Advertisement
Guest User

Anonymous JTSEC #OpIsraël Full Recon #2

a guest
Jan 23rd, 2019
2,716
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 126.86 KB | None | 0 0
  1. ######################################################################################################################################
  2. Hostname www.jewish.net ISP NETWORK TRANSIT HOLDINGS LLC
  3. Continent North America Flag
  4. US
  5. Country United States Country Code US
  6. Region Texas Local time 23 Jan 2019 01:15 CST
  7. City Spring Postal Code
  8. #######################################################################################################################################
  9. > www.jewish.net
  10. Server: 194.187.251.67
  11. Address: 194.187.251.67#53
  12.  
  13. Non-authoritative answer:
  14. www.jewish.net canonical name = jewish.net.
  15. Name: jewish.net
  16. Address: 69.73.184.159
  17. >
  18. #######################################################################################################################################
  19.  
  20. HostIP:69.73.184.159
  21. HostName:www.jewish.net
  22.  
  23. Gathered Inet-whois information for 69.73.184.159
  24. ---------------------------------------------------------------------------------------------------------------------------------------
  25.  
  26.  
  27. inetnum: 69.6.64.0 - 69.94.63.255
  28. netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
  29. descr: IPv4 address block not managed by the RIPE NCC
  30. remarks: ------------------------------------------------------
  31. remarks:
  32. remarks: For registration information,
  33. remarks: you can consult the following sources:
  34. remarks:
  35. remarks: IANA
  36. remarks: http://www.iana.org/assignments/ipv4-address-space
  37. remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
  38. remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
  39. remarks:
  40. remarks: AFRINIC (Africa)
  41. remarks: http://www.afrinic.net/ whois.afrinic.net
  42. remarks:
  43. remarks: APNIC (Asia Pacific)
  44. remarks: http://www.apnic.net/ whois.apnic.net
  45. remarks:
  46. remarks: ARIN (Northern America)
  47. remarks: http://www.arin.net/ whois.arin.net
  48. remarks:
  49. remarks: LACNIC (Latin America and the Carribean)
  50. remarks: http://www.lacnic.net/ whois.lacnic.net
  51. remarks:
  52. remarks: ------------------------------------------------------
  53. country: EU # Country is really world wide
  54. admin-c: IANA1-RIPE
  55. tech-c: IANA1-RIPE
  56. status: ALLOCATED UNSPECIFIED
  57. mnt-by: RIPE-NCC-HM-MNT
  58. created: 2019-01-07T10:49:53Z
  59. last-modified: 2019-01-07T10:49:53Z
  60. source: RIPE
  61.  
  62. role: Internet Assigned Numbers Authority
  63. address: see http://www.iana.org.
  64. admin-c: IANA1-RIPE
  65. tech-c: IANA1-RIPE
  66. nic-hdl: IANA1-RIPE
  67. remarks: For more information on IANA services
  68. remarks: go to IANA web site at http://www.iana.org.
  69. mnt-by: RIPE-NCC-MNT
  70. created: 1970-01-01T00:00:00Z
  71. last-modified: 2001-09-22T09:31:27Z
  72. source: RIPE # Filtered
  73.  
  74. % This query was served by the RIPE Database Query Service version 1.92.6 (HEREFORD)
  75.  
  76.  
  77.  
  78. Gathered Inic-whois information for jewish.net
  79. ---------------------------------------------------------------------------------------------------------------------------------------
  80. Domain Name: JEWISH.NET
  81. Registry Domain ID: 1895875_DOMAIN_NET-VRSN
  82. Registrar WHOIS Server: whois.godaddy.com
  83. Registrar URL: http://www.godaddy.com
  84. Updated Date: 2018-02-16T10:48:18Z
  85. Creation Date: 1997-05-21T04:00:00Z
  86. Registry Expiry Date: 2021-05-22T04:00:00Z
  87. Registrar: GoDaddy.com, LLC
  88. Registrar IANA ID: 146
  89. Registrar Abuse Contact Email: abuse@godaddy.com
  90. Registrar Abuse Contact Phone: 480-624-2505
  91. Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
  92. Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
  93. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  94. Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
  95. Name Server: NS33.DOMAINCONTROL.COM
  96. Name Server: NS34.DOMAINCONTROL.COM
  97. DNSSEC: unsigned
  98. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  99. >>> Last update of whois database: 2019-01-23T07:22:48Z <<<
  100.  
  101. For more information on Whois status codes, please visit https://icann.org/epp
  102.  
  103. NOTICE: The expiration date displayed in this record is the date the
  104. registrar's sponsorship of the domain name registration in the registry is
  105. currently set to expire. This date does not necessarily reflect the expiration
  106. date of the domain name registrant's agreement with the sponsoring
  107. registrar. Users may consult the sponsoring registrar's Whois database to
  108. view the registrar's reported date of expiration for this registration.
  109.  
  110. TERMS OF USE: You are not authorized to access or query our Whois
  111. database through the use of electronic processes that are high-volume and
  112. automated except as reasonably necessary to register domain names or
  113. modify existing registrations; the Data in VeriSign Global Registry
  114. Services' ("VeriSign") Whois database is provided by VeriSign for
  115. information purposes only, and to assist persons in obtaining information
  116. about or related to a domain name registration record. VeriSign does not
  117. guarantee its accuracy. By submitting a Whois query, you agree to abide
  118. by the following terms of use: You agree that you may use this Data only
  119. for lawful purposes and that under no circumstances will you use this Data
  120. to: (1) allow, enable, or otherwise support the transmission of mass
  121. unsolicited, commercial advertising or solicitations via e-mail, telephone,
  122. or facsimile; or (2) enable high volume, automated, electronic processes
  123. that apply to VeriSign (or its computer systems). The compilation,
  124. repackaging, dissemination or other use of this Data is expressly
  125. prohibited without the prior written consent of VeriSign. You agree not to
  126. use electronic processes that are automated and high-volume to access or
  127. query the Whois database except as reasonably necessary to register
  128. domain names or modify existing registrations. VeriSign reserves the right
  129. to restrict your access to the Whois database in its sole discretion to ensure
  130. operational stability. VeriSign may restrict or terminate your access to the
  131. Whois database for failure to abide by these terms of use. VeriSign
  132. reserves the right to modify these terms at any time.
  133.  
  134. The Registry database contains ONLY .COM, .NET, .EDU domains and
  135. Registrars.
  136.  
  137. Gathered Netcraft information for www.jewish.net
  138. ---------------------------------------------------------------------------------------------------------------------------------------
  139.  
  140. Retrieving Netcraft.com information for www.jewish.net
  141. Netcraft.com Information gathered
  142.  
  143. Gathered Subdomain information for jewish.net
  144. --------------------------------------------------------------------------------------------------------------------------------------
  145. Searching Google.com:80...
  146. HostName:www.jewish.net
  147. HostIP:69.73.184.159
  148. Searching Altavista.com:80...
  149. Found 1 possible subdomain(s) for host jewish.net, Searched 0 pages containing 0 results
  150.  
  151. Gathered E-Mail information for jewish.net
  152. ---------------------------------------------------------------------------------------------------------------------------------------
  153. Searching Google.com:80...
  154. Searching Altavista.com:80...
  155. Found 0 E-Mail(s) for host jewish.net, Searched 0 pages containing 0 results
  156.  
  157. Gathered TCP Port information for 69.73.184.159
  158. ---------------------------------------------------------------------------------------------------------------------------------------
  159.  
  160. Port State
  161.  
  162. 80/tcp open
  163.  
  164. Portscan Finished: Scanned 150 ports, 2 ports were in state closed
  165. #######################################################################################################################################
  166. [i] Scanning Site: http://www.jewish.net
  167.  
  168.  
  169.  
  170. B A S I C I N F O
  171. =======================================================================================================================================
  172.  
  173.  
  174. [+] Site Title:
  175. [+] IP address: 69.73.184.159
  176. [+] Web Server: Could Not Detect
  177. [+] CMS: Could Not Detect
  178. [+] Cloudflare: Not Detected
  179. [+] Robots File: Could NOT Find robots.txt!
  180.  
  181.  
  182.  
  183.  
  184. W H O I S L O O K U P
  185. =======================================================================================================================================
  186.  
  187. Domain Name: JEWISH.NET
  188. Registry Domain ID: 1895875_DOMAIN_NET-VRSN
  189. Registrar WHOIS Server: whois.godaddy.com
  190. Registrar URL: http://www.godaddy.com
  191. Updated Date: 2018-02-16T10:48:18Z
  192. Creation Date: 1997-05-21T04:00:00Z
  193. Registry Expiry Date: 2021-05-22T04:00:00Z
  194. Registrar: GoDaddy.com, LLC
  195. Registrar IANA ID: 146
  196. Registrar Abuse Contact Email: abuse@godaddy.com
  197. Registrar Abuse Contact Phone: 480-624-2505
  198. Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
  199. Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
  200. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  201. Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
  202. Name Server: NS33.DOMAINCONTROL.COM
  203. Name Server: NS34.DOMAINCONTROL.COM
  204. DNSSEC: unsigned
  205. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  206. >>> Last update of whois database: 2019-01-23T07:30:24Z <<<
  207.  
  208. For more information on Whois status codes, please visit https://icann.org/epp
  209.  
  210.  
  211.  
  212. The Registry database contains ONLY .COM, .NET, .EDU domains and
  213. Registrars.
  214.  
  215.  
  216.  
  217.  
  218. G E O I P L O O K U P
  219. =======================================================================================================================================
  220.  
  221. [i] IP Address: 69.73.184.159
  222. [i] Country: United States
  223. [i] State: Texas
  224. [i] City: Spring
  225. [i] Latitude: 30.0505
  226. [i] Longitude: -95.4695
  227.  
  228.  
  229.  
  230.  
  231.  
  232.  
  233. D N S L O O K U P
  234. =======================================================================================================================================
  235.  
  236. jewish.net. 1799 IN A 69.73.184.159
  237. jewish.net. 3599 IN NS ns33.domaincontrol.com.
  238. jewish.net. 3599 IN NS ns34.domaincontrol.com.
  239. jewish.net. 3599 IN SOA ns33.domaincontrol.com. dns.jomax.net. 2017060501 28800 7200 604800 3600
  240. jewish.net. 3599 IN MX 20 ALT1.ASPMX.L.GOOGLE.COM.et.
  241. jewish.net. 3599 IN MX 30 ALT2.ASPMX.L.GOOGLE.com.
  242. jewish.net. 3599 IN MX 10 ASPMX.L.GOOGLE.com.
  243. jewish.net. 3599 IN MX 40 ASPMX2.GOOGLEMAIL.com.
  244. jewish.net. 3599 IN MX 50 ASPMX3.GOOGLEMAIL.com.
  245.  
  246.  
  247.  
  248.  
  249. S U B N E T C A L C U L A T I O N
  250. =======================================================================================================================================
  251.  
  252. Address = 69.73.184.159
  253. Network = 69.73.184.159 / 32
  254. Netmask = 255.255.255.255
  255. Broadcast = not needed on Point-to-Point links
  256. Wildcard Mask = 0.0.0.0
  257. Hosts Bits = 0
  258. Max. Hosts = 1 (2^0 - 0)
  259. Host Range = { 69.73.184.159 - 69.73.184.159 }
  260.  
  261.  
  262.  
  263. N M A P P O R T S C A N
  264. =======================================================================================================================================
  265.  
  266.  
  267. Starting Nmap 7.40 ( https://nmap.org ) at 2019-01-23 07:32 UTC
  268. Nmap scan report for jewish.net (69.73.184.159)
  269. Host is up (0.027s latency).
  270. rDNS record for 69.73.184.159: finn.nocdirect.com
  271. PORT STATE SERVICE
  272. 21/tcp open ftp
  273. 22/tcp open ssh
  274. 23/tcp filtered telnet
  275. 80/tcp open http
  276. 110/tcp open pop3
  277. 143/tcp open imap
  278. 443/tcp open https
  279. 3389/tcp filtered ms-wbt-server
  280.  
  281. Nmap done: 1 IP address (1 host up) scanned in 1.38 seconds
  282.  
  283.  
  284.  
  285. S U B - D O M A I N F I N D E R
  286. =======================================================================================================================================
  287.  
  288.  
  289. [i] Total Subdomains Found : 4
  290.  
  291. [+] Subdomain: vps1.jewish.net
  292. [-] IP: 209.217.253.175
  293.  
  294. [+] Subdomain: vps2.jewish.net
  295. [-] IP: 209.140.30.90
  296.  
  297. [+] Subdomain: vps3.jewish.net
  298. [-] IP: 209.140.28.114
  299.  
  300. [+] Subdomain: update.jewish.net
  301. [-] IP: 209.140.28.114
  302. #######################################################################################################################################
  303. [?] Enter the target: example( http://domain.com )
  304. http://www.jewish.net/
  305. [!] IP Address : 69.73.184.159
  306. [!] www.jewish.net doesn't seem to use a CMS
  307. [+] Honeypot Probabilty: 30%
  308. ---------------------------------------------------------------------------------------------------------------------------------------
  309. [~] Trying to gather whois information for www.jewish.net
  310. [+] Whois information found
  311. [-] Unable to build response, visit https://who.is/whois/www.jewish.net
  312. ---------------------------------------------------------------------------------------------------------------------------------------
  313. PORT STATE SERVICE
  314. 21/tcp open ftp
  315. 22/tcp open ssh
  316. 23/tcp filtered telnet
  317. 80/tcp open http
  318. 110/tcp open pop3
  319. 143/tcp open imap
  320. 443/tcp open https
  321. 3389/tcp filtered ms-wbt-server
  322. Nmap done: 1 IP address (1 host up) scanned in 1.37 seconds
  323. ---------------------------------------------------------------------------------------------------------------------------------------
  324.  
  325. [+] DNS Records
  326. ns34.domaincontrol.com. (173.201.74.17) AS26496 GoDaddy.com, LLC United States
  327. ns33.domaincontrol.com. (97.74.106.17) AS26496 GoDaddy.com, LLC United States
  328.  
  329. [+] MX Records
  330. 30 (209.85.203.27) AS15169 Google Inc. United States
  331.  
  332. [+] MX Records
  333. 10 (172.217.197.26) AS15169 Google Inc. United States
  334.  
  335. [+] MX Records
  336. 40 (172.217.192.26) AS15169 Google Inc. United States
  337.  
  338. [+] MX Records
  339. 50 (209.85.203.27) AS15169 Google Inc. United States
  340.  
  341. [+] Host Records (A)
  342. www.jewish.netHTTP: (finn.nocdirect.com) (69.73.184.159) AS3595 Global Net Access, LLC United States
  343.  
  344. [+] TXT Records
  345.  
  346. [+] DNS Map: https://dnsdumpster.com/static/map/jewish.net.png
  347.  
  348. [>] Initiating 3 intel modules
  349. [>] Loading Alpha module (1/3)
  350. [>] Beta module deployed (2/3)
  351. [>] Gamma module initiated (3/3)
  352. No emails found
  353. No hosts found
  354. [+] Virtual hosts:
  355. #######################################################################################################################################
  356. ; <<>> DiG 9.11.5-P1-1-Debian <<>> jewish.net
  357. ;; global options: +cmd
  358. ;; Got answer:
  359. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38907
  360. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  361.  
  362. ;; OPT PSEUDOSECTION:
  363. ; EDNS: version: 0, flags:; udp: 4096
  364. ;; QUESTION SECTION:
  365. ;jewish.net. IN A
  366.  
  367. ;; ANSWER SECTION:
  368. jewish.net. 1800 IN A 69.73.184.159
  369.  
  370. ;; Query time: 34 msec
  371. ;; SERVER: 38.132.106.139#53(38.132.106.139)
  372. ;; WHEN: mer jan 23 02:51:58 EST 2019
  373. ;; MSG SIZE rcvd: 55
  374. #######################################################################################################################################
  375. ; <<>> DiG 9.11.5-P1-1-Debian <<>> +trace jewish.net
  376. ;; global options: +cmd
  377. . 84330 IN NS i.root-servers.net.
  378. . 84330 IN NS c.root-servers.net.
  379. . 84330 IN NS m.root-servers.net.
  380. . 84330 IN NS g.root-servers.net.
  381. . 84330 IN NS e.root-servers.net.
  382. . 84330 IN NS f.root-servers.net.
  383. . 84330 IN NS j.root-servers.net.
  384. . 84330 IN NS a.root-servers.net.
  385. . 84330 IN NS l.root-servers.net.
  386. . 84330 IN NS k.root-servers.net.
  387. . 84330 IN NS h.root-servers.net.
  388. . 84330 IN NS b.root-servers.net.
  389. . 84330 IN NS d.root-servers.net.
  390. . 84330 IN RRSIG NS 8 0 518400 20190205050000 20190123040000 16749 . BjuPr9Wtn9W9+vjQuS+mCRtw0GlXadQUTZqWzyZaC3F69/qrZtLxkRDe u4CfiNpk+6Fr3WMHjEKjYCsXzZCnSjzS76IJSxNr5PPAIwkZ7qhoGcTi jQTCL0BBrNJa7FD29nPJ/pr3ljArReL3k4Gi/h/d1AJdOYNz5eXFzcRI l4YrdXsG6gMY3JmksoE/EDh9vp+BYwga3ZMv72ptER/BYcr2KqCKYK3V QMlr+kvO+s32m93OAOaqrtfBQZAAt0lqwGtU+tv0H0arV1LzcR6VZ3Yw XlHG1B6MybqD4BsXJOhyAEBq5e9TkjQcsz475DWKobsGTbFzK4MnKVC6 pPkqjg==
  391. ;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 34 ms
  392.  
  393. net. 172800 IN NS a.gtld-servers.net.
  394. net. 172800 IN NS b.gtld-servers.net.
  395. net. 172800 IN NS c.gtld-servers.net.
  396. net. 172800 IN NS d.gtld-servers.net.
  397. net. 172800 IN NS e.gtld-servers.net.
  398. net. 172800 IN NS f.gtld-servers.net.
  399. net. 172800 IN NS g.gtld-servers.net.
  400. net. 172800 IN NS h.gtld-servers.net.
  401. net. 172800 IN NS i.gtld-servers.net.
  402. net. 172800 IN NS j.gtld-servers.net.
  403. net. 172800 IN NS k.gtld-servers.net.
  404. net. 172800 IN NS l.gtld-servers.net.
  405. net. 172800 IN NS m.gtld-servers.net.
  406. net. 86400 IN DS 35886 8 2 7862B27F5F516EBE19680444D4CE5E762981931842C465F00236401D 8BD973EE
  407. net. 86400 IN RRSIG DS 8 1 86400 20190205050000 20190123040000 16749 . Zbl45JrB1v750etKlFSUMB8doWTIJlKHmC8ctRKAhet21+/N7oFicBGD MofVlNAaHiuz3hokD+VLCzBJCLpY8094denAdn7yk/tikTayE4LPdXkG zic60BxHQUj1+JbThAWqLejYkQe+PYwQnE6kNLViQSyU3z3cl96fTv1a +m6zQ60cSxkyOSn9Ua2pGwoeIrZYhyTCCmkko+2ENEsUIj1XPZKMTaaO aGtYoP4oqtMFkq6rb2aGobNfutkwB8VAtev76KyxAgN53ZJXWG73kOnY kBfo3Z1x3EYEKEfe/y51dQIjTaMWApEJq1Zw/x/cMyTRbtu+Qh4GnAGa V8GKGg==
  408. ;; Received 1167 bytes from 2001:503:c27::2:30#53(j.root-servers.net) in 38 ms
  409.  
  410. jewish.net. 172800 IN NS ns33.domaincontrol.com.
  411. jewish.net. 172800 IN NS ns34.domaincontrol.com.
  412. A1RT98BS5QGC9NFI51S9HCI47ULJG6JH.net. 86400 IN NSEC3 1 1 0 - A1RUUFFJKCT2Q54P78F8EJGJ8JBK7I8B NS SOA RRSIG DNSKEY NSEC3PARAM
  413. A1RT98BS5QGC9NFI51S9HCI47ULJG6JH.net. 86400 IN RRSIG NSEC3 8 2 86400 20190127063534 20190120052534 51638 net. J8R53F0gB5tjq6YvuKqQtGTnQPWpU00SbPZRXOqAJ7XOepBeWMKZe97E fNMc7zaq+sT0CTGPjcRz0Ay88OvjxpUW8SqQBOs0Skmv7l5pudqBONP/ /syqeLR9FBLTDH36oEWm1lZWNFLMH26QYE/eorJHMlzoOsq8e/0ClQEO S6Q=
  414. NFMMI3N1148H3LEPNQB26PTI6JHN9CVT.net. 86400 IN NSEC3 1 1 0 - NFN5TMSMHCFFAK16T6L9MF4CM6HTH12J NS DS RRSIG
  415. NFMMI3N1148H3LEPNQB26PTI6JHN9CVT.net. 86400 IN RRSIG NSEC3 8 2 86400 20190127063422 20190120052422 51638 net. WJ6buSLXuglMWYwDsM+Uc9y9+p16wPbZey+wjLIv9Syu4fmUQNP/Ymk7 k/I1NkJqkYP74piiKiBtXYI1yf+XijesUcHLSMNeQ1bFyHDXtS0RGDhf aH9BInN84jGJoIYkO6ASGHY7x7DSqnnHx4RQOxMrShtixn2oK0Mhl+im Wio=
  416. ;; Received 667 bytes from 2001:503:83eb::30#53(c.gtld-servers.net) in 42 ms
  417.  
  418. jewish.net. 1800 IN A 69.73.184.159
  419. jewish.net. 3600 IN NS ns33.domaincontrol.com.
  420. jewish.net. 3600 IN NS ns34.domaincontrol.com.
  421. ;; Received 110 bytes from 97.74.106.17#53(ns33.domaincontrol.com) in 40 ms
  422. #######################################################################################################################################
  423. Saut Nom d'hôte Adresse IP Temps 1
  424. 1 10.250.200.1 10.250.200.1 25.846
  425. 1 10.250.200.1 10.250.200.1 24.854
  426. 2 vlan102.as02.qc1.ca.m247.com 176.113.74.17 24.155
  427. 3 37.120.128.166 37.120.128.166 38.174
  428. 4 vlan304.as032.buc.ro.m247.com 77.243.185.226 24.227
  429. 5 te0-7-0-2.rcr21.ymq02.atlas.cogentco.com 38.122.42.161 24.624
  430. 6 hu0-4-0-1.ccr22.ymq01.atlas.cogentco.com 154.54.31.222 23.394
  431. 7 be2104.ccr22.alb02.atlas.cogentco.com 154.54.43.22 29.334
  432. 8 be2915.ccr41.jfk02.atlas.cogentco.com 154.54.40.62 32.521
  433. 9 be2807.ccr42.dca01.atlas.cogentco.com 154.54.40.110 38.049
  434. 10 be2112.ccr41.atl01.atlas.cogentco.com 154.54.7.158 51.293
  435. 11 be3370.agr21.atl01.atlas.cogentco.com 154.54.7.54 52.165
  436. 12 te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com 154.24.19.78 50.571
  437. 13 38.88.11.146 38.88.11.146 169.581
  438. 14 63.247.69.34 63.247.69.34 49.691
  439. 15 63.247.66.122 63.247.66.122 52.352
  440. #######################################################################################################################################
  441. Port État Service
  442. 25/tcp closed smtp
  443. 80/tcp open http
  444. 139/tcp closed netbios-ssn
  445. 443/tcp open https
  446. 445/tcp closed microsoft-ds
  447. #######################################################################################################################################
  448. Source TTL Type d'adresse Type d'enregistrement Résolution
  449. www.jewish.net. 3600 IN CNAME jewish.net.
  450. jewish.net. 3600 IN NS ns33.domaincontrol.com.
  451. jewish.net. 3600 IN NS ns34.domaincontrol.com.
  452. #######################################################################################################################################
  453. [*] Performing General Enumeration of Domain: jewish.net
  454. [-] DNSSEC is not configured for jewish.net
  455. [*] SOA ns33.domaincontrol.com 97.74.106.17
  456. [*] NS ns33.domaincontrol.com 97.74.106.17
  457. [*] NS ns33.domaincontrol.com 2603:5:21a1::11
  458. [*] NS ns34.domaincontrol.com 173.201.74.17
  459. [*] NS ns34.domaincontrol.com 2603:5:22a1::11
  460. [*] MX ASPMX2.GOOGLEMAIL.COM 74.125.141.26
  461. [*] MX ASPMX.L.GOOGLE.COM 64.233.177.26
  462. [*] MX ASPMX3.GOOGLEMAIL.COM 172.217.192.26
  463. [*] MX ALT2.ASPMX.L.GOOGLE.COM 172.217.192.26
  464. [*] A jewish.net 69.73.184.159
  465. [*] Enumerating SRV Records
  466. [-] No SRV Records Found for jewish.net
  467. [+] 0 Records Found
  468. #######################################################################################################################################
  469. [*] Processing domain jewish.net
  470. [*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
  471. [+] Getting nameservers
  472. 97.74.106.17 - ns33.domaincontrol.com
  473. 173.201.74.17 - ns34.domaincontrol.com
  474. [-] Zone transfer failed
  475.  
  476. [+] MX records found, added to target list
  477. 20 ALT1.ASPMX.L.GOOGLE.COM.et.
  478. 40 ASPMX2.GOOGLEMAIL.COM.
  479. 10 ASPMX.L.GOOGLE.COM.
  480. 50 ASPMX3.GOOGLEMAIL.COM.
  481. 30 ALT2.ASPMX.L.GOOGLE.COM.
  482.  
  483. [*] Scanning jewish.net for A records
  484. 69.73.184.159 - jewish.net
  485. 69.73.184.159 - ftp.jewish.net
  486. 209.140.28.114 - update.jewish.net
  487. 209.140.30.90 - vps2.jewish.net
  488. 209.217.253.175 - vps1.jewish.net
  489. 68.178.252.5 - webmail.jewish.net
  490. 68.178.252.133 - webmail.jewish.net
  491. 97.74.135.148 - webmail.jewish.net
  492. 173.201.193.133 - webmail.jewish.net
  493. 45.40.130.41 - webmail.jewish.net
  494. 97.74.135.55 - webmail.jewish.net
  495. 173.201.193.148 - webmail.jewish.net
  496. 97.74.135.45 - webmail.jewish.net
  497. 72.167.218.55 - webmail.jewish.net
  498. 68.178.252.148 - webmail.jewish.net
  499. 72.167.218.173 - webmail.jewish.net
  500. 97.74.135.133 - webmail.jewish.net
  501. 45.40.140.6 - webmail.jewish.net
  502. 173.201.192.5 - webmail.jewish.net
  503. 173.201.192.133 - webmail.jewish.net
  504. 72.167.218.45 - webmail.jewish.net
  505. 173.201.193.5 - webmail.jewish.net
  506. 72.167.218.183 - webmail.jewish.net
  507. 173.201.192.20 - webmail.jewish.net
  508. 68.178.252.20 - webmail.jewish.net
  509. 45.40.130.40 - webmail.jewish.net
  510. 173.201.192.148 - webmail.jewish.net
  511. 173.201.193.20 - webmail.jewish.net
  512. 69.73.184.159 - www.jewish.net
  513. #######################################################################################################################################
  514. Ip Address Status Type Domain Name Server
  515. ---------- ------ ---- ----------- ------
  516. 69.73.184.159 alias ftp.jewish.net
  517. 69.73.184.159 host jewish.net
  518. 209.140.28.114 host update.jewish.net
  519. 72.167.218.183 301 alias webmail.jewish.net
  520. 72.167.218.183 301 alias webmail.secureserver.net
  521. 72.167.218.183 301 host email.secureserver.net
  522. 68.178.252.20 301 host email.secureserver.net
  523. 173.201.192.20 301 host email.secureserver.net
  524. 173.201.193.20 301 host email.secureserver.net
  525. 68.178.252.5 301 host email.secureserver.net
  526. 72.167.218.45 301 host email.secureserver.net
  527. 68.178.252.148 301 host email.secureserver.net
  528. 97.74.135.148 301 host email.secureserver.net
  529. 173.201.193.148 301 host email.secureserver.net
  530. 72.167.218.55 301 host email.secureserver.net
  531. 97.74.135.45 301 host email.secureserver.net
  532. 173.201.193.5 301 host email.secureserver.net
  533. 173.201.192.133 301 host email.secureserver.net
  534. 173.201.192.5 301 host email.secureserver.net
  535. 97.74.135.55 301 host email.secureserver.net
  536. 72.167.218.173 301 host email.secureserver.net
  537. 68.178.252.133 301 host email.secureserver.net
  538. 45.40.130.40 301 host email.secureserver.net
  539. 97.74.135.133 301 host email.secureserver.net
  540. 45.40.140.6 301 host email.secureserver.net
  541. 45.40.130.41 301 host email.secureserver.net
  542. 173.201.192.148 301 host email.secureserver.net
  543. 173.201.193.133 301 host email.secureserver.net
  544. 69.73.184.159 alias www.jewish.net
  545. 69.73.184.159 host jewish.net
  546. #######################################################################################################################################
  547. [+] Testing domain
  548. www.jewish.net 69.73.184.159
  549. [+] Dns resolving
  550. Domain name Ip address Name server
  551. jewish.net 69.73.184.159 finn.nocdirect.com
  552. Found 1 host(s) for jewish.net
  553. [+] Testing wildcard
  554. Ok, no wildcard found.
  555.  
  556. [+] Scanning for subdomain on jewish.net
  557. [!] Wordlist not specified. I scannig with my internal wordlist...
  558. Estimated time about 16.54 seconds
  559.  
  560. Subdomain Ip address Name server
  561.  
  562. ftp.jewish.net 69.73.184.159 finn.nocdirect.com
  563. update.jewish.net 209.140.28.114 vps.moviesonlinefreestreaming.org
  564. webmail.jewish.net 173.201.193.133 p3plgemwbe17-v05.prod.phx3.secureserver.net
  565. www.jewish.net 69.73.184.159 finn.nocdirect.com
  566. ######################################################################################################################################
  567. dnsenum VERSION:1.2.4
  568.  
  569. ----- www.jewish.net -----
  570.  
  571.  
  572. Host's addresses:
  573. __________________
  574.  
  575. jewish.net. 1799 IN A 69.73.184.159
  576.  
  577.  
  578. Name Servers:
  579. ______________
  580.  
  581. ns33.domaincontrol.com. 83000 IN A 97.74.106.17
  582. ns34.domaincontrol.com. 86244 IN A 173.201.74.17
  583.  
  584.  
  585. Mail (MX) Servers:
  586. ___________________
  587.  
  588. ALT2.ASPMX.L.GOOGLE.COM. 293 IN A 172.217.192.27
  589. ASPMX3.GOOGLEMAIL.COM. 293 IN A 172.217.192.27
  590. ASPMX.L.GOOGLE.COM. 293 IN A 64.233.177.27
  591. ASPMX2.GOOGLEMAIL.COM. 293 IN A 74.125.141.27
  592.  
  593.  
  594. Trying Zone Transfers and getting Bind Versions:
  595. _________________________________________________
  596.  
  597.  
  598. Trying Zone Transfer for www.jewish.net on ns33.domaincontrol.com ...
  599.  
  600. Trying Zone Transfer for www.jewish.net on ns34.domaincontrol.com ...
  601.  
  602. brute force file not specified, bay.
  603. ######################################################################################################################################
  604. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:45 EST
  605. Nmap scan report for www.jewish.net (69.73.184.159)
  606. Host is up (0.051s latency).
  607. rDNS record for 69.73.184.159: finn.nocdirect.com
  608. Not shown: 429 filtered ports, 35 closed ports
  609. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  610. PORT STATE SERVICE
  611. 21/tcp open ftp
  612. 22/tcp open ssh
  613. 80/tcp open http
  614. 110/tcp open pop3
  615. 143/tcp open imap
  616. 443/tcp open https
  617. 465/tcp open smtps
  618. 587/tcp open submission
  619. 993/tcp open imaps
  620. 995/tcp open pop3s
  621. 3306/tcp open mysql
  622. 5666/tcp open nrpe
  623. #######################################################################################################################################
  624. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:45 EST
  625. Nmap scan report for www.jewish.net (69.73.184.159)
  626. Host is up (0.025s latency).
  627. rDNS record for 69.73.184.159: finn.nocdirect.com
  628. Not shown: 2 filtered ports, 1 closed port
  629. PORT STATE SERVICE
  630. 67/udp open|filtered dhcps
  631. 68/udp open|filtered dhcpc
  632. 69/udp open|filtered tftp
  633. 88/udp open|filtered kerberos-sec
  634. 123/udp open|filtered ntp
  635. 139/udp open|filtered netbios-ssn
  636. 162/udp open|filtered snmptrap
  637. 389/udp open|filtered ldap
  638. 520/udp open|filtered route
  639. 2049/udp open|filtered nfs
  640. #######################################################################################################################################
  641. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:45 EST
  642. NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
  643. NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
  644. NSE: [ftp-brute] passwords: Time limit 3m00s exceeded.
  645. Nmap scan report for www.jewish.net (69.73.184.159)
  646. Host is up (0.050s latency).
  647. rDNS record for 69.73.184.159: finn.nocdirect.com
  648.  
  649. PORT STATE SERVICE VERSION
  650. 21/tcp open ftp Pure-FTPd
  651. | ftp-brute:
  652. | Accounts: No valid accounts found
  653. |_ Statistics: Performed 2950 guesses in 320 seconds, average tps: 8.6
  654. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  655. Aggressive OS guesses: Linux 4.4 (92%), Linux 3.10 - 3.12 (91%), Linux 2.6.18 - 2.6.22 (90%), Linux 4.9 (90%), Linux 4.0 (88%), Linux 2.6.18 (87%), Linux 3.10 - 3.16 (87%), Linux 3.10 - 4.11 (87%), Linux 3.11 - 4.1 (87%), Linux 3.16 (87%)
  656. No exact OS matches for host (test conditions non-ideal).
  657. Network Distance: 16 hops
  658.  
  659. TRACEROUTE (using port 21/tcp)
  660. HOP RTT ADDRESS
  661. 1 23.42 ms 10.250.200.1
  662. 2 23.50 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  663. 3 26.43 ms 37.120.128.166
  664. 4 23.51 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  665. 5 23.58 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  666. 6 23.58 ms hu0-4-0-1.ccr22.ymq01.atlas.cogentco.com (154.54.31.222)
  667. 7 29.11 ms be2088.ccr21.alb02.atlas.cogentco.com (154.54.43.18)
  668. 8 32.11 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  669. 9 38.28 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  670. 10 48.75 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
  671. 11 50.02 ms be3370.agr21.atl01.atlas.cogentco.com (154.54.7.54)
  672. 12 50.17 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  673. 13 50.00 ms 38.88.11.146
  674. 14 50.08 ms 63.247.69.34
  675. 15 49.98 ms 63.247.66.122
  676. 16 50.07 ms finn.nocdirect.com (69.73.184.159)
  677.  
  678. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  679. Nmap done: 1 IP address (1 host up) scanned in 341.46 seconds
  680. + -- --=[Port 22 opened... running tests...
  681. #######################################################################################################################################
  682. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:53 EST
  683. Nmap scan report for www.jewish.net (69.73.184.159)
  684. Host is up.
  685. rDNS record for 69.73.184.159: finn.nocdirect.com
  686.  
  687. PORT STATE SERVICE VERSION
  688. 22/tcp filtered ssh
  689. Too many fingerprints match this host to give specific OS details
  690.  
  691. TRACEROUTE (using proto 1/icmp)
  692. HOP RTT ADDRESS
  693. 1 24.23 ms 10.250.200.1
  694. 2 24.29 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  695. 3 41.83 ms 37.120.128.166
  696. 4 24.27 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  697. 5 24.29 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  698. 6 24.29 ms 154.54.31.222
  699. 7 29.09 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  700. 8 33.49 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  701. 9 38.11 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  702. 10 49.55 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  703. 11 47.95 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  704. 12 48.63 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  705. 13 47.92 ms 38.88.11.146
  706. 14 48.26 ms 63.247.69.34
  707. 15 48.22 ms 63.247.66.122
  708. 16 ... 30
  709. #######################################################################################################################################
  710. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:54 EST
  711. Nmap scan report for www.jewish.net (69.73.184.159)
  712. Host is up.
  713. rDNS record for 69.73.184.159: finn.nocdirect.com
  714.  
  715. PORT STATE SERVICE VERSION
  716. 67/udp open|filtered dhcps
  717. |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
  718. Too many fingerprints match this host to give specific OS details
  719.  
  720. TRACEROUTE (using proto 1/icmp)
  721. HOP RTT ADDRESS
  722. 1 23.38 ms 10.250.200.1
  723. 2 23.85 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  724. 3 39.01 ms 37.120.128.166
  725. 4 23.42 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  726. 5 23.87 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  727. 6 23.83 ms 154.54.31.222
  728. 7 29.27 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  729. 8 32.00 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  730. 9 38.49 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  731. 10 49.10 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  732. 11 50.80 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  733. 12 51.72 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  734. 13 182.91 ms 38.88.11.146
  735. 14 51.33 ms 63.247.69.34
  736. 15 51.30 ms 63.247.66.122
  737. 16 ... 30
  738. #######################################################################################################################################
  739. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:56 EST
  740. Nmap scan report for www.jewish.net (69.73.184.159)
  741. Host is up.
  742. rDNS record for 69.73.184.159: finn.nocdirect.com
  743.  
  744. PORT STATE SERVICE VERSION
  745. 68/udp open|filtered dhcpc
  746. Too many fingerprints match this host to give specific OS details
  747.  
  748. TRACEROUTE (using proto 1/icmp)
  749. HOP RTT ADDRESS
  750. 1 22.20 ms 10.250.200.1
  751. 2 50.23 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  752. 3 41.24 ms 37.120.128.166
  753. 4 22.68 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  754. 5 23.09 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  755. 6 22.72 ms 154.54.31.222
  756. 7 28.30 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  757. 8 31.13 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  758. 9 37.85 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  759. 10 48.87 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  760. 11 48.40 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  761. 12 49.22 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  762. 13 234.52 ms 38.88.11.146
  763. 14 49.17 ms 63.247.69.34
  764. 15 48.38 ms 63.247.66.122
  765. 16 ... 30
  766. #######################################################################################################################################
  767. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:58 EST
  768. Nmap scan report for www.jewish.net (69.73.184.159)
  769. Host is up.
  770. rDNS record for 69.73.184.159: finn.nocdirect.com
  771.  
  772. PORT STATE SERVICE VERSION
  773. 69/udp open|filtered tftp
  774. Too many fingerprints match this host to give specific OS details
  775.  
  776. TRACEROUTE (using proto 1/icmp)
  777. HOP RTT ADDRESS
  778. 1 36.36 ms 10.250.200.1
  779. 2 36.67 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  780. 3 51.93 ms 37.120.128.166
  781. 4 36.42 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  782. 5 36.75 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  783. 6 36.74 ms 154.54.31.222
  784. 7 40.20 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  785. 8 43.92 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  786. 9 49.44 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  787. 10 58.56 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  788. 11 60.11 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  789. 12 61.83 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  790. 13 718.03 ms 38.88.11.146
  791. 14 60.09 ms 63.247.69.34
  792. 15 60.06 ms 63.247.66.122
  793. 16 ... 30
  794. #######################################################################################################################################
  795. HTTP/1.1 302 Found
  796. Date: Wed, 23 Jan 2019 08:02:28 GMT
  797. Content-Type: text/html; charset=iso-8859-1
  798. Location: https://www.empresawebgt.com/
  799. Expires: Wed, 23 Jan 2019 08:02:27 GMT
  800. Cache-Control: no-cache
  801. Connection: keep-alive
  802. #######################################################################################################################################
  803. ---------------------------------------------------------------------------------------------------------------------------------------
  804.  
  805. [ ! ] Starting SCANNER INURLBR 2.1 at [23-01-2019 03:02:56]
  806. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  807. It is the end user's responsibility to obey all applicable local, state and federal laws.
  808. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  809.  
  810. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-www.jewish.net ]
  811. [ INFO ][ DORK ]::[ site:www.jewish.net ]
  812. [ INFO ][ SEARCHING ]:: {
  813. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.bw ]
  814.  
  815. [ INFO ][ SEARCHING ]::
  816. -[:::]
  817. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  818.  
  819. [ INFO ][ SEARCHING ]::
  820. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  821. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.iq ID: 003917828085772992913:gmoeray5sa8 ]
  822.  
  823. [ INFO ][ SEARCHING ]::
  824. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  825.  
  826. [ INFO ][ TOTAL FOUND VALUES ]:: [ 41 ]
  827.  
  828.  
  829. _[ - ]::--------------------------------------------------------------------------------------------------------------
  830. |_[ + ] [ 0 / 41 ]-[03:03:08] [ - ]
  831. |_[ + ] Target:: [ http://www.jewish.net/ ]
  832. |_[ + ] Exploit::
  833. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  834. |_[ + ] More details:: / - / , ISP:
  835. |_[ + ] Found:: UNIDENTIFIED
  836.  
  837. _[ - ]::--------------------------------------------------------------------------------------------------------------
  838. |_[ + ] [ 1 / 41 ]-[03:03:08] [ - ]
  839. |_[ + ] Target:: [ http://www.jewish.net/vcard/ ]
  840. |_[ + ] Exploit::
  841. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  842. |_[ + ] More details:: / - / , ISP:
  843. |_[ + ] Found:: UNIDENTIFIED
  844.  
  845. _[ - ]::--------------------------------------------------------------------------------------------------------------
  846. |_[ + ] [ 2 / 41 ]-[03:03:09] [ - ]
  847. |_[ + ] Target:: [ http://www.jewish.net/links/Communities/index.shtml ]
  848. |_[ + ] Exploit::
  849. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  850. |_[ + ] More details:: / - / , ISP:
  851. |_[ + ] Found:: UNIDENTIFIED
  852.  
  853. _[ - ]::--------------------------------------------------------------------------------------------------------------
  854. |_[ + ] [ 3 / 41 ]-[03:03:09] [ - ]
  855. |_[ + ] Target:: [ http://www.jewish.net/links/Synagogues_and_Movements/index.shtml ]
  856. |_[ + ] Exploit::
  857. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  858. |_[ + ] More details:: / - / , ISP:
  859. |_[ + ] Found:: UNIDENTIFIED
  860.  
  861. _[ - ]::--------------------------------------------------------------------------------------------------------------
  862. |_[ + ] [ 4 / 41 ]-[03:03:09] [ - ]
  863. |_[ + ] Target:: [ http://www.jewish.net/links/Kabbalah_and_Mysticism/ ]
  864. |_[ + ] Exploit::
  865. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  866. |_[ + ] More details:: / - / , ISP:
  867. |_[ + ] Found:: UNIDENTIFIED
  868.  
  869. _[ - ]::--------------------------------------------------------------------------------------------------------------
  870. |_[ + ] [ 5 / 41 ]-[03:03:10] [ - ]
  871. |_[ + ] Target:: [ http://www.jewish.net/terms.html ]
  872. |_[ + ] Exploit::
  873. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  874. |_[ + ] More details:: / - / , ISP:
  875. |_[ + ] Found:: UNIDENTIFIED
  876.  
  877. _[ - ]::--------------------------------------------------------------------------------------------------------------
  878. |_[ + ] [ 6 / 41 ]-[03:03:10] [ - ]
  879. |_[ + ] Target:: [ http://www.jewish.net/links/Anti-Semitism/index.shtml ]
  880. |_[ + ] Exploit::
  881. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  882. |_[ + ] More details:: / - / , ISP:
  883. |_[ + ] Found:: UNIDENTIFIED
  884.  
  885. _[ - ]::--------------------------------------------------------------------------------------------------------------
  886. |_[ + ] [ 7 / 41 ]-[03:03:10] [ - ]
  887. |_[ + ] Target:: [ http://www.jewish.net/links/Anti-Semitism/Holocaust/index.shtml ]
  888. |_[ + ] Exploit::
  889. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  890. |_[ + ] More details:: / - / , ISP:
  891. |_[ + ] Found:: UNIDENTIFIED
  892.  
  893. _[ - ]::--------------------------------------------------------------------------------------------------------------
  894. |_[ + ] [ 8 / 41 ]-[03:03:11] [ - ]
  895. |_[ + ] Target:: [ http://www.jewish.net/links/Israel/index.shtml ]
  896. |_[ + ] Exploit::
  897. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  898. |_[ + ] More details:: / - / , ISP:
  899. |_[ + ] Found:: UNIDENTIFIED
  900.  
  901. _[ - ]::--------------------------------------------------------------------------------------------------------------
  902. |_[ + ] [ 9 / 41 ]-[03:03:11] [ - ]
  903. |_[ + ] Target:: [ http://www.jewish.net/links/Holidays_and_Observances/index.shtml ]
  904. |_[ + ] Exploit::
  905. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  906. |_[ + ] More details:: / - / , ISP:
  907. |_[ + ] Found:: UNIDENTIFIED
  908.  
  909. _[ - ]::--------------------------------------------------------------------------------------------------------------
  910. |_[ + ] [ 10 / 41 ]-[03:03:11] [ - ]
  911. |_[ + ] Target:: [ http://www.jewish.net/links/Shopping_and_Gifts/index.shtml ]
  912. |_[ + ] Exploit::
  913. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  914. |_[ + ] More details:: / - / , ISP:
  915. |_[ + ] Found:: UNIDENTIFIED
  916.  
  917. _[ - ]::--------------------------------------------------------------------------------------------------------------
  918. |_[ + ] [ 11 / 41 ]-[03:03:12] [ - ]
  919. |_[ + ] Target:: [ http://www.jewish.net/links/Family/index.shtml ]
  920. |_[ + ] Exploit::
  921. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  922. |_[ + ] More details:: / - / , ISP:
  923. |_[ + ] Found:: UNIDENTIFIED
  924.  
  925. _[ - ]::--------------------------------------------------------------------------------------------------------------
  926. |_[ + ] [ 12 / 41 ]-[03:03:12] [ - ]
  927. |_[ + ] Target:: [ http://www.jewish.net/links/Education/index.shtml ]
  928. |_[ + ] Exploit::
  929. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  930. |_[ + ] More details:: / - / , ISP:
  931. |_[ + ] Found:: UNIDENTIFIED
  932.  
  933. _[ - ]::--------------------------------------------------------------------------------------------------------------
  934. |_[ + ] [ 13 / 41 ]-[03:03:12] [ - ]
  935. |_[ + ] Target:: [ http://www.jewish.net/links/News_And_Media/index.shtml ]
  936. |_[ + ] Exploit::
  937. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  938. |_[ + ] More details:: / - / , ISP:
  939. |_[ + ] Found:: UNIDENTIFIED
  940.  
  941. _[ - ]::--------------------------------------------------------------------------------------------------------------
  942. |_[ + ] [ 14 / 41 ]-[03:03:13] [ - ]
  943. |_[ + ] Target:: [ http://www.jewish.net/links/Tourism_and_Travel/index.shtml ]
  944. |_[ + ] Exploit::
  945. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  946. |_[ + ] More details:: / - / , ISP:
  947. |_[ + ] Found:: UNIDENTIFIED
  948.  
  949. _[ - ]::--------------------------------------------------------------------------------------------------------------
  950. |_[ + ] [ 15 / 41 ]-[03:03:13] [ - ]
  951. |_[ + ] Target:: [ http://www.jewish.net/links/Israel/Business_and_Economy/Internet/ ]
  952. |_[ + ] Exploit::
  953. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  954. |_[ + ] More details:: / - / , ISP:
  955. |_[ + ] Found:: UNIDENTIFIED
  956.  
  957. _[ - ]::--------------------------------------------------------------------------------------------------------------
  958. |_[ + ] [ 16 / 41 ]-[03:03:13] [ - ]
  959. |_[ + ] Target:: [ http://www.jewish.net/links/Jewish_Calendar/index.shtml ]
  960. |_[ + ] Exploit::
  961. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  962. |_[ + ] More details:: / - / , ISP:
  963. |_[ + ] Found:: UNIDENTIFIED
  964.  
  965. _[ - ]::--------------------------------------------------------------------------------------------------------------
  966. |_[ + ] [ 17 / 41 ]-[03:03:14] [ - ]
  967. |_[ + ] Target:: [ http://www.jewish.net/links/Shopping_and_Gifts/Judaica/index.shtml ]
  968. |_[ + ] Exploit::
  969. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  970. |_[ + ] More details:: / - / , ISP:
  971. |_[ + ] Found:: UNIDENTIFIED
  972.  
  973. _[ - ]::--------------------------------------------------------------------------------------------------------------
  974. |_[ + ] [ 18 / 41 ]-[03:03:14] [ - ]
  975. |_[ + ] Target:: [ http://www.jewish.net/links/Israel/Kibbutzim/index.shtml ]
  976. |_[ + ] Exploit::
  977. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  978. |_[ + ] More details:: / - / , ISP:
  979. |_[ + ] Found:: UNIDENTIFIED
  980.  
  981. _[ - ]::--------------------------------------------------------------------------------------------------------------
  982. |_[ + ] [ 19 / 41 ]-[03:03:14] [ - ]
  983. |_[ + ] Target:: [ http://www.jewish.net/links/News_And_Media/Radio_and_Television/index.shtml ]
  984. |_[ + ] Exploit::
  985. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  986. |_[ + ] More details:: / - / , ISP:
  987. |_[ + ] Found:: UNIDENTIFIED
  988.  
  989. _[ - ]::--------------------------------------------------------------------------------------------------------------
  990. |_[ + ] [ 20 / 41 ]-[03:03:15] [ - ]
  991. |_[ + ] Target:: [ http://www.jewish.net/links/Shopping_and_Gifts/Judaica/more2.shtml ]
  992. |_[ + ] Exploit::
  993. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  994. |_[ + ] More details:: / - / , ISP:
  995. |_[ + ] Found:: UNIDENTIFIED
  996.  
  997. _[ - ]::--------------------------------------------------------------------------------------------------------------
  998. |_[ + ] [ 21 / 41 ]-[03:03:15] [ - ]
  999. |_[ + ] Target:: [ http://www.jewish.net/links/News_And_Media/Magazines/index.shtml ]
  1000. |_[ + ] Exploit::
  1001. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1002. |_[ + ] More details:: / - / , ISP:
  1003. |_[ + ] Found:: UNIDENTIFIED
  1004.  
  1005. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1006. |_[ + ] [ 22 / 41 ]-[03:03:15] [ - ]
  1007. |_[ + ] Target:: [ http://www.jewish.net/links/Arts_and_Entertainment/Jokes_and_Humour/index.shtml ]
  1008. |_[ + ] Exploit::
  1009. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1010. |_[ + ] More details:: / - / , ISP:
  1011. |_[ + ] Found:: UNIDENTIFIED
  1012.  
  1013. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1014. |_[ + ] [ 23 / 41 ]-[03:03:16] [ - ]
  1015. |_[ + ] Target:: [ http://www.jewish.net/links/Israel/Government/index.shtml ]
  1016. |_[ + ] Exploit::
  1017. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1018. |_[ + ] More details:: / - / , ISP:
  1019. |_[ + ] Found:: UNIDENTIFIED
  1020.  
  1021. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1022. |_[ + ] [ 24 / 41 ]-[03:03:16] [ - ]
  1023. |_[ + ] Target:: [ http://www.jewish.net/links/Synagogues_and_Movements/Karaite/index.shtml ]
  1024. |_[ + ] Exploit::
  1025. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1026. |_[ + ] More details:: / - / , ISP:
  1027. |_[ + ] Found:: UNIDENTIFIED
  1028.  
  1029. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1030. |_[ + ] [ 25 / 41 ]-[03:03:16] [ - ]
  1031. |_[ + ] Target:: [ http://www.jewish.net/links/Shopping_and_Gifts/Art/index.shtml ]
  1032. |_[ + ] Exploit::
  1033. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1034. |_[ + ] More details:: / - / , ISP:
  1035. |_[ + ] Found:: UNIDENTIFIED
  1036.  
  1037. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1038. |_[ + ] [ 26 / 41 ]-[03:03:17] [ - ]
  1039. |_[ + ] Target:: [ http://www.jewish.net/links/Arts_and_Entertainment/Artists/index.shtml ]
  1040. |_[ + ] Exploit::
  1041. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1042. |_[ + ] More details:: / - / , ISP:
  1043. |_[ + ] Found:: UNIDENTIFIED
  1044.  
  1045. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1046. |_[ + ] [ 27 / 41 ]-[03:03:17] [ - ]
  1047. |_[ + ] Target:: [ http://www.jewish.net/links/Synagogues_and_Movements/Sephardi/index.shtml ]
  1048. |_[ + ] Exploit::
  1049. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1050. |_[ + ] More details:: / - / , ISP:
  1051. |_[ + ] Found:: UNIDENTIFIED
  1052.  
  1053. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1054. |_[ + ] [ 28 / 41 ]-[03:03:17] [ - ]
  1055. |_[ + ] Target:: [ http://www.jewish.net/links/Holidays_and_Observances/Rosh_HaShana/index.shtml ]
  1056. |_[ + ] Exploit::
  1057. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1058. |_[ + ] More details:: / - / , ISP:
  1059. |_[ + ] Found:: UNIDENTIFIED
  1060.  
  1061. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1062. |_[ + ] [ 29 / 41 ]-[03:03:18] [ - ]
  1063. |_[ + ] Target:: [ http://www.jewish.net/links/Torah/Holy_Scrolls_and_Scribes/index.shtml ]
  1064. |_[ + ] Exploit::
  1065. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1066. |_[ + ] More details:: / - / , ISP:
  1067. |_[ + ] Found:: UNIDENTIFIED
  1068.  
  1069. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1070. |_[ + ] [ 30 / 41 ]-[03:03:18] [ - ]
  1071. |_[ + ] Target:: [ http://www.jewish.net/links/Arts_and_Entertainment/Galleries_and_Museums/index.shtml ]
  1072. |_[ + ] Exploit::
  1073. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1074. |_[ + ] More details:: / - / , ISP:
  1075. |_[ + ] Found:: UNIDENTIFIED
  1076.  
  1077. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1078. |_[ + ] [ 31 / 41 ]-[03:03:18] [ - ]
  1079. |_[ + ] Target:: [ http://www.jewish.net/links/Famous_Jews/Actors/index.shtml ]
  1080. |_[ + ] Exploit::
  1081. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1082. |_[ + ] More details:: / - / , ISP:
  1083. |_[ + ] Found:: UNIDENTIFIED
  1084.  
  1085. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1086. |_[ + ] [ 32 / 41 ]-[03:03:19] [ - ]
  1087. |_[ + ] Target:: [ http://www.jewish.net/links/Yiddish/Religion/index.shtml ]
  1088. |_[ + ] Exploit::
  1089. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1090. |_[ + ] More details:: / - / , ISP:
  1091. |_[ + ] Found:: UNIDENTIFIED
  1092.  
  1093. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1094. |_[ + ] [ 33 / 41 ]-[03:03:19] [ - ]
  1095. |_[ + ] Target:: [ http://www.jewish.net/links/Jewish_Singles_and_Dating/Israel/index.shtml ]
  1096. |_[ + ] Exploit::
  1097. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1098. |_[ + ] More details:: / - / , ISP:
  1099. |_[ + ] Found:: UNIDENTIFIED
  1100.  
  1101. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1102. |_[ + ] [ 34 / 41 ]-[03:03:19] [ - ]
  1103. |_[ + ] Target:: [ http://www.jewish.net/links/Torah/Torah_Codes/index.shtml ]
  1104. |_[ + ] Exploit::
  1105. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1106. |_[ + ] More details:: / - / , ISP:
  1107. |_[ + ] Found:: UNIDENTIFIED
  1108.  
  1109. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1110. |_[ + ] [ 35 / 41 ]-[03:03:20] [ - ]
  1111. |_[ + ] Target:: [ http://www.jewish.net/links/Jewish_Singles_and_Dating/USA_and_Canada/index.shtml ]
  1112. |_[ + ] Exploit::
  1113. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1114. |_[ + ] More details:: / - / , ISP:
  1115. |_[ + ] Found:: UNIDENTIFIED
  1116.  
  1117. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1118. |_[ + ] [ 36 / 41 ]-[03:03:20] [ - ]
  1119. |_[ + ] Target:: [ http://www.jewish.net/cgi-bin/links/search.cgi ]
  1120. |_[ + ] Exploit::
  1121. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1122. |_[ + ] More details:: / - / , ISP:
  1123. |_[ + ] Found:: UNIDENTIFIED
  1124.  
  1125. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1126. |_[ + ] [ 37 / 41 ]-[03:03:20] [ - ]
  1127. |_[ + ] Target:: [ http://www.jewish.net/cgi-bin/poll/index.cgi ]
  1128. |_[ + ] Exploit::
  1129. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1130. |_[ + ] More details:: / - / , ISP:
  1131. |_[ + ] Found:: UNIDENTIFIED
  1132.  
  1133. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1134. |_[ + ] [ 38 / 41 ]-[03:03:21] [ - ]
  1135. |_[ + ] Target:: [ http://www.jewish.net/links/Communities/United_States_and_Canada/New_York/index.shtml ]
  1136. |_[ + ] Exploit::
  1137. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1138. |_[ + ] More details:: / - / , ISP:
  1139. |_[ + ] Found:: UNIDENTIFIED
  1140.  
  1141. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1142. |_[ + ] [ 39 / 41 ]-[03:03:21] [ - ]
  1143. |_[ + ] Target:: [ http://www.jewish.net/links/Anti-Semitism/History/index.shtml ]
  1144. |_[ + ] Exploit::
  1145. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1146. |_[ + ] More details:: / - / , ISP:
  1147. |_[ + ] Found:: UNIDENTIFIED
  1148.  
  1149. _[ - ]::--------------------------------------------------------------------------------------------------------------
  1150. |_[ + ] [ 40 / 41 ]-[03:03:21] [ - ]
  1151. |_[ + ] Target:: [ http://www.jewish.net/links/Israel/Localities/Tel_Aviv/Business_and_Economy/index.shtml ]
  1152. |_[ + ] Exploit::
  1153. |_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:69.73.184.159:80
  1154. |_[ + ] More details:: / - / , ISP:
  1155. |_[ + ] Found:: UNIDENTIFIED
  1156.  
  1157. [ INFO ] [ Shutting down ]
  1158. [ INFO ] [ End of process INURLBR at [23-01-2019 03:03:21]
  1159. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  1160. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-www.jewish.net ]
  1161. |_________________________________________________________________________________________
  1162.  
  1163. \_________________________________________________________________________________________/
  1164. #######################################################################################################################################
  1165. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 03:03 EST
  1166. Nmap scan report for www.jewish.net (69.73.184.159)
  1167. Host is up (0.026s latency).
  1168. rDNS record for 69.73.184.159: finn.nocdirect.com
  1169.  
  1170. PORT STATE SERVICE VERSION
  1171. 110/tcp filtered pop3
  1172. Too many fingerprints match this host to give specific OS details
  1173. Network Distance: 1 hop
  1174.  
  1175. TRACEROUTE (using port 80/tcp)
  1176. HOP RTT ADDRESS
  1177. 1 23.51 ms finn.nocdirect.com (69.73.184.159)
  1178. #######################################################################################################################################
  1179. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 03:03 EST
  1180. Nmap scan report for www.jewish.net (69.73.184.159)
  1181. Host is up.
  1182. rDNS record for 69.73.184.159: finn.nocdirect.com
  1183.  
  1184. PORT STATE SERVICE VERSION
  1185. 123/udp open|filtered ntp
  1186. Too many fingerprints match this host to give specific OS details
  1187.  
  1188. TRACEROUTE (using proto 1/icmp)
  1189. HOP RTT ADDRESS
  1190. 1 22.47 ms 10.250.200.1
  1191. 2 23.01 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1192. 3 69.08 ms 37.120.128.166
  1193. 4 22.62 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  1194. 5 23.24 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  1195. 6 23.50 ms 154.54.31.222
  1196. 7 28.54 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  1197. 8 31.37 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  1198. 9 37.33 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  1199. 10 48.47 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  1200. 11 48.56 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  1201. 12 48.58 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  1202. 13 48.19 ms 38.88.11.146
  1203. 14 48.21 ms 63.247.69.34
  1204. 15 48.54 ms 63.247.66.122
  1205. 16 ... 30
  1206. #######################################################################################################################################
  1207.  
  1208.  
  1209. AVAILABLE PLUGINS
  1210. -----------------
  1211.  
  1212. PluginCompression
  1213. PluginSessionResumption
  1214. PluginCertInfo
  1215. PluginOpenSSLCipherSuites
  1216. PluginHeartbleed
  1217. PluginChromeSha1Deprecation
  1218. PluginSessionRenegotiation
  1219. PluginHSTS
  1220.  
  1221.  
  1222.  
  1223. CHECKING HOST(S) AVAILABILITY
  1224. -----------------------------
  1225.  
  1226. www.jewish.net:443 => 69.73.184.159:443
  1227.  
  1228.  
  1229.  
  1230. SCAN RESULTS FOR WWW.JEWISH.NET:443 - 69.73.184.159:443
  1231. -------------------------------------------------------
  1232.  
  1233. * Deflate Compression:
  1234. OK - Compression disabled
  1235.  
  1236. * Session Renegotiation:
  1237. Client-initiated Renegotiations: OK - Rejected
  1238. Secure Renegotiation: OK - Supported
  1239.  
  1240. * OpenSSL Heartbleed:
  1241. OK - Not vulnerable to Heartbleed
  1242.  
  1243. * Certificate - Content:
  1244. SHA1 Fingerprint: 91d95c273ced329d0274e11eec58dc9ada560c21
  1245. Common Name: jewish.net
  1246. Issuer: cPanel, Inc. Certification Authority
  1247. Serial Number: E6FED669853BBC45AB4654AB331C5B46
  1248. Not Before: Dec 29 00:00:00 2017 GMT
  1249. Not After: Mar 29 23:59:59 2018 GMT
  1250. Signature Algorithm: sha256WithRSAEncryption
  1251. Public Key Algorithm: rsaEncryption
  1252. Key Size: 2048 bit
  1253. Exponent: 65537 (0x10001)
  1254. X509v3 Subject Alternative Name: {'DNS': ['jewish.net', 'www.jewish.net']}
  1255.  
  1256. * Certificate - Trust:
  1257. Hostname Validation: OK - Subject Alternative Name matches
  1258. Google CA Store (09/2015): FAILED - Certificate is NOT Trusted: certificate has expired
  1259. Java 6 CA Store (Update 65): FAILED - Certificate is NOT Trusted: certificate has expired
  1260. Microsoft CA Store (09/2015): FAILED - Certificate is NOT Trusted: certificate has expired
  1261. Mozilla NSS CA Store (09/2015): FAILED - Certificate is NOT Trusted: certificate has expired
  1262. Apple CA Store (OS X 10.10.5): FAILED - Certificate is NOT Trusted: certificate has expired
  1263. Certificate Chain Received: ['jewish.net', 'cPanel, Inc. Certification Authority', 'COMODO RSA Certification Authority']
  1264.  
  1265. * Certificate - OCSP Stapling:
  1266. NOT SUPPORTED - Server did not send back an OCSP response.
  1267.  
  1268. * SSLV2 Cipher Suites:
  1269. Server rejected all cipher suites.
  1270.  
  1271. * Session Resumption:
  1272. With Session IDs: NOT SUPPORTED (0 successful, 5 failed, 0 errors, 5 total attempts).
  1273. With TLS Session Tickets: OK - Supported
  1274.  
  1275. * TLSV1_2 Cipher Suites:
  1276. Preferred:
  1277. ECDHE-RSA-AES256-GCM-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
  1278. Accepted:
  1279. ECDHE-RSA-AES256-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
  1280. ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
  1281. ECDHE-RSA-AES256-GCM-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
  1282. CAMELLIA256-SHA - 256 bits HTTP 200 OK
  1283. AES256-SHA256 - 256 bits HTTP 200 OK
  1284. AES256-SHA - 256 bits HTTP 200 OK
  1285. AES256-GCM-SHA384 - 256 bits HTTP 200 OK
  1286. ECDHE-RSA-AES128-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
  1287. ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
  1288. ECDHE-RSA-AES128-GCM-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
  1289. CAMELLIA128-SHA - 128 bits HTTP 200 OK
  1290. AES128-SHA256 - 128 bits HTTP 200 OK
  1291. AES128-SHA - 128 bits HTTP 200 OK
  1292. AES128-GCM-SHA256 - 128 bits HTTP 200 OK
  1293.  
  1294. * TLSV1_1 Cipher Suites:
  1295. Preferred:
  1296. ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
  1297. Accepted:
  1298. ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
  1299. CAMELLIA256-SHA - 256 bits HTTP 200 OK
  1300. AES256-SHA - 256 bits HTTP 200 OK
  1301. ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
  1302. CAMELLIA128-SHA - 128 bits HTTP 200 OK
  1303. AES128-SHA - 128 bits HTTP 200 OK
  1304.  
  1305. * TLSV1 Cipher Suites:
  1306. Preferred:
  1307. ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
  1308. Accepted:
  1309. ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
  1310. CAMELLIA256-SHA - 256 bits HTTP 200 OK
  1311. AES256-SHA - 256 bits HTTP 200 OK
  1312. ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
  1313. CAMELLIA128-SHA - 128 bits HTTP 200 OK
  1314. AES128-SHA - 128 bits HTTP 200 OK
  1315.  
  1316. * SSLV3 Cipher Suites:
  1317. Server rejected all cipher suites.
  1318.  
  1319.  
  1320.  
  1321. SCAN COMPLETED IN 4.47 S
  1322. ------------------------
  1323. Version: 1.11.12-static
  1324. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  1325.  
  1326. Connected to 69.73.184.159
  1327.  
  1328. Testing SSL server www.jewish.net on port 443 using SNI name www.jewish.net
  1329.  
  1330. TLS Fallback SCSV:
  1331. Server supports TLS Fallback SCSV
  1332.  
  1333. TLS renegotiation:
  1334. Secure session renegotiation supported
  1335.  
  1336. TLS Compression:
  1337. Compression disabled
  1338.  
  1339. Heartbleed:
  1340. TLS 1.2 not vulnerable to heartbleed
  1341. TLS 1.1 not vulnerable to heartbleed
  1342. TLS 1.0 not vulnerable to heartbleed
  1343.  
  1344. Supported Server Cipher(s):
  1345. Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  1346. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  1347. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1348. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  1349. Accepted TLSv1.2 256 bits AES256-SHA256
  1350. Accepted TLSv1.2 256 bits AES256-SHA
  1351. Accepted TLSv1.2 256 bits CAMELLIA256-SHA
  1352. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  1353. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  1354. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1355. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  1356. Accepted TLSv1.2 128 bits AES128-SHA256
  1357. Accepted TLSv1.2 128 bits AES128-SHA
  1358. Accepted TLSv1.2 128 bits CAMELLIA128-SHA
  1359. Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1360. Accepted TLSv1.1 256 bits AES256-SHA
  1361. Accepted TLSv1.1 256 bits CAMELLIA256-SHA
  1362. Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1363. Accepted TLSv1.1 128 bits AES128-SHA
  1364. Accepted TLSv1.1 128 bits CAMELLIA128-SHA
  1365. Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1366. Accepted TLSv1.0 256 bits AES256-SHA
  1367. Accepted TLSv1.0 256 bits CAMELLIA256-SHA
  1368. Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1369. Accepted TLSv1.0 128 bits AES128-SHA
  1370. Accepted TLSv1.0 128 bits CAMELLIA128-SHA
  1371.  
  1372. SSL Certificate:
  1373. Signature Algorithm: sha256WithRSAEncryption
  1374. RSA Key Strength: 2048
  1375.  
  1376. Subject: jewish.net
  1377. Altnames: DNS:jewish.net, DNS:www.jewish.net
  1378. Issuer: cPanel, Inc. Certification Authority
  1379.  
  1380. Not valid before: Dec 29 00:00:00 2017 GMT
  1381. Not valid after: Mar 29 23:59:59 2018 GMT
  1382. #######################################################################################################################################
  1383. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 03:06 EST
  1384. Nmap scan report for www.jewish.net (69.73.184.159)
  1385. Host is up.
  1386. rDNS record for 69.73.184.159: finn.nocdirect.com
  1387.  
  1388. PORT STATE SERVICE VERSION
  1389. 3306/tcp filtered mysql
  1390. Too many fingerprints match this host to give specific OS details
  1391.  
  1392. TRACEROUTE (using proto 1/icmp)
  1393. HOP RTT ADDRESS
  1394. 1 23.25 ms 10.250.200.1
  1395. 2 23.63 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1396. 3 41.44 ms 37.120.128.166
  1397. 4 23.30 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  1398. 5 23.84 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  1399. 6 23.69 ms 154.54.31.222
  1400. 7 29.06 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  1401. 8 31.88 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  1402. 9 38.08 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  1403. 10 49.19 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  1404. 11 50.31 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  1405. 12 50.67 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  1406. 13 211.01 ms 38.88.11.146
  1407. 14 50.61 ms 63.247.69.34
  1408. 15 58.17 ms 63.247.66.122
  1409. 16 ... 30
  1410. #######################################################################################################################################
  1411. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 03:10 EST
  1412. NSE: Loaded 149 scripts for scanning.
  1413. NSE: Script Pre-scanning.
  1414. NSE: Starting runlevel 1 (of 3) scan.
  1415. Initiating NSE at 03:10
  1416. Completed NSE at 03:10, 0.00s elapsed
  1417. NSE: Starting runlevel 2 (of 3) scan.
  1418. Initiating NSE at 03:10
  1419. Completed NSE at 03:10, 0.00s elapsed
  1420. NSE: Starting runlevel 3 (of 3) scan.
  1421. Initiating NSE at 03:10
  1422. Completed NSE at 03:10, 0.00s elapsed
  1423. Initiating Ping Scan at 03:10
  1424. Scanning www.jewish.net (69.73.184.159) [4 ports]
  1425. Completed Ping Scan at 03:10, 0.06s elapsed (1 total hosts)
  1426. Initiating Parallel DNS resolution of 1 host. at 03:10
  1427. Completed Parallel DNS resolution of 1 host. at 03:10, 0.02s elapsed
  1428. Initiating Connect Scan at 03:10
  1429. Scanning www.jewish.net (69.73.184.159) [1000 ports]
  1430. Discovered open port 80/tcp on 69.73.184.159
  1431. Completed Connect Scan at 03:10, 4.73s elapsed (1000 total ports)
  1432. Initiating Service scan at 03:10
  1433. Scanning 1 service on www.jewish.net (69.73.184.159)
  1434. Completed Service scan at 03:10, 31.90s elapsed (1 service on 1 host)
  1435. Initiating OS detection (try #1) against www.jewish.net (69.73.184.159)
  1436. Retrying OS detection (try #2) against www.jewish.net (69.73.184.159)
  1437. Initiating Traceroute at 03:10
  1438. Completed Traceroute at 03:11, 6.10s elapsed
  1439. Initiating Parallel DNS resolution of 15 hosts. at 03:11
  1440. Completed Parallel DNS resolution of 15 hosts. at 03:11, 16.50s elapsed
  1441. NSE: Script scanning 69.73.184.159.
  1442. NSE: Starting runlevel 1 (of 3) scan.
  1443. Initiating NSE at 03:11
  1444. Completed NSE at 03:11, 1.86s elapsed
  1445. NSE: Starting runlevel 2 (of 3) scan.
  1446. Initiating NSE at 03:11
  1447. Completed NSE at 03:11, 0.28s elapsed
  1448. NSE: Starting runlevel 3 (of 3) scan.
  1449. Initiating NSE at 03:11
  1450. Completed NSE at 03:11, 0.00s elapsed
  1451. Nmap scan report for www.jewish.net (69.73.184.159)
  1452. Host is up, received reset ttl 64 (0.023s latency).
  1453. rDNS record for 69.73.184.159: finn.nocdirect.com
  1454. Scanned at 2019-01-23 03:10:14 EST for 65s
  1455. Not shown: 996 filtered ports
  1456. Reason: 996 no-responses
  1457. PORT STATE SERVICE REASON VERSION
  1458. 25/tcp closed smtp conn-refused
  1459. 80/tcp open http-proxy syn-ack Squid http proxy
  1460. | http-methods:
  1461. |_ Supported Methods: GET HEAD POST OPTIONS
  1462. |_http-open-proxy: Proxy might be redirecting requests
  1463. |_http-title: Did not follow redirect to https://www.empresawebgt.com/
  1464. 139/tcp closed netbios-ssn conn-refused
  1465. 445/tcp closed microsoft-ds conn-refused
  1466. OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
  1467. Aggressive OS guesses: Linux 3.18 (93%), Linux 3.16 - 4.6 (93%), Linux 3.10 - 4.11 (91%), Linux 3.13 (91%), Linux 3.13 or 4.2 (91%), Linux 4.2 (91%), Linux 4.4 (91%), HP P2000 G3 NAS device (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 (89%)
  1468. No exact OS matches for host (test conditions non-ideal).
  1469. TCP/IP fingerprint:
  1470. SCAN(V=7.70SVN%E=4%D=1/23%OT=80%CT=25%CU=%PV=N%G=N%TM=5C4821A7%P=x86_64-unknown-linux-gnu)
  1471. SEQ(SP=100%GCD=1%ISR=10B%TI=Z%CI=Z%TS=8)
  1472. OPS(O1=M4B3ST11NW7%O2=M4B3ST11NW7%O3=M4B3NNT11NW7%O4=M4B3ST11NW7%O5=M4B3ST11NW7%O6=M4B3ST11)
  1473. WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7120)
  1474. ECN(R=Y%DF=Y%TG=40%W=7210%O=M4B3NNSNW7%CC=Y%Q=)
  1475. T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
  1476. T2(R=N)
  1477. T3(R=N)
  1478. T4(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
  1479. T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
  1480. T6(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
  1481. T7(R=N)
  1482. U1(R=N)
  1483. IE(R=N)
  1484.  
  1485. Uptime guess: 1.854 days (since Mon Jan 21 06:41:15 2019)
  1486. TCP Sequence Prediction: Difficulty=256 (Good luck!)
  1487. IP ID Sequence Generation: All zeros
  1488.  
  1489. TRACEROUTE (using proto 1/icmp)
  1490. HOP RTT ADDRESS
  1491. 1 24.14 ms 10.250.200.1
  1492. 2 24.47 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1493. 3 36.51 ms 37.120.128.166
  1494. 4 24.51 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  1495. 5 24.92 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  1496. 6 24.72 ms 154.54.31.222
  1497. 7 30.15 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  1498. 8 32.94 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  1499. 9 39.16 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  1500. 10 49.82 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  1501. 11 50.26 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  1502. 12 50.44 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  1503. 13 50.04 ms 38.88.11.146
  1504. 14 50.69 ms 63.247.69.34
  1505. 15 50.21 ms 63.247.66.122
  1506. 16 ... 30
  1507.  
  1508. NSE: Script Post-scanning.
  1509. NSE: Starting runlevel 1 (of 3) scan.
  1510. Initiating NSE at 03:11
  1511. Completed NSE at 03:11, 0.00s elapsed
  1512. NSE: Starting runlevel 2 (of 3) scan.
  1513. Initiating NSE at 03:11
  1514. Completed NSE at 03:11, 0.00s elapsed
  1515. NSE: Starting runlevel 3 (of 3) scan.
  1516. Initiating NSE at 03:11
  1517. Completed NSE at 03:11, 0.00s elapsed
  1518. Read data files from: /usr/local/bin/../share/nmap
  1519. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1520. Nmap done: 1 IP address (1 host up) scanned in 65.99 seconds
  1521. Raw packets sent: 132 (9.672KB) | Rcvd: 60 (4.224KB)
  1522. #######################################################################################################################################
  1523. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 03:11 EST
  1524. NSE: Loaded 149 scripts for scanning.
  1525. NSE: Script Pre-scanning.
  1526. Initiating NSE at 03:11
  1527. Completed NSE at 03:11, 0.00s elapsed
  1528. Initiating NSE at 03:11
  1529. Completed NSE at 03:11, 0.00s elapsed
  1530. Initiating NSE at 03:11
  1531. Completed NSE at 03:11, 0.00s elapsed
  1532. Initiating Parallel DNS resolution of 1 host. at 03:11
  1533. Completed Parallel DNS resolution of 1 host. at 03:11, 0.02s elapsed
  1534. Initiating UDP Scan at 03:11
  1535. Scanning www.jewish.net (69.73.184.159) [13 ports]
  1536. Completed UDP Scan at 03:11, 1.24s elapsed (13 total ports)
  1537. Initiating Service scan at 03:11
  1538. Scanning 11 services on www.jewish.net (69.73.184.159)
  1539. Service scan Timing: About 9.09% done; ETC: 03:29 (0:16:20 remaining)
  1540. Completed Service scan at 03:13, 102.58s elapsed (11 services on 1 host)
  1541. Initiating OS detection (try #1) against www.jewish.net (69.73.184.159)
  1542. Retrying OS detection (try #2) against www.jewish.net (69.73.184.159)
  1543. Initiating Traceroute at 03:13
  1544. Completed Traceroute at 03:13, 7.10s elapsed
  1545. Initiating Parallel DNS resolution of 1 host. at 03:13
  1546. Completed Parallel DNS resolution of 1 host. at 03:13, 0.02s elapsed
  1547. NSE: Script scanning 69.73.184.159.
  1548. Initiating NSE at 03:13
  1549. Completed NSE at 03:15, 154.38s elapsed
  1550. Initiating NSE at 03:15
  1551. Completed NSE at 03:15, 1.01s elapsed
  1552. Initiating NSE at 03:15
  1553. Completed NSE at 03:15, 0.00s elapsed
  1554. Nmap scan report for www.jewish.net (69.73.184.159)
  1555. Host is up (0.024s latency).
  1556. rDNS record for 69.73.184.159: finn.nocdirect.com
  1557.  
  1558. PORT STATE SERVICE VERSION
  1559. 53/udp open|filtered domain
  1560. 67/udp open|filtered dhcps
  1561. 68/udp open|filtered dhcpc
  1562. 69/udp open|filtered tftp
  1563. 88/udp open|filtered kerberos-sec
  1564. 123/udp open|filtered ntp
  1565. 137/udp filtered netbios-ns
  1566. 138/udp filtered netbios-dgm
  1567. 139/udp open|filtered netbios-ssn
  1568. 162/udp open|filtered snmptrap
  1569. 389/udp open|filtered ldap
  1570. 520/udp open|filtered route
  1571. 2049/udp open|filtered nfs
  1572. Too many fingerprints match this host to give specific OS details
  1573.  
  1574. TRACEROUTE (using port 138/udp)
  1575. HOP RTT ADDRESS
  1576. 1 24.31 ms 10.250.200.1
  1577. 2 ... 3
  1578. 4 22.33 ms 10.250.200.1
  1579. 5 24.27 ms 10.250.200.1
  1580. 6 24.27 ms 10.250.200.1
  1581. 7 24.27 ms 10.250.200.1
  1582. 8 24.11 ms 10.250.200.1
  1583. 9 24.11 ms 10.250.200.1
  1584. 10 24.15 ms 10.250.200.1
  1585. 11 ... 18
  1586. 19 23.13 ms 10.250.200.1
  1587. 20 23.13 ms 10.250.200.1
  1588. 21 ... 28
  1589. 29 24.23 ms 10.250.200.1
  1590. 30 25.05 ms 10.250.200.1
  1591.  
  1592. NSE: Script Post-scanning.
  1593. Initiating NSE at 03:15
  1594. Completed NSE at 03:15, 0.00s elapsed
  1595. Initiating NSE at 03:15
  1596. Completed NSE at 03:15, 0.00s elapsed
  1597. Initiating NSE at 03:15
  1598. Completed NSE at 03:15, 0.00s elapsed
  1599. Read data files from: /usr/local/bin/../share/nmap
  1600. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1601. Nmap done: 1 IP address (1 host up) scanned in 269.51 seconds
  1602. Raw packets sent: 144 (9.760KB) | Rcvd: 26 (2.322KB)
  1603. #######################################################################################################################################
  1604. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 03:15 EST
  1605. Nmap scan report for www.jewish.net (69.73.184.159)
  1606. Host is up (0.024s latency).
  1607. rDNS record for 69.73.184.159: finn.nocdirect.com
  1608. Not shown: 22 filtered ports, 3 closed ports
  1609. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  1610. PORT STATE SERVICE
  1611. 80/tcp open http
  1612. ######################################################################################################################################
  1613. * default
  1614. * default
  1615. [*] Importing 'Nmap XML' data
  1616. [*] Import: Parsing with 'Nokogiri v1.10.0'
  1617. [*] Importing host 69.73.184.159
  1618. [*] Successfully imported /usr/share/sniper/loot/www.jewish.net/nmap/nmap-www.jewish.net-udp.xml
  1619. [*] Importing 'Nmap XML' data
  1620. [*] Import: Parsing with 'Nokogiri v1.10.0'
  1621. [*] Importing host 69.73.184.159
  1622. [*] Successfully imported /usr/share/sniper/loot/www.jewish.net/nmap/nmap-udp-www.jewish.net.xml
  1623. [*] Importing 'Nmap XML' data
  1624. [*] Import: Parsing with 'Nokogiri v1.10.0'
  1625. [*] Importing host 69.73.184.159
  1626. [*] Successfully imported /usr/share/sniper/loot/www.jewish.net/nmap/nmap-www.jewish.net.xml
  1627. #######################################################################################################################################
  1628. Hosts
  1629. =====
  1630.  
  1631. address mac name os_name os_flavor os_sp purpose info comments
  1632. ------- --- ---- ------- --------- ----- ------- ---- --------
  1633. 18.209.92.69 ec2-18-209-92-69.compute-1.amazonaws.com embedded device
  1634. 69.73.184.159 finn.nocdirect.com Linux 3.X server
  1635. 165.98.58.12 wh1.redkangaroo.net.ni Unknown device
  1636.  
  1637. Services
  1638. ========
  1639.  
  1640. host port proto name state info
  1641. ---- ---- ----- ---- ----- ----
  1642. 18.209.92.69 25 tcp smtp closed
  1643. 18.209.92.69 53 udp domain unknown
  1644. 18.209.92.69 67 udp dhcps unknown
  1645. 18.209.92.69 68 udp dhcpc unknown
  1646. 18.209.92.69 69 udp tftp unknown
  1647. 18.209.92.69 80 tcp http open Apache httpd 2.4.37 (Amazon) OpenSSL/1.0.2k-fips PHP/7.2.11
  1648. 18.209.92.69 88 udp kerberos-sec unknown
  1649. 18.209.92.69 123 udp ntp unknown
  1650. 18.209.92.69 137 udp netbios-ns filtered
  1651. 18.209.92.69 138 udp netbios-dgm filtered
  1652. 18.209.92.69 139 tcp netbios-ssn closed
  1653. 18.209.92.69 139 udp netbios-ssn unknown
  1654. 18.209.92.69 162 udp snmptrap unknown
  1655. 18.209.92.69 389 udp ldap unknown
  1656. 18.209.92.69 443 tcp ssl/ssl open Apache httpd SSL-only mode
  1657. 18.209.92.69 445 tcp microsoft-ds closed
  1658. 18.209.92.69 520 udp route unknown
  1659. 18.209.92.69 2049 udp nfs unknown
  1660. 69.73.184.159 25 tcp smtp closed
  1661. 69.73.184.159 53 udp domain unknown
  1662. 69.73.184.159 67 udp dhcps unknown
  1663. 69.73.184.159 68 udp dhcpc unknown
  1664. 69.73.184.159 69 udp tftp unknown
  1665. 69.73.184.159 80 tcp http-proxy open Squid http proxy
  1666. 69.73.184.159 88 udp kerberos-sec unknown
  1667. 69.73.184.159 123 udp ntp unknown
  1668. 69.73.184.159 137 udp netbios-ns filtered
  1669. 69.73.184.159 138 udp netbios-dgm filtered
  1670. 69.73.184.159 139 tcp netbios-ssn closed
  1671. 69.73.184.159 139 udp netbios-ssn unknown
  1672. 69.73.184.159 162 udp snmptrap unknown
  1673. 69.73.184.159 389 udp ldap unknown
  1674. 69.73.184.159 445 tcp microsoft-ds closed
  1675. 69.73.184.159 520 udp route unknown
  1676. 69.73.184.159 2049 udp nfs unknown
  1677. 165.98.58.12 53 udp domain unknown
  1678. 165.98.58.12 67 udp dhcps unknown
  1679. 165.98.58.12 68 udp dhcpc unknown
  1680. 165.98.58.12 69 udp tftp unknown
  1681. 165.98.58.12 88 udp kerberos-sec unknown
  1682. 165.98.58.12 123 udp ntp unknown
  1683. 165.98.58.12 137 udp netbios-ns filtered
  1684. 165.98.58.12 138 udp netbios-dgm filtered
  1685. 165.98.58.12 139 udp netbios-ssn unknown
  1686. 165.98.58.12 162 udp snmptrap unknown
  1687. 165.98.58.12 389 udp ldap unknown
  1688. 165.98.58.12 520 udp route unknown
  1689. 165.98.58.12 2049 udp nfs unknown
  1690. #######################################################################################################################################
  1691. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:44 EST
  1692. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  1693. Host is up (0.051s latency).
  1694. Not shown: 429 filtered ports, 35 closed ports
  1695. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  1696. PORT STATE SERVICE
  1697. 21/tcp open ftp
  1698. 22/tcp open ssh
  1699. 80/tcp open http
  1700. 110/tcp open pop3
  1701. 143/tcp open imap
  1702. 443/tcp open https
  1703. 465/tcp open smtps
  1704. 587/tcp open submission
  1705. 993/tcp open imaps
  1706. 995/tcp open pop3s
  1707. 3306/tcp open mysql
  1708. 5666/tcp open nrpe
  1709. #######################################################################################################################################
  1710. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:45 EST
  1711. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  1712. Host is up (0.026s latency).
  1713. Not shown: 2 filtered ports, 1 closed port
  1714. PORT STATE SERVICE
  1715. 67/udp open|filtered dhcps
  1716. 68/udp open|filtered dhcpc
  1717. 69/udp open|filtered tftp
  1718. 88/udp open|filtered kerberos-sec
  1719. 123/udp open|filtered ntp
  1720. 139/udp open|filtered netbios-ssn
  1721. 162/udp open|filtered snmptrap
  1722. 389/udp open|filtered ldap
  1723. 520/udp open|filtered route
  1724. 2049/udp open|filtered nfs
  1725. #######################################################################################################################################
  1726. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:45 EST
  1727. NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
  1728. NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
  1729. NSE: [ftp-brute] passwords: Time limit 3m00s exceeded.
  1730. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  1731. Host is up (0.050s latency).
  1732.  
  1733. PORT STATE SERVICE VERSION
  1734. 21/tcp open ftp Pure-FTPd
  1735. | ftp-brute:
  1736. | Accounts: No valid accounts found
  1737. |_ Statistics: Performed 2881 guesses in 319 seconds, average tps: 8.1
  1738. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1739. Device type: general purpose|storage-misc|firewall|webcam
  1740. Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (91%), Synology DiskStation Manager 5.X (86%), WatchGuard Fireware 11.X (85%), Tandberg embedded (85%)
  1741. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/h:tandberg:vcs
  1742. Aggressive OS guesses: Linux 3.10 - 3.12 (91%), Linux 4.4 (91%), Linux 2.6.18 - 2.6.22 (90%), Linux 4.9 (90%), Linux 3.10 - 4.11 (87%), Linux 3.11 - 4.1 (87%), Linux 3.16 (87%), Linux 3.2 - 4.9 (87%), Linux 4.0 (87%), Linux 2.6.32 or 3.10 (87%)
  1743. No exact OS matches for host (test conditions non-ideal).
  1744. Network Distance: 16 hops
  1745.  
  1746. TRACEROUTE (using port 21/tcp)
  1747. HOP RTT ADDRESS
  1748. 1 24.02 ms 10.250.200.1
  1749. 2 25.17 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1750. 3 35.89 ms 37.120.128.166
  1751. 4 24.09 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  1752. 5 25.23 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  1753. 6 25.18 ms hu0-4-0-1.ccr21.ymq01.atlas.cogentco.com (154.54.25.126)
  1754. 7 30.12 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  1755. 8 33.75 ms be2915.ccr41.jfk02.atlas.cogentco.com (154.54.40.62)
  1756. 9 40.15 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
  1757. 10 49.78 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  1758. 11 49.56 ms be3373.agr22.atl01.atlas.cogentco.com (154.54.44.78)
  1759. 12 50.65 ms te0-0-2-3.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.82)
  1760. 13 49.46 ms 38.88.11.146
  1761. 14 49.85 ms 63.247.69.34
  1762. 15 49.80 ms 63.247.66.122
  1763. 16 49.49 ms finn.nocdirect.com (69.73.184.159)
  1764. #######################################################################################################################################
  1765. # general
  1766. (gen) banner: SSH-2.0-OpenSSH_7.4
  1767. (gen) software: OpenSSH 7.4
  1768. (gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
  1769. (gen) compression: enabled (zlib@openssh.com)
  1770.  
  1771. # key exchange algorithms
  1772. (kex) curve25519-sha256 -- [warn] unknown algorithm
  1773. (kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
  1774. (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
  1775. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  1776. (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
  1777. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  1778. (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
  1779. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  1780. (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
  1781. `- [info] available since OpenSSH 4.4
  1782. (kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
  1783. (kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
  1784. (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1785. `- [warn] using weak hashing algorithm
  1786. `- [info] available since OpenSSH 2.3.0
  1787. (kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
  1788. (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
  1789. `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
  1790. (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1791. `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
  1792. `- [warn] using small 1024-bit modulus
  1793. `- [warn] using weak hashing algorithm
  1794. `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
  1795.  
  1796. # host-key algorithms
  1797. (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
  1798. (key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
  1799. (key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
  1800. (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
  1801. `- [warn] using weak random number generator could reveal the key
  1802. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  1803. (key) ssh-ed25519 -- [info] available since OpenSSH 6.5
  1804.  
  1805. # encryption algorithms (ciphers)
  1806. (enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
  1807. `- [info] default cipher since OpenSSH 6.9.
  1808. (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
  1809. (enc) aes192-ctr -- [info] available since OpenSSH 3.7
  1810. (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
  1811. (enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
  1812. (enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
  1813. (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1814. `- [warn] using weak cipher mode
  1815. `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
  1816. (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1817. `- [warn] using weak cipher mode
  1818. `- [info] available since OpenSSH 2.3.0
  1819. (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1820. `- [warn] using weak cipher mode
  1821. `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
  1822. (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1823. `- [fail] disabled since Dropbear SSH 0.53
  1824. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  1825. `- [warn] using weak cipher mode
  1826. `- [warn] using small 64-bit block size
  1827. `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
  1828. (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1829. `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
  1830. `- [warn] using weak cipher mode
  1831. `- [warn] using small 64-bit block size
  1832. `- [info] available since OpenSSH 2.1.0
  1833. (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
  1834. `- [warn] using weak cipher
  1835. `- [warn] using weak cipher mode
  1836. `- [warn] using small 64-bit block size
  1837. `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
  1838.  
  1839. # message authentication code algorithms
  1840. (mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
  1841. `- [info] available since OpenSSH 6.2
  1842. (mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
  1843. (mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
  1844. (mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
  1845. (mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
  1846. `- [info] available since OpenSSH 6.2
  1847. (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
  1848. `- [warn] using small 64-bit tag size
  1849. `- [info] available since OpenSSH 4.7
  1850. (mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
  1851. `- [info] available since OpenSSH 6.2
  1852. (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
  1853. `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
  1854. (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
  1855. `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
  1856. (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
  1857. `- [warn] using weak hashing algorithm
  1858. `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
  1859.  
  1860. # algorithm recommendations (for OpenSSH 7.4)
  1861. (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
  1862. (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
  1863. (rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
  1864. (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
  1865. (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
  1866. (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
  1867. (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
  1868. (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
  1869. (rec) -blowfish-cbc -- enc algorithm to remove
  1870. (rec) -3des-cbc -- enc algorithm to remove
  1871. (rec) -aes256-cbc -- enc algorithm to remove
  1872. (rec) -cast128-cbc -- enc algorithm to remove
  1873. (rec) -aes192-cbc -- enc algorithm to remove
  1874. (rec) -aes128-cbc -- enc algorithm to remove
  1875. (rec) -hmac-sha2-512 -- mac algorithm to remove
  1876. (rec) -umac-128@openssh.com -- mac algorithm to remove
  1877. (rec) -hmac-sha2-256 -- mac algorithm to remove
  1878. (rec) -umac-64@openssh.com -- mac algorithm to remove
  1879. (rec) -hmac-sha1 -- mac algorithm to remove
  1880. (rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
  1881. (rec) -umac-64-etm@openssh.com -- mac algorithm to remove
  1882. #######################################################################################################################################
  1883. admin is a valid user!
  1884. backup is a valid user!
  1885. ftp is a valid user!
  1886. mail is a valid user!
  1887. mysql is a valid user!
  1888. nobody is a valid user!
  1889. postfix is a valid user!
  1890. postgres is a valid user!
  1891. root is a valid user!
  1892. #######################################################################################################################################
  1893.  
  1894. libssh scanner 1.0.4
  1895.  
  1896. Searching for Vulnerable Hosts...
  1897.  
  1898. [*] 69.73.184.159:22 is not vulnerable to authentication bypass (SSH-2.0-OpenSSH_7.4)
  1899.  
  1900. Scanner Completed Successfully
  1901. #######################################################################################################################################
  1902. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:50 EST
  1903. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  1904. Host is up.
  1905.  
  1906. PORT STATE SERVICE VERSION
  1907. 22/tcp filtered ssh
  1908. Too many fingerprints match this host to give specific OS details
  1909.  
  1910. TRACEROUTE (using proto 1/icmp)
  1911. HOP RTT ADDRESS
  1912. 1 25.02 ms 10.250.200.1
  1913. 2 50.26 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1914. 3 40.23 ms 37.120.128.166
  1915. 4 25.44 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  1916. 5 25.63 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  1917. 6 25.47 ms 154.54.31.222
  1918. 7 30.85 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  1919. 8 34.65 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  1920. 9 40.28 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  1921. 10 50.82 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  1922. 11 51.23 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  1923. 12 52.23 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  1924. 13 51.22 ms 38.88.11.146
  1925. 14 51.23 ms 63.247.69.34
  1926. 15 48.56 ms 63.247.66.122
  1927. 16 ... 30
  1928. ######################################################################################################################################
  1929. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:51 EST
  1930. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  1931. Host is up.
  1932.  
  1933. PORT STATE SERVICE VERSION
  1934. 67/udp open|filtered dhcps
  1935. |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
  1936. Too many fingerprints match this host to give specific OS details
  1937.  
  1938. TRACEROUTE (using proto 1/icmp)
  1939. HOP RTT ADDRESS
  1940. 1 25.15 ms 10.250.200.1
  1941. 2 49.53 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1942. 3 39.77 ms 37.120.128.166
  1943. 4 26.30 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  1944. 5 25.53 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  1945. 6 25.54 ms 154.54.31.222
  1946. 7 31.01 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  1947. 8 33.75 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  1948. 9 39.78 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  1949. 10 50.99 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  1950. 11 46.96 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  1951. 12 47.73 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  1952. 13 53.66 ms 38.88.11.146
  1953. 14 48.46 ms 63.247.69.34
  1954. 15 49.42 ms 63.247.66.122
  1955. 16 ... 30
  1956. #######################################################################################################################################
  1957. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:53 EST
  1958. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  1959. Host is up.
  1960.  
  1961. PORT STATE SERVICE VERSION
  1962. 68/udp open|filtered dhcpc
  1963. Too many fingerprints match this host to give specific OS details
  1964.  
  1965. TRACEROUTE (using proto 1/icmp)
  1966. HOP RTT ADDRESS
  1967. 1 24.14 ms 10.250.200.1
  1968. 2 24.70 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1969. 3 41.77 ms 37.120.128.166
  1970. 4 24.23 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  1971. 5 24.78 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  1972. 6 24.78 ms 154.54.31.222
  1973. 7 30.03 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  1974. 8 32.82 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  1975. 9 39.23 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  1976. 10 50.53 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  1977. 11 50.63 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  1978. 12 50.62 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  1979. 13 50.54 ms 38.88.11.146
  1980. 14 50.58 ms 63.247.69.34
  1981. 15 50.60 ms 63.247.66.122
  1982. 16 ... 30
  1983. #######################################################################################################################################
  1984. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 02:56 EST
  1985. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  1986. Host is up.
  1987.  
  1988. PORT STATE SERVICE VERSION
  1989. 69/udp open|filtered tftp
  1990. Too many fingerprints match this host to give specific OS details
  1991.  
  1992. TRACEROUTE (using proto 1/icmp)
  1993. HOP RTT ADDRESS
  1994. 1 22.18 ms 10.250.200.1
  1995. 2 22.56 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1996. 3 42.56 ms 37.120.128.166
  1997. 4 22.25 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  1998. 5 22.85 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  1999. 6 23.08 ms 154.54.31.222
  2000. 7 28.25 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  2001. 8 30.92 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  2002. 9 37.12 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  2003. 10 47.90 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  2004. 11 48.79 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  2005. 12 49.18 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  2006. 13 191.84 ms 38.88.11.146
  2007. 14 49.17 ms 63.247.69.34
  2008. 15 49.10 ms 63.247.66.122
  2009. 16 ... 30
  2010. #######################################################################################################################################
  2011.  
  2012. wig - WebApp Information Gatherer
  2013.  
  2014.  
  2015. Scanning http://69.73.184.159...
  2016. __________________ SITE INFO __________________
  2017. IP Title
  2018. 69.73.184.159 Captcha
  2019.  
  2020. ___________________ VERSION ___________________
  2021. Name Versions Type
  2022.  
  2023. _______________________________________________
  2024. Time: 230.1 sec Urls: 156 Fingerprints: 40401
  2025. #######################################################################################################################################
  2026. HTTP/1.1 302 Found
  2027. Date: Wed, 23 Jan 2019 08:02:33 GMT
  2028. Content-Type: text/html; charset=iso-8859-1
  2029. Location: https://www.empresawebgt.com/
  2030. Expires: Wed, 23 Jan 2019 08:02:32 GMT
  2031. Cache-Control: no-cache
  2032. Connection: keep-alive
  2033. #######################################################################################################################################
  2034. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 03:02 EST
  2035. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  2036. Host is up (0.023s latency).
  2037.  
  2038. PORT STATE SERVICE VERSION
  2039. 110/tcp filtered pop3
  2040. Too many fingerprints match this host to give specific OS details
  2041. Network Distance: 1 hop
  2042.  
  2043. TRACEROUTE (using port 80/tcp)
  2044. HOP RTT ADDRESS
  2045. 1 23.67 ms finn.nocdirect.com (69.73.184.159)
  2046. ######################################################################################################################################
  2047. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 03:02 EST
  2048. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  2049. Host is up.
  2050.  
  2051. PORT STATE SERVICE VERSION
  2052. 123/udp open|filtered ntp
  2053. Too many fingerprints match this host to give specific OS details
  2054.  
  2055. TRACEROUTE (using proto 1/icmp)
  2056. HOP RTT ADDRESS
  2057. 1 22.62 ms 10.250.200.1
  2058. 2 23.06 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  2059. 3 42.50 ms 37.120.128.166
  2060. 4 22.70 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  2061. 5 23.13 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  2062. 6 23.53 ms 154.54.31.222
  2063. 7 28.71 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  2064. 8 31.15 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  2065. 9 37.53 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  2066. 10 48.60 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  2067. 11 47.63 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  2068. 12 48.42 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  2069. 13 47.76 ms 38.88.11.146
  2070. 14 47.78 ms 63.247.69.34
  2071. 15 47.76 ms 63.247.66.122
  2072. 16 ... 30
  2073. ######################################################################################################################################
  2074.  
  2075. ^ ^
  2076. _ __ _ ____ _ __ _ _ ____
  2077. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  2078. | V V // o // _/ | V V // 0 // 0 // _/
  2079. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  2080. <
  2081. ...'
  2082.  
  2083. WAFW00F - Web Application Firewall Detection Tool
  2084.  
  2085. By Sandro Gauci && Wendel G. Henrique
  2086.  
  2087. Checking https://69.73.184.159
  2088. Generic Detection results:
  2089. No WAF detected by the generic detection
  2090. Number of requests: 14
  2091. #######################################################################################################################################
  2092. https://69.73.184.159 [200 OK] Country[UNITED STATES][US], HTML5, HTTPServer[imunify360-webshield/1.5], IP[69.73.184.159], JQuery, PoweredBy[Imunify360], Script, Title[Captcha]
  2093. #######################################################################################################################################
  2094.  
  2095.  
  2096.  
  2097. AVAILABLE PLUGINS
  2098. -----------------
  2099.  
  2100. PluginChromeSha1Deprecation
  2101. PluginSessionRenegotiation
  2102. PluginOpenSSLCipherSuites
  2103. PluginCertInfo
  2104. PluginHeartbleed
  2105. PluginCompression
  2106. PluginSessionResumption
  2107. PluginHSTS
  2108.  
  2109.  
  2110.  
  2111. CHECKING HOST(S) AVAILABILITY
  2112. -----------------------------
  2113.  
  2114. 69.73.184.159:443 => 69.73.184.159:443
  2115.  
  2116.  
  2117.  
  2118. SCAN RESULTS FOR 69.73.184.159:443 - 69.73.184.159:443
  2119. ------------------------------------------------------
  2120.  
  2121. * Deflate Compression:
  2122. OK - Compression disabled
  2123.  
  2124. * Session Renegotiation:
  2125. Client-initiated Renegotiations: OK - Rejected
  2126. Secure Renegotiation: OK - Supported
  2127.  
  2128. * Certificate - Content:
  2129. SHA1 Fingerprint: 4fed6e092dea035f94bedc066eb5173ec0d3dbaa
  2130. Common Name: localhost.localdomain
  2131. Issuer: localhost.localdomain
  2132. Serial Number: F52E794F6A9C332A
  2133. Not Before: Sep 19 10:54:46 2017 GMT
  2134. Not After: Sep 19 10:54:46 2018 GMT
  2135. Signature Algorithm: sha1WithRSAEncryption
  2136. Public Key Algorithm: rsaEncryption
  2137. Key Size: 2048 bit
  2138. Exponent: 65537 (0x10001)
  2139.  
  2140. * Certificate - Trust:
  2141. Hostname Validation: FAILED - Certificate does NOT match 69.73.184.159
  2142. Google CA Store (09/2015): FAILED - Certificate is NOT Trusted: self signed certificate
  2143. Java 6 CA Store (Update 65): FAILED - Certificate is NOT Trusted: self signed certificate
  2144. Microsoft CA Store (09/2015): FAILED - Certificate is NOT Trusted: self signed certificate
  2145. Mozilla NSS CA Store (09/2015): FAILED - Certificate is NOT Trusted: self signed certificate
  2146. Apple CA Store (OS X 10.10.5): FAILED - Certificate is NOT Trusted: self signed certificate
  2147. Certificate Chain Received: ['localhost.localdomain']
  2148.  
  2149. * Certificate - OCSP Stapling:
  2150. NOT SUPPORTED - Server did not send back an OCSP response.
  2151.  
  2152. * Session Resumption:
  2153. With Session IDs: NOT SUPPORTED (0 successful, 5 failed, 0 errors, 5 total attempts).
  2154. With TLS Session Tickets: OK - Supported
  2155.  
  2156. * SSLV2 Cipher Suites:
  2157. Server rejected all cipher suites.
  2158.  
  2159. * TLSV1_2 Cipher Suites:
  2160. Preferred:
  2161. ECDHE-RSA-AES256-GCM-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
  2162. Accepted:
  2163. ECDHE-RSA-AES256-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
  2164. ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
  2165. ECDHE-RSA-AES256-GCM-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
  2166. CAMELLIA256-SHA - 256 bits HTTP 200 OK
  2167. AES256-SHA256 - 256 bits HTTP 200 OK
  2168. AES256-SHA - 256 bits HTTP 200 OK
  2169. AES256-GCM-SHA384 - 256 bits HTTP 200 OK
  2170. ECDHE-RSA-AES128-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
  2171. ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
  2172. ECDHE-RSA-AES128-GCM-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
  2173. CAMELLIA128-SHA - 128 bits HTTP 200 OK
  2174. AES128-SHA256 - 128 bits HTTP 200 OK
  2175. AES128-SHA - 128 bits HTTP 200 OK
  2176. AES128-GCM-SHA256 - 128 bits HTTP 200 OK
  2177.  
  2178. * TLSV1_1 Cipher Suites:
  2179. Preferred:
  2180. ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
  2181. Accepted:
  2182. ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
  2183. CAMELLIA256-SHA - 256 bits HTTP 200 OK
  2184. AES256-SHA - 256 bits HTTP 200 OK
  2185. ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
  2186. CAMELLIA128-SHA - 128 bits HTTP 200 OK
  2187. AES128-SHA - 128 bits HTTP 200 OK
  2188.  
  2189. * TLSV1 Cipher Suites:
  2190. Preferred:
  2191. ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
  2192. Accepted:
  2193. ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
  2194. CAMELLIA256-SHA - 256 bits HTTP 200 OK
  2195. AES256-SHA - 256 bits HTTP 200 OK
  2196. ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
  2197. CAMELLIA128-SHA - 128 bits HTTP 200 OK
  2198. AES128-SHA - 128 bits HTTP 200 OK
  2199.  
  2200. * SSLV3 Cipher Suites:
  2201. Server rejected all cipher suites.
  2202.  
  2203. Unhandled exception when processing --heartbleed:
  2204. socket.timeout - timed out
  2205.  
  2206.  
  2207.  
  2208. SCAN COMPLETED IN 5.57 S
  2209. ------------------------
  2210. Version: 1.11.12-static
  2211. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  2212.  
  2213. Connected to 69.73.184.159
  2214.  
  2215. Testing SSL server 69.73.184.159 on port 443 using SNI name 69.73.184.159
  2216.  
  2217. TLS Fallback SCSV:
  2218. Server supports TLS Fallback SCSV
  2219.  
  2220. TLS renegotiation:
  2221. Secure session renegotiation supported
  2222.  
  2223. TLS Compression:
  2224. Compression disabled
  2225.  
  2226. Heartbleed:
  2227. TLS 1.2 not vulnerable to heartbleed
  2228. TLS 1.1 not vulnerable to heartbleed
  2229. TLS 1.0 not vulnerable to heartbleed
  2230.  
  2231. Supported Server Cipher(s):
  2232. Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  2233. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  2234. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  2235. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  2236. Accepted TLSv1.2 256 bits AES256-SHA256
  2237. Accepted TLSv1.2 256 bits AES256-SHA
  2238. Accepted TLSv1.2 256 bits CAMELLIA256-SHA
  2239. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  2240. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  2241. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  2242. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  2243. Accepted TLSv1.2 128 bits AES128-SHA256
  2244. Accepted TLSv1.2 128 bits AES128-SHA
  2245. Accepted TLSv1.2 128 bits CAMELLIA128-SHA
  2246. Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  2247. Accepted TLSv1.1 256 bits AES256-SHA
  2248. Accepted TLSv1.1 256 bits CAMELLIA256-SHA
  2249. Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  2250. Accepted TLSv1.1 128 bits AES128-SHA
  2251. Accepted TLSv1.1 128 bits CAMELLIA128-SHA
  2252. Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  2253. Accepted TLSv1.0 256 bits AES256-SHA
  2254. Accepted TLSv1.0 256 bits CAMELLIA256-SHA
  2255. Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  2256. Accepted TLSv1.0 128 bits AES128-SHA
  2257. Accepted TLSv1.0 128 bits CAMELLIA128-SHA
  2258.  
  2259. SSL Certificate:
  2260. Signature Algorithm: sha1WithRSAEncryption
  2261. RSA Key Strength: 2048
  2262.  
  2263. Subject: localhost.localdomain
  2264. Issuer: localhost.localdomain
  2265.  
  2266. Not valid before: Sep 19 10:54:46 2017 GMT
  2267. Not valid after: Sep 19 10:54:46 2018 GMT
  2268. ######################################################################################################################################
  2269. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 03:05 EST
  2270. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  2271. Host is up.
  2272.  
  2273. PORT STATE SERVICE VERSION
  2274. 3306/tcp filtered mysql
  2275. Too many fingerprints match this host to give specific OS details
  2276.  
  2277. TRACEROUTE (using proto 1/icmp)
  2278. HOP RTT ADDRESS
  2279. 1 23.78 ms 10.250.200.1
  2280. 2 33.38 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  2281. 3 42.00 ms 37.120.128.166
  2282. 4 23.81 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  2283. 5 24.81 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  2284. 6 24.02 ms 154.54.31.222
  2285. 7 29.79 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  2286. 8 32.68 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  2287. 9 38.44 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  2288. 10 48.88 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  2289. 11 50.03 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  2290. 12 50.03 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  2291. 13 49.98 ms 38.88.11.146
  2292. 14 50.01 ms 63.247.69.34
  2293. 15 50.00 ms 63.247.66.122
  2294. 16 ... 30
  2295. #######################################################################################################################################
  2296. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 03:09 EST
  2297. NSE: Loaded 149 scripts for scanning.
  2298. NSE: Script Pre-scanning.
  2299. NSE: Starting runlevel 1 (of 3) scan.
  2300. Initiating NSE at 03:09
  2301. Completed NSE at 03:09, 0.00s elapsed
  2302. NSE: Starting runlevel 2 (of 3) scan.
  2303. Initiating NSE at 03:09
  2304. Completed NSE at 03:09, 0.00s elapsed
  2305. NSE: Starting runlevel 3 (of 3) scan.
  2306. Initiating NSE at 03:09
  2307. Completed NSE at 03:09, 0.00s elapsed
  2308. Initiating Ping Scan at 03:09
  2309. Scanning 69.73.184.159 [4 ports]
  2310. Completed Ping Scan at 03:09, 0.06s elapsed (1 total hosts)
  2311. Initiating Parallel DNS resolution of 1 host. at 03:09
  2312. Completed Parallel DNS resolution of 1 host. at 03:09, 0.02s elapsed
  2313. Initiating Connect Scan at 03:09
  2314. Scanning finn.nocdirect.com (69.73.184.159) [1000 ports]
  2315. Discovered open port 80/tcp on 69.73.184.159
  2316. Discovered open port 443/tcp on 69.73.184.159
  2317. Completed Connect Scan at 03:09, 4.46s elapsed (1000 total ports)
  2318. Initiating Service scan at 03:09
  2319. Scanning 2 services on finn.nocdirect.com (69.73.184.159)
  2320. Completed Service scan at 03:10, 31.82s elapsed (2 services on 1 host)
  2321. Initiating OS detection (try #1) against finn.nocdirect.com (69.73.184.159)
  2322. Retrying OS detection (try #2) against finn.nocdirect.com (69.73.184.159)
  2323. Initiating Traceroute at 03:10
  2324. Completed Traceroute at 03:10, 6.10s elapsed
  2325. Initiating Parallel DNS resolution of 15 hosts. at 03:10
  2326. Completed Parallel DNS resolution of 15 hosts. at 03:10, 16.50s elapsed
  2327. NSE: Script scanning 69.73.184.159.
  2328. NSE: Starting runlevel 1 (of 3) scan.
  2329. Initiating NSE at 03:10
  2330. NSE Timing: About 99.63% done; ETC: 03:11 (0:00:00 remaining)
  2331. Completed NSE at 03:11, 32.32s elapsed
  2332. NSE: Starting runlevel 2 (of 3) scan.
  2333. Initiating NSE at 03:11
  2334. NSE Timing: About 93.75% done; ETC: 03:11 (0:00:02 remaining)
  2335. Completed NSE at 03:12, 60.04s elapsed
  2336. NSE: Starting runlevel 3 (of 3) scan.
  2337. Initiating NSE at 03:12
  2338. Completed NSE at 03:12, 0.00s elapsed
  2339. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  2340. Host is up, received reset ttl 64 (0.024s latency).
  2341. Scanned at 2019-01-23 03:09:33 EST for 156s
  2342. Not shown: 995 filtered ports
  2343. Reason: 995 no-responses
  2344. PORT STATE SERVICE REASON VERSION
  2345. 25/tcp closed smtp conn-refused
  2346. 80/tcp open http-proxy syn-ack Squid http proxy
  2347. | http-methods:
  2348. |_ Supported Methods: GET HEAD POST OPTIONS
  2349. |_http-open-proxy: Proxy might be redirecting requests
  2350. |_http-title: Did not follow redirect to https://www.empresawebgt.com/
  2351. 139/tcp closed netbios-ssn conn-refused
  2352. 443/tcp open ssl/https syn-ack imunify360-webshield/1.5
  2353. | fingerprint-strings:
  2354. | GetRequest, HTTPOptions:
  2355. | HTTP/1.1 200 OK
  2356. | Date: Wed, 23 Jan 2019 08:09:50 GMT
  2357. | Content-Type: text/html
  2358. | Content-Length: 20663
  2359. | Connection: close
  2360. | Server: imunify360-webshield/1.5
  2361. | Expires: Wed, 23 Jan 2019 08:09:49 GMT
  2362. | Cache-Control: no-cache
  2363. | <!DOCTYPE html>
  2364. | <html lang="en">
  2365. | <head>
  2366. | <meta charset="UTF-8">
  2367. | <title>Captcha</title>
  2368. | <link rel="stylesheet"
  2369. | href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.6/css/bootstrap.min.css"
  2370. | integrity="sha384-1q8mTJOASx8j1Au+a5WDVnPi2lkFfwwEAa8hDDdjZlpLegxhjVME1fgjWPGmkzs7"
  2371. | crossorigin="anonymous">
  2372. | <link href="data:image/x-icon;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQEAYAAABPYyMiAAAABmJLR0T///////8JWPfcAAAACXBIWXMAAABIAAAASABGyWs+AAAAF0lEQVRIx2NgGAWjYBSMglEwCkbBSAcACBAAAeaR9cIAAAAASUVORK5CYII="
  2373. | rel="icon" type="image/x-icon"/>
  2374. | <link href="https://fonts.googleapis.com/css?family=Noto+Sans"
  2375. |_ rel="stylesheet">
  2376. |_http-server-header: imunify360-webshield/1.5
  2377. 445/tcp closed microsoft-ds conn-refused
  2378. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  2379. SF-Port443-TCP:V=7.70SVN%T=SSL%I=7%D=1/23%Time=5C48214E%P=x86_64-unknown-l
  2380. SF:inux-gnu%r(GetRequest,4000,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Wed,\x20
  2381. SF:23\x20Jan\x202019\x2008:09:50\x20GMT\r\nContent-Type:\x20text/html\r\nC
  2382. SF:ontent-Length:\x2020663\r\nConnection:\x20close\r\nServer:\x20imunify36
  2383. SF:0-webshield/1\.5\r\nExpires:\x20Wed,\x2023\x20Jan\x202019\x2008:09:49\x
  2384. SF:20GMT\r\nCache-Control:\x20no-cache\r\n\r\n<!DOCTYPE\x20html>\n<html\x2
  2385. SF:0lang=\"en\">\n<head>\n\x20\x20\x20\x20<meta\x20charset=\"UTF-8\">\n\x2
  2386. SF:0\x20\x20\x20<title>Captcha</title>\n\x20\x20\x20\x20<link\x20rel=\"sty
  2387. SF:lesheet\"\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20href=\"https://maxcd
  2388. SF:n\.bootstrapcdn\.com/bootstrap/3\.3\.6/css/bootstrap\.min\.css\"\n\x20\
  2389. SF:x20\x20\x20\x20\x20\x20\x20\x20\x20integrity=\"sha384-1q8mTJOASx8j1Au\+
  2390. SF:a5WDVnPi2lkFfwwEAa8hDDdjZlpLegxhjVME1fgjWPGmkzs7\"\n\x20\x20\x20\x20\x2
  2391. SF:0\x20\x20\x20\x20\x20crossorigin=\"anonymous\">\n\x20\x20\x20\x20<link\
  2392. SF:x20href=\"data:image/x-icon;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQEAYA
  2393. SF:AABPYyMiAAAABmJLR0T///////8JWPfcAAAACXBIWXMAAABIAAAASABGyWs\+AAAAF0lEQV
  2394. SF:RIx2NgGAWjYBSMglEwCkbBSAcACBAAAeaR9cIAAAAASUVORK5CYII=\"\n\x20\x20\x20\
  2395. SF:x20\x20\x20\x20\x20\x20\x20rel=\"icon\"\x20type=\"image/x-icon\"/>\n\x2
  2396. SF:0\x20\x20\x20<link\x20href=\"https://fonts\.googleapis\.com/css\?family
  2397. SF:=Noto\+Sans\"\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20rel=\"stylesheet
  2398. SF:\">\n")%r(HTTPOptions,4000,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Wed,\x20
  2399. SF:23\x20Jan\x202019\x2008:09:50\x20GMT\r\nContent-Type:\x20text/html\r\nC
  2400. SF:ontent-Length:\x2020663\r\nConnection:\x20close\r\nServer:\x20imunify36
  2401. SF:0-webshield/1\.5\r\nExpires:\x20Wed,\x2023\x20Jan\x202019\x2008:09:49\x
  2402. SF:20GMT\r\nCache-Control:\x20no-cache\r\n\r\n<!DOCTYPE\x20html>\n<html\x2
  2403. SF:0lang=\"en\">\n<head>\n\x20\x20\x20\x20<meta\x20charset=\"UTF-8\">\n\x2
  2404. SF:0\x20\x20\x20<title>Captcha</title>\n\x20\x20\x20\x20<link\x20rel=\"sty
  2405. SF:lesheet\"\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20href=\"https://maxcd
  2406. SF:n\.bootstrapcdn\.com/bootstrap/3\.3\.6/css/bootstrap\.min\.css\"\n\x20\
  2407. SF:x20\x20\x20\x20\x20\x20\x20\x20\x20integrity=\"sha384-1q8mTJOASx8j1Au\+
  2408. SF:a5WDVnPi2lkFfwwEAa8hDDdjZlpLegxhjVME1fgjWPGmkzs7\"\n\x20\x20\x20\x20\x2
  2409. SF:0\x20\x20\x20\x20\x20crossorigin=\"anonymous\">\n\x20\x20\x20\x20<link\
  2410. SF:x20href=\"data:image/x-icon;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQEAYA
  2411. SF:AABPYyMiAAAABmJLR0T///////8JWPfcAAAACXBIWXMAAABIAAAASABGyWs\+AAAAF0lEQV
  2412. SF:RIx2NgGAWjYBSMglEwCkbBSAcACBAAAeaR9cIAAAAASUVORK5CYII=\"\n\x20\x20\x20\
  2413. SF:x20\x20\x20\x20\x20\x20\x20rel=\"icon\"\x20type=\"image/x-icon\"/>\n\x2
  2414. SF:0\x20\x20\x20<link\x20href=\"https://fonts\.googleapis\.com/css\?family
  2415. SF:=Noto\+Sans\"\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20rel=\"stylesheet
  2416. SF:\">\n");
  2417. Device type: general purpose|storage-misc|broadband router|WAP
  2418. Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (93%), HP embedded (90%), Asus embedded (87%)
  2419. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:hp:p2000_g3 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/h:asus:rt-ac66u
  2420. OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
  2421. Aggressive OS guesses: Linux 3.16 - 4.6 (93%), Linux 3.18 (92%), Linux 3.10 - 4.11 (91%), Linux 3.13 (91%), Linux 3.13 or 4.2 (91%), Linux 4.2 (91%), Linux 4.4 (91%), HP P2000 G3 NAS device (90%), Linux 3.2 - 4.9 (90%), Linux 3.16 (89%)
  2422. No exact OS matches for host (test conditions non-ideal).
  2423. TCP/IP fingerprint:
  2424. SCAN(V=7.70SVN%E=4%D=1/23%OT=80%CT=25%CU=%PV=N%G=N%TM=5C4821D9%P=x86_64-unknown-linux-gnu)
  2425. SEQ(SP=108%GCD=1%ISR=10D%TI=Z%CI=Z%TS=8)
  2426. OPS(O1=M4B3ST11NW7%O2=M4B3ST11NW7%O3=M4B3NNT11NW7%O4=M4B3ST11NW7%O5=M4B3ST11NW7%O6=M4B3ST11)
  2427. WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7120)
  2428. ECN(R=Y%DF=Y%TG=40%W=7210%O=M4B3NNSNW7%CC=Y%Q=)
  2429. T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
  2430. T2(R=N)
  2431. T3(R=N)
  2432. T4(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
  2433. T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
  2434. T6(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
  2435. T7(R=N)
  2436. U1(R=N)
  2437. IE(R=N)
  2438.  
  2439. Uptime guess: 1.855 days (since Mon Jan 21 06:41:15 2019)
  2440. TCP Sequence Prediction: Difficulty=264 (Good luck!)
  2441. IP ID Sequence Generation: All zeros
  2442.  
  2443. TRACEROUTE (using proto 1/icmp)
  2444. HOP RTT ADDRESS
  2445. 1 21.79 ms 10.250.200.1
  2446. 2 22.33 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  2447. 3 42.57 ms 37.120.128.166
  2448. 4 22.00 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
  2449. 5 24.21 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
  2450. 6 22.38 ms 154.54.31.222
  2451. 7 27.81 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
  2452. 8 30.39 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
  2453. 9 37.33 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
  2454. 10 47.68 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
  2455. 11 48.17 ms be3372.agr21.atl01.atlas.cogentco.com (154.54.41.254)
  2456. 12 48.54 ms te0-0-2-0.nr12.b019158-0.atl01.atlas.cogentco.com (154.24.19.78)
  2457. 13 48.16 ms 38.88.11.146
  2458. 14 48.49 ms 63.247.69.34
  2459. 15 48.50 ms 63.247.66.122
  2460. 16 ... 30
  2461.  
  2462. NSE: Script Post-scanning.
  2463. NSE: Starting runlevel 1 (of 3) scan.
  2464. Initiating NSE at 03:12
  2465. Completed NSE at 03:12, 0.00s elapsed
  2466. NSE: Starting runlevel 2 (of 3) scan.
  2467. Initiating NSE at 03:12
  2468. Completed NSE at 03:12, 0.00s elapsed
  2469. NSE: Starting runlevel 3 (of 3) scan.
  2470. Initiating NSE at 03:12
  2471. Completed NSE at 03:12, 0.00s elapsed
  2472. Read data files from: /usr/local/bin/../share/nmap
  2473. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2474. Nmap done: 1 IP address (1 host up) scanned in 156.31 seconds
  2475. Raw packets sent: 148 (10.600KB) | Rcvd: 149 (14.622KB)
  2476. #######################################################################################################################################
  2477. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 03:12 EST
  2478. NSE: Loaded 149 scripts for scanning.
  2479. NSE: Script Pre-scanning.
  2480. Initiating NSE at 03:12
  2481. Completed NSE at 03:12, 0.00s elapsed
  2482. Initiating NSE at 03:12
  2483. Completed NSE at 03:12, 0.00s elapsed
  2484. Initiating NSE at 03:12
  2485. Completed NSE at 03:12, 0.00s elapsed
  2486. Initiating Parallel DNS resolution of 1 host. at 03:12
  2487. Completed Parallel DNS resolution of 1 host. at 03:12, 0.02s elapsed
  2488. Initiating UDP Scan at 03:12
  2489. Scanning finn.nocdirect.com (69.73.184.159) [13 ports]
  2490. Completed UDP Scan at 03:12, 1.24s elapsed (13 total ports)
  2491. Initiating Service scan at 03:12
  2492. Scanning 11 services on finn.nocdirect.com (69.73.184.159)
  2493. Service scan Timing: About 9.09% done; ETC: 03:29 (0:16:10 remaining)
  2494. Completed Service scan at 03:13, 102.57s elapsed (11 services on 1 host)
  2495. Initiating OS detection (try #1) against finn.nocdirect.com (69.73.184.159)
  2496. Retrying OS detection (try #2) against finn.nocdirect.com (69.73.184.159)
  2497. Initiating Traceroute at 03:13
  2498. Completed Traceroute at 03:14, 7.10s elapsed
  2499. Initiating Parallel DNS resolution of 1 host. at 03:14
  2500. Completed Parallel DNS resolution of 1 host. at 03:14, 0.02s elapsed
  2501. NSE: Script scanning 69.73.184.159.
  2502. Initiating NSE at 03:14
  2503. Completed NSE at 03:16, 154.36s elapsed
  2504. Initiating NSE at 03:16
  2505. Completed NSE at 03:16, 1.01s elapsed
  2506. Initiating NSE at 03:16
  2507. Completed NSE at 03:16, 0.00s elapsed
  2508. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  2509. Host is up (0.025s latency).
  2510.  
  2511. PORT STATE SERVICE VERSION
  2512. 53/udp open|filtered domain
  2513. 67/udp open|filtered dhcps
  2514. 68/udp open|filtered dhcpc
  2515. 69/udp open|filtered tftp
  2516. 88/udp open|filtered kerberos-sec
  2517. 123/udp open|filtered ntp
  2518. 137/udp filtered netbios-ns
  2519. 138/udp filtered netbios-dgm
  2520. 139/udp open|filtered netbios-ssn
  2521. 162/udp open|filtered snmptrap
  2522. 389/udp open|filtered ldap
  2523. 520/udp open|filtered route
  2524. 2049/udp open|filtered nfs
  2525. Too many fingerprints match this host to give specific OS details
  2526.  
  2527. TRACEROUTE (using port 138/udp)
  2528. HOP RTT ADDRESS
  2529. 1 24.35 ms 10.250.200.1
  2530. 2 ... 3
  2531. 4 22.37 ms 10.250.200.1
  2532. 5 23.79 ms 10.250.200.1
  2533. 6 23.78 ms 10.250.200.1
  2534. 7 23.77 ms 10.250.200.1
  2535. 8 23.77 ms 10.250.200.1
  2536. 9 23.76 ms 10.250.200.1
  2537. 10 23.77 ms 10.250.200.1
  2538. 11 ... 18
  2539. 19 24.38 ms 10.250.200.1
  2540. 20 23.09 ms 10.250.200.1
  2541. 21 ... 28
  2542. 29 23.09 ms 10.250.200.1
  2543. 30 23.95 ms 10.250.200.1
  2544.  
  2545. NSE: Script Post-scanning.
  2546. Initiating NSE at 03:16
  2547. Completed NSE at 03:16, 0.00s elapsed
  2548. Initiating NSE at 03:16
  2549. Completed NSE at 03:16, 0.00s elapsed
  2550. Initiating NSE at 03:16
  2551. Completed NSE at 03:16, 0.00s elapsed
  2552. Read data files from: /usr/local/bin/../share/nmap
  2553. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2554. Nmap done: 1 IP address (1 host up) scanned in 269.46 seconds
  2555. Raw packets sent: 144 (9.760KB) | Rcvd: 28 (2.526KB)
  2556. #######################################################################################################################################
  2557. Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 03:16 EST
  2558. Nmap scan report for finn.nocdirect.com (69.73.184.159)
  2559. Host is up (0.023s latency).
  2560. Not shown: 22 filtered ports, 3 closed ports
  2561. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  2562. PORT STATE SERVICE
  2563. 80/tcp open http
  2564.  
  2565. Nmap done: 1 IP address (1 host up) scanned in 1.55 seconds
  2566. #######################################################################################################################################
  2567. ---------------------------------------------------------------------------------------------------------------------------------------
  2568. + Target IP: 69.73.184.159
  2569. + Target Hostname: www.jewish.net
  2570. + Target Port: 80
  2571. + Start Time: 2019-01-23 02:22:51 (GMT-5)
  2572. ---------------------------------------------------------------------------------------------------------------------------------------
  2573. + Server: No banner retrieved
  2574. + The anti-clickjacking X-Frame-Options header is not present.
  2575. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  2576. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  2577. + ERROR: Error limit (20) reached for host, giving up. Last error: error reading HTTP response
  2578. + Scan terminated: 20 error(s) and 3 item(s) reported on remote host
  2579. + End Time: 2019-01-23 02:29:52 (GMT-5) (421 seconds)
  2580. ---------------------------------------------------------------------------------------------------------------------------------------
  2581. #######################################################################################################################################
  2582. ---------------------------------------------------------------------------------------------------------------------------------------
  2583. + Target IP: 69.73.184.159
  2584. + Target Hostname: 69.73.184.159
  2585. + Target Port: 443
  2586. ---------------------------------------------------------------------------------------------------------------------------------------
  2587. + SSL Info: Subject: /CN=finn.nocdirect.com.zz
  2588. Ciphers: ECDHE-RSA-AES256-GCM-SHA384
  2589. Issuer: /CN=finn.nocdirect.com.zz
  2590. + Start Time: 2019-01-23 02:22:45 (GMT-5)
  2591. ---------------------------------------------------------------------------------------------------------------------------------------
  2592. + Server: Apache
  2593. + The anti-clickjacking X-Frame-Options header is not present.
  2594. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  2595. + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
  2596. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  2597. + Server banner has changed from 'Apache' to 'imunify360-webshield/1.5' which may suggest a WAF, load balancer or proxy is in place
  2598. + ERROR: Error limit (20) reached for host, giving up. Last error: opening stream: can't connect: Connect failed: ; Connection timed out at /var/lib/nikto/plugins/LW2.pm line 5157.
  2599. : Connection timed out
  2600. + Scan terminated: 19 error(s) and 4 item(s) reported on remote host
  2601. + End Time: 2019-01-23 02:34:40 (GMT-5) (715 seconds)
  2602. ---------------------------------------------------------------------------------------------------------------------------------------
  2603. #######################################################################################################################################
  2604. Anonymous JTSEC #OpIsraël Full Recon #2
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement