Z
  2925. |
  2926. | Detected By: Javascript Var (Passive Detection)
  2927. |
  2928. | [!] 12 vulnerabilities identified:
  2929. |
  2930. | [!] Title: Wordfence 3.8.6 - lib/IPTraf.php User-Agent Header Stored XSS
  2931. | Fixed in: 3.8.7
  2932. | Reference: https://wpvulndb.com/vulnerabilities/6140
  2933. |
  2934. | [!] Title: Wordfence 3.8.1 - Password Creation Restriction Bypass
  2935. | Fixed in: 3.8.3
  2936. | Reference: https://wpvulndb.com/vulnerabilities/6141
  2937. |
  2938. | [!] Title: Wordfence 3.8.1 - wp-admin/admin.php whois Parameter Stored XSS
  2939. | Fixed in: 3.8.3
  2940. | References:
  2941. | - https://wpvulndb.com/vulnerabilities/6142
  2942. | - https://packetstormsecurity.com/files/122993/
  2943. | - https://www.securityfocus.com/bid/62053/
  2944. |
  2945. | [!] Title: Wordfence 3.3.5 - XSS & IAA
  2946. | Fixed in: 3.3.7
  2947. | References:
  2948. | - https://wpvulndb.com/vulnerabilities/6143
  2949. | - http://seclists.org/fulldisclosure/2012/Oct/139
  2950. |
  2951. | [!] Title: Wordfence 5.2.4 - Unspecified Issue
  2952. | Fixed in: 5.2.5
  2953. | Reference: https://wpvulndb.com/vulnerabilities/7581
  2954. |
  2955. | [!] Title: Wordfence 5.2.4 - IPTraf.php URI Request Stored XSS
  2956. | Fixed in: 5.2.5
  2957. | References:
  2958. | - https://wpvulndb.com/vulnerabilities/7582
  2959. | - https://packetstormsecurity.com/files/128259/
  2960. |
  2961. | [!] Title: Wordfence 5.2.3 - Banned IP Functionality Bypass
  2962. | Fixed in: 5.2.4
  2963. | References:
  2964. | - https://wpvulndb.com/vulnerabilities/7583
  2965. | - https://packetstormsecurity.com/files/128259/
  2966. | - http://seclists.org/fulldisclosure/2014/Sep/49
  2967. | - https://vexatioustendencies.com/wordfence-v5-2-3-2-stored-xss-insufficient-logging-throttle-bypass-exploit-detection-bypass/
  2968. |
  2969. | [!] Title: Wordfence 5.2.3 - Multiple Vulnerabilities
  2970. | Fixed in: 5.2.4
  2971. | References:
  2972. | - https://wpvulndb.com/vulnerabilities/7612
  2973. | - https://vexatioustendencies.com/wordfence-v5-2-3-2-stored-xss-insufficient-logging-throttle-bypass-exploit-detection-bypass/
  2974. |
  2975. | [!] Title: Wordfence <= 5.2.4 - Multiple Vulnerabilities (XSS & Bypasses)
  2976. | Fixed in: 5.2.5
  2977. | References:
  2978. | - https://wpvulndb.com/vulnerabilities/7636
  2979. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4664
  2980. | - https://secupress.me/blog/wordfence-5-2-5-security-update/
  2981. | - https://www.securityfocus.com/bid/70915/
  2982. |
  2983. | [!] Title: Wordfence 5.2.2 - XSS in Referer Header
  2984. | Fixed in: 5.2.3
  2985. | References:
  2986. | - https://wpvulndb.com/vulnerabilities/7698
  2987. | - https://vexatioustendencies.com/wordpress-plugin-vulnerability-dump-part-2/
  2988. |
  2989. | [!] Title: Wordfence <= 5.1.4 - Cross-Site Scripting (XSS)
  2990. | Fixed in: 5.1.5
  2991. | References:
  2992. | - https://wpvulndb.com/vulnerabilities/7711
  2993. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4932
  2994. |
  2995. | [!] Title: Wordfence <= 7.1.12 - Username Enumeration Prevention Bypass
  2996. | Fixed in: 7.1.14
  2997. | References:
  2998. | - https://wpvulndb.com/vulnerabilities/9135
  2999. | - http://www.waraxe.us/advisory-109.html
  3000. | - https://packetstormsecurity.com/files/149845/
  3001. |
  3002. | The version could not be determined.
  3003.  
  3004. [+] wordpress-seo
  3005. | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/wordpress-seo/
  3006. | Last Updated: 2019-09-03T07:32:00.000Z
  3007. | [!] The version is out of date, the latest version is 12.0
  3008. |
  3009. | Detected By: Comment (Passive Detection)
  3010. |
  3011. | Version: 11.8 (60% confidence)
  3012. | Detected By: Comment (Passive Detection)
  3013. | - https://www.mundesley-pc.gov.uk/, Match: 'optimized with the Yoast SEO plugin v11.8 -'
  3014.  
  3015. [+] wp-rocket
  3016. | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/wp-rocket/
  3017. |
  3018. | Detected By: Comment (Passive Detection)
  3019. |
  3020. | [!] 1 vulnerability identified:
  3021. |
  3022. | [!] Title: WP Rocket <= 2.10.3 - Local File Inclusion (LFI)
  3023. | Fixed in: 2.10.4
  3024. | References:
  3025. | - https://wpvulndb.com/vulnerabilities/8872
  3026. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11658
  3027. | - https://wp-rocket.me/changelog
  3028. | - https://gist.github.com/Shinkurt/157dbb3767c9489f3d754f79b183a890
  3029. |
  3030. | The version could not be determined.
  3031.  
  3032. [+] wpfront-scroll-top
  3033. | Location: https://www.mundesley-pc.gov.uk/wp-content/plugins/wpfront-scroll-top/
  3034. | Latest Version: 2.0.2
  3035. | Last Updated: 2019-05-21T06:27:00.000Z
  3036. |
  3037. | Detected By: Urls In Homepage (Passive Detection)
  3038. |
  3039. | The version could not be determined.
  3040.  
  3041. [+] Enumerating Config Backups (via Passive and Aggressive Methods)
  3042. Checking Config Backups - Time: 00:02:30 <=============> (21 / 21) 100.00% Time: 00:02:30
  3043.  
  3044. [i] No Config Backups Found.
  3045.  
  3046.  
  3047. [+] Finished: Thu Sep 5 02:03:23 2019
  3048. [+] Requests Done: 106
  3049. [+] Cached Requests: 11
  3050. [+] Data Sent: 8.998 KB
  3051. [+] Data Received: 24.314 MB
  3052. [+] Memory used: 201.77 MB
  3053. [+] Elapsed time: 00:24:37
  3054. #######################################################################################################################################
  3055. [+] URL: https://www.mundesley-pc.gov.uk/
  3056. [+] Started: Thu Sep 5 02:08:44 2019
  3057.  
  3058. Interesting Finding(s):
  3059.  
  3060. [+] https://www.mundesley-pc.gov.uk/
  3061. | Interesting Entry: Server: Apache
  3062. | Found By: Headers (Passive Detection)
  3063. | Confidence: 100%
  3064.  
  3065. [+] https://www.mundesley-pc.gov.uk/robots.txt
  3066. | Interesting Entries:
  3067. | - /wp-admin/
  3068. | - /wp-admin/admin-ajax.php
  3069. | Found By: Robots Txt (Aggressive Detection)
  3070. | Confidence: 100%
  3071.  
  3072. [+] https://www.mundesley-pc.gov.uk/xmlrpc.php
  3073. | Found By: Direct Access (Aggressive Detection)
  3074. | Confidence: 100%
  3075. | References:
  3076. | - http://codex.wordpress.org/XML-RPC_Pingback_API
  3077. | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
  3078. | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
  3079. | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
  3080. | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
  3081.  
  3082. [+] https://www.mundesley-pc.gov.uk/readme.html
  3083. | Found By: Direct Access (Aggressive Detection)
  3084. | Confidence: 100%
  3085.  
  3086. [+] https://www.mundesley-pc.gov.uk/wp-cron.php
  3087. | Found By: Direct Access (Aggressive Detection)
  3088. | Confidence: 60%
  3089. | References:
  3090. | - https://www.iplocation.net/defend-wordpress-from-ddos
  3091. | - https://github.com/wpscanteam/wpscan/issues/1299
  3092.  
  3093. Fingerprinting the version - Time: 00:00:10 <=========> (362 / 362) 100.00% Time: 00:00:10
  3094. [+] WordPress version 5.2.2 identified (Latest, released on 2019-06-18).
  3095. | Detected By: Meta Generator (Passive Detection)
  3096. | - https://www.mundesley-pc.gov.uk/, Match: 'WordPress 5.2.2'
  3097. | Confirmed By:
  3098. | Plugin And Theme Query Parameter In Homepage (Passive Detection)
  3099. | - https://www.mundesley-pc.gov.uk/wp-content/plugins/uk-cookie-consent/assets/css/style.css?ver=5.2.2
  3100. | - https://www.mundesley-pc.gov.uk/wp-content/plugins/ubermenu/pro/assets/css/skins/simplegreen.css?ver=5.2.2
  3101. | Unique Fingerprinting (Aggressive Detection)
  3102. | - https://www.mundesley-pc.gov.uk/wp-admin/css/media.css md5sum is 16375f6512d5a1e04dbb884a02ba658a
  3103.  
  3104. [+] WordPress theme in use: mundesleypc2017
  3105. | Location: https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/
  3106. | Style URL: https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/style.css
  3107. | Style Name: Mundesley Parish Council
  3108. | Style URI: https://www.mundesley-pc.gov.uk
  3109. | Description: A WordPress powered website with a custom theme (design)...
  3110. | Author: Josh.biz Web Design
  3111. | Author URI: http://www.josh.biz
  3112. |
  3113. | Detected By: Css Style (Passive Detection)
  3114. | Confirmed By: Urls In Homepage (Passive Detection)
  3115. |
  3116. | Version: 1.0 (80% confidence)
  3117. | Detected By: Style (Passive Detection)
  3118. | - https://www.mundesley-pc.gov.uk/wp-content/themes/mundesleypc2017/style.css, Match: 'Version: 1.0'
  3119.  
  3120. [+] Enumerating Users (via Passive and Aggressive Methods)
  3121. Brute Forcing Author IDs - Time: 00:00:05 <============> (10 / 10) 100.00% Time: 00:00:05
  3122.  
  3123. [i] User(s) Identified:
  3124.  
  3125. [+] Doreen
  3126. | Detected By: Rss Generator (Aggressive Detection)
  3127.  
  3128. [+] joshbizadmin
  3129. | Detected By: Yoast Seo Author Sitemap (Aggressive Detection)
  3130. | - https://www.mundesley-pc.gov.uk/author-sitemap.xml
  3131.  
  3132. [+] doreen
  3133. | Detected By: Yoast Seo Author Sitemap (Aggressive Detection)
  3134. | - https://www.mundesley-pc.gov.uk/author-sitemap.xml
  3135.  
  3136.  
  3137. [+] Finished: Thu Sep 5 02:10:19 2019
  3138. [+] Requests Done: 94
  3139. [+] Cached Requests: 10
  3140. [+] Data Sent: 24.702 KB
  3141. [+] Data Received: 1.445 MB
  3142. [+] Memory used: 103.266 MB
  3143. [+] Elapsed time: 00:01:34
  3144. #######################################################################################################################################
  3145. [INFO] ------TARGET info------
  3146. [*] TARGET: https://www.mundesley-pc.gov.uk/
  3147. [*] TARGET IP: 89.145.78.0
  3148. [INFO] NO load balancer detected for www.mundesley-pc.gov.uk...
  3149. [*] DNS servers: ns1.livedns.co.uk.
  3150. [*] TARGET server: Apache
  3151. [*] CC: GB
  3152. [*] Country: United Kingdom
  3153. [*] RegionCode: ENG
  3154. [*] RegionName: England
  3155. [*] City: Hemel Hempstead
  3156. [*] ASN: AS29017
  3157. [*] BGP_PREFIX: 89.145.64.0/18
  3158. [*] ISP: GYRON Gyron Internet Ltd, GB
  3159. [INFO] SSL/HTTPS certificate detected
  3160. [*] Issuer: issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
  3161. [*] Subject: subject=CN = mundesley-pc.gov.uk
  3162. [ALERT] Let's Encrypt is commonly used for Phishing
  3163. [INFO] DNS enumeration:
  3164. [*] mail.mundesley-pc.gov.uk 213.171.216.40
  3165. [*] webmail.mundesley-pc.gov.uk 213.171.216.231
  3166. [INFO] Possible abuse mails are:
  3167. [INFO] NO PAC (Proxy Auto Configuration) file FOUND
  3168. [ALERT] robots.txt file FOUND in http://www.mundesley-pc.gov.uk/robots.txt
  3169. [INFO] Checking for HTTP status codes recursively from http://www.mundesley-pc.gov.uk/robots.txt
  3170. [INFO] Status code Folders
  3171. [*] 200 http://www.mundesley-pc.gov.uk/wp-admin/
  3172. [INFO] Starting FUZZing in http://www.mundesley-pc.gov.uk/FUzZzZzZzZz...
  3173. [INFO] Status code Folders
  3174. [*] 200 http://www.mundesley-pc.gov.uk/news
  3175. [ALERT] Look in the source code. It may contain passwords
  3176. [INFO] Links found from https://www.mundesley-pc.gov.uk/ http://89.145.78.0/:
  3177. [INFO] GOOGLE has 18,500 results (0.24 seconds) about http://www.mundesley-pc.gov.uk/
  3178. [INFO] BING shows 89.145.78.0 is shared with 31,300 hosts/vhosts
  3179. [INFO] Shodan detected the following opened ports on 89.145.78.0:
  3180. [INFO] ------VirusTotal SECTION------
  3181. [INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
  3182. [INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
  3183. [INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
  3184. [INFO] ------Alexa Rank SECTION------
  3185. [INFO] Percent of Visitors Rank in Country:
  3186. [INFO] Percent of Search Traffic:
  3187. [INFO] Percent of Unique Visits:
  3188. [INFO] Total Sites Linking In:
  3189. [INFO] Useful links related to www.mundesley-pc.gov.uk - 89.145.78.0:
  3190. [*] https://www.virustotal.com/pt/ip-address/89.145.78.0/information/
  3191. [*] https://www.hybrid-analysis.com/search?host=89.145.78.0
  3192. [*] https://www.shodan.io/host/89.145.78.0
  3193. [*] https://www.senderbase.org/lookup/?search_string=89.145.78.0
  3194. [*] https://www.alienvault.com/open-threat-exchange/ip/89.145.78.0
  3195. [*] http://pastebin.com/search?q=89.145.78.0
  3196. [*] http://urlquery.net/search.php?q=89.145.78.0
  3197. [*] http://www.alexa.com/siteinfo/www.mundesley-pc.gov.uk
  3198. [*] http://www.google.com/safebrowsing/diagnostic?site=www.mundesley-pc.gov.uk
  3199. [*] https://censys.io/ipv4/89.145.78.0
  3200. [*] https://www.abuseipdb.com/check/89.145.78.0
  3201. [*] https://urlscan.io/search/#89.145.78.0
  3202. [*] https://github.com/search?q=89.145.78.0&type=Code
  3203. [INFO] Useful links related to AS29017 - 89.145.64.0/18:
  3204. [*] http://www.google.com/safebrowsing/diagnostic?site=AS:29017
  3205. [*] https://www.senderbase.org/lookup/?search_string=89.145.64.0/18
  3206. [*] http://bgp.he.net/AS29017
  3207. [*] https://stat.ripe.net/AS29017
  3208. [INFO] Date: 05/09/19 | Time: 02:11:22
  3209. [INFO] Total time: 2 minute(s) and 18 second(s)
  3210. #######################################################################################################################################
  3211. Anonymous JTSEC #OpAssange Full Recon #27
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement