· 6 years ago · Oct 24, 2019, 09:52 PM
1######################################################################################################################################
2=====================================================================================================================================
3Hostname www.actforamerica.org ISP Amazon.com, Inc.
4Continent North America Flag
5US
6Country United States Country Code US
7Region Virginia Local time 24 Oct 2019 15:43 EDT
8City Ashburn Postal Code 20149
9IP Address 35.153.8.200 Latitude 39.048
10 Longitude -77.473
11======================================================================================================================================
12######################################################################################################################################
13> www.actforamerica.org
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18Name: www.actforamerica.org
19Address: 35.153.8.200
20>
21######################################################################################################################################
22Domain Name: ACTFORAMERICA.ORG
23Registry Domain ID: D110785547-LROR
24Registrar WHOIS Server: whois.godaddy.com
25Registrar URL: http://www.whois.godaddy.com
26Updated Date: 2017-02-19T03:32:30Z
27Creation Date: 2006-01-05T13:57:20Z
28Registry Expiry Date: 2025-01-05T13:57:20Z
29Registrar Registration Expiration Date:
30Registrar: GoDaddy.com, LLC
31Registrar IANA ID: 146
32Registrar Abuse Contact Email: abuse@godaddy.com
33Registrar Abuse Contact Phone: +1.4806242505
34Reseller:
35Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
36Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
37Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
38Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
39Registrant Organization: ACT for America
40Registrant State/Province: District of Columbia
41Registrant Country: US
42Name Server: NS47.DOMAINCONTROL.COM
43Name Server: NS48.DOMAINCONTROL.COM
44DNSSEC: unsigned
45######################################################################################################################################
46[+] IP Address : 35.153.8.200
47
48[+] Headers :
49
50[+] Date : Thu, 24 Oct 2019 20:26:27 GMT
51[+] Server : Apache/2.4.18 (Ubuntu)
52[+] X-Content-Type-Options : nosniff
53[+] X-Drupal-Cache : HIT
54[+] Set-Cookie : SSESS586d7b686dbf38938d315f79815252f8=I2dSSIVHJItvm12Gq1EiqHilLg9rQQ9afntXTbs0tJY; expires=Sat, 16-Nov-2019 23:59:47 GMT; Max-Age=2000000; path=/; domain=.actforamerica.org; secure; HttpOnly
55[+] Etag : "1571947312-1"
56[+] Content-Language : en
57[+] X-Frame-Options : SAMEORIGIN
58[+] X-Generator : Drupal 7 (http://drupal.org)
59[+] Cache-Control : public, max-age=3600
60[+] Last-Modified : Thu, 24 Oct 2019 20:01:52 GMT
61[+] Expires : Sun, 19 Nov 1978 05:00:00 GMT
62[+] Vary : Cookie,Accept-Encoding
63[+] Content-Encoding : gzip
64[+] Keep-Alive : timeout=5, max=100
65[+] Connection : Keep-Alive
66[+] Transfer-Encoding : chunked
67[+] Content-Type : text/html; charset=utf-8
68
69[+] SSL Certificate Information :
70
71[+] commonName : actforamerica.org
72[+] countryName : US
73[+] organizationName : Let's Encrypt
74[+] commonName : Let's Encrypt Authority X3
75[+] Version : 3
76[+] Serial Number : 0332F52567864F57EB150B7223027D874D99
77[+] Not Before : Oct 4 11:26:10 2019 GMT
78[+] Not After : Jan 2 11:26:10 2020 GMT
79[+] OCSP : ('http://ocsp.int-x3.letsencrypt.org',)
80[+] subject Alt Name : (('DNS', 'actforamerica.org'), ('DNS', 'www.actforamerica.org'))
81[+] CA Issuers : ('http://cert.int-x3.letsencrypt.org/',)
82
83[+] Whois Lookup :
84
85[+] NIR : None
86[+] ASN Registry : arin
87[+] ASN : 14618
88[+] ASN CIDR : 35.153.0.0/16
89[+] ASN Country Code : US
90[+] ASN Date : 2016-08-09
91[+] ASN Description : AMAZON-AES - Amazon.com, Inc., US
92[+] cidr : 35.160.0.0/12, 35.152.0.0/13, 35.176.0.0/13
93[+] name : AT-88-Z
94[+] handle : NET-35-152-0-0-1
95[+] range : 35.152.0.0 - 35.183.255.255
96[+] description : Amazon Technologies Inc.
97[+] country : US
98[+] state : WA
99[+] city : Seattle
100[+] address : 410 Terry Ave N.
101[+] postal_code : 98109
102[+] emails : ['abuse@amazonaws.com', 'aws-routing-poc@amazon.com', 'amzn-noc-contact@amazon.com']
103[+] created : 2016-08-09
104[+] updated : 2016-08-09
105
106[+] Crawling Target...
107
108[+] Looking for robots.txt........[ Found ]
109[+] Extracting robots Links.......[ 68 ]
110[+] Looking for sitemap.xml.......[ Not Found ]
111[+] Extracting CSS Links..........[ 8 ]
112[+] Extracting Javascript Links...[ 27 ]
113[+] Extracting Internal Links.....[ 42 ]
114[+] Extracting External Links.....[ 3 ]
115[+] Extracting Images.............[ 12 ]
116
117[+] Total Links Extracted : 160
118
119[+] Dumping Links in /opt/FinalRecon/dumps/www.actforamerica.org.dump
120[+] Completed!
121#####################################################################################################################################
122[+] Starting At 2019-10-24 16:26:42.860320
123[+] Collecting Information On: https://www.actforamerica.org/
124[#] Status: 200
125--------------------------------------------------
126[#] Web Server Detected: Apache/2.4.18 (Ubuntu)
127- Date: Thu, 24 Oct 2019 20:26:44 GMT
128- Server: Apache/2.4.18 (Ubuntu)
129- X-Content-Type-Options: nosniff
130- X-Drupal-Cache: HIT
131- Set-Cookie: SSESS586d7b686dbf38938d315f79815252f8=w6sVNYX2QPGBLAJasrjUPxXtlzSzuZmdAQO1ksvJK3A; expires=Sun, 17-Nov-2019 00:00:04 GMT; Max-Age=2000000; path=/; domain=.actforamerica.org; secure; HttpOnly
132- Etag: "1571947312-1"
133- Content-Language: en
134- X-Frame-Options: SAMEORIGIN
135- X-Generator: Drupal 7 (http://drupal.org)
136- Cache-Control: public, max-age=3600
137- Last-Modified: Thu, 24 Oct 2019 20:01:52 GMT
138- Expires: Sun, 19 Nov 1978 05:00:00 GMT
139- Vary: Cookie,Accept-Encoding
140- Content-Encoding: gzip
141- Keep-Alive: timeout=5, max=100
142- Connection: Keep-Alive
143- Transfer-Encoding: chunked
144- Content-Type: text/html; charset=utf-8
145--------------------------------------------------
146[#] Finding Location..!
147[#] status: success
148[#] country: United States
149[#] countryCode: US
150[#] region: VA
151[#] regionName: Virginia
152[#] city: Ashburn
153[#] zip: 20149
154[#] lat: 39.0438
155[#] lon: -77.4874
156[#] timezone: America/New_York
157[#] isp: Amazon.com, Inc.
158[#] org: AWS EC2 (us-east-1)
159[#] as: AS14618 Amazon.com, Inc.
160[#] query: 35.153.8.200
161--------------------------------------------------
162[x] Didn't Detect WAF Presence on: https://www.actforamerica.org/
163--------------------------------------------------
164[#] Starting Reverse DNS
165[-] Failed ! Fail
166--------------------------------------------------
167[!] Scanning Open Port
168[#] 80/tcp open http
169[#] 443/tcp open https
170--------------------------------------------------
171[+] Collecting Information Disclosure!
172[#] Detecting sitemap.xml file
173[-] sitemap.xml file not Found!?
174[#] Detecting robots.txt file
175[!] robots.txt File Found: https://www.actforamerica.org//robots.txt
176[#] Detecting GNU Mailman
177[-] GNU Mailman App Not Detected!?
178--------------------------------------------------
179[+] Crawling Url Parameter On: https://www.actforamerica.org/
180--------------------------------------------------
181[#] Searching Html Form !
182[+] Html Form Discovered
183[#] action: javascript:void(0)
184[#] class: None
185[#] id: news-updates
186[#] method: None
187--------------------------------------------------
188[!] Found 2 dom parameter
189[#] https://www.actforamerica.org//#main-menu
190[#] https://www.actforamerica.org//#content
191--------------------------------------------------
192[!] 6 Internal Dynamic Parameter Discovered
193[+] https://www.actforamerica.org////windows.microsoft.com/en-US/internet-explorer/products/ie/home?ocid=ie6_countdown_bannercode
194[+] https://www.actforamerica.org/action/wall?id=7&reset=1
195[+] https://www.actforamerica.org//civicrm/contribute/transact?reset=1&id=6
196[+] https://www.actforamerica.org/civicrm/contribute/transact?reset=1&id=6
197[+] https://www.actforamerica.org//user/login?current=home
198[+] https://www.actforamerica.org/civicrm/contribute/transact?reset=1&id=6
199--------------------------------------------------
200[!] 1 External Dynamic Parameter Discovered
201[#] https://fonts.googleapis.com/css?family=Roboto:300,300i,400,400i,500,500i,700,700i,900,900i
202--------------------------------------------------
203[!] 72 Internal links Discovered
204[+] https://www.actforamerica.org/sites/default/files/favicon24_24_0.png
205[+] https://www.actforamerica.org///sites/all/themes/theme1008/css/style-mobile.css
206[+] https://www.actforamerica.org///sites/all/themes/theme1008/css/skeleton-mobile.css
207[+] https://www.actforamerica.org///sites/all/themes/theme1008/css/style-new.css
208[+] https://www.actforamerica.org///sites/all/themes/theme1008/css/style-optimized-new.css
209[+] https://www.actforamerica.org///sites/all/themes/theme1008/css/style-layout.css
210[+] https://www.actforamerica.org///sites/all/themes/theme1008/css/style-home.css
211[+] https://www.actforamerica.org///sites/all/themes/theme1008/css/bootstrap.css
212[+] https://www.actforamerica.org///sites/all/themes/theme1008/css/print.css
213[+] https://www.actforamerica.org
214[+] https://www.actforamerica.org//javascript:void(0)
215[+] https://www.actforamerica.org///
216[+] https://www.actforamerica.org//javascript:void(0)
217[+] https://www.actforamerica.org///
218[+] https://www.actforamerica.org/aboutact
219[+] https://www.actforamerica.org/Mission
220[+] https://www.actforamerica.org/aboutbrigitte
221[+] https://www.actforamerica.org/policy
222[+] https://www.actforamerica.org/contact
223[+] https://www.actforamerica.org/newsletter-subscription
224[+] https://www.actforamerica.org/pressreleases
225[+] https://www.actforamerica.org/splc
226[+] https://www.actforamerica.org//issues
227[+] https://www.actforamerica.org/terrorism
228[+] https://www.actforamerica.org/terrorism/muslim-brotherhood
229[+] https://www.actforamerica.org/terrorism/the-islamic-state
230[+] https://www.actforamerica.org/terrorism/Benghazi
231[+] https://www.actforamerica.org/CriticalInfrastructure
232[+] https://www.actforamerica.org/CriticalInfrastructure/EMP-Protection
233[+] https://www.actforamerica.org/criticalinfrastructure/energysecurity
234[+] https://www.actforamerica.org/ConstitutionalFreedoms
235[+] https://www.actforamerica.org/ConstitutionalFreedoms/Free-speech-protection
236[+] https://www.actforamerica.org/ConstitutionalFreedoms/Honor-Violence
237[+] https://www.actforamerica.org/constitutionalfreedoms/FGM
238[+] https://www.actforamerica.org/ConstitutionalFreedoms/Textbook-Reform
239[+] https://www.actforamerica.org/Immigration
240[+] https://www.actforamerica.org/immigration/end-sanctuary-cities
241[+] https://www.actforamerica.org/immigration/end-chain-migration
242[+] https://www.actforamerica.org/immigration/end-visa-lottery
243[+] https://www.actforamerica.org/Immigration/Border-Security
244[+] https://www.actforamerica.org/militaryandlawenforcement
245[+] https://www.actforamerica.org/militaryandlawenforcement/supportourmilitary
246[+] https://www.actforamerica.org/militaryandlawenforcement/lawenforcement
247[+] https://www.actforamerica.org/militaryandlawenforcement/supportourlawenforcement
248[+] https://www.actforamerica.org/Israel
249[+] https://www.actforamerica.org/Israel/Support-For-Israel
250[+] https://www.actforamerica.org/Israel/Speeches
251[+] https://www.actforamerica.org//node/17357
252[+] https://www.actforamerica.org/join-the-movement
253[+] https://www.actforamerica.org/takeaction
254[+] https://www.actforamerica.org/join-the-movement
255[+] https://www.actforamerica.org/Action-Center
256[+] https://www.actforamerica.org/highprioritylegislation
257[+] https://www.actforamerica.org/takeaction
258[+] https://www.actforamerica.org/project/bgtour
259[+] https://www.actforamerica.org/takeaction
260[+] https://www.actforamerica.org/manage/donation
261[+] https://www.actforamerica.org//javascript:void(0);
262[+] https://www.actforamerica.org/accomplishments/federalbillspassed
263[+] https://www.actforamerica.org/Immigration/Border-Security
264[+] https://www.actforamerica.org//javascript:void(0);
265[+] https://www.actforamerica.org//javascript:void(0);
266[+] https://www.actforamerica.org//javascript:void(0);
267[+] https://www.actforamerica.org/join-the-movement
268[+] https://www.actforamerica.org/takeaction
269[+] https://www.actforamerica.org/join-the-movement
270[+] https://www.actforamerica.org/contact
271[+] https://www.actforamerica.org//./faq
272[+] https://www.actforamerica.org/policy
273[+] https://www.actforamerica.org/termsofservice
274[+] https://www.actforamerica.org///
275[+] https://www.actforamerica.org//javascript:void(0);
276--------------------------------------------------
277[!] 3 External links Discovered
278[#] https://twitter.com/ACTforAmerica
279[#] https://www.facebook.com/actforamerica
280[#] https://www.youtube.com/user/act4america
281--------------------------------------------------
282[#] Mapping Subdomain..
283[!] Found 7 Subdomain
284- actforamerica.org
285- web1.actforamerica.org
286- dev1.actforamerica.org
287- web2.actforamerica.org
288- dev2.actforamerica.org
289- clone.actforamerica.org
290- www.actforamerica.org
291--------------------------------------------------
292[!] Done At 2019-10-24 16:27:23.112939
293#####################################################################################################################################
294[i] Scanning Site: https://www.actforamerica.org
295
296
297
298B A S I C I N F O
299====================
300
301
302[+] Site Title: ActForAmerica | since 2000
303[+] IP address: 35.153.8.200
304[+] Web Server: Apache/2.4.18 (Ubuntu)
305[+] CMS: Drupal
306[+] Cloudflare: Not Detected
307[+] Robots File: Found
308
309-------------[ contents ]----------------
310#
311# robots.txt
312#
313# This file is to prevent the crawling and indexing of certain parts
314# of your site by web crawlers and spiders run by sites like Yahoo!
315# and Google. By telling these "robots" where not to go on your site,
316# you save bandwidth and server resources.
317#
318# This file will be ignored unless it is at the root of your host:
319# Used: http://example.com/robots.txt
320# Ignored: http://example.com/site/robots.txt
321#
322# For more information about the robots.txt standard, see:
323# http://www.robotstxt.org/robotstxt.html
324
325User-agent: *
326Crawl-delay: 10
327# CSS, JS, Images
328Allow: /misc/*.css$
329Allow: /misc/*.css?
330Allow: /misc/*.js$
331Allow: /misc/*.js?
332Allow: /misc/*.gif
333Allow: /misc/*.jpg
334Allow: /misc/*.jpeg
335Allow: /misc/*.png
336Allow: /modules/*.css$
337Allow: /modules/*.css?
338Allow: /modules/*.js$
339Allow: /modules/*.js?
340Allow: /modules/*.gif
341Allow: /modules/*.jpg
342Allow: /modules/*.jpeg
343Allow: /modules/*.png
344Allow: /profiles/*.css$
345Allow: /profiles/*.css?
346Allow: /profiles/*.js$
347Allow: /profiles/*.js?
348Allow: /profiles/*.gif
349Allow: /profiles/*.jpg
350Allow: /profiles/*.jpeg
351Allow: /profiles/*.png
352Allow: /themes/*.css$
353Allow: /themes/*.css?
354Allow: /themes/*.js$
355Allow: /themes/*.js?
356Allow: /themes/*.gif
357Allow: /themes/*.jpg
358Allow: /themes/*.jpeg
359Allow: /themes/*.png
360# Directories
361Disallow: /includes/
362Disallow: /misc/
363Disallow: /modules/
364Disallow: /profiles/
365Disallow: /scripts/
366Disallow: /themes/
367# Files
368Disallow: /CHANGELOG.txt
369Disallow: /cron.php
370Disallow: /INSTALL.mysql.txt
371Disallow: /INSTALL.pgsql.txt
372Disallow: /INSTALL.sqlite.txt
373Disallow: /install.php
374Disallow: /INSTALL.txt
375Disallow: /LICENSE.txt
376Disallow: /MAINTAINERS.txt
377Disallow: /update.php
378Disallow: /UPGRADE.txt
379Disallow: /xmlrpc.php
380# Paths (clean URLs)
381Disallow: /admin/
382Disallow: /comment/reply/
383Disallow: /filter/tips/
384Disallow: /node/add/
385Disallow: /search/
386Disallow: /user/register/
387Disallow: /user/password/
388Disallow: /user/login/
389Disallow: /user/logout/
390# Paths (no clean URLs)
391Disallow: /?q=admin/
392Disallow: /?q=comment/reply/
393Disallow: /?q=filter/tips/
394Disallow: /?q=node/add/
395Disallow: /?q=search/
396Disallow: /?q=user/password/
397Disallow: /?q=user/register/
398Disallow: /?q=user/login/
399Disallow: /?q=user/logout/
400
401-----------[end of contents]-------------
402
403
404
405W H O I S L O O K U P
406========================
407
408 Domain Name: ACTFORAMERICA.ORG
409Registry Domain ID: D110785547-LROR
410Registrar WHOIS Server: whois.godaddy.com
411Registrar URL: http://www.whois.godaddy.com
412Updated Date: 2017-02-19T03:32:30Z
413Creation Date: 2006-01-05T13:57:20Z
414Registry Expiry Date: 2025-01-05T13:57:20Z
415Registrar Registration Expiration Date:
416Registrar: GoDaddy.com, LLC
417Registrar IANA ID: 146
418Registrar Abuse Contact Email: abuse@godaddy.com
419Registrar Abuse Contact Phone: +1.4806242505
420Reseller:
421Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
422Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
423Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
424Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
425Registrant Organization: ACT for America
426Registrant State/Province: District of Columbia
427Registrant Country: US
428Name Server: NS47.DOMAINCONTROL.COM
429Name Server: NS48.DOMAINCONTROL.COM
430DNSSEC: unsigned
431URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/)
432>>> Last update of WHOIS database: 2019-10-24T20:25:50Z <<<
433
434For more information on Whois status codes, please visit https://icann.org/epp
435
436
437
438
439
440G E O I P L O O K U P
441=========================
442
443[i] IP Address: 35.153.8.200
444[i] Country: United States
445[i] State: Virginia
446[i] City: Ashburn
447[i] Latitude: 39.0481
448[i] Longitude: -77.4728
449
450
451
452
453H T T P H E A D E R S
454=======================
455
456
457[i] HTTP/1.1 200 OK
458[i] Date: Thu, 24 Oct 2019 20:26:53 GMT
459[i] Server: Apache/2.4.18 (Ubuntu)
460[i] X-Content-Type-Options: nosniff
461[i] X-Drupal-Cache: HIT
462[i] Set-Cookie: SSESS586d7b686dbf38938d315f79815252f8=_GzSv1yMqXWYhzQxAFHarREPrN2sMxhxZ75RVyAa1Uw; expires=Sun, 17-Nov-2019 00:00:13 GMT; Max-Age=2000000; path=/; domain=.actforamerica.org; secure; HttpOnly
463[i] Etag: "1571947312-0"
464[i] Content-Language: en
465[i] X-Frame-Options: SAMEORIGIN
466[i] X-Generator: Drupal 7 (http://drupal.org)
467[i] Cache-Control: public, max-age=3600
468[i] Last-Modified: Thu, 24 Oct 2019 20:01:52 GMT
469[i] Expires: Sun, 19 Nov 1978 05:00:00 GMT
470[i] Vary: Cookie,Accept-Encoding
471[i] Connection: close
472[i] Content-Type: text/html; charset=utf-8
473
474
475
476
477D N S L O O K U P
478===================
479
480actforamerica.org. 599 IN A 35.153.8.200
481actforamerica.org. 3599 IN NS ns47.domaincontrol.com.
482actforamerica.org. 3599 IN NS ns48.domaincontrol.com.
483actforamerica.org. 599 IN SOA ns47.domaincontrol.com. dns.jomax.net. 2019100903 28800 7200 604800 600
484actforamerica.org. 599 IN MX 5 aspmx.l.google.com.
485actforamerica.org. 599 IN MX 20 alt1.aspmx.l.google.com.
486actforamerica.org. 599 IN MX 30 alt2.aspmx.l.google.com.
487actforamerica.org. 599 IN MX 40 aspmx2.googlemail.com.
488actforamerica.org. 599 IN MX 50 aspmx3.googlemail.com.
489actforamerica.org. 599 IN TXT "v=spf1 a a:actforamerica.org a:actforameriaalert.org a:amazonses.com ip4:206.253.170.94 ip4:35.153.8.200 ip4:34.225.44.33 ip4:54.240.46.4 ip4:54.240.46.5 ip4:54.240.46.6 ip4:54.240.46.7 ip4:54.240.46.8 ip4:54.240.46.9 ~all"
490actforamerica.org. 599 IN TXT "google-site-verification=NKMYVao6QMYtFWVnLzzbQvijVAjOWwGS6Y63s_Q8sfI"
491actforamerica.org. 599 IN TXT "MS=ms44498340"
492actforamerica.org. 599 IN TXT "google-site-verification=Ab9kpcnZVu1RqgZGlyAYVuhdOFH4ipxCD4beqZJgL60"
493
494
495
496
497S U B N E T C A L C U L A T I O N
498====================================
499
500Address = 35.153.8.200
501Network = 35.153.8.200 / 32
502Netmask = 255.255.255.255
503Broadcast = not needed on Point-to-Point links
504Wildcard Mask = 0.0.0.0
505Hosts Bits = 0
506Max. Hosts = 1 (2^0 - 0)
507Host Range = { 35.153.8.200 - 35.153.8.200 }
508
509
510
511N M A P P O R T S C A N
512============================
513
514Starting Nmap 7.70 ( https://nmap.org ) at 2019-10-24 20:26 UTC
515Nmap scan report for actforamerica.org (35.153.8.200)
516Host is up (0.0078s latency).
517rDNS record for 35.153.8.200: ec2-35-153-8-200.compute-1.amazonaws.com
518
519PORT STATE SERVICE
52021/tcp filtered ftp
52122/tcp filtered ssh
52223/tcp filtered telnet
52380/tcp open http
524110/tcp filtered pop3
525143/tcp filtered imap
526443/tcp open https
5273389/tcp filtered ms-wbt-server
528
529Nmap done: 1 IP address (1 host up) scanned in 1.26 seconds
530
531
532
533S U B - D O M A I N F I N D E R
534==================================
535
536
537[i] Total Subdomains Found : 6
538
539[+] Subdomain: web1.actforamerica.org
540[-] IP: 35.170.9.159
541
542[+] Subdomain: dev1.actforamerica.org
543[-] IP: 34.225.44.33
544
545[+] Subdomain: web2.actforamerica.org
546[-] IP: 34.202.174.165
547
548[+] Subdomain: dev2.actforamerica.org
549[-] IP: 34.225.44.33
550
551[+] Subdomain: clone.actforamerica.org
552[-] IP: 34.231.63.183
553
554[+] Subdomain: www.actforamerica.org
555[-] IP: 35.153.8.200
556#####################################################################################################################################
557Trying "actforamerica.org"
558Trying "actforamerica.org"
559;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16110
560;; flags: qr rd ra; QUERY: 1, ANSWER: 13, AUTHORITY: 2, ADDITIONAL: 4
561
562;; QUESTION SECTION:
563;actforamerica.org. IN ANY
564
565;; ANSWER SECTION:
566actforamerica.org. 600 IN TXT "MS=ms44498340"
567actforamerica.org. 600 IN TXT "google-site-verification=Ab9kpcnZVu1RqgZGlyAYVuhdOFH4ipxCD4beqZJgL60"
568actforamerica.org. 600 IN TXT "v=spf1 a a:actforamerica.org a:actforameriaalert.org a:amazonses.com ip4:206.253.170.94 ip4:35.153.8.200 ip4:34.225.44.33 ip4:54.240.46.4 ip4:54.240.46.5 ip4:54.240.46.6 ip4:54.240.46.7 ip4:54.240.46.8 ip4:54.240.46.9 ~all"
569actforamerica.org. 600 IN TXT "google-site-verification=NKMYVao6QMYtFWVnLzzbQvijVAjOWwGS6Y63s_Q8sfI"
570actforamerica.org. 600 IN MX 30 alt2.aspmx.l.google.com.
571actforamerica.org. 600 IN MX 40 aspmx2.googlemail.com.
572actforamerica.org. 600 IN MX 50 aspmx3.googlemail.com.
573actforamerica.org. 600 IN MX 5 aspmx.l.google.com.
574actforamerica.org. 600 IN MX 20 alt1.aspmx.l.google.com.
575actforamerica.org. 600 IN SOA ns47.domaincontrol.com. dns.jomax.net. 2019100903 28800 7200 604800 600
576actforamerica.org. 600 IN A 35.153.8.200
577actforamerica.org. 3600 IN NS ns48.domaincontrol.com.
578actforamerica.org. 3600 IN NS ns47.domaincontrol.com.
579
580;; AUTHORITY SECTION:
581actforamerica.org. 3600 IN NS ns47.domaincontrol.com.
582actforamerica.org. 3600 IN NS ns48.domaincontrol.com.
583
584;; ADDITIONAL SECTION:
585ns47.domaincontrol.com. 21114 IN A 97.74.103.24
586ns47.domaincontrol.com. 31285 IN AAAA 2603:5:2172::18
587ns48.domaincontrol.com. 21114 IN A 173.201.71.24
588ns48.domaincontrol.com. 109 IN AAAA 2603:5:2272::18
589
590Received 824 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 56 ms
591######################################################################################################################################
592; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace actforamerica.org
593;; global options: +cmd
594. 84416 IN NS d.root-servers.net.
595. 84416 IN NS m.root-servers.net.
596. 84416 IN NS f.root-servers.net.
597. 84416 IN NS l.root-servers.net.
598. 84416 IN NS h.root-servers.net.
599. 84416 IN NS j.root-servers.net.
600. 84416 IN NS a.root-servers.net.
601. 84416 IN NS e.root-servers.net.
602. 84416 IN NS c.root-servers.net.
603. 84416 IN NS b.root-servers.net.
604. 84416 IN NS i.root-servers.net.
605. 84416 IN NS k.root-servers.net.
606. 84416 IN NS g.root-servers.net.
607. 84416 IN RRSIG NS 8 0 518400 20191106170000 20191024160000 22545 . A+zuBIrCB00SLggnHhVG3YRodf5bYY3GBWGmpEpuHwWkvpA6h/01xgPx lpp8IsbTTRg7llCASsElmRSIMyCnGcvuphcmhr9r6/5L+oFIdLAHLztt mnrFVnWsOtlMCk758M/yNaRj9J1OPuiLcGF6vqTEOnlX7Ws/3/8bww44 d+zMdTpWNI4h324w0b4weiAMhQNiDGHV6qGncoAXEw1xQHEmJ6Klvanr gXqrSZhChZx4f7167+8EDrYdbx4yo1k474hFoKY3LRaVRj4LzW5rV5lE M4JLODgCrsVxme0AN4DDxlBn2TiE5fEPu3kGMWBFkBiwsxkPVeuAgEQ6 RRi5sQ==
608;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 214 ms
609
610org. 172800 IN NS a0.org.afilias-nst.info.
611org. 172800 IN NS a2.org.afilias-nst.info.
612org. 172800 IN NS b0.org.afilias-nst.org.
613org. 172800 IN NS b2.org.afilias-nst.org.
614org. 172800 IN NS c0.org.afilias-nst.info.
615org. 172800 IN NS d0.org.afilias-nst.org.
616org. 86400 IN DS 9795 7 1 364DFAB3DAF254CAB477B5675B10766DDAA24982
617org. 86400 IN DS 9795 7 2 3922B31B6F3A4EA92B19EB7B52120F031FD8E05FF0B03BAFCF9F891B FE7FF8E5
618org. 86400 IN RRSIG DS 8 1 86400 20191106170000 20191024160000 22545 . AKUhmGaG2lOnMqeNSsPZoCOJRzRW6nqbhxhSObhZlE48vaYSrHUMRpxn ZBIVS/+bH63k0Nr8bYuu5wlFYlIgRD2K1zI905JdcidEv7TgRM150y1T QQ/Ok15cKDoK2F4h4sJRdHbGH7ToASnrqm8kjjr0lEGT5kwQCCW7OrhP uhW3yKnCx2h5p3IrQOMUYF8zBTDD/Sir0tT3lAbZ5tQuTYWu7A+EB9U+ p4SSqAccmxESzJJIVYOWfHGyG31NT8eIBEzXd8I8b4IL2KPkbhuA/CT4 lKJ9QdFXv41EK7aV+ghvXEK9ijVLSk7TWO3EoqkGVPY0/hxTojLK1emB JshTWg==
619;; Received 819 bytes from 192.58.128.30#53(j.root-servers.net) in 317 ms
620
621actforamerica.org. 86400 IN NS ns48.domaincontrol.com.
622actforamerica.org. 86400 IN NS ns47.domaincontrol.com.
623h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 86400 IN NSEC3 1 1 1 D399EAAB H9PAES2EQ3K44BAR1F3TIUO0J45719RJ NS SOA RRSIG DNSKEY NSEC3PARAM
624h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 86400 IN RRSIG NSEC3 7 2 86400 20191114204817 20191024194817 36752 org. ZZf9hRrD+tBOA1e7P2YnTtMvTizuYN5TlLiMp3sxLIBaJX+/RuMd0hbW l/JsZ4bXh6KHykcWTXNn1RY9UKRVuSN8WeKa31MukOBASjpkb/BwB+J3 CXNBul7vlh8FUWfUdKL6nWh7ekXhl4BQVXf+JX7Ym1LUtdTcf0UKYmEa 0P0=
625uu5gsahsqps93u0oitbveccdhnn9511n.org. 86400 IN NSEC3 1 1 1 D399EAAB UU64U2KE46PF4TRDQLB7RS38NHKLD35S NS DS RRSIG
626uu5gsahsqps93u0oitbveccdhnn9511n.org. 86400 IN RRSIG NSEC3 7 2 86400 20191109152857 20191019142857 36752 org. iqaV/tfh5GfeDYMgPjy7KCLWyZM7RjeU9XTxF5e5VqFrTjhFmYA9W6VC 6sA21WE6Y7QYBKZs5u6SLyTzDJZK4vA3pn5S28QFGWIFW6abL9lG30G1 LlOCoEAg8BFQcSPD6zK1ZdWQw/Hgyw5e5GwwqMjxvI6GTW97K7TmOYpG 6ag=
627;; Received 594 bytes from 199.19.54.1#53(b0.org.afilias-nst.org) in 243 ms
628
629actforamerica.org. 600 IN A 35.153.8.200
630actforamerica.org. 3600 IN NS ns47.domaincontrol.com.
631actforamerica.org. 3600 IN NS ns48.domaincontrol.com.
632;; Received 117 bytes from 97.74.103.24#53(ns47.domaincontrol.com) in 309 ms
633######################################################################################################################################
634[*] Performing General Enumeration of Domain: actforamerica.org
635[-] DNSSEC is not configured for actforamerica.org
636[*] SOA ns47.domaincontrol.com 97.74.103.24
637[*] NS ns47.domaincontrol.com 97.74.103.24
638[*] NS ns47.domaincontrol.com 2603:5:2172::18
639[*] NS ns48.domaincontrol.com 173.201.71.24
640[*] NS ns48.domaincontrol.com 2603:5:2272::18
641[*] MX aspmx.l.google.com 173.194.76.27
642[*] MX aspmx3.googlemail.com 172.217.194.27
643[*] MX alt2.aspmx.l.google.com 172.217.194.27
644[*] MX aspmx2.googlemail.com 209.85.233.27
645[*] MX alt1.aspmx.l.google.com 209.85.233.26
646[*] MX aspmx.l.google.com 2a00:1450:400c:c08::1b
647[*] MX aspmx3.googlemail.com 2404:6800:4003:c04::1a
648[*] MX alt2.aspmx.l.google.com 2404:6800:4003:c04::1b
649[*] MX aspmx2.googlemail.com 2a00:1450:4010:c03::1a
650[*] MX alt1.aspmx.l.google.com 2a00:1450:4010:c03::1a
651[*] A actforamerica.org 35.153.8.200
652[*] TXT actforamerica.org MS=ms44498340
653[*] TXT actforamerica.org google-site-verification=Ab9kpcnZVu1RqgZGlyAYVuhdOFH4ipxCD4beqZJgL60
654[*] TXT actforamerica.org v=spf1 a a:actforamerica.org a:actforameriaalert.org a:amazonses.com ip4:206.253.170.94 ip4:35.153.8.200 ip4:34.225.44.33 ip4:54.240.46.4 ip4:54.240.46.5 ip4:54.240.46.6 ip4:54.240.46.7 ip4:54.240.46.8 ip4:54.240.46.9 ~all
655[*] TXT actforamerica.org google-site-verification=NKMYVao6QMYtFWVnLzzbQvijVAjOWwGS6Y63s_Q8sfI
656[*] Enumerating SRV Records
657[-] No SRV Records Found for actforamerica.org
658[+] 0 Records Found
659#######################################################################################################################################
660[*] Processing domain actforamerica.org
661[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
662[+] Getting nameservers
66397.74.103.24 - ns47.domaincontrol.com
664173.201.71.24 - ns48.domaincontrol.com
665[-] Zone transfer failed
666
667[+] TXT records found
668"MS=ms44498340"
669"google-site-verification=Ab9kpcnZVu1RqgZGlyAYVuhdOFH4ipxCD4beqZJgL60"
670"v=spf1 a a:actforamerica.org a:actforameriaalert.org a:amazonses.com ip4:206.253.170.94 ip4:35.153.8.200 ip4:34.225.44.33 ip4:54.240.46.4 ip4:54.240.46.5 ip4:54.240.46.6 ip4:54.240.46.7 ip4:54.240.46.8 ip4:54.240.46.9 ~all"
671"google-site-verification=NKMYVao6QMYtFWVnLzzbQvijVAjOWwGS6Y63s_Q8sfI"
672
673[+] MX records found, added to target list
6745 aspmx.l.google.com.
67550 aspmx3.googlemail.com.
67630 alt2.aspmx.l.google.com.
67740 aspmx2.googlemail.com.
67820 alt1.aspmx.l.google.com.
679
680[*] Scanning actforamerica.org for A records
68135.153.8.200 - actforamerica.org
68298.129.107.221 - dev.actforamerica.org
68334.225.44.33 - dev1.actforamerica.org
68434.225.44.33 - dev2.actforamerica.org
68535.153.8.200 - ftp.actforamerica.org
68635.153.8.200 - search.actforamerica.org
68735.153.8.200 - secure.actforamerica.org
68835.153.8.200 - shop.actforamerica.org
68934.200.140.165 - vpn.actforamerica.org
69035.170.9.159 - web1.actforamerica.org
69134.202.174.165 - web2.actforamerica.org
69235.153.8.200 - www.actforamerica.org
693######################################################################################################################################
694Parsero scan report for www.actforamerica.org
695http://www.actforamerica.org/update.php 301 Moved Permanently
696http://www.actforamerica.org/?q=search/ 301 Moved Permanently
697http://www.actforamerica.org/CHANGELOG.txt 301 Moved Permanently
698http://www.actforamerica.org/search/ 301 Moved Permanently
699http://www.actforamerica.org/user/logout/ 301 Moved Permanently
700http://www.actforamerica.org/?q=filter/tips/ 301 Moved Permanently
701http://www.actforamerica.org/user/password/ 301 Moved Permanently
702http://www.actforamerica.org/?q=user/login/ 301 Moved Permanently
703http://www.actforamerica.org/cron.php 301 Moved Permanently
704http://www.actforamerica.org/scripts/ 301 Moved Permanently
705http://www.actforamerica.org/?q=user/logout/ 301 Moved Permanently
706http://www.actforamerica.org/modules/ 301 Moved Permanently
707http://www.actforamerica.org/INSTALL.sqlite.txt 301 Moved Permanently
708http://www.actforamerica.org/misc/ 301 Moved Permanently
709http://www.actforamerica.org/comment/reply/ 301 Moved Permanently
710http://www.actforamerica.org/INSTALL.mysql.txt 301 Moved Permanently
711http://www.actforamerica.org/?q=user/register/ 301 Moved Permanently
712http://www.actforamerica.org/includes/ 301 Moved Permanently
713http://www.actforamerica.org/profiles/ 301 Moved Permanently
714http://www.actforamerica.org/filter/tips/ 301 Moved Permanently
715http://www.actforamerica.org/LICENSE.txt 301 Moved Permanently
716http://www.actforamerica.org/?q=admin/ 301 Moved Permanently
717http://www.actforamerica.org/MAINTAINERS.txt 301 Moved Permanently
718http://www.actforamerica.org/user/register/ 301 Moved Permanently
719http://www.actforamerica.org/INSTALL.txt 301 Moved Permanently
720http://www.actforamerica.org/install.php 301 Moved Permanently
721http://www.actforamerica.org/UPGRADE.txt 301 Moved Permanently
722http://www.actforamerica.org/?q=node/add/ 301 Moved Permanently
723http://www.actforamerica.org/?q=user/password/ 301 Moved Permanently
724http://www.actforamerica.org/user/login/ 301 Moved Permanently
725http://www.actforamerica.org/node/add/ 301 Moved Permanently
726http://www.actforamerica.org/themes/ 301 Moved Permanently
727http://www.actforamerica.org/admin/ 301 Moved Permanently
728http://www.actforamerica.org/xmlrpc.php 301 Moved Permanently
729http://www.actforamerica.org/?q=comment/reply/ 301 Moved Permanently
730http://www.actforamerica.org/INSTALL.pgsql.txt 301 Moved Permanently
731
732[+] 36 links have been analyzed but any them are available...
733######################################################################################################################################
734
735 AVAILABLE PLUGINS
736 -----------------
737
738 OpenSslCcsInjectionPlugin
739 SessionRenegotiationPlugin
740 SessionResumptionPlugin
741 EarlyDataPlugin
742 CertificateInfoPlugin
743 HeartbleedPlugin
744 RobotPlugin
745 OpenSslCipherSuitesPlugin
746 CompressionPlugin
747 FallbackScsvPlugin
748 HttpHeadersPlugin
749
750
751
752 CHECKING HOST(S) AVAILABILITY
753 -----------------------------
754
755 35.153.8.200:443 => 35.153.8.200
756
757
758
759
760 SCAN RESULTS FOR 35.153.8.200:443 - 35.153.8.200
761 ------------------------------------------------
762
763 * Downgrade Attacks:
764 TLS_FALLBACK_SCSV: OK - Supported
765
766 * Session Renegotiation:
767 Client-initiated Renegotiation: OK - Rejected
768 Secure Renegotiation: OK - Supported
769
770 * TLS 1.2 Session Resumption Support:
771 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
772 With TLS Tickets: OK - Supported
773
774 * OpenSSL CCS Injection:
775 OK - Not vulnerable to OpenSSL CCS injection
776
777 * SSLV2 Cipher Suites:
778 Server rejected all cipher suites.
779
780 * TLSV1_3 Cipher Suites:
781 Server rejected all cipher suites.
782
783 * Deflate Compression:
784 OK - Compression disabled
785
786 * SSLV3 Cipher Suites:
787 Server rejected all cipher suites.
788
789 * OpenSSL Heartbleed:
790 OK - Not vulnerable to Heartbleed
791
792 * Certificate Information:
793 Content
794 SHA1 Fingerprint: 1479647f405c018cb5bcd7a1deae9416b30919da
795 Common Name: actforamerica.org
796 Issuer: Let's Encrypt Authority X3
797 Serial Number: 278676831215008051846024114734678382431641
798 Not Before: 2019-10-04 11:26:10
799 Not After: 2020-01-02 11:26:10
800 Signature Algorithm: sha256
801 Public Key Algorithm: RSA
802 Key Size: 2048
803 Exponent: 65537 (0x10001)
804 DNS Subject Alternative Names: ['actforamerica.org', 'www.actforamerica.org']
805
806 Trust
807 Hostname Validation: FAILED - Certificate does NOT match 35.153.8.200
808 Android CA Store (9.0.0_r9): OK - Certificate is trusted
809 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
810 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
811 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
812 Windows CA Store (2019-05-27): OK - Certificate is trusted
813 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
814 Received Chain: actforamerica.org --> Let's Encrypt Authority X3
815 Verified Chain: actforamerica.org --> Let's Encrypt Authority X3 --> DST Root CA X3
816 Received Chain Contains Anchor: OK - Anchor certificate not sent
817 Received Chain Order: OK - Order is valid
818 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
819
820 Extensions
821 OCSP Must-Staple: NOT SUPPORTED - Extension not found
822 Certificate Transparency: WARNING - Only 2 SCTs included but Google recommends 3 or more
823
824 OCSP Stapling
825 NOT SUPPORTED - Server did not send back an OCSP response
826
827 * TLSV1_2 Cipher Suites:
828 Forward Secrecy OK - Supported
829 RC4 OK - Not Supported
830
831 Preferred:
832 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
833 Accepted:
834 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
835 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
836 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
837 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
838 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
839 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
840 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
841 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
842 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 200 OK
843 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
844 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
845 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
846 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
847 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
848 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
849 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
850 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
851 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
852 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
853 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
854 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
855 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
856
857 * TLSV1_1 Cipher Suites:
858 Forward Secrecy OK - Supported
859 RC4 OK - Not Supported
860
861 Preferred:
862 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
863 Accepted:
864 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
865 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
866 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
867 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
868 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
869 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
870 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
871 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
872 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
873
874 * ROBOT Attack:
875 OK - Not vulnerable
876
877 * TLSV1 Cipher Suites:
878 Forward Secrecy OK - Supported
879 RC4 OK - Not Supported
880
881 Preferred:
882 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
883 Accepted:
884 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
885 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
886 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
887 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
888 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
889 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
890 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
891 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
892 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
893
894
895 SCAN COMPLETED IN 32.39 S
896 -------------------------
897######################################################################################################################################
898Domains still to check: 1
899 Checking if the hostname actforamerica.org. given is in fact a domain...
900
901Analyzing domain: actforamerica.org.
902 Checking NameServers using system default resolver...
903 IP: 173.201.71.24 (United States)
904 HostName: ns48.domaincontrol.com Type: NS
905 HostName: ns48.domaincontrol.com Type: PTR
906 IP: 97.74.103.24 (United States)
907 HostName: ns47.domaincontrol.com Type: NS
908 HostName: ns47.domaincontrol.com Type: PTR
909
910 Checking MailServers using system default resolver...
911 IP: 74.125.140.27 (United States)
912 HostName: aspmx.l.google.com Type: MX
913 HostName: wq-in-f27.1e100.net Type: PTR
914 IP: 172.217.194.26 (United States)
915 HostName: alt2.aspmx.l.google.com Type: MX
916 IP: 209.85.233.26 (United States)
917 HostName: aspmx2.googlemail.com Type: MX
918 HostName: lr-in-f26.1e100.net Type: PTR
919 IP: 172.217.194.26 (United States)
920 HostName: alt2.aspmx.l.google.com Type: MX
921 HostName: aspmx3.googlemail.com Type: MX
922 IP: 209.85.233.26 (United States)
923 HostName: aspmx2.googlemail.com Type: MX
924 HostName: lr-in-f26.1e100.net Type: PTR
925 HostName: alt1.aspmx.l.google.com Type: MX
926
927 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
928 No zone transfer found on nameserver 173.201.71.24
929 No zone transfer found on nameserver 97.74.103.24
930
931 Checking SPF record...
932 New hostname found: actforamerica
933 New hostname found: actforameriaalert
934 New hostname found: amazonses
935 New IP found: 206.253.170.94
936 New IP found: 35.153.8.200
937 New IP found: 34.225.44.33
938 New IP found: 54.240.46.4
939 New IP found: 54.240.46.5
940 New IP found: 54.240.46.6
941 New IP found: 54.240.46.7
942 New IP found: 54.240.46.8
943 New IP found: 54.240.46.9
944
945 Checking 195 most common hostnames using system default resolver...
946 IP: 35.153.8.200 (United States)
947 Type: SPF
948 HostName: www.actforamerica.org. Type: A
949 HostName: ec2-35-153-8-200.compute-1.amazonaws.com Type: PTR
950 IP: 35.153.8.200 (United States)
951 Type: SPF
952 HostName: www.actforamerica.org. Type: A
953 HostName: ec2-35-153-8-200.compute-1.amazonaws.com Type: PTR
954 HostName: ftp.actforamerica.org. Type: A
955 IP: 35.153.8.200 (United States)
956 Type: SPF
957 HostName: www.actforamerica.org. Type: A
958 HostName: ec2-35-153-8-200.compute-1.amazonaws.com Type: PTR
959 HostName: ftp.actforamerica.org. Type: A
960 HostName: secure.actforamerica.org. Type: A
961 IP: 35.153.8.200 (United States)
962 Type: SPF
963 HostName: www.actforamerica.org. Type: A
964 HostName: ec2-35-153-8-200.compute-1.amazonaws.com Type: PTR
965 HostName: ftp.actforamerica.org. Type: A
966 HostName: secure.actforamerica.org. Type: A
967 HostName: search.actforamerica.org. Type: A
968
969 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
970 Checking netblock 54.240.46.0
971 Checking netblock 97.74.103.0
972 Checking netblock 74.125.140.0
973 Checking netblock 34.225.44.0
974 Checking netblock 173.201.71.0
975 Checking netblock 206.253.170.0
976 Checking netblock 35.153.8.0
977 Checking netblock 172.217.194.0
978 Checking netblock 209.85.233.0
979
980 Searching for actforamerica.org. emails in Google
981 info@actforamerica.org.
982 accounting@actforamerica.org.
983 dhall@actforamerica.org
984 info@actforamerica.org
985 tnt@actforamerica.org
986
987 Checking 14 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
988 Host 54.240.46.5 is up (reset ttl 64)
989 Host 97.74.103.24 is up (reset ttl 64)
990 Host 74.125.140.27 is up (reset ttl 64)
991 Host 34.225.44.33 is up (reset ttl 64)
992 Host 173.201.71.24 is up (reset ttl 64)
993 Host 206.253.170.94 is up (reset ttl 64)
994 Host 54.240.46.4 is up (reset ttl 64)
995 Host 35.153.8.200 is up (reset ttl 64)
996 Host 54.240.46.6 is up (reset ttl 64)
997 Host 54.240.46.7 is up (reset ttl 64)
998 Host 54.240.46.8 is up (reset ttl 64)
999 Host 54.240.46.9 is up (reset ttl 64)
1000 Host 172.217.194.26 is up (reset ttl 64)
1001 Host 209.85.233.26 is up (reset ttl 64)
1002
1003 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
1004 Scanning ip 54.240.46.5 ():
1005 Scanning ip 97.74.103.24 (ns47.domaincontrol.com (PTR)):
1006 53/tcp open tcpwrapped syn-ack ttl 55
1007 Scanning ip 74.125.140.27 (wq-in-f27.1e100.net (PTR)):
1008 Scanning ip 34.225.44.33 ():
1009 Scanning ip 173.201.71.24 (ns48.domaincontrol.com (PTR)):
1010 53/tcp open tcpwrapped syn-ack ttl 55
1011 Scanning ip 206.253.170.94 ():
1012 80/tcp open tcpwrapped syn-ack ttl 112
1013 443/tcp open tcpwrapped syn-ack ttl 112
1014 Scanning ip 54.240.46.4 ():
1015 Scanning ip 35.153.8.200 (search.actforamerica.org.):
1016 Scanning ip 54.240.46.6 ():
1017 Scanning ip 54.240.46.7 ():
1018 Scanning ip 54.240.46.8 ():
1019 Scanning ip 54.240.46.9 ():
1020 Scanning ip 172.217.194.26 (aspmx3.googlemail.com):
1021 Scanning ip 209.85.233.26 (alt1.aspmx.l.google.com):
1022 WebCrawling domain's web servers... up to 50 max links.
1023--Finished--
1024Summary information for domain actforamerica.org.
1025-----------------------------------------
1026 Domain Specific Information:
1027 Email: info@actforamerica.org.
1028 Email: accounting@actforamerica.org.
1029 Email: dhall@actforamerica.org
1030 Email: info@actforamerica.org
1031 Email: tnt@actforamerica.org
1032
1033 Domain Ips Information:
1034 IP: 54.240.46.5
1035 Type: SPF
1036 Is Active: True (reset ttl 64)
1037 IP: 97.74.103.24
1038 HostName: ns47.domaincontrol.com Type: NS
1039 HostName: ns47.domaincontrol.com Type: PTR
1040 Country: United States
1041 Is Active: True (reset ttl 64)
1042 Port: 53/tcp open tcpwrapped syn-ack ttl 55
1043 IP: 74.125.140.27
1044 HostName: aspmx.l.google.com Type: MX
1045 HostName: wq-in-f27.1e100.net Type: PTR
1046 Country: United States
1047 Is Active: True (reset ttl 64)
1048 IP: 34.225.44.33
1049 Type: SPF
1050 Is Active: True (reset ttl 64)
1051 IP: 173.201.71.24
1052 HostName: ns48.domaincontrol.com Type: NS
1053 HostName: ns48.domaincontrol.com Type: PTR
1054 Country: United States
1055 Is Active: True (reset ttl 64)
1056 Port: 53/tcp open tcpwrapped syn-ack ttl 55
1057 IP: 206.253.170.94
1058 Type: SPF
1059 Is Active: True (reset ttl 64)
1060 Port: 80/tcp open tcpwrapped syn-ack ttl 112
1061 Port: 443/tcp open tcpwrapped syn-ack ttl 112
1062 IP: 54.240.46.4
1063 Type: SPF
1064 Is Active: True (reset ttl 64)
1065 IP: 35.153.8.200
1066 Type: SPF
1067 HostName: www.actforamerica.org. Type: A
1068 HostName: ec2-35-153-8-200.compute-1.amazonaws.com Type: PTR
1069 HostName: ftp.actforamerica.org. Type: A
1070 HostName: secure.actforamerica.org. Type: A
1071 HostName: search.actforamerica.org. Type: A
1072 Country: United States
1073 Is Active: True (reset ttl 64)
1074 IP: 54.240.46.6
1075 Type: SPF
1076 Is Active: True (reset ttl 64)
1077 IP: 54.240.46.7
1078 Type: SPF
1079 Is Active: True (reset ttl 64)
1080 IP: 54.240.46.8
1081 Type: SPF
1082 Is Active: True (reset ttl 64)
1083 IP: 54.240.46.9
1084 Type: SPF
1085 Is Active: True (reset ttl 64)
1086 IP: 172.217.194.26
1087 HostName: alt2.aspmx.l.google.com Type: MX
1088 HostName: aspmx3.googlemail.com Type: MX
1089 Country: United States
1090 Is Active: True (reset ttl 64)
1091 IP: 209.85.233.26
1092 HostName: aspmx2.googlemail.com Type: MX
1093 HostName: lr-in-f26.1e100.net Type: PTR
1094 HostName: alt1.aspmx.l.google.com Type: MX
1095 Country: United States
1096 Is Active: True (reset ttl 64)
1097
1098--------------End Summary --------------
1099-----------------------------------------
1100
1101#####################################################################################################################################
1102-----------------------------------------------------------------------------------------------------
1103[3/100] https://www.actforamerica.org/sites/default/files/images/BenghaziSelectCommitteeLetter.pdf
1104[4/100] https://www.actforamerica.org/sites/default/files/civicrm/custom/images/CAIROne-Pager.pdf
1105[5/100] https://www.actforamerica.org/sites/default/files/images/ACT-FOR-AMERICA-PRESS-RELEASE.pdf
1106[6/100] http://www.actforamerica.org/r%3Fu%3Dhttps%253A%252F%252Fwww.justice.gov%252Farchive%252Ftax%252Fusaopress%252F2007%252Ftxdv07mokh0424rel.pdf%26e%3Dfb4f9995e203accfb69ab68f3599c507%26utm_source%3Dactforamerica%26utm_medium%3Demail%26utm_campaign%3Dat10_12%26n%3D14
1107---------------------------------------------------------------------------------------------------
1108
1109[+] List of software found:
1110-----------------------------
1111��Adobe PSL 1.4e for Canon
1112Canon MF731C/733C
1113Adobe PDF library 10.01
1114Adobe Illustrator CC 22.1 (Macintosh)
1115-----------------------------------------------------------------------------------------------------
1116
1117[+] List of e-mails found:
1118----------------------------
1119spresler@actforamerica.org
1120#####################################################################################################################################
1121
1122Privileges have been dropped to "nobody:nogroup" for security reasons.
1123
1124Processed queries: 0
1125Received packets: 0
1126Progress: 0.00% (00 h 00 min 00 sec / 00 h 00 min 00 sec)
1127Current incoming rate: 0 pps, average: 0 pps
1128Current success rate: 0 pps, average: 0 pps
1129Finished total: 0, success: 0 (0.00%)
1130Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
1131Failures: 0: 0.00%, 1: 0.00%, 2: 0.00%, 3: 0.00%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1132Response: | Success: | Total:
1133OK: | 0 ( 0.00%) | 0 ( 0.00%)
1134NXDOMAIN: | 0 ( 0.00%) | 0 ( 0.00%)
1135SERVFAIL: | 0 ( 0.00%) | 0 ( 0.00%)
1136REFUSED: | 0 ( 0.00%) | 0 ( 0.00%)
1137FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1138
1139
1140
1141Processed queries: 1919
1142Received packets: 288
1143Progress: 100.00% (00 h 00 min 01 sec / 00 h 00 min 01 sec)
1144Current incoming rate: 287 pps, average: 287 pps
1145Current success rate: 213 pps, average: 213 pps
1146Finished total: 214, success: 214 (100.00%)
1147Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
1148Failures: 0: 38.32%, 1: 823.83%, 2: 34.58%, 3: 0.00%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1149Response: | Success: | Total:
1150OK: | 17 ( 7.94%) | 17 ( 5.90%)
1151NXDOMAIN: | 177 ( 82.71%) | 177 ( 61.46%)
1152SERVFAIL: | 20 ( 9.35%) | 20 ( 6.94%)
1153REFUSED: | 0 ( 0.00%) | 74 ( 25.69%)
1154FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1155
1156
1157
1158Processed queries: 1919
1159Received packets: 686
1160Progress: 100.00% (00 h 00 min 02 sec / 00 h 00 min 02 sec)
1161Current incoming rate: 397 pps, average: 342 pps
1162Current success rate: 290 pps, average: 252 pps
1163Finished total: 505, success: 505 (100.00%)
1164Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
1165Failures: 0: 16.24%, 1: 26.14%, 2: 29.31%, 3: 273.07%, 4: 35.25%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1166Response: | Success: | Total:
1167OK: | 47 ( 9.31%) | 47 ( 6.88%)
1168NXDOMAIN: | 423 ( 83.76%) | 423 ( 61.93%)
1169SERVFAIL: | 35 ( 6.93%) | 35 ( 5.12%)
1170REFUSED: | 0 ( 0.00%) | 178 ( 26.06%)
1171FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1172
1173
1174
1175Processed queries: 1919
1176Received packets: 1107
1177Progress: 100.00% (00 h 00 min 03 sec / 00 h 00 min 03 sec)
1178Current incoming rate: 420 pps, average: 368 pps
1179Current success rate: 296 pps, average: 266 pps
1180Finished total: 802, success: 802 (100.00%)
1181Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
1182Failures: 0: 10.22%, 1: 16.46%, 2: 18.45%, 3: 18.45%, 4: 19.20%, 5: 119.58%, 6: 36.91%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1183Response: | Success: | Total:
1184OK: | 68 ( 8.48%) | 68 ( 6.17%)
1185NXDOMAIN: | 678 ( 84.54%) | 678 ( 61.52%)
1186SERVFAIL: | 56 ( 6.98%) | 56 ( 5.08%)
1187REFUSED: | 0 ( 0.00%) | 300 ( 27.22%)
1188FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1189
1190
1191
1192Processed queries: 1919
1193Received packets: 1505
1194Progress: 100.00% (00 h 00 min 04 sec / 00 h 00 min 04 sec)
1195Current incoming rate: 397 pps, average: 375 pps
1196Current success rate: 210 pps, average: 252 pps
1197Finished total: 1013, success: 1013 (100.00%)
1198Mismatched domains: 95 (6.35%), IDs: 0 (0.00%)
1199Failures: 0: 8.09%, 1: 13.03%, 2: 14.61%, 3: 14.61%, 4: 15.20%, 5: 13.62%, 6: 12.64%, 7: 64.17%, 8: 32.77%, 9: 0.69%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1200Response: | Success: | Total:
1201OK: | 88 ( 8.69%) | 94 ( 6.28%)
1202NXDOMAIN: | 858 ( 84.70%) | 910 ( 60.83%)
1203SERVFAIL: | 67 ( 6.61%) | 72 ( 4.81%)
1204REFUSED: | 0 ( 0.00%) | 420 ( 28.07%)
1205FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1206
1207
1208
1209Processed queries: 1919
1210Received packets: 1906
1211Progress: 100.00% (00 h 00 min 05 sec / 00 h 00 min 05 sec)
1212Current incoming rate: 400 pps, average: 380 pps
1213Current success rate: 157 pps, average: 233 pps
1214Finished total: 1171, success: 1171 (100.00%)
1215Mismatched domains: 279 (14.74%), IDs: 0 (0.00%)
1216Failures: 0: 7.00%, 1: 11.27%, 2: 12.64%, 3: 12.64%, 4: 13.15%, 5: 11.78%, 6: 10.93%, 7: 6.40%, 8: 7.34%, 9: 42.44%, 10: 27.50%, 11: 0.77%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1217Response: | Success: | Total:
1218OK: | 109 ( 9.31%) | 125 ( 6.60%)
1219NXDOMAIN: | 986 ( 84.20%) | 1142 ( 60.33%)
1220SERVFAIL: | 76 ( 6.49%) | 91 ( 4.81%)
1221REFUSED: | 0 ( 0.00%) | 535 ( 28.26%)
1222FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1223
1224
1225
1226Processed queries: 1919
1227Received packets: 2275
1228Progress: 100.00% (00 h 00 min 06 sec / 00 h 00 min 06 sec)
1229Current incoming rate: 368 pps, average: 378 pps
1230Current success rate: 148 pps, average: 219 pps
1231Finished total: 1320, success: 1320 (100.00%)
1232Mismatched domains: 437 (19.33%), IDs: 0 (0.00%)
1233Failures: 0: 6.21%, 1: 10.00%, 2: 11.21%, 3: 11.21%, 4: 11.67%, 5: 10.45%, 6: 9.70%, 7: 5.68%, 8: 6.52%, 9: 5.68%, 10: 4.55%, 11: 28.71%, 12: 22.73%, 13: 1.06%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1234Response: | Success: | Total:
1235OK: | 118 ( 8.94%) | 145 ( 6.41%)
1236NXDOMAIN: | 1124 ( 85.15%) | 1378 ( 60.95%)
1237SERVFAIL: | 78 ( 5.91%) | 101 ( 4.47%)
1238REFUSED: | 0 ( 0.00%) | 637 ( 28.17%)
1239FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1240
1241
1242
1243Processed queries: 1919
1244Received packets: 2705
1245Progress: 100.00% (00 h 00 min 07 sec / 00 h 00 min 07 sec)
1246Current incoming rate: 429 pps, average: 385 pps
1247Current success rate: 128 pps, average: 206 pps
1248Finished total: 1449, success: 1449 (100.00%)
1249Mismatched domains: 676 (25.14%), IDs: 0 (0.00%)
1250Failures: 0: 5.66%, 1: 9.11%, 2: 10.21%, 3: 10.21%, 4: 10.63%, 5: 9.52%, 6: 8.83%, 7: 5.18%, 8: 5.94%, 9: 5.18%, 10: 4.14%, 11: 5.94%, 12: 4.55%, 13: 17.67%, 14: 18.08%, 15: 1.59%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1251Response: | Success: | Total:
1252OK: | 126 ( 8.70%) | 176 ( 6.55%)
1253NXDOMAIN: | 1237 ( 85.37%) | 1638 ( 60.91%)
1254SERVFAIL: | 86 ( 5.94%) | 114 ( 4.24%)
1255REFUSED: | 0 ( 0.00%) | 761 ( 28.30%)
1256FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1257
1258
1259
1260Processed queries: 1919
1261Received packets: 3112
1262Progress: 100.00% (00 h 00 min 08 sec / 00 h 00 min 08 sec)
1263Current incoming rate: 406 pps, average: 388 pps
1264Current success rate: 88 pps, average: 191 pps
1265Finished total: 1538, success: 1538 (100.00%)
1266Mismatched domains: 966 (31.20%), IDs: 0 (0.00%)
1267Failures: 0: 5.33%, 1: 8.58%, 2: 9.62%, 3: 9.62%, 4: 10.01%, 5: 8.97%, 6: 8.32%, 7: 4.88%, 8: 5.59%, 9: 4.88%, 10: 3.90%, 11: 5.59%, 12: 4.29%, 13: 3.97%, 14: 2.21%, 15: 12.94%, 16: 13.65%, 17: 2.34%, 18: 0.07%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1268Response: | Success: | Total:
1269OK: | 138 ( 8.97%) | 206 ( 6.65%)
1270NXDOMAIN: | 1308 ( 85.05%) | 1894 ( 61.18%)
1271SERVFAIL: | 92 ( 5.98%) | 128 ( 4.13%)
1272REFUSED: | 0 ( 0.00%) | 868 ( 28.04%)
1273FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1274
1275
1276
1277Processed queries: 1919
1278Received packets: 3504
1279Progress: 100.00% (00 h 00 min 09 sec / 00 h 00 min 09 sec)
1280Current incoming rate: 391 pps, average: 388 pps
1281Current success rate: 86 pps, average: 180 pps
1282Finished total: 1625, success: 1625 (100.00%)
1283Mismatched domains: 1238 (35.50%), IDs: 0 (0.00%)
1284Failures: 0: 5.05%, 1: 8.12%, 2: 9.11%, 3: 9.11%, 4: 9.48%, 5: 8.49%, 6: 7.88%, 7: 4.62%, 8: 5.29%, 9: 4.62%, 10: 3.69%, 11: 5.29%, 12: 4.06%, 13: 3.75%, 14: 2.09%, 15: 3.38%, 16: 2.03%, 17: 8.80%, 18: 10.40%, 19: 2.77%, 20: 0.06%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1285Response: | Success: | Total:
1286OK: | 145 ( 8.92%) | 223 ( 6.40%)
1287NXDOMAIN: | 1384 ( 85.17%) | 2147 ( 61.57%)
1288SERVFAIL: | 96 ( 5.91%) | 147 ( 4.22%)
1289REFUSED: | 0 ( 0.00%) | 970 ( 27.82%)
1290FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1291
1292
1293
1294Processed queries: 1919
1295Received packets: 3890
1296Progress: 100.00% (00 h 00 min 10 sec / 00 h 00 min 10 sec)
1297Current incoming rate: 385 pps, average: 388 pps
1298Current success rate: 64 pps, average: 168 pps
1299Finished total: 1690, success: 1690 (100.00%)
1300Mismatched domains: 1541 (39.83%), IDs: 0 (0.00%)
1301Failures: 0: 4.85%, 1: 7.81%, 2: 8.76%, 3: 8.76%, 4: 9.11%, 5: 8.17%, 6: 7.57%, 7: 4.44%, 8: 5.09%, 9: 4.44%, 10: 3.55%, 11: 5.09%, 12: 3.91%, 13: 3.61%, 14: 2.01%, 15: 3.25%, 16: 1.95%, 17: 2.54%, 18: 2.54%, 19: 5.86%, 20: 8.17%, 21: 2.01%, 22: 0.06%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1302Response: | Success: | Total:
1303OK: | 152 ( 8.99%) | 251 ( 6.49%)
1304NXDOMAIN: | 1437 ( 85.03%) | 2390 ( 61.77%)
1305SERVFAIL: | 101 ( 5.98%) | 169 ( 4.37%)
1306REFUSED: | 0 ( 0.00%) | 1059 ( 27.37%)
1307FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1308
1309
1310
1311Processed queries: 1919
1312Received packets: 4272
1313Progress: 100.00% (00 h 00 min 11 sec / 00 h 00 min 11 sec)
1314Current incoming rate: 381 pps, average: 387 pps
1315Current success rate: 42 pps, average: 157 pps
1316Finished total: 1733, success: 1733 (100.00%)
1317Mismatched domains: 1865 (43.90%), IDs: 0 (0.00%)
1318Failures: 0: 4.73%, 1: 7.62%, 2: 8.54%, 3: 8.54%, 4: 8.89%, 5: 7.96%, 6: 7.39%, 7: 4.33%, 8: 4.96%, 9: 4.33%, 10: 3.46%, 11: 4.96%, 12: 3.81%, 13: 3.52%, 14: 1.96%, 15: 3.17%, 16: 1.90%, 17: 2.48%, 18: 2.48%, 19: 1.73%, 20: 1.10%, 21: 5.19%, 22: 6.23%, 23: 1.21%, 24: 0.23%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1319Response: | Success: | Total:
1320OK: | 159 ( 9.17%) | 274 ( 6.45%)
1321NXDOMAIN: | 1469 ( 84.77%) | 2623 ( 61.75%)
1322SERVFAIL: | 105 ( 6.06%) | 186 ( 4.38%)
1323REFUSED: | 0 ( 0.00%) | 1165 ( 27.42%)
1324FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1325
1326
1327
1328Processed queries: 1919
1329Received packets: 4675
1330Progress: 100.00% (00 h 00 min 12 sec / 00 h 00 min 12 sec)
1331Current incoming rate: 402 pps, average: 388 pps
1332Current success rate: 33 pps, average: 146 pps
1333Finished total: 1767, success: 1767 (100.00%)
1334Mismatched domains: 2223 (47.82%), IDs: 0 (0.00%)
1335Failures: 0: 4.64%, 1: 7.47%, 2: 8.38%, 3: 8.38%, 4: 8.72%, 5: 7.81%, 6: 7.24%, 7: 4.24%, 8: 4.87%, 9: 4.24%, 10: 3.40%, 11: 4.87%, 12: 3.74%, 13: 3.45%, 14: 1.92%, 15: 3.11%, 16: 1.87%, 17: 2.43%, 18: 2.43%, 19: 1.70%, 20: 1.08%, 21: 1.25%, 22: 0.96%, 23: 4.70%, 24: 4.58%, 25: 1.13%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1336Response: | Success: | Total:
1337OK: | 160 ( 9.05%) | 299 ( 6.43%)
1338NXDOMAIN: | 1501 ( 84.95%) | 2881 ( 61.97%)
1339SERVFAIL: | 106 ( 6.00%) | 207 ( 4.45%)
1340REFUSED: | 0 ( 0.00%) | 1262 ( 27.15%)
1341FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1342
1343
1344
1345Processed queries: 1919
1346Received packets: 5101
1347Progress: 100.00% (00 h 00 min 13 sec / 00 h 00 min 13 sec)
1348Current incoming rate: 425 pps, average: 391 pps
1349Current success rate: 18 pps, average: 137 pps
1350Finished total: 1786, success: 1786 (100.00%)
1351Mismatched domains: 2618 (51.63%), IDs: 0 (0.00%)
1352Failures: 0: 4.59%, 1: 7.39%, 2: 8.29%, 3: 8.29%, 4: 8.62%, 5: 7.73%, 6: 7.17%, 7: 4.20%, 8: 4.82%, 9: 4.20%, 10: 3.36%, 11: 4.82%, 12: 3.70%, 13: 3.42%, 14: 1.90%, 15: 3.08%, 16: 1.85%, 17: 2.41%, 18: 2.41%, 19: 1.68%, 20: 1.06%, 21: 1.23%, 22: 0.95%, 23: 0.84%, 24: 0.67%, 25: 4.42%, 26: 3.75%, 27: 0.56%, 28: 0.06%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1353Response: | Success: | Total:
1354OK: | 162 ( 9.07%) | 326 ( 6.43%)
1355NXDOMAIN: | 1517 ( 84.94%) | 3130 ( 61.72%)
1356SERVFAIL: | 107 ( 5.99%) | 223 ( 4.40%)
1357REFUSED: | 0 ( 0.00%) | 1392 ( 27.45%)
1358FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1359
1360
1361
1362Processed queries: 1919
1363Received packets: 5530
1364Progress: 100.00% (00 h 00 min 14 sec / 00 h 00 min 14 sec)
1365Current incoming rate: 428 pps, average: 394 pps
1366Current success rate: 20 pps, average: 128 pps
1367Finished total: 1807, success: 1807 (100.00%)
1368Mismatched domains: 3016 (54.89%), IDs: 0 (0.00%)
1369Failures: 0: 4.54%, 1: 7.30%, 2: 8.19%, 3: 8.19%, 4: 8.52%, 5: 7.64%, 6: 7.08%, 7: 4.15%, 8: 4.76%, 9: 4.15%, 10: 3.32%, 11: 4.76%, 12: 3.65%, 13: 3.38%, 14: 1.88%, 15: 3.04%, 16: 1.83%, 17: 2.38%, 18: 2.38%, 19: 1.66%, 20: 1.05%, 21: 1.22%, 22: 0.94%, 23: 0.83%, 24: 0.66%, 25: 0.72%, 26: 0.50%, 27: 4.32%, 28: 2.77%, 29: 0.39%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1370Response: | Success: | Total:
1371OK: | 164 ( 9.08%) | 349 ( 6.35%)
1372NXDOMAIN: | 1536 ( 85.00%) | 3405 ( 61.97%)
1373SERVFAIL: | 107 ( 5.92%) | 236 ( 4.29%)
1374REFUSED: | 0 ( 0.00%) | 1505 ( 27.39%)
1375FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1376
1377
1378
1379Processed queries: 1919
1380Received packets: 5936
1381Progress: 100.00% (00 h 00 min 15 sec / 00 h 00 min 15 sec)
1382Current incoming rate: 405 pps, average: 394 pps
1383Current success rate: 19 pps, average: 121 pps
1384Finished total: 1827, success: 1827 (100.00%)
1385Mismatched domains: 3386 (57.39%), IDs: 0 (0.00%)
1386Failures: 0: 4.49%, 1: 7.22%, 2: 8.10%, 3: 8.10%, 4: 8.43%, 5: 7.55%, 6: 7.01%, 7: 4.11%, 8: 4.71%, 9: 4.11%, 10: 3.28%, 11: 4.71%, 12: 3.61%, 13: 3.34%, 14: 1.86%, 15: 3.01%, 16: 1.81%, 17: 2.35%, 18: 2.35%, 19: 1.64%, 20: 1.04%, 21: 1.20%, 22: 0.93%, 23: 0.82%, 24: 0.66%, 25: 0.71%, 26: 0.49%, 27: 0.82%, 28: 0.60%, 29: 3.50%, 30: 2.03%, 31: 0.44%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1387Response: | Success: | Total:
1388OK: | 165 ( 9.03%) | 369 ( 6.25%)
1389NXDOMAIN: | 1555 ( 85.11%) | 3668 ( 62.17%)
1390SERVFAIL: | 107 ( 5.86%) | 248 ( 4.20%)
1391REFUSED: | 0 ( 0.00%) | 1615 ( 27.37%)
1392FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1393
1394
1395
1396Processed queries: 1919
1397Received packets: 6377
1398Progress: 100.00% (00 h 00 min 16 sec / 00 h 00 min 16 sec)
1399Current incoming rate: 440 pps, average: 397 pps
1400Current success rate: 17 pps, average: 115 pps
1401Finished total: 1845, success: 1845 (100.00%)
1402Mismatched domains: 3800 (59.95%), IDs: 0 (0.00%)
1403Failures: 0: 4.44%, 1: 7.15%, 2: 8.02%, 3: 8.02%, 4: 8.35%, 5: 7.48%, 6: 6.94%, 7: 4.07%, 8: 4.66%, 9: 4.07%, 10: 3.25%, 11: 4.66%, 12: 3.58%, 13: 3.31%, 14: 1.84%, 15: 2.98%, 16: 1.79%, 17: 2.33%, 18: 2.33%, 19: 1.63%, 20: 1.03%, 21: 1.19%, 22: 0.92%, 23: 0.81%, 24: 0.65%, 25: 0.70%, 26: 0.49%, 27: 0.81%, 28: 0.60%, 29: 0.38%, 30: 0.81%, 31: 3.31%, 32: 1.03%, 33: 0.38%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1404Response: | Success: | Total:
1405OK: | 168 ( 9.11%) | 397 ( 6.26%)
1406NXDOMAIN: | 1569 ( 85.04%) | 3928 ( 61.97%)
1407SERVFAIL: | 108 ( 5.85%) | 263 ( 4.15%)
1408REFUSED: | 0 ( 0.00%) | 1751 ( 27.62%)
1409FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1410
1411
1412
1413Processed queries: 1919
1414Received packets: 6787
1415Progress: 100.00% (00 h 00 min 17 sec / 00 h 00 min 17 sec)
1416Current incoming rate: 409 pps, average: 398 pps
1417Current success rate: 36 pps, average: 110 pps
1418Finished total: 1882, success: 1882 (100.00%)
1419Mismatched domains: 4152 (61.56%), IDs: 0 (0.00%)
1420Failures: 0: 4.36%, 1: 7.01%, 2: 7.86%, 3: 7.86%, 4: 8.18%, 5: 7.33%, 6: 6.80%, 7: 3.99%, 8: 4.57%, 9: 3.99%, 10: 3.19%, 11: 4.57%, 12: 3.51%, 13: 3.24%, 14: 1.81%, 15: 2.92%, 16: 1.75%, 17: 2.28%, 18: 2.28%, 19: 1.59%, 20: 1.01%, 21: 1.17%, 22: 0.90%, 23: 0.80%, 24: 0.64%, 25: 0.69%, 26: 0.48%, 27: 0.80%, 28: 0.58%, 29: 0.37%, 30: 0.80%, 31: 0.43%, 32: 0.85%, 33: 2.18%, 34: 1.01%, 35: 0.16%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1421Response: | Success: | Total:
1422OK: | 174 ( 9.25%) | 424 ( 6.29%)
1423NXDOMAIN: | 1599 ( 84.96%) | 4179 ( 61.96%)
1424SERVFAIL: | 109 ( 5.79%) | 283 ( 4.20%)
1425REFUSED: | 0 ( 0.00%) | 1858 ( 27.55%)
1426FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1427
1428
1429
1430Processed queries: 1919
1431Received packets: 7212
1432Progress: 100.00% (00 h 00 min 18 sec / 00 h 00 min 18 sec)
1433Current incoming rate: 424 pps, average: 399 pps
1434Current success rate: 29 pps, average: 106 pps
1435Finished total: 1912, success: 1912 (100.00%)
1436Mismatched domains: 4537 (63.29%), IDs: 0 (0.00%)
1437Failures: 0: 4.29%, 1: 6.90%, 2: 7.74%, 3: 7.74%, 4: 8.05%, 5: 7.22%, 6: 6.69%, 7: 3.92%, 8: 4.50%, 9: 3.92%, 10: 3.14%, 11: 4.50%, 12: 3.45%, 13: 3.19%, 14: 1.78%, 15: 2.88%, 16: 1.73%, 17: 2.25%, 18: 2.25%, 19: 1.57%, 20: 0.99%, 21: 1.15%, 22: 0.89%, 23: 0.78%, 24: 0.63%, 25: 0.68%, 26: 0.47%, 27: 0.78%, 28: 0.58%, 29: 0.37%, 30: 0.78%, 31: 0.42%, 32: 0.84%, 33: 1.15%, 34: 0.68%, 35: 1.05%, 36: 0.42%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1438Response: | Success: | Total:
1439OK: | 177 ( 9.26%) | 443 ( 6.18%)
1440NXDOMAIN: | 1625 ( 84.99%) | 4449 ( 62.06%)
1441SERVFAIL: | 110 ( 5.75%) | 301 ( 4.20%)
1442REFUSED: | 0 ( 0.00%) | 1975 ( 27.55%)
1443FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1444
1445
1446
1447Processed queries: 1919
1448Received packets: 7592
1449Progress: 100.00% (00 h 00 min 19 sec / 00 h 00 min 19 sec)
1450Current incoming rate: 379 pps, average: 398 pps
1451Current success rate: 5 pps, average: 100 pps
1452Finished total: 1918, success: 1918 (100.00%)
1453Mismatched domains: 4910 (65.04%), IDs: 0 (0.00%)
1454Failures: 0: 4.28%, 1: 6.88%, 2: 7.72%, 3: 7.72%, 4: 8.03%, 5: 7.19%, 6: 6.67%, 7: 3.91%, 8: 4.48%, 9: 3.91%, 10: 3.13%, 11: 4.48%, 12: 3.44%, 13: 3.18%, 14: 1.77%, 15: 2.87%, 16: 1.72%, 17: 2.24%, 18: 2.24%, 19: 1.56%, 20: 0.99%, 21: 1.15%, 22: 0.89%, 23: 0.78%, 24: 0.63%, 25: 0.68%, 26: 0.47%, 27: 0.78%, 28: 0.57%, 29: 0.36%, 30: 0.78%, 31: 0.42%, 32: 0.83%, 33: 1.15%, 34: 0.68%, 35: 0.83%, 36: 0.47%, 37: 0.10%, 38: 0.05%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1455Response: | Success: | Total:
1456OK: | 177 ( 9.23%) | 466 ( 6.17%)
1457NXDOMAIN: | 1631 ( 85.04%) | 4693 ( 62.17%)
1458SERVFAIL: | 110 ( 5.74%) | 311 ( 4.12%)
1459REFUSED: | 0 ( 0.00%) | 2078 ( 27.53%)
1460FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1461
1462
1463
1464Processed queries: 1919
1465Received packets: 7997
1466Progress: 100.00% (00 h 00 min 20 sec / 00 h 00 min 20 sec)
1467Current incoming rate: 404 pps, average: 399 pps
1468Current success rate: 0 pps, average: 95 pps
1469Finished total: 1918, success: 1918 (100.00%)
1470Mismatched domains: 5313 (66.81%), IDs: 0 (0.00%)
1471Failures: 0: 4.28%, 1: 6.88%, 2: 7.72%, 3: 7.72%, 4: 8.03%, 5: 7.19%, 6: 6.67%, 7: 3.91%, 8: 4.48%, 9: 3.91%, 10: 3.13%, 11: 4.48%, 12: 3.44%, 13: 3.18%, 14: 1.77%, 15: 2.87%, 16: 1.72%, 17: 2.24%, 18: 2.24%, 19: 1.56%, 20: 0.99%, 21: 1.15%, 22: 0.89%, 23: 0.78%, 24: 0.63%, 25: 0.68%, 26: 0.47%, 27: 0.78%, 28: 0.57%, 29: 0.36%, 30: 0.78%, 31: 0.42%, 32: 0.83%, 33: 1.15%, 34: 0.68%, 35: 0.83%, 36: 0.47%, 37: 0.05%, 38: 0.05%, 39: 0.05%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1472Response: | Success: | Total:
1473OK: | 177 ( 9.23%) | 487 ( 6.12%)
1474NXDOMAIN: | 1631 ( 85.04%) | 4949 ( 62.24%)
1475SERVFAIL: | 110 ( 5.74%) | 329 ( 4.14%)
1476REFUSED: | 0 ( 0.00%) | 2185 ( 27.48%)
1477FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1478
1479
1480
1481Processed queries: 1919
1482Received packets: 8352
1483Progress: 100.00% (00 h 00 min 21 sec / 00 h 00 min 21 sec)
1484Current incoming rate: 354 pps, average: 396 pps
1485Current success rate: 0 pps, average: 91 pps
1486Finished total: 1918, success: 1918 (100.00%)
1487Mismatched domains: 5665 (68.22%), IDs: 0 (0.00%)
1488Failures: 0: 4.28%, 1: 6.88%, 2: 7.72%, 3: 7.72%, 4: 8.03%, 5: 7.19%, 6: 6.67%, 7: 3.91%, 8: 4.48%, 9: 3.91%, 10: 3.13%, 11: 4.48%, 12: 3.44%, 13: 3.18%, 14: 1.77%, 15: 2.87%, 16: 1.72%, 17: 2.24%, 18: 2.24%, 19: 1.56%, 20: 0.99%, 21: 1.15%, 22: 0.89%, 23: 0.78%, 24: 0.63%, 25: 0.68%, 26: 0.47%, 27: 0.78%, 28: 0.57%, 29: 0.36%, 30: 0.78%, 31: 0.42%, 32: 0.83%, 33: 1.15%, 34: 0.68%, 35: 0.83%, 36: 0.47%, 37: 0.05%, 38: 0.05%, 39: 0.00%, 40: 0.00%, 41: 0.05%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1489Response: | Success: | Total:
1490OK: | 177 ( 9.23%) | 516 ( 6.21%)
1491NXDOMAIN: | 1631 ( 85.04%) | 5166 ( 62.21%)
1492SERVFAIL: | 110 ( 5.74%) | 343 ( 4.13%)
1493REFUSED: | 0 ( 0.00%) | 2277 ( 27.42%)
1494FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1495
1496
1497
1498Processed queries: 1919
1499Received packets: 8379
1500Progress: 100.00% (00 h 00 min 22 sec / 00 h 00 min 22 sec)
1501Current incoming rate: 26 pps, average: 380 pps
1502Current success rate: 0 pps, average: 87 pps
1503Finished total: 1918, success: 1918 (100.00%)
1504Mismatched domains: 5692 (68.32%), IDs: 0 (0.00%)
1505Failures: 0: 4.28%, 1: 6.88%, 2: 7.72%, 3: 7.72%, 4: 8.03%, 5: 7.19%, 6: 6.67%, 7: 3.91%, 8: 4.48%, 9: 3.91%, 10: 3.13%, 11: 4.48%, 12: 3.44%, 13: 3.18%, 14: 1.77%, 15: 2.87%, 16: 1.72%, 17: 2.24%, 18: 2.24%, 19: 1.56%, 20: 0.99%, 21: 1.15%, 22: 0.89%, 23: 0.78%, 24: 0.63%, 25: 0.68%, 26: 0.47%, 27: 0.78%, 28: 0.57%, 29: 0.36%, 30: 0.78%, 31: 0.42%, 32: 0.83%, 33: 1.15%, 34: 0.68%, 35: 0.83%, 36: 0.47%, 37: 0.05%, 38: 0.05%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.05%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1506Response: | Success: | Total:
1507OK: | 177 ( 9.23%) | 516 ( 6.19%)
1508NXDOMAIN: | 1631 ( 85.04%) | 5181 ( 62.19%)
1509SERVFAIL: | 110 ( 5.74%) | 343 ( 4.12%)
1510REFUSED: | 0 ( 0.00%) | 2289 ( 27.48%)
1511FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1512
1513
1514
1515Processed queries: 1919
1516Received packets: 8386
1517Progress: 100.00% (00 h 00 min 23 sec / 00 h 00 min 23 sec)
1518Current incoming rate: 6 pps, average: 363 pps
1519Current success rate: 0 pps, average: 83 pps
1520Finished total: 1918, success: 1918 (100.00%)
1521Mismatched domains: 5699 (68.35%), IDs: 0 (0.00%)
1522Failures: 0: 4.28%, 1: 6.88%, 2: 7.72%, 3: 7.72%, 4: 8.03%, 5: 7.19%, 6: 6.67%, 7: 3.91%, 8: 4.48%, 9: 3.91%, 10: 3.13%, 11: 4.48%, 12: 3.44%, 13: 3.18%, 14: 1.77%, 15: 2.87%, 16: 1.72%, 17: 2.24%, 18: 2.24%, 19: 1.56%, 20: 0.99%, 21: 1.15%, 22: 0.89%, 23: 0.78%, 24: 0.63%, 25: 0.68%, 26: 0.47%, 27: 0.78%, 28: 0.57%, 29: 0.36%, 30: 0.78%, 31: 0.42%, 32: 0.83%, 33: 1.15%, 34: 0.68%, 35: 0.83%, 36: 0.47%, 37: 0.05%, 38: 0.05%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.05%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1523Response: | Success: | Total:
1524OK: | 177 ( 9.23%) | 516 ( 6.19%)
1525NXDOMAIN: | 1631 ( 85.04%) | 5185 ( 62.19%)
1526SERVFAIL: | 110 ( 5.74%) | 345 ( 4.14%)
1527REFUSED: | 0 ( 0.00%) | 2290 ( 27.46%)
1528FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1529
1530
1531
1532Processed queries: 1919
1533Received packets: 8387
1534Progress: 100.00% (00 h 00 min 24 sec / 00 h 00 min 24 sec)
1535Current incoming rate: 0 pps, average: 348 pps
1536Current success rate: 0 pps, average: 79 pps
1537Finished total: 1918, success: 1918 (100.00%)
1538Mismatched domains: 5700 (68.35%), IDs: 0 (0.00%)
1539Failures: 0: 4.28%, 1: 6.88%, 2: 7.72%, 3: 7.72%, 4: 8.03%, 5: 7.19%, 6: 6.67%, 7: 3.91%, 8: 4.48%, 9: 3.91%, 10: 3.13%, 11: 4.48%, 12: 3.44%, 13: 3.18%, 14: 1.77%, 15: 2.87%, 16: 1.72%, 17: 2.24%, 18: 2.24%, 19: 1.56%, 20: 0.99%, 21: 1.15%, 22: 0.89%, 23: 0.78%, 24: 0.63%, 25: 0.68%, 26: 0.47%, 27: 0.78%, 28: 0.57%, 29: 0.36%, 30: 0.78%, 31: 0.42%, 32: 0.83%, 33: 1.15%, 34: 0.68%, 35: 0.83%, 36: 0.47%, 37: 0.05%, 38: 0.05%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.05%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1540Response: | Success: | Total:
1541OK: | 177 ( 9.23%) | 516 ( 6.19%)
1542NXDOMAIN: | 1631 ( 85.04%) | 5186 ( 62.19%)
1543SERVFAIL: | 110 ( 5.74%) | 345 ( 4.14%)
1544REFUSED: | 0 ( 0.00%) | 2290 ( 27.46%)
1545FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1546
1547
1548
1549Processed queries: 1919
1550Received packets: 8395
1551Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
1552Current incoming rate: 7 pps, average: 335 pps
1553Current success rate: 0 pps, average: 76 pps
1554Finished total: 1918, success: 1918 (100.00%)
1555Mismatched domains: 5708 (68.38%), IDs: 0 (0.00%)
1556Failures: 0: 4.28%, 1: 6.88%, 2: 7.72%, 3: 7.72%, 4: 8.03%, 5: 7.19%, 6: 6.67%, 7: 3.91%, 8: 4.48%, 9: 3.91%, 10: 3.13%, 11: 4.48%, 12: 3.44%, 13: 3.18%, 14: 1.77%, 15: 2.87%, 16: 1.72%, 17: 2.24%, 18: 2.24%, 19: 1.56%, 20: 0.99%, 21: 1.15%, 22: 0.89%, 23: 0.78%, 24: 0.63%, 25: 0.68%, 26: 0.47%, 27: 0.78%, 28: 0.57%, 29: 0.36%, 30: 0.78%, 31: 0.42%, 32: 0.83%, 33: 1.15%, 34: 0.68%, 35: 0.83%, 36: 0.47%, 37: 0.05%, 38: 0.05%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.05%, 50: 0.00%,
1557Response: | Success: | Total:
1558OK: | 177 ( 9.23%) | 517 ( 6.19%)
1559NXDOMAIN: | 1631 ( 85.04%) | 5190 ( 62.18%)
1560SERVFAIL: | 110 ( 5.74%) | 348 ( 4.17%)
1561REFUSED: | 0 ( 0.00%) | 2290 ( 27.44%)
1562FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1563
1564
1565
1566Processed queries: 1919
1567Received packets: 8395
1568Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
1569Current incoming rate: 0 pps, average: 334 pps
1570Current success rate: 0 pps, average: 76 pps
1571Finished total: 1919, success: 1918 (99.95%)
1572Mismatched domains: 5708 (68.38%), IDs: 0 (0.00%)
1573Failures: 0: 4.27%, 1: 6.88%, 2: 7.71%, 3: 7.71%, 4: 8.03%, 5: 7.19%, 6: 6.67%, 7: 3.91%, 8: 4.48%, 9: 3.91%, 10: 3.13%, 11: 4.48%, 12: 3.44%, 13: 3.18%, 14: 1.77%, 15: 2.87%, 16: 1.72%, 17: 2.24%, 18: 2.24%, 19: 1.56%, 20: 0.99%, 21: 1.15%, 22: 0.89%, 23: 0.78%, 24: 0.63%, 25: 0.68%, 26: 0.47%, 27: 0.78%, 28: 0.57%, 29: 0.36%, 30: 0.78%, 31: 0.42%, 32: 0.83%, 33: 1.15%, 34: 0.68%, 35: 0.83%, 36: 0.47%, 37: 0.05%, 38: 0.05%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.05%,
1574Response: | Success: | Total:
1575OK: | 177 ( 9.23%) | 517 ( 6.19%)
1576NXDOMAIN: | 1631 ( 85.04%) | 5190 ( 62.18%)
1577SERVFAIL: | 110 ( 5.74%) | 348 ( 4.17%)
1578REFUSED: | 0 ( 0.00%) | 2290 ( 27.44%)
1579FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1580www.actforamerica.org
158135.153.8.200
1582#####################################################################################################################################
1583[+] www.actforamerica.org has no SPF record!
1584[*] No DMARC record found. Looking for organizational record
1585[*] Found organizational DMARC record:
1586[*] v=DMARC1; p=none; rua=mailto:1c000982@mxtoolbox.dmarc-report.com; ruf=mailto:1c000982@forensics.dmarc-report.com; sp=none; fo=1; adkim=r; aspf=r
1587[+] Organizational subdomain policy set to none
1588[+] Spoofing possible for www.actforamerica.org!
1589######################################################################################################################################
1590Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 17:22 EDT
1591Nmap scan report for www.actforamerica.org (35.153.8.200)
1592Host is up (0.25s latency).
1593rDNS record for 35.153.8.200: ec2-35-153-8-200.compute-1.amazonaws.com
1594Not shown: 994 filtered ports, 4 closed ports
1595Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1596PORT STATE SERVICE
159780/tcp open http
1598443/tcp open https
1599
1600Nmap done: 1 IP address (1 host up) scanned in 17.07 seconds
1601######################################################################################################################################
1602Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 17:22 EDT
1603Nmap scan report for www.actforamerica.org (35.153.8.200)
1604Host is up (0.29s latency).
1605rDNS record for 35.153.8.200: ec2-35-153-8-200.compute-1.amazonaws.com
1606Not shown: 2 filtered ports
1607PORT STATE SERVICE
160853/udp open|filtered domain
160967/udp open|filtered dhcps
161068/udp open|filtered dhcpc
161169/udp open|filtered tftp
161288/udp open|filtered kerberos-sec
1613123/udp open|filtered ntp
1614139/udp open|filtered netbios-ssn
1615161/udp open|filtered snmp
1616162/udp open|filtered snmptrap
1617389/udp open|filtered ldap
1618500/udp open|filtered isakmp
1619520/udp open|filtered route
16202049/udp open|filtered nfs
1621
1622Nmap done: 1 IP address (1 host up) scanned in 6.52 seconds
1623######################################################################################################################################
1624HTTP/1.1 301 Moved Permanently
1625Date: Thu, 24 Oct 2019 21:23:03 GMT
1626Server: Apache/2.4.18 (Ubuntu)
1627Location: https://www.actforamerica.org/
1628Content-Type: text/html; charset=iso-8859-1
1629######################################################################################################################################
1630/>
1631./faq
1632//html5shim.googlecode.com/svn/trunk/html5.js
1633https://fonts.googleapis.com/css?family=Roboto:300,300i,400,400i,500,500i,700,700i,900,900i
1634https://twitter.com/ACTforAmerica
1635https://www.actforamerica.org
1636https://www.actforamerica.org/modules/comment/comment.css?pzqepo
1637https://www.actforamerica.org/modules/field/theme/field.css?pzqepo
1638https://www.actforamerica.org/modules/forum/forum.css?pzqepo
1639https://www.actforamerica.org/modules/node/node.css?pzqepo
1640https://www.actforamerica.org/modules/poll/poll.css?pzqepo
1641https://www.actforamerica.org/modules/system/system.base.css?pzqepo
1642https://www.actforamerica.org/modules/system/system.menus.css?pzqepo
1643https://www.actforamerica.org/modules/system/system.messages.css?pzqepo
1644https://www.actforamerica.org/modules/system/system.theme.css?pzqepo
1645https://www.actforamerica.org/modules/user/user.css?pzqepo
1646https://www.actforamerica.org/policy
1647https://www.actforamerica.org/search-page
1648https://www.actforamerica.org/sites/all/custom_ext/org.civicrm.shoreditch/css/custom-civicrm.css?pzqepo
1649https://www.actforamerica.org/sites/all/libraries/colorbox/example1/colorbox.css?pzqepo
1650https://www.actforamerica.org/sites/all/libraries/flexslider/flexslider.css?pzqepo
1651https://www.actforamerica.org/sites/all/modules/cctags/cctags.css?pzqepo
1652https://www.actforamerica.org/sites/all/modules/civicrm/css/civicrm.css?pzqepo
1653https://www.actforamerica.org/sites/all/modules/civicrm/css/crm-i.css?pzqepo
1654https://www.actforamerica.org/sites/all/modules/contrib/ckeditor/css/ckeditor.css?pzqepo
1655https://www.actforamerica.org/sites/all/modules/contrib/esign/css/esign.css?pzqepo
1656https://www.actforamerica.org/sites/all/modules/contrib/field_hidden/field_hidden.css?pzqepo
1657https://www.actforamerica.org/sites/all/modules/contrib/logintoboggan/logintoboggan.css?pzqepo
1658https://www.actforamerica.org/sites/all/modules/ctools/css/ctools.css?pzqepo
1659https://www.actforamerica.org/sites/all/modules/date/date_api/date.css?pzqepo
1660https://www.actforamerica.org/sites/all/modules/dismiss/css/dismiss.base.css?pzqepo
1661https://www.actforamerica.org/sites/all/modules/flexslider/assets/css/flexslider_img.css?pzqepo
1662https://www.actforamerica.org/sites/all/modules/panels/css/panels.css?pzqepo
1663https://www.actforamerica.org/sites/all/modules/panels/plugins/layouts/flexible/flexible.css?pzqepo
1664https://www.actforamerica.org/sites/all/modules/tipsy/stylesheets/tipsy.css?pzqepo
1665https://www.actforamerica.org/sites/all/modules/tm_font_awesome/css/font-awesome.css?pzqepo
1666https://www.actforamerica.org/sites/all/modules/ubercart/uc_file/uc_file.css?pzqepo
1667https://www.actforamerica.org/sites/all/modules/ubercart/uc_order/uc_order.css?pzqepo
1668https://www.actforamerica.org/sites/all/modules/ubercart/uc_product/uc_product.css?pzqepo
1669https://www.actforamerica.org/sites/all/modules/ubercart/uc_store/uc_store.css?pzqepo
1670https://www.actforamerica.org/sites/all/modules/views/css/views.css?pzqepo
1671https://www.actforamerica.org/sites/all/themes/theme1008/css/boilerplate.css?pzqepo
1672https://www.actforamerica.org/sites/all/themes/theme1008/css/custom.css?pzqepo
1673https://www.actforamerica.org/sites/all/themes/theme1008/css/maintenance-page.css?pzqepo
1674https://www.actforamerica.org/sites/all/themes/theme1008/css/skeleton.css?pzqepo
1675https://www.actforamerica.org/sites/all/themes/theme1008/css/style.css?pzqepo
1676https://www.actforamerica.org/sites/default/files/act_logo1_0.png
1677https://www.actforamerica.org/sites/default/files/ctools/css/2af122ee5a52d2af15d667bdd60e700e.css?pzqepo
1678https://www.actforamerica.org/termsofservice
1679https://www.facebook.com/actforamerica
1680https://www.googletagmanager.com/gtag/js?id=UA-124850613-1
1681https://www.googletagmanager.com/ns.html?id=GTM-5PK789R
1682https://www.youtube.com/user/act4america
1683<script src='/sites/all/modules/jquery_update/replace/jquery/1.10/jquery.min.js'>\x3C/script>
1684/sites/all/themes/theme1008/images/act_logo.png
1685//storage.ie6countdown.com/assets/100/images/banners/warning_bar_0000_us.jpg
1686text/css
1687text/javascript
1688//windows.microsoft.com/en-US/internet-explorer/products/ie/home?ocid=ie6_countdown_bannercode
1689######################################################################################################################################
1690http://www.actforamerica.org [301 Moved Permanently] Apache[2.4.18], Country[UNITED STATES][US], HTTPServer[Ubuntu Linux][Apache/2.4.18 (Ubuntu)], IP[35.153.8.200], RedirectLocation[https://www.actforamerica.org/], Title[301 Moved Permanently]
1691https://www.actforamerica.org/ [200 OK] Apache[2.4.18], Content-Language[en], Cookies[SSESS586d7b686dbf38938d315f79815252f8], Country[UNITED STATES][US], Drupal, Frame, HTML5, HTTPServer[Ubuntu Linux][Apache/2.4.18 (Ubuntu)], HttpOnly[SSESS586d7b686dbf38938d315f79815252f8], IP[35.153.8.200], JQuery[1.10,1.10.2], MetaGenerator[Drupal 7 (http://drupal.org)], Script[text/javascript], Title[ActForAmerica | since 2000], UncommonHeaders[x-content-type-options,x-drupal-cache,x-generator], X-Frame-Options[SAMEORIGIN], YouTube
1692######################################################################################################################################
1693
1694wig - WebApp Information Gatherer
1695
1696
1697Scanning https://www.actforamerica.org...
1698_______________________________________ SITE INFO _______________________________________
1699IP Title
170035.153.8.200 ActForAmerica | since 2000
1701
1702________________________________________ VERSION ________________________________________
1703Name Versions Type
1704Drupal 7.41 | 7.42 | 7.43 | 7.44 | 7.50 CMS
1705Apache 2.4.18 Platform
1706jQuery 1.4.4 JavaScript
1707Ubuntu 16.04 OS
1708
1709______________________________________ INTERESTING ______________________________________
1710URL Note Type
1711/install.php Drupal installation file Interesting
1712/robots.txt robots.txt index Interesting
1713/install.php Installation file Interesting
1714
1715_________________________________________ TOOLS _________________________________________
1716Name Link Software
1717droopescan https://github.com/droope/droopescan Drupal
1718CMSmap https://github.com/Dionach/CMSmap Drupal
1719
1720____________________________________ VULNERABILITIES ____________________________________
1721Affected #Vulns Link
1722Drupal 7.41 8 http://cvedetails.com/version/192974
1723Drupal 7.42 7 http://cvedetails.com/version/192973
1724Drupal 7.43 2 http://cvedetails.com/version/201714
1725
1726_________________________________________________________________________________________
1727Time: 1.6 sec Urls: 462 Fingerprints: 40401
1728######################################################################################################################################
1729Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 17:24 EDT
1730NSE: Loaded 163 scripts for scanning.
1731NSE: Script Pre-scanning.
1732Initiating NSE at 17:24
1733Completed NSE at 17:24, 0.00s elapsed
1734Initiating NSE at 17:24
1735Completed NSE at 17:24, 0.00s elapsed
1736Initiating Parallel DNS resolution of 1 host. at 17:24
1737Completed Parallel DNS resolution of 1 host. at 17:24, 0.03s elapsed
1738Initiating SYN Stealth Scan at 17:24
1739Scanning www.actforamerica.org (35.153.8.200) [1 port]
1740Discovered open port 80/tcp on 35.153.8.200
1741Completed SYN Stealth Scan at 17:24, 0.28s elapsed (1 total ports)
1742Initiating Service scan at 17:24
1743Scanning 1 service on www.actforamerica.org (35.153.8.200)
1744Completed Service scan at 17:24, 6.53s elapsed (1 service on 1 host)
1745Initiating OS detection (try #1) against www.actforamerica.org (35.153.8.200)
1746Retrying OS detection (try #2) against www.actforamerica.org (35.153.8.200)
1747Initiating Traceroute at 17:25
1748Completed Traceroute at 17:25, 6.31s elapsed
1749Initiating Parallel DNS resolution of 11 hosts. at 17:25
1750Completed Parallel DNS resolution of 11 hosts. at 17:25, 0.39s elapsed
1751NSE: Script scanning 35.153.8.200.
1752Initiating NSE at 17:25
1753NSE: [http-wordpress-enum 35.153.8.200:80] got no answers from pipelined queries
1754Completed NSE at 17:27, 139.65s elapsed
1755Initiating NSE at 17:27
1756Completed NSE at 17:27, 2.00s elapsed
1757Nmap scan report for www.actforamerica.org (35.153.8.200)
1758Host is up (0.30s latency).
1759rDNS record for 35.153.8.200: ec2-35-153-8-200.compute-1.amazonaws.com
1760
1761PORT STATE SERVICE VERSION
176280/tcp open http Apache httpd 2.4.18
1763|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
1764| http-brute:
1765|_ Path "/" does not require authentication
1766|_http-chrono: Request times for /; avg: 7008.47ms; min: 1835.69ms; max: 16024.24ms
1767|_http-csrf: Couldn't find any CSRF vulnerabilities.
1768|_http-date: Thu, 24 Oct 2019 21:25:14 GMT; -22s from local time.
1769|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
1770|_http-dombased-xss: Couldn't find any DOM based XSS.
1771|_http-errors: Couldn't find any error pages.
1772|_http-feed: Couldn't find any feeds.
1773|_http-fetch: Please enter the complete path of the directory to save data in.
1774| http-headers:
1775| Date: Thu, 24 Oct 2019 21:25:14 GMT
1776| Server: Apache/2.4.18 (Ubuntu)
1777| Location: https://www.actforamerica.org/
1778| Content-Length: 325
1779| Connection: close
1780| Content-Type: text/html; charset=iso-8859-1
1781|
1782|_ (Request type: GET)
1783|_http-jsonp-detection: Couldn't find any JSONP endpoints.
1784| http-methods:
1785|_ Supported Methods: GET HEAD POST
1786|_http-mobileversion-checker: No mobile version detected.
1787|_http-security-headers:
1788| http-sitemap-generator:
1789| Directory structure:
1790| Longest directory structure:
1791| Depth: 0
1792| Dir: /
1793| Total files found (by extension):
1794|_
1795|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
1796|_http-title: Did not follow redirect to https://www.actforamerica.org/
1797| http-vhosts:
1798| 42 names had status 301
1799|_85 names had status ERROR
1800|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
1801|_http-xssed: No previously reported XSS vuln.
1802| vulners:
1803| cpe:/a:apache:http_server:2.4.18:
1804| CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
1805| CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
1806| CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
1807| CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
1808| CVE-2019-0211 7.2 https://vulners.com/cve/CVE-2019-0211
1809| CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
1810| CVE-2017-15715 6.8 https://vulners.com/cve/CVE-2017-15715
1811| CVE-2019-10082 6.4 https://vulners.com/cve/CVE-2019-10082
1812| CVE-2017-9788 6.4 https://vulners.com/cve/CVE-2017-9788
1813| CVE-2019-10098 5.8 https://vulners.com/cve/CVE-2019-10098
1814| CVE-2019-0220 5.0 https://vulners.com/cve/CVE-2019-0220
1815| CVE-2019-0196 5.0 https://vulners.com/cve/CVE-2019-0196
1816| CVE-2018-17199 5.0 https://vulners.com/cve/CVE-2018-17199
1817| CVE-2018-1333 5.0 https://vulners.com/cve/CVE-2018-1333
1818| CVE-2017-9798 5.0 https://vulners.com/cve/CVE-2017-9798
1819| CVE-2017-15710 5.0 https://vulners.com/cve/CVE-2017-15710
1820| CVE-2016-8743 5.0 https://vulners.com/cve/CVE-2016-8743
1821| CVE-2016-8740 5.0 https://vulners.com/cve/CVE-2016-8740
1822| CVE-2016-4979 5.0 https://vulners.com/cve/CVE-2016-4979
1823| CVE-2019-0197 4.9 https://vulners.com/cve/CVE-2019-0197
1824| CVE-2019-10092 4.3 https://vulners.com/cve/CVE-2019-10092
1825| CVE-2018-11763 4.3 https://vulners.com/cve/CVE-2018-11763
1826| CVE-2016-4975 4.3 https://vulners.com/cve/CVE-2016-4975
1827| CVE-2016-1546 4.3 https://vulners.com/cve/CVE-2016-1546
1828| CVE-2018-1283 3.5 https://vulners.com/cve/CVE-2018-1283
1829|_ CVE-2016-8612 3.3 https://vulners.com/cve/CVE-2016-8612
1830| vulscan: VulDB - https://vuldb.com:
1831| [88747] Apache HTTP Server 2.4.17/2.4.18 mod_http2 denial of service
1832| [76731] Apache HTTP Server 2.4.12 ErrorDocument 400 Crash denial of service
1833| [74367] Apache HTTP Server up to 2.4.12 mod_lua lua_request.c wsupgrade denial of service
1834| [68575] Apache HTTP Server up to 2.4.10 LuaAuthzProvider mod_lua.c privilege escalation
1835| [68435] Apache HTTP Server 2.4.10 mod_proxy_fcgi.c handle_headers denial of service
1836| [13300] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi setuid privilege escalation
1837| [13299] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi Content-Type Header information disclosure
1838| [136374] Apache HTTP Server up to 2.4.38 Slash Regular Expression unknown vulnerability
1839| [136373] Apache HTTP Server 2.4.34/2.4.35/2.4.36/2.4.37/2.4.38 HTTP2 Request Crash denial of service
1840| [136372] Apache HTTP Server up to 2.4.38 HTTP2 Request unknown vulnerability
1841| [133112] Apache HTTP Server up to 2.4.38 mod_auth_digest race condition privilege escalation
1842| [133111] Apache HTTP Server 2.4.37/2.4.38 mod_ssl Bypass privilege escalation
1843| [130341] Apache HTTP Server 2.4.37 mod_ssl Loop denial of service
1844| [130330] Apache HTTP Server up to 2.4.37 mod_session Expired privilege escalation
1845| [130329] Apache HTTP Server 2.4.37 mod_http2 Slowloris denial of service
1846| [124447] Apache HTTP Server up to 2.4.34 SETTINGS Frame denial of service
1847| [121910] Apache HTTP Server 2.4.33 mod_md HTTP Requests denial of service
1848| [122569] Apache HTTP Server up to 2.4.33 HTTP2 Request denial of service
1849| [115061] Apache HTTP Server up to 2.4.29 HTTP Digest Authentication Challenge HTTP Requests Replay privilege escalation
1850| [115060] Apache HTTP Server up to 2.4.29 mod_cache_socache Request Header Crash denial of service
1851| [115059] Apache HTTP Server up to 2.4.29 HTTP2 NULL Pointer Dereference denial of service
1852| [115058] Apache HTTP Server up to 2.4.29 HTTP Header Crash denial of service
1853| [115057] Apache HTTP Server up to 2.4.29 mod_session Variable Name Cache privilege escalation
1854| [115039] Apache HTTP Server up to 2.4.29 FilesMatch File Upload privilege escalation
1855| [114258] Apache HTTP Server up to 2.4.22 mod_cluster Segmentation Fault denial of service
1856| [104986] Apache CXF 2.4.5/2.5.1 WS-SP UsernameToken Policy SOAP Request weak authentication
1857| [103521] Apache HTTP Server 2.4.26 HTTP2 Free memory corruption
1858| [94627] Apache HTTP Server up to 2.4.24 mod_auth_digest Crash denial of service
1859| [94626] Apache HTTP Server up to 2.4.24 mod_session_crypto Padding weak encryption
1860| [94625] Apache HTTP Server up to 2.4.24 Response Split privilege escalation
1861| [93958] Apache HTTP Server up to 2.4.23 mod_http2 h2_stream.c denial of service
1862| [89669] Apache HTTP Server up to 2.4.23 RFC 3875 Namespace Conflict Environment Variable Open Redirect
1863| [88667] Apache HTTP Server up to 2.4.20 mod_http2 Certificate weak authentication
1864| [77083] Apache Groovy up to 2.4.3 MethodClosure.java MethodClosure memory corruption
1865| [76733] Apache HTTP Server 2.4.7/2.4.8/2.4.9/2.4.10/2.4.12 ap_some_auth_required unknown vulnerability
1866| [76732] Apache HTTP Server 2.4.7/2.4.8/2.4.9/2.4.10/2.4.12 Request apr_brigade_flatten privilege escalation
1867| [73106] Apache Hadoop up to 2.4.0 Symlink privilege escalation
1868| [67183] Apache HTTP Server up to 2.4.9 mod_proxy denial of service
1869| [67180] Apache HTTP Server up to 2.4.9 WinNT MPM Memory Leak denial of service
1870| [67185] Apache HTTP Server up to 2.4.9 mod_status Heap-Based memory corruption
1871| [67184] Apache HTTP Server 2.4.5/2.4.6 mod_cache NULL Pointer Dereference denial of service
1872| [67182] Apache HTTP Server up to 2.4.9 mod_deflate Memory Consumption denial of service
1873| [67181] Apache HTTP Server up to 2.4.9 mod_cgid denial of service
1874| [12667] Apache HTTP Server 2.4.7 mod_log_config.c log_cookie denial of service
1875| [9683] Apache HTTP Server 2.4.5 mod_session_dbd denial of service
1876| [7202] Apache HTTP Server 2.4.2 on Oracle Solaris ld_library_path cross site scripting
1877| [62417] Apache CXF 2.4.7/2.4.8/2.5.3/2.5.4/2.6.1 spoofing
1878| [6092] Apache HTTP Server 2.4.0/2.4.1/2.4.2 mod_proxy_ajp.c information disclosure
1879| [6090] Apache HTTP Server 2.4.0/2.4.1/2.4.2 mod_proxy_http.c information disclosure
1880| [9673] Apache HTTP Server up to 2.4.4 mod_dav mod_dav.c Request denial of service
1881|
1882| MITRE CVE - https://cve.mitre.org:
1883| [CVE-2013-2249] mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
1884| [CVE-2012-4558] Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
1885| [CVE-2012-3502] The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.
1886| [CVE-2012-3499] Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
1887| [CVE-2012-3451] Apache CXF before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote attackers to execute unintended web-service operations by sending a header with a SOAP Action String that is inconsistent with the message body.
1888| [CVE-2012-2687] Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
1889| [CVE-2012-2379] Apache CXF 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.
1890| [CVE-2012-2378] Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) EncryptedElements policies.
1891| [CVE-2012-0883] envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
1892| [CVE-2011-2516] Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
1893|
1894| SecurityFocus - https://www.securityfocus.com/bid/:
1895| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
1896| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
1897| [15413] PHP Apache 2 Virtual() Safe_Mode and Open_Basedir Restriction Bypass Vulnerability
1898| [15177] PHP Apache 2 Local Denial of Service Vulnerability
1899| [6065] Apache 2 WebDAV CGI POST Request Information Disclosure Vulnerability
1900| [5816] Apache 2 mod_dav Denial Of Service Vulnerability
1901| [5486] Apache 2.0 CGI Path Disclosure Vulnerability
1902| [5485] Apache 2.0 Path Disclosure Vulnerability
1903| [5434] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
1904| [5256] Apache httpd 2.0 CGI Error Path Disclosure Vulnerability
1905| [4057] Apache 2 for Windows OPTIONS request Path Disclosure Vulnerability
1906| [4056] Apache 2 for Windows php.exe Path Disclosure Vulnerability
1907|
1908| IBM X-Force - https://exchange.xforce.ibmcloud.com:
1909| [75211] Debian GNU/Linux apache 2 cross-site scripting
1910|
1911| Exploit-DB - https://www.exploit-db.com:
1912| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
1913| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
1914| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
1915| [28424] Apache 2.x HTTP Server Arbitrary HTTP Request Headers Security Weakness
1916| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
1917| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
1918| [27135] Apache Struts 2 DefaultActionMapper Prefixes OGNL Code Execution
1919| [26710] Apache CXF prior to 2.5.10, 2.6.7 and 2.7.4 - Denial of Service
1920| [24590] Apache 2.0.x mod_ssl Remote Denial of Service Vulnerability
1921| [23581] Apache 2.0.4x mod_perl Module File Descriptor Leakage Vulnerability
1922| [23482] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (2)
1923| [23481] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (1)
1924| [23296] Red Hat Apache 2.0.40 Directory Index Default Configuration Error
1925| [23282] apache cocoon 2.14/2.2 - Directory Traversal vulnerability
1926| [22191] Apache Web Server 2.0.x MS-DOS Device Name Denial of Service Vulnerability
1927| [21854] Apache 2.0.39/40 Oversized STDERR Buffer Denial of Service Vulnerability
1928| [21719] Apache 2.0 Path Disclosure Vulnerability
1929| [21697] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
1930| [20272] Apache 1.2.5/1.3.1,UnityMail 2.0 MIME Header DoS Vulnerability
1931| [19828] Cobalt RaQ 2.0/3.0 Apache .htaccess Disclosure Vulnerability
1932| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
1933| [18329] Apache Struts2 <= 2.3.1 - Multiple Vulnerabilities
1934| [17691] Apache Struts < 2.2.0 - Remote Command Execution
1935| [15319] Apache 2.2 (Windows) Local Denial of Service
1936| [14617] Apache JackRabbit 2.0.0 webapp XPath Injection
1937| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
1938| [8458] Apache Geronimo <= 2.1.3 - Multiple Directory Traversal Vulnerabilities
1939| [5330] Apache 2.0 mod_jk2 2.0.2 - Remote Buffer Overflow Exploit (win32)
1940| [3996] Apache 2.0.58 mod_rewrite Remote Overflow Exploit (win2k3)
1941| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
1942| [1056] Apache <= 2.0.49 Arbitrary Long HTTP Headers Denial of Service
1943| [855] Apache <= 2.0.52 HTTP GET request Denial of Service Exploit
1944| [132] Apache 1.3.x - 2.0.48 - mod_userdir Remote Users Disclosure Exploit
1945| [38] Apache <= 2.0.45 APR Remote Exploit -Apache-Knacker.pl
1946| [34] Webfroot Shoutbox < 2.32 (Apache) Remote Exploit
1947| [11] Apache <= 2.0.44 Linux Remote Denial of Service Exploit
1948| [9] Apache HTTP Server 2.x Memory Leak Exploit
1949|
1950| OpenVAS (Nessus) - http://www.openvas.org:
1951| [855524] Solaris Update for Apache 2 120544-14
1952| [855077] Solaris Update for Apache 2 120543-14
1953| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
1954| [72626] Debian Security Advisory DSA 2579-1 (apache2)
1955| [71551] Gentoo Security Advisory GLSA 201206-25 (apache)
1956| [71550] Gentoo Security Advisory GLSA 201206-24 (apache tomcat)
1957| [71485] Debian Security Advisory DSA 2506-1 (libapache-mod-security)
1958| [71256] Debian Security Advisory DSA 2452-1 (apache2)
1959| [71238] Debian Security Advisory DSA 2436-1 (libapache2-mod-fcgid)
1960| [70724] Debian Security Advisory DSA 2405-1 (apache2)
1961| [70235] Debian Security Advisory DSA 2298-2 (apache2)
1962| [70233] Debian Security Advisory DSA 2298-1 (apache2)
1963| [69988] Debian Security Advisory DSA 2279-1 (libapache2-mod-authnz-external)
1964| [69338] Debian Security Advisory DSA 2202-1 (apache2)
1965| [65131] SLES9: Security update for Apache 2 oes/CORE
1966| [64426] Gentoo Security Advisory GLSA 200907-04 (apache)
1967| [61381] Gentoo Security Advisory GLSA 200807-06 (apache)
1968| [60582] Gentoo Security Advisory GLSA 200803-19 (apache)
1969| [58745] Gentoo Security Advisory GLSA 200711-06 (apache)
1970| [57851] Gentoo Security Advisory GLSA 200608-01 (apache)
1971| [56246] Gentoo Security Advisory GLSA 200602-03 (Apache)
1972| [55392] Gentoo Security Advisory GLSA 200509-12 (Apache)
1973| [55129] Gentoo Security Advisory GLSA 200508-15 (apache)
1974| [54739] Gentoo Security Advisory GLSA 200411-18 (apache)
1975| [54724] Gentoo Security Advisory GLSA 200411-03 (apache)
1976| [54712] Gentoo Security Advisory GLSA 200410-21 (apache)
1977| [54689] Gentoo Security Advisory GLSA 200409-33 (net=www/apache)
1978| [54677] Gentoo Security Advisory GLSA 200409-21 (apache)
1979| [54610] Gentoo Security Advisory GLSA 200407-03 (Apache)
1980| [54601] Gentoo Security Advisory GLSA 200406-16 (Apache)
1981| [54590] Gentoo Security Advisory GLSA 200406-05 (Apache)
1982| [54582] Gentoo Security Advisory GLSA 200405-22 (Apache)
1983| [54529] Gentoo Security Advisory GLSA 200403-04 (Apache)
1984| [54499] Gentoo Security Advisory GLSA 200310-04 (Apache)
1985| [54498] Gentoo Security Advisory GLSA 200310-03 (Apache)
1986| [11092] Apache 2.0.39 Win32 directory traversal
1987| [66081] SLES11: Security update for Apache 2
1988| [66074] SLES10: Security update for Apache 2
1989| [66070] SLES9: Security update for Apache 2
1990| [65893] SLES10: Security update for Apache 2
1991| [65888] SLES10: Security update for Apache 2
1992| [65510] SLES9: Security update for Apache 2
1993| [65249] SLES9: Security update for Apache 2
1994| [65230] SLES9: Security update for Apache 2
1995| [65228] SLES9: Security update for Apache 2
1996| [65207] SLES9: Security update for Apache 2
1997| [65136] SLES9: Security update for Apache 2
1998| [65017] SLES9: Security update for Apache 2
1999|
2000| SecurityTracker - https://www.securitytracker.com:
2001| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
2002| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
2003| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
2004| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
2005| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
2006|
2007| OSVDB - http://www.osvdb.org:
2008| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
2009|_
2010Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2011Device type: general purpose|specialized|storage-misc
2012Running (JUST GUESSING): Linux 3.X (91%), Crestron 2-Series (87%), HP embedded (85%)
2013OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:crestron:2_series cpe:/h:hp:p2000_g3
2014Aggressive OS guesses: Linux 3.10 - 3.13 (91%), Crestron XPanel control system (87%), HP P2000 G3 NAS device (85%)
2015No exact OS matches for host (test conditions non-ideal).
2016Uptime guess: 22.754 days (since Tue Oct 1 23:22:27 2019)
2017Network Distance: 30 hops
2018TCP Sequence Prediction: Difficulty=260 (Good luck!)
2019IP ID Sequence Generation: All zeros
2020Service Info: Host: www.actforamerica.org
2021
2022TRACEROUTE (using port 80/tcp)
2023HOP RTT ADDRESS
20241 281.55 ms 10.234.204.1
20252 281.63 ms 45.131.4.3
20263 281.62 ms 109.236.95.224
20274 281.67 ms hu0-4-0-0.ccr21.ams04.atlas.cogentco.com (149.11.39.41)
20285 281.69 ms be3382.ccr41.lon13.atlas.cogentco.com (154.54.39.217)
20296 281.76 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
20307 402.84 ms be2317.ccr41.jfk02.atlas.cogentco.com (154.54.30.185)
20318 281.74 ms 38.140.107.42
20329 281.77 ms 38.140.107.42
203310 180.52 ms 52.93.4.14
203411 220.62 ms 52.93.4.46
203512 ... 29
203630 371.74 ms ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
2037
2038NSE: Script Post-scanning.
2039Initiating NSE at 17:27
2040Completed NSE at 17:27, 0.00s elapsed
2041Initiating NSE at 17:27
2042Completed NSE at 17:27, 0.00s elapsed
2043#####################################################################################################################################
2044------------------------------------------------------------------------------------------------------------------------
2045
2046[ ! ] Starting SCANNER INURLBR 2.1 at [24-10-2019 17:27:50]
2047[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
2048It is the end user's responsibility to obey all applicable local, state and federal laws.
2049Developers assume no liability and are not responsible for any misuse or damage caused by this program
2050
2051[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.actforamerica.org/output/inurlbr-www.actforamerica.org ]
2052[ INFO ][ DORK ]::[ site:www.actforamerica.org ]
2053[ INFO ][ SEARCHING ]:: {
2054[ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.gh ]
2055
2056[ INFO ][ SEARCHING ]::
2057-[:::]
2058[ INFO ][ ENGINE ]::[ GOOGLE API ]
2059
2060[ INFO ][ SEARCHING ]::
2061-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2062[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.om ID: 010479943387663786936:wjwf2xkhfmq ]
2063
2064[ INFO ][ SEARCHING ]::
2065-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2066
2067[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
2068
2069
2070 _[ - ]::--------------------------------------------------------------------------------------------------------------
2071|_[ + ] [ 0 / 100 ]-[17:28:09] [ - ]
2072|_[ + ] Target:: [ https://www.actforamerica.org/ ]
2073|_[ + ] Exploit::
2074|_[ + ] Information Server:: , , IP::0
2075|_[ + ] More details::
2076|_[ + ] Found:: UNIDENTIFIED
2077
2078 _[ - ]::--------------------------------------------------------------------------------------------------------------
2079|_[ + ] [ 1 / 100 ]-[17:28:09] [ - ]
2080|_[ + ] Target:: [ https://www.actforamerica.org/node/13281 ]
2081|_[ + ] Exploit::
2082|_[ + ] Information Server:: , , IP::0
2083|_[ + ] More details::
2084|_[ + ] Found:: UNIDENTIFIED
2085
2086 _[ - ]::--------------------------------------------------------------------------------------------------------------
2087|_[ + ] [ 2 / 100 ]-[17:28:10] [ - ]
2088|_[ + ] Target:: [ https://www.actforamerica.org/IL ]
2089|_[ + ] Exploit::
2090|_[ + ] Information Server:: , , IP::0
2091|_[ + ] More details::
2092|_[ + ] Found:: UNIDENTIFIED
2093
2094 _[ - ]::--------------------------------------------------------------------------------------------------------------
2095|_[ + ] [ 3 / 100 ]-[17:28:10] [ - ]
2096|_[ + ] Target:: [ https://www.actforamerica.org/longisland ]
2097|_[ + ] Exploit::
2098|_[ + ] Information Server:: , , IP::0
2099|_[ + ] More details::
2100|_[ + ] Found:: UNIDENTIFIED
2101
2102 _[ - ]::--------------------------------------------------------------------------------------------------------------
2103|_[ + ] [ 4 / 100 ]-[17:28:11] [ - ]
2104|_[ + ] Target:: [ https://www.actforamerica.org/videos ]
2105|_[ + ] Exploit::
2106|_[ + ] Information Server:: , , IP::0
2107|_[ + ] More details::
2108|_[ + ] Found:: UNIDENTIFIED
2109
2110 _[ - ]::--------------------------------------------------------------------------------------------------------------
2111|_[ + ] [ 5 / 100 ]-[17:28:11] [ - ]
2112|_[ + ] Target:: [ https://www.actforamerica.org/takeaction ]
2113|_[ + ] Exploit::
2114|_[ + ] Information Server:: , , IP::0
2115|_[ + ] More details::
2116|_[ + ] Found:: UNIDENTIFIED
2117
2118 _[ - ]::--------------------------------------------------------------------------------------------------------------
2119|_[ + ] [ 6 / 100 ]-[17:28:12] [ - ]
2120|_[ + ] Target:: [ https://www.actforamerica.org/highprioritylegislation ]
2121|_[ + ] Exploit::
2122|_[ + ] Information Server:: , , IP::0
2123|_[ + ] More details::
2124|_[ + ] Found:: UNIDENTIFIED
2125
2126 _[ - ]::--------------------------------------------------------------------------------------------------------------
2127|_[ + ] [ 7 / 100 ]-[17:28:12] [ - ]
2128|_[ + ] Target:: [ https://www.actforamerica.org/contact ]
2129|_[ + ] Exploit::
2130|_[ + ] Information Server:: , , IP::0
2131|_[ + ] More details::
2132|_[ + ] Found:: UNIDENTIFIED
2133
2134 _[ - ]::--------------------------------------------------------------------------------------------------------------
2135|_[ + ] [ 8 / 100 ]-[17:28:13] [ - ]
2136|_[ + ] Target:: [ https://www.actforamerica.org/bgbirthdaycard ]
2137|_[ + ] Exploit::
2138|_[ + ] Information Server:: , , IP::0
2139|_[ + ] More details::
2140|_[ + ] Found:: UNIDENTIFIED
2141
2142 _[ - ]::--------------------------------------------------------------------------------------------------------------
2143|_[ + ] [ 9 / 100 ]-[17:28:14] [ - ]
2144|_[ + ] Target:: [ https://www.actforamerica.org/termsofservice ]
2145|_[ + ] Exploit::
2146|_[ + ] Information Server:: , , IP::0
2147|_[ + ] More details::
2148|_[ + ] Found:: UNIDENTIFIED
2149
2150 _[ - ]::--------------------------------------------------------------------------------------------------------------
2151|_[ + ] [ 10 / 100 ]-[17:28:14] [ - ]
2152|_[ + ] Target:: [ https://www.actforamerica.org/oceanside ]
2153|_[ + ] Exploit::
2154|_[ + ] Information Server:: , , IP::0
2155|_[ + ] More details::
2156|_[ + ] Found:: UNIDENTIFIED
2157
2158 _[ - ]::--------------------------------------------------------------------------------------------------------------
2159|_[ + ] [ 11 / 100 ]-[17:28:15] [ - ]
2160|_[ + ] Target:: [ https://www.actforamerica.org/policy ]
2161|_[ + ] Exploit::
2162|_[ + ] Information Server:: , , IP::0
2163|_[ + ] More details::
2164|_[ + ] Found:: UNIDENTIFIED
2165
2166 _[ - ]::--------------------------------------------------------------------------------------------------------------
2167|_[ + ] [ 12 / 100 ]-[17:28:16] [ - ]
2168|_[ + ] Target:: [ https://www.actforamerica.org/mbpetition ]
2169|_[ + ] Exploit::
2170|_[ + ] Information Server:: , , IP::0
2171|_[ + ] More details::
2172|_[ + ] Found:: UNIDENTIFIED
2173
2174 _[ - ]::--------------------------------------------------------------------------------------------------------------
2175|_[ + ] [ 13 / 100 ]-[17:28:17] [ - ]
2176|_[ + ] Target:: [ https://www.actforamerica.org/legislation ]
2177|_[ + ] Exploit::
2178|_[ + ] Information Server:: , , IP::0
2179|_[ + ] More details::
2180|_[ + ] Found:: UNIDENTIFIED
2181
2182 _[ - ]::--------------------------------------------------------------------------------------------------------------
2183|_[ + ] [ 14 / 100 ]-[17:28:18] [ - ]
2184|_[ + ] Target:: [ https://www.actforamerica.org/faq ]
2185|_[ + ] Exploit::
2186|_[ + ] Information Server:: , , IP::0
2187|_[ + ] More details::
2188|_[ + ] Found:: UNIDENTIFIED
2189
2190 _[ - ]::--------------------------------------------------------------------------------------------------------------
2191|_[ + ] [ 15 / 100 ]-[17:28:19] [ - ]
2192|_[ + ] Target:: [ https://www.actforamerica.org/disclaimer ]
2193|_[ + ] Exploit::
2194|_[ + ] Information Server:: , , IP::0
2195|_[ + ] More details::
2196|_[ + ] Found:: UNIDENTIFIED
2197
2198 _[ - ]::--------------------------------------------------------------------------------------------------------------
2199|_[ + ] [ 16 / 100 ]-[17:28:20] [ - ]
2200|_[ + ] Target:: [ https://www.actforamerica.org/aboutbrigitte ]
2201|_[ + ] Exploit::
2202|_[ + ] Information Server:: , , IP::0
2203|_[ + ] More details::
2204|_[ + ] Found:: UNIDENTIFIED
2205
2206 _[ - ]::--------------------------------------------------------------------------------------------------------------
2207|_[ + ] [ 17 / 100 ]-[17:28:21] [ - ]
2208|_[ + ] Target:: [ https://www.actforamerica.org/pressreleases ]
2209|_[ + ] Exploit::
2210|_[ + ] Information Server:: , , IP::0
2211|_[ + ] More details::
2212|_[ + ] Found:: UNIDENTIFIED
2213
2214 _[ - ]::--------------------------------------------------------------------------------------------------------------
2215|_[ + ] [ 18 / 100 ]-[17:28:23] [ - ]
2216|_[ + ] Target:: [ https://www.actforamerica.org/orangecounty ]
2217|_[ + ] Exploit::
2218|_[ + ] Information Server:: , , IP::0
2219|_[ + ] More details::
2220|_[ + ] Found:: UNIDENTIFIED
2221
2222 _[ - ]::--------------------------------------------------------------------------------------------------------------
2223|_[ + ] [ 19 / 100 ]-[17:28:23] [ - ]
2224|_[ + ] Target:: [ https://www.actforamerica.org/happybirthdaypotus ]
2225|_[ + ] Exploit::
2226|_[ + ] Information Server:: , , IP::0
2227|_[ + ] More details::
2228|_[ + ] Found:: UNIDENTIFIED
2229
2230 _[ - ]::--------------------------------------------------------------------------------------------------------------
2231|_[ + ] [ 20 / 100 ]-[17:28:24] [ - ]
2232|_[ + ] Target:: [ https://www.actforamerica.org/socialsharing ]
2233|_[ + ] Exploit::
2234|_[ + ] Information Server:: , , IP::0
2235|_[ + ] More details::
2236|_[ + ] Found:: UNIDENTIFIED
2237
2238 _[ - ]::--------------------------------------------------------------------------------------------------------------
2239|_[ + ] [ 21 / 100 ]-[17:28:25] [ - ]
2240|_[ + ] Target:: [ https://www.actforamerica.org/about/ ]
2241|_[ + ] Exploit::
2242|_[ + ] Information Server:: , , IP::0
2243|_[ + ] More details::
2244|_[ + ] Found:: UNIDENTIFIED
2245
2246 _[ - ]::--------------------------------------------------------------------------------------------------------------
2247|_[ + ] [ 22 / 100 ]-[17:28:27] [ - ]
2248|_[ + ] Target:: [ https://www.actforamerica.org/rise ]
2249|_[ + ] Exploit::
2250|_[ + ] Information Server:: , , IP::0
2251|_[ + ] More details::
2252|_[ + ] Found:: UNIDENTIFIED
2253
2254 _[ - ]::--------------------------------------------------------------------------------------------------------------
2255|_[ + ] [ 23 / 100 ]-[17:28:27] [ - ]
2256|_[ + ] Target:: [ https://www.actforamerica.org/terrorism ]
2257|_[ + ] Exploit::
2258|_[ + ] Information Server:: , , IP::0
2259|_[ + ] More details::
2260|_[ + ] Found:: UNIDENTIFIED
2261
2262 _[ - ]::--------------------------------------------------------------------------------------------------------------
2263|_[ + ] [ 24 / 100 ]-[17:28:28] [ - ]
2264|_[ + ] Target:: [ https://www.actforamerica.org/immigration ]
2265|_[ + ] Exploit::
2266|_[ + ] Information Server:: , , IP::0
2267|_[ + ] More details::
2268|_[ + ] Found:: UNIDENTIFIED
2269
2270 _[ - ]::--------------------------------------------------------------------------------------------------------------
2271|_[ + ] [ 25 / 100 ]-[17:28:29] [ - ]
2272|_[ + ] Target:: [ https://www.actforamerica.org/campushatewatch ]
2273|_[ + ] Exploit::
2274|_[ + ] Information Server:: , , IP::0
2275|_[ + ] More details::
2276|_[ + ] Found:: UNIDENTIFIED
2277
2278 _[ - ]::--------------------------------------------------------------------------------------------------------------
2279|_[ + ] [ 26 / 100 ]-[17:28:31] [ - ]
2280|_[ + ] Target:: [ https://www.actforamerica.org/israel ]
2281|_[ + ] Exploit::
2282|_[ + ] Information Server:: , , IP::0
2283|_[ + ] More details::
2284|_[ + ] Found:: UNIDENTIFIED
2285
2286 _[ - ]::--------------------------------------------------------------------------------------------------------------
2287|_[ + ] [ 27 / 100 ]-[17:28:31] [ - ]
2288|_[ + ] Target:: [ https://www.actforamerica.org/splc ]
2289|_[ + ] Exploit::
2290|_[ + ] Information Server:: , , IP::0
2291|_[ + ] More details::
2292|_[ + ] Found:: UNIDENTIFIED
2293
2294 _[ - ]::--------------------------------------------------------------------------------------------------------------
2295|_[ + ] [ 28 / 100 ]-[17:28:32] [ - ]
2296|_[ + ] Target:: [ https://www.actforamerica.org/criticalinfrastructure ]
2297|_[ + ] Exploit::
2298|_[ + ] Information Server:: , , IP::0
2299|_[ + ] More details::
2300|_[ + ] Found:: UNIDENTIFIED
2301
2302 _[ - ]::--------------------------------------------------------------------------------------------------------------
2303|_[ + ] [ 29 / 100 ]-[17:28:33] [ - ]
2304|_[ + ] Target:: [ https://www.actforamerica.org/aboutact ]
2305|_[ + ] Exploit::
2306|_[ + ] Information Server:: , , IP::0
2307|_[ + ] More details::
2308|_[ + ] Found:: UNIDENTIFIED
2309
2310 _[ - ]::--------------------------------------------------------------------------------------------------------------
2311|_[ + ] [ 30 / 100 ]-[17:28:34] [ - ]
2312|_[ + ] Target:: [ https://www.actforamerica.org/constitutionalfreedoms ]
2313|_[ + ] Exploit::
2314|_[ + ] Information Server:: , , IP::0
2315|_[ + ] More details::
2316|_[ + ] Found:: UNIDENTIFIED
2317
2318 _[ - ]::--------------------------------------------------------------------------------------------------------------
2319|_[ + ] [ 31 / 100 ]-[17:28:35] [ - ]
2320|_[ + ] Target:: [ https://www.actforamerica.org/militaryandlawenforcement ]
2321|_[ + ] Exploit::
2322|_[ + ] Information Server:: , , IP::0
2323|_[ + ] More details::
2324|_[ + ] Found:: UNIDENTIFIED
2325
2326 _[ - ]::--------------------------------------------------------------------------------------------------------------
2327|_[ + ] [ 32 / 100 ]-[17:28:36] [ - ]
2328|_[ + ] Target:: [ https://www.actforamerica.org/confirmkavanaugh ]
2329|_[ + ] Exploit::
2330|_[ + ] Information Server:: , , IP::0
2331|_[ + ] More details::
2332|_[ + ] Found:: UNIDENTIFIED
2333
2334 _[ - ]::--------------------------------------------------------------------------------------------------------------
2335|_[ + ] [ 33 / 100 ]-[17:28:37] [ - ]
2336|_[ + ] Target:: [ https://www.actforamerica.org/mission ]
2337|_[ + ] Exploit::
2338|_[ + ] Information Server:: , , IP::0
2339|_[ + ] More details::
2340|_[ + ] Found:: UNIDENTIFIED
2341
2342 _[ - ]::--------------------------------------------------------------------------------------------------------------
2343|_[ + ] [ 34 / 100 ]-[17:28:38] [ - ]
2344|_[ + ] Target:: [ https://www.actforamerica.org/user ]
2345|_[ + ] Exploit::
2346|_[ + ] Information Server:: , , IP::0
2347|_[ + ] More details::
2348|_[ + ] Found:: UNIDENTIFIED
2349
2350 _[ - ]::--------------------------------------------------------------------------------------------------------------
2351|_[ + ] [ 35 / 100 ]-[17:28:40] [ - ]
2352|_[ + ] Target:: [ https://www.actforamerica.org/accomplishments ]
2353|_[ + ] Exploit::
2354|_[ + ] Information Server:: , , IP::0
2355|_[ + ] More details::
2356|_[ + ] Found:: UNIDENTIFIED
2357
2358 _[ - ]::--------------------------------------------------------------------------------------------------------------
2359|_[ + ] [ 36 / 100 ]-[17:28:40] [ - ]
2360|_[ + ] Target:: [ https://www.actforamerica.org/cart ]
2361|_[ + ] Exploit::
2362|_[ + ] Information Server:: , , IP::0
2363|_[ + ] More details::
2364|_[ + ] Found:: UNIDENTIFIED
2365
2366 _[ - ]::--------------------------------------------------------------------------------------------------------------
2367|_[ + ] [ 37 / 100 ]-[17:28:41] [ - ]
2368|_[ + ] Target:: [ https://www.actforamerica.org/issues ]
2369|_[ + ] Exploit::
2370|_[ + ] Information Server:: , , IP::0
2371|_[ + ] More details::
2372|_[ + ] Found:: UNIDENTIFIED
2373
2374 _[ - ]::--------------------------------------------------------------------------------------------------------------
2375|_[ + ] [ 38 / 100 ]-[17:28:42] [ - ]
2376|_[ + ] Target:: [ https://www.actforamerica.org/action/cairhyatt ]
2377|_[ + ] Exploit::
2378|_[ + ] Information Server:: , , IP::0
2379|_[ + ] More details::
2380|_[ + ] Found:: UNIDENTIFIED
2381
2382 _[ - ]::--------------------------------------------------------------------------------------------------------------
2383|_[ + ] [ 39 / 100 ]-[17:28:43] [ - ]
2384|_[ + ] Target:: [ https://www.actforamerica.org/pressreleases/eventbrite_attacks ]
2385|_[ + ] Exploit::
2386|_[ + ] Information Server:: , , IP::0
2387|_[ + ] More details::
2388|_[ + ] Found:: UNIDENTIFIED
2389
2390 _[ - ]::--------------------------------------------------------------------------------------------------------------
2391|_[ + ] [ 40 / 100 ]-[17:28:44] [ - ]
2392|_[ + ] Target:: [ https://www.actforamerica.org/action/nopromiseact ]
2393|_[ + ] Exploit::
2394|_[ + ] Information Server:: , , IP::0
2395|_[ + ] More details::
2396|_[ + ] Found:: UNIDENTIFIED
2397
2398 _[ - ]::--------------------------------------------------------------------------------------------------------------
2399|_[ + ] [ 41 / 100 ]-[17:28:45] [ - ]
2400|_[ + ] Target:: [ https://www.actforamerica.org/action/seattleschooldistrict ]
2401|_[ + ] Exploit::
2402|_[ + ] Information Server:: , , IP::0
2403|_[ + ] More details::
2404|_[ + ] Found:: UNIDENTIFIED
2405
2406 _[ - ]::--------------------------------------------------------------------------------------------------------------
2407|_[ + ] [ 42 / 100 ]-[17:28:46] [ - ]
2408|_[ + ] Target:: [ https://www.actforamerica.org/accomplishments/federalwins ]
2409|_[ + ] Exploit::
2410|_[ + ] Information Server:: , , IP::0
2411|_[ + ] More details::
2412|_[ + ] Found:: UNIDENTIFIED
2413
2414 _[ - ]::--------------------------------------------------------------------------------------------------------------
2415|_[ + ] [ 43 / 100 ]-[17:28:47] [ - ]
2416|_[ + ] Target:: [ https://www.actforamerica.org/accomplishments/federalbillspassed ]
2417|_[ + ] Exploit::
2418|_[ + ] Information Server:: , , IP::0
2419|_[ + ] More details::
2420|_[ + ] Found:: UNIDENTIFIED
2421
2422 _[ - ]::--------------------------------------------------------------------------------------------------------------
2423|_[ + ] [ 44 / 100 ]-[17:28:49] [ - ]
2424|_[ + ] Target:: [ https://www.actforamerica.org/action/24 ]
2425|_[ + ] Exploit::
2426|_[ + ] Information Server:: , , IP::0
2427|_[ + ] More details::
2428|_[ + ] Found:: UNIDENTIFIED
2429
2430 _[ - ]::--------------------------------------------------------------------------------------------------------------
2431|_[ + ] [ 45 / 100 ]-[17:28:49] [ - ]
2432|_[ + ] Target:: [ https://www.actforamerica.org/action/thankyoupotus ]
2433|_[ + ] Exploit::
2434|_[ + ] Information Server:: , , IP::0
2435|_[ + ] More details::
2436|_[ + ] Found:: UNIDENTIFIED
2437
2438 _[ - ]::--------------------------------------------------------------------------------------------------------------
2439|_[ + ] [ 46 / 100 ]-[17:28:50] [ - ]
2440|_[ + ] Target:: [ https://www.actforamerica.org/action/thankyoupotus1 ]
2441|_[ + ] Exploit::
2442|_[ + ] Information Server:: , , IP::0
2443|_[ + ] More details::
2444|_[ + ] Found:: UNIDENTIFIED
2445
2446 _[ - ]::--------------------------------------------------------------------------------------------------------------
2447|_[ + ] [ 47 / 100 ]-[17:28:51] [ - ]
2448|_[ + ] Target:: [ https://www.actforamerica.org/action/temple ]
2449|_[ + ] Exploit::
2450|_[ + ] Information Server:: , , IP::0
2451|_[ + ] More details::
2452|_[ + ] Found:: UNIDENTIFIED
2453
2454 _[ - ]::--------------------------------------------------------------------------------------------------------------
2455|_[ + ] [ 48 / 100 ]-[17:28:52] [ - ]
2456|_[ + ] Target:: [ https://www.actforamerica.org/action/wesupportpotus ]
2457|_[ + ] Exploit::
2458|_[ + ] Information Server:: , , IP::0
2459|_[ + ] More details::
2460|_[ + ] Found:: UNIDENTIFIED
2461
2462 _[ - ]::--------------------------------------------------------------------------------------------------------------
2463|_[ + ] [ 49 / 100 ]-[17:28:53] [ - ]
2464|_[ + ] Target:: [ https://www.actforamerica.org/manage/donation ]
2465|_[ + ] Exploit::
2466|_[ + ] Information Server:: , , IP::0
2467|_[ + ] More details::
2468|_[ + ] Found:: UNIDENTIFIED
2469
2470 _[ - ]::--------------------------------------------------------------------------------------------------------------
2471|_[ + ] [ 50 / 100 ]-[17:28:54] [ - ]
2472|_[ + ] Target:: [ https://www.actforamerica.org/action/nodreamact ]
2473|_[ + ] Exploit::
2474|_[ + ] Information Server:: , , IP::0
2475|_[ + ] More details::
2476|_[ + ] Found:: UNIDENTIFIED
2477
2478 _[ - ]::--------------------------------------------------------------------------------------------------------------
2479|_[ + ] [ 51 / 100 ]-[17:28:55] [ - ]
2480|_[ + ] Target:: [ https://www.actforamerica.org/legislation/federalprioritybills ]
2481|_[ + ] Exploit::
2482|_[ + ] Information Server:: , , IP::0
2483|_[ + ] More details::
2484|_[ + ] Found:: UNIDENTIFIED
2485
2486 _[ - ]::--------------------------------------------------------------------------------------------------------------
2487|_[ + ] [ 52 / 100 ]-[17:28:56] [ - ]
2488|_[ + ] Target:: [ https://www.actforamerica.org/action/omar ]
2489|_[ + ] Exploit::
2490|_[ + ] Information Server:: , , IP::0
2491|_[ + ] More details::
2492|_[ + ] Found:: UNIDENTIFIED
2493
2494 _[ - ]::--------------------------------------------------------------------------------------------------------------
2495|_[ + ] [ 53 / 100 ]-[17:28:57] [ - ]
2496|_[ + ] Target:: [ https://www.actforamerica.org/action/hr2740 ]
2497|_[ + ] Exploit::
2498|_[ + ] Information Server:: , , IP::0
2499|_[ + ] More details::
2500|_[ + ] Found:: UNIDENTIFIED
2501
2502 _[ - ]::--------------------------------------------------------------------------------------------------------------
2503|_[ + ] [ 54 / 100 ]-[17:28:58] [ - ]
2504|_[ + ] Target:: [ https://www.actforamerica.org/israel/speeches ]
2505|_[ + ] Exploit::
2506|_[ + ] Information Server:: , , IP::0
2507|_[ + ] More details::
2508|_[ + ] Found:: UNIDENTIFIED
2509
2510 _[ - ]::--------------------------------------------------------------------------------------------------------------
2511|_[ + ] [ 55 / 100 ]-[17:29:00] [ - ]
2512|_[ + ] Target:: [ https://www.actforamerica.org/search-page ]
2513|_[ + ] Exploit::
2514|_[ + ] Information Server:: , , IP::0
2515|_[ + ] More details::
2516|_[ + ] Found:: UNIDENTIFIED
2517
2518 _[ - ]::--------------------------------------------------------------------------------------------------------------
2519|_[ + ] [ 56 / 100 ]-[17:29:00] [ - ]
2520|_[ + ] Target:: [ https://www.actforamerica.org/action/borderbonds ]
2521|_[ + ] Exploit::
2522|_[ + ] Information Server:: , , IP::0
2523|_[ + ] More details::
2524|_[ + ] Found:: UNIDENTIFIED
2525
2526 _[ - ]::--------------------------------------------------------------------------------------------------------------
2527|_[ + ] [ 57 / 100 ]-[17:29:01] [ - ]
2528|_[ + ] Target:: [ https://www.actforamerica.org/action/oldglory ]
2529|_[ + ] Exploit::
2530|_[ + ] Information Server:: , , IP::0
2531|_[ + ] More details::
2532|_[ + ] Found:: UNIDENTIFIED
2533
2534 _[ - ]::--------------------------------------------------------------------------------------------------------------
2535|_[ + ] [ 58 / 100 ]-[17:29:02] [ - ]
2536|_[ + ] Target:: [ https://www.actforamerica.org/action/29 ]
2537|_[ + ] Exploit::
2538|_[ + ] Information Server:: , , IP::0
2539|_[ + ] More details::
2540|_[ + ] Found:: UNIDENTIFIED
2541
2542 _[ - ]::--------------------------------------------------------------------------------------------------------------
2543|_[ + ] [ 59 / 100 ]-[17:29:03] [ - ]
2544|_[ + ] Target:: [ https://www.actforamerica.org/action/asylumabuse ]
2545|_[ + ] Exploit::
2546|_[ + ] Information Server:: , , IP::0
2547|_[ + ] More details::
2548|_[ + ] Found:: UNIDENTIFIED
2549
2550 _[ - ]::--------------------------------------------------------------------------------------------------------------
2551|_[ + ] [ 60 / 100 ]-[17:29:05] [ - ]
2552|_[ + ] Target:: [ https://www.actforamerica.org/militaryandlawenforcement/lawenforcement ]
2553|_[ + ] Exploit::
2554|_[ + ] Information Server:: , , IP::0
2555|_[ + ] More details::
2556|_[ + ] Found:: UNIDENTIFIED
2557
2558 _[ - ]::--------------------------------------------------------------------------------------------------------------
2559|_[ + ] [ 61 / 100 ]-[17:29:05] [ - ]
2560|_[ + ] Target:: [ https://www.actforamerica.org/action/elchapo ]
2561|_[ + ] Exploit::
2562|_[ + ] Information Server:: , , IP::0
2563|_[ + ] More details::
2564|_[ + ] Found:: UNIDENTIFIED
2565
2566 _[ - ]::--------------------------------------------------------------------------------------------------------------
2567|_[ + ] [ 62 / 100 ]-[17:29:06] [ - ]
2568|_[ + ] Target:: [ https://www.actforamerica.org/action/taps ]
2569|_[ + ] Exploit::
2570|_[ + ] Information Server:: , , IP::0
2571|_[ + ] More details::
2572|_[ + ] Found:: UNIDENTIFIED
2573
2574 _[ - ]::--------------------------------------------------------------------------------------------------------------
2575|_[ + ] [ 63 / 100 ]-[17:29:07] [ - ]
2576|_[ + ] Target:: [ https://www.actforamerica.org/user/register ]
2577|_[ + ] Exploit::
2578|_[ + ] Information Server:: , , IP::0
2579|_[ + ] More details::
2580|_[ + ] Found:: UNIDENTIFIED
2581
2582 _[ - ]::--------------------------------------------------------------------------------------------------------------
2583|_[ + ] [ 64 / 100 ]-[17:29:08] [ - ]
2584|_[ + ] Target:: [ https://www.actforamerica.org/event/spacecoast ]
2585|_[ + ] Exploit::
2586|_[ + ] Information Server:: , , IP::0
2587|_[ + ] More details::
2588|_[ + ] Found:: UNIDENTIFIED
2589
2590 _[ - ]::--------------------------------------------------------------------------------------------------------------
2591|_[ + ] [ 65 / 100 ]-[17:29:09] [ - ]
2592|_[ + ] Target:: [ https://www.actforamerica.org/action/nba ]
2593|_[ + ] Exploit::
2594|_[ + ] Information Server:: , , IP::0
2595|_[ + ] More details::
2596|_[ + ] Found:: UNIDENTIFIED
2597
2598 _[ - ]::--------------------------------------------------------------------------------------------------------------
2599|_[ + ] [ 66 / 100 ]-[17:29:10] [ - ]
2600|_[ + ] Target:: [ https://www.actforamerica.org/action/fgm1 ]
2601|_[ + ] Exploit::
2602|_[ + ] Information Server:: , , IP::0
2603|_[ + ] More details::
2604|_[ + ] Found:: UNIDENTIFIED
2605
2606 _[ - ]::--------------------------------------------------------------------------------------------------------------
2607|_[ + ] [ 67 / 100 ]-[17:29:11] [ - ]
2608|_[ + ] Target:: [ https://www.actforamerica.org/action/marriottcair ]
2609|_[ + ] Exploit::
2610|_[ + ] Information Server:: , , IP::0
2611|_[ + ] More details::
2612|_[ + ] Found:: UNIDENTIFIED
2613
2614 _[ - ]::--------------------------------------------------------------------------------------------------------------
2615|_[ + ] [ 68 / 100 ]-[17:29:12] [ - ]
2616|_[ + ] Target:: [ https://www.actforamerica.org/ACTION/PROTECTANDSERVE ]
2617|_[ + ] Exploit::
2618|_[ + ] Information Server:: , , IP::0
2619|_[ + ] More details::
2620|_[ + ] Found:: UNIDENTIFIED
2621
2622 _[ - ]::--------------------------------------------------------------------------------------------------------------
2623|_[ + ] [ 69 / 100 ]-[17:29:13] [ - ]
2624|_[ + ] Target:: [ https://www.actforamerica.org/action/fto ]
2625|_[ + ] Exploit::
2626|_[ + ] Information Server:: , , IP::0
2627|_[ + ] More details::
2628|_[ + ] Found:: UNIDENTIFIED
2629
2630 _[ - ]::--------------------------------------------------------------------------------------------------------------
2631|_[ + ] [ 70 / 100 ]-[17:29:14] [ - ]
2632|_[ + ] Target:: [ https://www.actforamerica.org/action/callhyatt ]
2633|_[ + ] Exploit::
2634|_[ + ] Information Server:: , , IP::0
2635|_[ + ] More details::
2636|_[ + ] Found:: UNIDENTIFIED
2637
2638 _[ - ]::--------------------------------------------------------------------------------------------------------------
2639|_[ + ] [ 71 / 100 ]-[17:29:15] [ - ]
2640|_[ + ] Target:: [ https://www.actforamerica.org/action/bernie ]
2641|_[ + ] Exploit::
2642|_[ + ] Information Server:: , , IP::0
2643|_[ + ] More details::
2644|_[ + ] Found:: UNIDENTIFIED
2645
2646 _[ - ]::--------------------------------------------------------------------------------------------------------------
2647|_[ + ] [ 72 / 100 ]-[17:29:16] [ - ]
2648|_[ + ] Target:: [ https://www.actforamerica.org/action/warcollege ]
2649|_[ + ] Exploit::
2650|_[ + ] Information Server:: , , IP::0
2651|_[ + ] More details::
2652|_[ + ] Found:: UNIDENTIFIED
2653
2654 _[ - ]::--------------------------------------------------------------------------------------------------------------
2655|_[ + ] [ 73 / 100 ]-[17:29:17] [ - ]
2656|_[ + ] Target:: [ https://www.actforamerica.org/node/264 ]
2657|_[ + ] Exploit::
2658|_[ + ] Information Server:: , , IP::0
2659|_[ + ] More details::
2660|_[ + ] Found:: UNIDENTIFIED
2661
2662 _[ - ]::--------------------------------------------------------------------------------------------------------------
2663|_[ + ] [ 74 / 100 ]-[17:29:18] [ - ]
2664|_[ + ] Target:: [ https://www.actforamerica.org/action/impeachment ]
2665|_[ + ] Exploit::
2666|_[ + ] Information Server:: , , IP::0
2667|_[ + ] More details::
2668|_[ + ] Found:: UNIDENTIFIED
2669
2670 _[ - ]::--------------------------------------------------------------------------------------------------------------
2671|_[ + ] [ 75 / 100 ]-[17:29:19] [ - ]
2672|_[ + ] Target:: [ https://www.actforamerica.org/action/28 ]
2673|_[ + ] Exploit::
2674|_[ + ] Information Server:: , , IP::0
2675|_[ + ] More details::
2676|_[ + ] Found:: UNIDENTIFIED
2677
2678 _[ - ]::--------------------------------------------------------------------------------------------------------------
2679|_[ + ] [ 76 / 100 ]-[17:29:20] [ - ]
2680|_[ + ] Target:: [ https://www.actforamerica.org/action/buildthewall ]
2681|_[ + ] Exploit::
2682|_[ + ] Information Server:: , , IP::0
2683|_[ + ] More details::
2684|_[ + ] Found:: UNIDENTIFIED
2685
2686 _[ - ]::--------------------------------------------------------------------------------------------------------------
2687|_[ + ] [ 77 / 100 ]-[17:29:21] [ - ]
2688|_[ + ] Target:: [ https://www.actforamerica.org/pressreleases/response_to_splc ]
2689|_[ + ] Exploit::
2690|_[ + ] Information Server:: , , IP::0
2691|_[ + ] More details::
2692|_[ + ] Found:: UNIDENTIFIED
2693
2694 _[ - ]::--------------------------------------------------------------------------------------------------------------
2695|_[ + ] [ 78 / 100 ]-[17:29:22] [ - ]
2696|_[ + ] Target:: [ https://www.actforamerica.org/militaryandlawenforcement/supportourlawenforcement ]
2697|_[ + ] Exploit::
2698|_[ + ] Information Server:: , , IP::0
2699|_[ + ] More details::
2700|_[ + ] Found:: UNIDENTIFIED
2701
2702 _[ - ]::--------------------------------------------------------------------------------------------------------------
2703|_[ + ] [ 79 / 100 ]-[17:29:23] [ - ]
2704|_[ + ] Target:: [ https://www.actforamerica.org/action/birthright ]
2705|_[ + ] Exploit::
2706|_[ + ] Information Server:: , , IP::0
2707|_[ + ] More details::
2708|_[ + ] Found:: UNIDENTIFIED
2709
2710 _[ - ]::--------------------------------------------------------------------------------------------------------------
2711|_[ + ] [ 80 / 100 ]-[17:29:24] [ - ]
2712|_[ + ] Target:: [ https://www.actforamerica.org/action/uga ]
2713|_[ + ] Exploit::
2714|_[ + ] Information Server:: , , IP::0
2715|_[ + ] More details::
2716|_[ + ] Found:: UNIDENTIFIED
2717
2718 _[ - ]::--------------------------------------------------------------------------------------------------------------
2719|_[ + ] [ 81 / 100 ]-[17:29:25] [ - ]
2720|_[ + ] Target:: [ https://www.actforamerica.org/action/thankyoutrump ]
2721|_[ + ] Exploit::
2722|_[ + ] Information Server:: , , IP::0
2723|_[ + ] More details::
2724|_[ + ] Found:: UNIDENTIFIED
2725
2726 _[ - ]::--------------------------------------------------------------------------------------------------------------
2727|_[ + ] [ 82 / 100 ]-[17:29:26] [ - ]
2728|_[ + ] Target:: [ https://www.actforamerica.org/action/sfsu ]
2729|_[ + ] Exploit::
2730|_[ + ] Information Server:: , , IP::0
2731|_[ + ] More details::
2732|_[ + ] Found:: UNIDENTIFIED
2733
2734 _[ - ]::--------------------------------------------------------------------------------------------------------------
2735|_[ + ] [ 83 / 100 ]-[17:29:27] [ - ]
2736|_[ + ] Target:: [ https://www.actforamerica.org/action/saveasia1 ]
2737|_[ + ] Exploit::
2738|_[ + ] Information Server:: , , IP::0
2739|_[ + ] More details::
2740|_[ + ] Found:: UNIDENTIFIED
2741
2742 _[ - ]::--------------------------------------------------------------------------------------------------------------
2743|_[ + ] [ 84 / 100 ]-[17:29:28] [ - ]
2744|_[ + ] Target:: [ https://www.actforamerica.org/action/masa ]
2745|_[ + ] Exploit::
2746|_[ + ] Information Server:: , , IP::0
2747|_[ + ] More details::
2748|_[ + ] Found:: UNIDENTIFIED
2749
2750 _[ - ]::--------------------------------------------------------------------------------------------------------------
2751|_[ + ] [ 85 / 100 ]-[17:29:29] [ - ]
2752|_[ + ] Target:: [ https://www.actforamerica.org/action/saveasia ]
2753|_[ + ] Exploit::
2754|_[ + ] Information Server:: , , IP::0
2755|_[ + ] More details::
2756|_[ + ] Found:: UNIDENTIFIED
2757
2758 _[ - ]::--------------------------------------------------------------------------------------------------------------
2759|_[ + ] [ 86 / 100 ]-[17:29:30] [ - ]
2760|_[ + ] Target:: [ https://www.actforamerica.org/action/trumpnominations ]
2761|_[ + ] Exploit::
2762|_[ + ] Information Server:: , , IP::0
2763|_[ + ] More details::
2764|_[ + ] Found:: UNIDENTIFIED
2765
2766 _[ - ]::--------------------------------------------------------------------------------------------------------------
2767|_[ + ] [ 87 / 100 ]-[17:29:31] [ - ]
2768|_[ + ] Target:: [ https://www.actforamerica.org/action/antifaresolution ]
2769|_[ + ] Exploit::
2770|_[ + ] Information Server:: , , IP::0
2771|_[ + ] More details::
2772|_[ + ] Found:: UNIDENTIFIED
2773
2774 _[ - ]::--------------------------------------------------------------------------------------------------------------
2775|_[ + ] [ 88 / 100 ]-[17:29:32] [ - ]
2776|_[ + ] Target:: [ https://www.actforamerica.org/issues/exposingsocialism ]
2777|_[ + ] Exploit::
2778|_[ + ] Information Server:: , , IP::0
2779|_[ + ] More details::
2780|_[ + ] Found:: UNIDENTIFIED
2781
2782 _[ - ]::--------------------------------------------------------------------------------------------------------------
2783|_[ + ] [ 89 / 100 ]-[17:29:33] [ - ]
2784|_[ + ] Target:: [ https://www.actforamerica.org/fight-back ]
2785|_[ + ] Exploit::
2786|_[ + ] Information Server:: , , IP::0
2787|_[ + ] More details::
2788|_[ + ] Found:: UNIDENTIFIED
2789
2790 _[ - ]::--------------------------------------------------------------------------------------------------------------
2791|_[ + ] [ 90 / 100 ]-[17:29:34] [ - ]
2792|_[ + ] Target:: [ https://www.actforamerica.org/action/sanctuarycities ]
2793|_[ + ] Exploit::
2794|_[ + ] Information Server:: , , IP::0
2795|_[ + ] More details::
2796|_[ + ] Found:: UNIDENTIFIED
2797
2798 _[ - ]::--------------------------------------------------------------------------------------------------------------
2799|_[ + ] [ 91 / 100 ]-[17:29:35] [ - ]
2800|_[ + ] Target:: [ https://www.actforamerica.org/action/25 ]
2801|_[ + ] Exploit::
2802|_[ + ] Information Server:: , , IP::0
2803|_[ + ] More details::
2804|_[ + ] Found:: UNIDENTIFIED
2805
2806 _[ - ]::--------------------------------------------------------------------------------------------------------------
2807|_[ + ] [ 92 / 100 ]-[17:29:36] [ - ]
2808|_[ + ] Target:: [ https://www.actforamerica.org/criticalinfrastructure/energysecurity ]
2809|_[ + ] Exploit::
2810|_[ + ] Information Server:: , , IP::0
2811|_[ + ] More details::
2812|_[ + ] Found:: UNIDENTIFIED
2813
2814 _[ - ]::--------------------------------------------------------------------------------------------------------------
2815|_[ + ] [ 93 / 100 ]-[17:29:37] [ - ]
2816|_[ + ] Target:: [ https://www.actforamerica.org/action/noamnesty ]
2817|_[ + ] Exploit::
2818|_[ + ] Information Server:: , , IP::0
2819|_[ + ] More details::
2820|_[ + ] Found:: UNIDENTIFIED
2821
2822 _[ - ]::--------------------------------------------------------------------------------------------------------------
2823|_[ + ] [ 94 / 100 ]-[17:29:38] [ - ]
2824|_[ + ] Target:: [ https://www.actforamerica.org/project/statelegteam ]
2825|_[ + ] Exploit::
2826|_[ + ] Information Server:: , , IP::0
2827|_[ + ] More details::
2828|_[ + ] Found:: UNIDENTIFIED
2829
2830 _[ - ]::--------------------------------------------------------------------------------------------------------------
2831|_[ + ] [ 95 / 100 ]-[17:29:39] [ - ]
2832|_[ + ] Target:: [ https://www.actforamerica.org/constitutionalfreedoms/fgm ]
2833|_[ + ] Exploit::
2834|_[ + ] Information Server:: , , IP::0
2835|_[ + ] More details::
2836|_[ + ] Found:: UNIDENTIFIED
2837
2838 _[ - ]::--------------------------------------------------------------------------------------------------------------
2839|_[ + ] [ 96 / 100 ]-[17:29:41] [ - ]
2840|_[ + ] Target:: [ https://www.actforamerica.org/action/21 ]
2841|_[ + ] Exploit::
2842|_[ + ] Information Server:: , , IP::0
2843|_[ + ] More details::
2844|_[ + ] Found:: UNIDENTIFIED
2845
2846 _[ - ]::--------------------------------------------------------------------------------------------------------------
2847|_[ + ] [ 97 / 100 ]-[17:29:41] [ - ]
2848|_[ + ] Target:: [ https://www.actforamerica.org/action/hyatt ]
2849|_[ + ] Exploit::
2850|_[ + ] Information Server:: , , IP::0
2851|_[ + ] More details::
2852|_[ + ] Found:: UNIDENTIFIED
2853
2854 _[ - ]::--------------------------------------------------------------------------------------------------------------
2855|_[ + ] [ 98 / 100 ]-[17:29:42] [ - ]
2856|_[ + ] Target:: [ https://www.actforamerica.org/action/02 ]
2857|_[ + ] Exploit::
2858|_[ + ] Information Server:: , , IP::0
2859|_[ + ] More details::
2860|_[ + ] Found:: UNIDENTIFIED
2861
2862 _[ - ]::--------------------------------------------------------------------------------------------------------------
2863|_[ + ] [ 99 / 100 ]-[17:29:43] [ - ]
2864|_[ + ] Target:: [ https://www.actforamerica.org/action/trumpbirthright ]
2865|_[ + ] Exploit::
2866|_[ + ] Information Server:: , , IP::0
2867|_[ + ] More details::
2868|_[ + ] Found:: UNIDENTIFIED
2869
2870[ INFO ] [ Shutting down ]
2871[ INFO ] [ End of process INURLBR at [24-10-2019 17:29:43]
2872[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
2873[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.actforamerica.org/output/inurlbr-www.actforamerica.org ]
2874|_________________________________________________________________________________________
2875
2876\_________________________________________________________________________________________/
2877######################################################################################################################################
2878Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 17:29 EDT
2879NSE: Loaded 163 scripts for scanning.
2880NSE: Script Pre-scanning.
2881Initiating NSE at 17:29
2882Completed NSE at 17:29, 0.00s elapsed
2883Initiating NSE at 17:29
2884Completed NSE at 17:29, 0.00s elapsed
2885Initiating Parallel DNS resolution of 1 host. at 17:29
2886Completed Parallel DNS resolution of 1 host. at 17:29, 0.04s elapsed
2887Initiating SYN Stealth Scan at 17:29
2888Scanning www.actforamerica.org (35.153.8.200) [1 port]
2889Completed SYN Stealth Scan at 17:29, 0.29s elapsed (1 total ports)
2890Initiating Service scan at 17:29
2891Initiating OS detection (try #1) against www.actforamerica.org (35.153.8.200)
2892Retrying OS detection (try #2) against www.actforamerica.org (35.153.8.200)
2893Initiating Traceroute at 17:30
2894Completed Traceroute at 17:30, 6.35s elapsed
2895Initiating Parallel DNS resolution of 9 hosts. at 17:30
2896Completed Parallel DNS resolution of 9 hosts. at 17:30, 0.38s elapsed
2897NSE: Script scanning 35.153.8.200.
2898Initiating NSE at 17:30
2899Completed NSE at 17:30, 0.38s elapsed
2900Initiating NSE at 17:30
2901Completed NSE at 17:30, 0.00s elapsed
2902Nmap scan report for www.actforamerica.org (35.153.8.200)
2903Host is up (0.25s latency).
2904rDNS record for 35.153.8.200: ec2-35-153-8-200.compute-1.amazonaws.com
2905
2906PORT STATE SERVICE VERSION
2907443/tcp filtered https
2908Too many fingerprints match this host to give specific OS details
2909
2910TRACEROUTE (using proto 1/icmp)
2911HOP RTT ADDRESS
29121 301.67 ms 10.234.204.1
29132 301.73 ms 45.131.4.2
29143 301.72 ms 109.236.95.224
29154 301.75 ms hu0-1-0-3.ccr21.ams04.atlas.cogentco.com (149.11.38.225)
29165 301.77 ms be3382.ccr41.lon13.atlas.cogentco.com (154.54.39.217)
29176 301.83 ms be12266.ccr42.par01.atlas.cogentco.com (154.54.56.174)
29187 301.82 ms be3495.ccr31.jfk10.atlas.cogentco.com (66.28.4.182)
29198 301.80 ms 38.140.106.162
29209 301.81 ms be3495.ccr31.jfk10.atlas.cogentco.com (66.28.4.182)
292110 178.10 ms 52.93.4.2
292211 ... 30
2923
2924NSE: Script Post-scanning.
2925Initiating NSE at 17:30
2926Completed NSE at 17:30, 0.00s elapsed
2927Initiating NSE at 17:30
2928Completed NSE at 17:30, 0.00s elapsed
2929######################################################################################################################################
2930------------------------------------------------------------------------------------------------------------------------
2931
2932[ ! ] Starting SCANNER INURLBR 2.1 at [24-10-2019 17:30:38]
2933[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
2934It is the end user's responsibility to obey all applicable local, state and federal laws.
2935Developers assume no liability and are not responsible for any misuse or damage caused by this program
2936
2937[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.actforamerica.org/output/inurlbr-www.actforamerica.org ]
2938[ INFO ][ DORK ]::[ site:www.actforamerica.org ]
2939[ INFO ][ SEARCHING ]:: {
2940[ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.bd ]
2941
2942[ INFO ][ SEARCHING ]::
2943-[:::]
2944[ INFO ][ ENGINE ]::[ GOOGLE API ]
2945
2946[ INFO ][ SEARCHING ]::
2947-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2948[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.af ID: 010479943387663786936:wjwf2xkhfmq ]
2949
2950[ INFO ][ SEARCHING ]::
2951-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2952
2953[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
2954
2955
2956 _[ - ]::--------------------------------------------------------------------------------------------------------------
2957|_[ + ] [ 0 / 100 ]-[17:30:58] [ - ]
2958|_[ + ] Target:: [ https://www.actforamerica.org/ ]
2959|_[ + ] Exploit::
2960|_[ + ] Information Server:: , , IP::0
2961|_[ + ] More details::
2962|_[ + ] Found:: UNIDENTIFIED
2963
2964 _[ - ]::--------------------------------------------------------------------------------------------------------------
2965|_[ + ] [ 1 / 100 ]-[17:30:59] [ - ]
2966|_[ + ] Target:: [ https://www.actforamerica.org/node/13281 ]
2967|_[ + ] Exploit::
2968|_[ + ] Information Server:: , , IP::0
2969|_[ + ] More details::
2970|_[ + ] Found:: UNIDENTIFIED
2971
2972 _[ - ]::--------------------------------------------------------------------------------------------------------------
2973|_[ + ] [ 2 / 100 ]-[17:30:59] [ - ]
2974|_[ + ] Target:: [ https://www.actforamerica.org/IL ]
2975|_[ + ] Exploit::
2976|_[ + ] Information Server:: , , IP::0
2977|_[ + ] More details::
2978|_[ + ] Found:: UNIDENTIFIED
2979
2980 _[ - ]::--------------------------------------------------------------------------------------------------------------
2981|_[ + ] [ 3 / 100 ]-[17:31:00] [ - ]
2982|_[ + ] Target:: [ https://www.actforamerica.org/longisland ]
2983|_[ + ] Exploit::
2984|_[ + ] Information Server:: , , IP::0
2985|_[ + ] More details::
2986|_[ + ] Found:: UNIDENTIFIED
2987
2988 _[ - ]::--------------------------------------------------------------------------------------------------------------
2989|_[ + ] [ 4 / 100 ]-[17:31:00] [ - ]
2990|_[ + ] Target:: [ https://www.actforamerica.org/videos ]
2991|_[ + ] Exploit::
2992|_[ + ] Information Server:: , , IP::0
2993|_[ + ] More details::
2994|_[ + ] Found:: UNIDENTIFIED
2995
2996 _[ - ]::--------------------------------------------------------------------------------------------------------------
2997|_[ + ] [ 5 / 100 ]-[17:31:01] [ - ]
2998|_[ + ] Target:: [ https://www.actforamerica.org/takeaction ]
2999|_[ + ] Exploit::
3000|_[ + ] Information Server:: , , IP::0
3001|_[ + ] More details::
3002|_[ + ] Found:: UNIDENTIFIED
3003
3004 _[ - ]::--------------------------------------------------------------------------------------------------------------
3005|_[ + ] [ 6 / 100 ]-[17:31:01] [ - ]
3006|_[ + ] Target:: [ https://www.actforamerica.org/highprioritylegislation ]
3007|_[ + ] Exploit::
3008|_[ + ] Information Server:: , , IP::0
3009|_[ + ] More details::
3010|_[ + ] Found:: UNIDENTIFIED
3011
3012 _[ - ]::--------------------------------------------------------------------------------------------------------------
3013|_[ + ] [ 7 / 100 ]-[17:31:02] [ - ]
3014|_[ + ] Target:: [ https://www.actforamerica.org/contact ]
3015|_[ + ] Exploit::
3016|_[ + ] Information Server:: , , IP::0
3017|_[ + ] More details::
3018|_[ + ] Found:: UNIDENTIFIED
3019
3020 _[ - ]::--------------------------------------------------------------------------------------------------------------
3021|_[ + ] [ 8 / 100 ]-[17:31:02] [ - ]
3022|_[ + ] Target:: [ https://www.actforamerica.org/bgbirthdaycard ]
3023|_[ + ] Exploit::
3024|_[ + ] Information Server:: , , IP::0
3025|_[ + ] More details::
3026|_[ + ] Found:: UNIDENTIFIED
3027
3028 _[ - ]::--------------------------------------------------------------------------------------------------------------
3029|_[ + ] [ 9 / 100 ]-[17:31:03] [ - ]
3030|_[ + ] Target:: [ https://www.actforamerica.org/termsofservice ]
3031|_[ + ] Exploit::
3032|_[ + ] Information Server:: , , IP::0
3033|_[ + ] More details::
3034|_[ + ] Found:: UNIDENTIFIED
3035
3036 _[ - ]::--------------------------------------------------------------------------------------------------------------
3037|_[ + ] [ 10 / 100 ]-[17:31:04] [ - ]
3038|_[ + ] Target:: [ https://www.actforamerica.org/oceanside ]
3039|_[ + ] Exploit::
3040|_[ + ] Information Server:: , , IP::0
3041|_[ + ] More details::
3042|_[ + ] Found:: UNIDENTIFIED
3043
3044 _[ - ]::--------------------------------------------------------------------------------------------------------------
3045|_[ + ] [ 11 / 100 ]-[17:31:04] [ - ]
3046|_[ + ] Target:: [ https://www.actforamerica.org/policy ]
3047|_[ + ] Exploit::
3048|_[ + ] Information Server:: , , IP::0
3049|_[ + ] More details::
3050|_[ + ] Found:: UNIDENTIFIED
3051
3052 _[ - ]::--------------------------------------------------------------------------------------------------------------
3053|_[ + ] [ 12 / 100 ]-[17:31:05] [ - ]
3054|_[ + ] Target:: [ https://www.actforamerica.org/mbpetition ]
3055|_[ + ] Exploit::
3056|_[ + ] Information Server:: , , IP::0
3057|_[ + ] More details::
3058|_[ + ] Found:: UNIDENTIFIED
3059
3060 _[ - ]::--------------------------------------------------------------------------------------------------------------
3061|_[ + ] [ 13 / 100 ]-[17:31:07] [ - ]
3062|_[ + ] Target:: [ https://www.actforamerica.org/legislation ]
3063|_[ + ] Exploit::
3064|_[ + ] Information Server:: , , IP::0
3065|_[ + ] More details::
3066|_[ + ] Found:: UNIDENTIFIED
3067
3068 _[ - ]::--------------------------------------------------------------------------------------------------------------
3069|_[ + ] [ 14 / 100 ]-[17:31:07] [ - ]
3070|_[ + ] Target:: [ https://www.actforamerica.org/faq ]
3071|_[ + ] Exploit::
3072|_[ + ] Information Server:: , , IP::0
3073|_[ + ] More details::
3074|_[ + ] Found:: UNIDENTIFIED
3075
3076 _[ - ]::--------------------------------------------------------------------------------------------------------------
3077|_[ + ] [ 15 / 100 ]-[17:31:08] [ - ]
3078|_[ + ] Target:: [ https://www.actforamerica.org/disclaimer ]
3079|_[ + ] Exploit::
3080|_[ + ] Information Server:: , , IP::0
3081|_[ + ] More details::
3082|_[ + ] Found:: UNIDENTIFIED
3083
3084 _[ - ]::--------------------------------------------------------------------------------------------------------------
3085|_[ + ] [ 16 / 100 ]-[17:31:09] [ - ]
3086|_[ + ] Target:: [ https://www.actforamerica.org/aboutbrigitte ]
3087|_[ + ] Exploit::
3088|_[ + ] Information Server:: , , IP::0
3089|_[ + ] More details::
3090|_[ + ] Found:: UNIDENTIFIED
3091
3092 _[ - ]::--------------------------------------------------------------------------------------------------------------
3093|_[ + ] [ 17 / 100 ]-[17:31:11] [ - ]
3094|_[ + ] Target:: [ https://www.actforamerica.org/pressreleases ]
3095|_[ + ] Exploit::
3096|_[ + ] Information Server:: , , IP::0
3097|_[ + ] More details::
3098|_[ + ] Found:: UNIDENTIFIED
3099
3100 _[ - ]::--------------------------------------------------------------------------------------------------------------
3101|_[ + ] [ 18 / 100 ]-[17:31:11] [ - ]
3102|_[ + ] Target:: [ https://www.actforamerica.org/orangecounty ]
3103|_[ + ] Exploit::
3104|_[ + ] Information Server:: , , IP::0
3105|_[ + ] More details::
3106|_[ + ] Found:: UNIDENTIFIED
3107
3108 _[ - ]::--------------------------------------------------------------------------------------------------------------
3109|_[ + ] [ 19 / 100 ]-[17:31:13] [ - ]
3110|_[ + ] Target:: [ https://www.actforamerica.org/happybirthdaypotus ]
3111|_[ + ] Exploit::
3112|_[ + ] Information Server:: , , IP::0
3113|_[ + ] More details::
3114|_[ + ] Found:: UNIDENTIFIED
3115
3116 _[ - ]::--------------------------------------------------------------------------------------------------------------
3117|_[ + ] [ 20 / 100 ]-[17:31:14] [ - ]
3118|_[ + ] Target:: [ https://www.actforamerica.org/socialsharing ]
3119|_[ + ] Exploit::
3120|_[ + ] Information Server:: , , IP::0
3121|_[ + ] More details::
3122|_[ + ] Found:: UNIDENTIFIED
3123
3124 _[ - ]::--------------------------------------------------------------------------------------------------------------
3125|_[ + ] [ 21 / 100 ]-[17:31:15] [ - ]
3126|_[ + ] Target:: [ https://www.actforamerica.org/about/ ]
3127|_[ + ] Exploit::
3128|_[ + ] Information Server:: , , IP::0
3129|_[ + ] More details::
3130|_[ + ] Found:: UNIDENTIFIED
3131
3132 _[ - ]::--------------------------------------------------------------------------------------------------------------
3133|_[ + ] [ 22 / 100 ]-[17:31:15] [ - ]
3134|_[ + ] Target:: [ https://www.actforamerica.org/rise ]
3135|_[ + ] Exploit::
3136|_[ + ] Information Server:: , , IP::0
3137|_[ + ] More details::
3138|_[ + ] Found:: UNIDENTIFIED
3139
3140 _[ - ]::--------------------------------------------------------------------------------------------------------------
3141|_[ + ] [ 23 / 100 ]-[17:31:17] [ - ]
3142|_[ + ] Target:: [ https://www.actforamerica.org/terrorism ]
3143|_[ + ] Exploit::
3144|_[ + ] Information Server:: , , IP::0
3145|_[ + ] More details::
3146|_[ + ] Found:: UNIDENTIFIED
3147
3148 _[ - ]::--------------------------------------------------------------------------------------------------------------
3149|_[ + ] [ 24 / 100 ]-[17:31:17] [ - ]
3150|_[ + ] Target:: [ https://www.actforamerica.org/immigration ]
3151|_[ + ] Exploit::
3152|_[ + ] Information Server:: , , IP::0
3153|_[ + ] More details::
3154|_[ + ] Found:: UNIDENTIFIED
3155
3156 _[ - ]::--------------------------------------------------------------------------------------------------------------
3157|_[ + ] [ 25 / 100 ]-[17:31:18] [ - ]
3158|_[ + ] Target:: [ https://www.actforamerica.org/campushatewatch ]
3159|_[ + ] Exploit::
3160|_[ + ] Information Server:: , , IP::0
3161|_[ + ] More details::
3162|_[ + ] Found:: UNIDENTIFIED
3163
3164 _[ - ]::--------------------------------------------------------------------------------------------------------------
3165|_[ + ] [ 26 / 100 ]-[17:31:20] [ - ]
3166|_[ + ] Target:: [ https://www.actforamerica.org/israel ]
3167|_[ + ] Exploit::
3168|_[ + ] Information Server:: , , IP::0
3169|_[ + ] More details::
3170|_[ + ] Found:: UNIDENTIFIED
3171
3172 _[ - ]::--------------------------------------------------------------------------------------------------------------
3173|_[ + ] [ 27 / 100 ]-[17:31:20] [ - ]
3174|_[ + ] Target:: [ https://www.actforamerica.org/splc ]
3175|_[ + ] Exploit::
3176|_[ + ] Information Server:: , , IP::0
3177|_[ + ] More details::
3178|_[ + ] Found:: UNIDENTIFIED
3179
3180 _[ - ]::--------------------------------------------------------------------------------------------------------------
3181|_[ + ] [ 28 / 100 ]-[17:31:22] [ - ]
3182|_[ + ] Target:: [ https://www.actforamerica.org/criticalinfrastructure ]
3183|_[ + ] Exploit::
3184|_[ + ] Information Server:: , , IP::0
3185|_[ + ] More details::
3186|_[ + ] Found:: UNIDENTIFIED
3187
3188 _[ - ]::--------------------------------------------------------------------------------------------------------------
3189|_[ + ] [ 29 / 100 ]-[17:31:22] [ - ]
3190|_[ + ] Target:: [ https://www.actforamerica.org/aboutact ]
3191|_[ + ] Exploit::
3192|_[ + ] Information Server:: , , IP::0
3193|_[ + ] More details::
3194|_[ + ] Found:: UNIDENTIFIED
3195
3196 _[ - ]::--------------------------------------------------------------------------------------------------------------
3197|_[ + ] [ 30 / 100 ]-[17:31:24] [ - ]
3198|_[ + ] Target:: [ https://www.actforamerica.org/constitutionalfreedoms ]
3199|_[ + ] Exploit::
3200|_[ + ] Information Server:: , , IP::0
3201|_[ + ] More details::
3202|_[ + ] Found:: UNIDENTIFIED
3203
3204 _[ - ]::--------------------------------------------------------------------------------------------------------------
3205|_[ + ] [ 31 / 100 ]-[17:31:24] [ - ]
3206|_[ + ] Target:: [ https://www.actforamerica.org/militaryandlawenforcement ]
3207|_[ + ] Exploit::
3208|_[ + ] Information Server:: , , IP::0
3209|_[ + ] More details::
3210|_[ + ] Found:: UNIDENTIFIED
3211
3212 _[ - ]::--------------------------------------------------------------------------------------------------------------
3213|_[ + ] [ 32 / 100 ]-[17:31:26] [ - ]
3214|_[ + ] Target:: [ https://www.actforamerica.org/confirmkavanaugh ]
3215|_[ + ] Exploit::
3216|_[ + ] Information Server:: , , IP::0
3217|_[ + ] More details::
3218|_[ + ] Found:: UNIDENTIFIED
3219
3220 _[ - ]::--------------------------------------------------------------------------------------------------------------
3221|_[ + ] [ 33 / 100 ]-[17:31:26] [ - ]
3222|_[ + ] Target:: [ https://www.actforamerica.org/mission ]
3223|_[ + ] Exploit::
3224|_[ + ] Information Server:: , , IP::0
3225|_[ + ] More details::
3226|_[ + ] Found:: UNIDENTIFIED
3227
3228 _[ - ]::--------------------------------------------------------------------------------------------------------------
3229|_[ + ] [ 34 / 100 ]-[17:31:27] [ - ]
3230|_[ + ] Target:: [ https://www.actforamerica.org/user ]
3231|_[ + ] Exploit::
3232|_[ + ] Information Server:: , , IP::0
3233|_[ + ] More details::
3234|_[ + ] Found:: UNIDENTIFIED
3235
3236 _[ - ]::--------------------------------------------------------------------------------------------------------------
3237|_[ + ] [ 35 / 100 ]-[17:31:29] [ - ]
3238|_[ + ] Target:: [ https://www.actforamerica.org/accomplishments ]
3239|_[ + ] Exploit::
3240|_[ + ] Information Server:: , , IP::0
3241|_[ + ] More details::
3242|_[ + ] Found:: UNIDENTIFIED
3243
3244 _[ - ]::--------------------------------------------------------------------------------------------------------------
3245|_[ + ] [ 36 / 100 ]-[17:31:29] [ - ]
3246|_[ + ] Target:: [ https://www.actforamerica.org/cart ]
3247|_[ + ] Exploit::
3248|_[ + ] Information Server:: , , IP::0
3249|_[ + ] More details::
3250|_[ + ] Found:: UNIDENTIFIED
3251
3252 _[ - ]::--------------------------------------------------------------------------------------------------------------
3253|_[ + ] [ 37 / 100 ]-[17:31:31] [ - ]
3254|_[ + ] Target:: [ https://www.actforamerica.org/issues ]
3255|_[ + ] Exploit::
3256|_[ + ] Information Server:: , , IP::0
3257|_[ + ] More details::
3258|_[ + ] Found:: UNIDENTIFIED
3259
3260 _[ - ]::--------------------------------------------------------------------------------------------------------------
3261|_[ + ] [ 38 / 100 ]-[17:31:31] [ - ]
3262|_[ + ] Target:: [ https://www.actforamerica.org/action/cairhyatt ]
3263|_[ + ] Exploit::
3264|_[ + ] Information Server:: , , IP::0
3265|_[ + ] More details::
3266|_[ + ] Found:: UNIDENTIFIED
3267
3268 _[ - ]::--------------------------------------------------------------------------------------------------------------
3269|_[ + ] [ 39 / 100 ]-[17:31:33] [ - ]
3270|_[ + ] Target:: [ https://www.actforamerica.org/pressreleases/eventbrite_attacks ]
3271|_[ + ] Exploit::
3272|_[ + ] Information Server:: , , IP::0
3273|_[ + ] More details::
3274|_[ + ] Found:: UNIDENTIFIED
3275
3276 _[ - ]::--------------------------------------------------------------------------------------------------------------
3277|_[ + ] [ 40 / 100 ]-[17:31:33] [ - ]
3278|_[ + ] Target:: [ https://www.actforamerica.org/action/nopromiseact ]
3279|_[ + ] Exploit::
3280|_[ + ] Information Server:: , , IP::0
3281|_[ + ] More details::
3282|_[ + ] Found:: UNIDENTIFIED
3283
3284 _[ - ]::--------------------------------------------------------------------------------------------------------------
3285|_[ + ] [ 41 / 100 ]-[17:31:35] [ - ]
3286|_[ + ] Target:: [ https://www.actforamerica.org/action/seattleschooldistrict ]
3287|_[ + ] Exploit::
3288|_[ + ] Information Server:: , , IP::0
3289|_[ + ] More details::
3290|_[ + ] Found:: UNIDENTIFIED
3291
3292 _[ - ]::--------------------------------------------------------------------------------------------------------------
3293|_[ + ] [ 42 / 100 ]-[17:31:35] [ - ]
3294|_[ + ] Target:: [ https://www.actforamerica.org/accomplishments/federalwins ]
3295|_[ + ] Exploit::
3296|_[ + ] Information Server:: , , IP::0
3297|_[ + ] More details::
3298|_[ + ] Found:: UNIDENTIFIED
3299
3300 _[ - ]::--------------------------------------------------------------------------------------------------------------
3301|_[ + ] [ 43 / 100 ]-[17:31:37] [ - ]
3302|_[ + ] Target:: [ https://www.actforamerica.org/accomplishments/federalbillspassed ]
3303|_[ + ] Exploit::
3304|_[ + ] Information Server:: , , IP::0
3305|_[ + ] More details::
3306|_[ + ] Found:: UNIDENTIFIED
3307
3308 _[ - ]::--------------------------------------------------------------------------------------------------------------
3309|_[ + ] [ 44 / 100 ]-[17:31:37] [ - ]
3310|_[ + ] Target:: [ https://www.actforamerica.org/action/24 ]
3311|_[ + ] Exploit::
3312|_[ + ] Information Server:: , , IP::0
3313|_[ + ] More details::
3314|_[ + ] Found:: UNIDENTIFIED
3315
3316 _[ - ]::--------------------------------------------------------------------------------------------------------------
3317|_[ + ] [ 45 / 100 ]-[17:31:39] [ - ]
3318|_[ + ] Target:: [ https://www.actforamerica.org/action/thankyoupotus ]
3319|_[ + ] Exploit::
3320|_[ + ] Information Server:: , , IP::0
3321|_[ + ] More details::
3322|_[ + ] Found:: UNIDENTIFIED
3323
3324 _[ - ]::--------------------------------------------------------------------------------------------------------------
3325|_[ + ] [ 46 / 100 ]-[17:31:39] [ - ]
3326|_[ + ] Target:: [ https://www.actforamerica.org/action/thankyoupotus1 ]
3327|_[ + ] Exploit::
3328|_[ + ] Information Server:: , , IP::0
3329|_[ + ] More details::
3330|_[ + ] Found:: UNIDENTIFIED
3331
3332 _[ - ]::--------------------------------------------------------------------------------------------------------------
3333|_[ + ] [ 47 / 100 ]-[17:31:41] [ - ]
3334|_[ + ] Target:: [ https://www.actforamerica.org/action/temple ]
3335|_[ + ] Exploit::
3336|_[ + ] Information Server:: , , IP::0
3337|_[ + ] More details::
3338|_[ + ] Found:: UNIDENTIFIED
3339
3340 _[ - ]::--------------------------------------------------------------------------------------------------------------
3341|_[ + ] [ 48 / 100 ]-[17:31:41] [ - ]
3342|_[ + ] Target:: [ https://www.actforamerica.org/action/wesupportpotus ]
3343|_[ + ] Exploit::
3344|_[ + ] Information Server:: , , IP::0
3345|_[ + ] More details::
3346|_[ + ] Found:: UNIDENTIFIED
3347
3348 _[ - ]::--------------------------------------------------------------------------------------------------------------
3349|_[ + ] [ 49 / 100 ]-[17:31:43] [ - ]
3350|_[ + ] Target:: [ https://www.actforamerica.org/manage/donation ]
3351|_[ + ] Exploit::
3352|_[ + ] Information Server:: , , IP::0
3353|_[ + ] More details::
3354|_[ + ] Found:: UNIDENTIFIED
3355
3356 _[ - ]::--------------------------------------------------------------------------------------------------------------
3357|_[ + ] [ 50 / 100 ]-[17:31:44] [ - ]
3358|_[ + ] Target:: [ https://www.actforamerica.org/action/nodreamact ]
3359|_[ + ] Exploit::
3360|_[ + ] Information Server:: , , IP::0
3361|_[ + ] More details::
3362|_[ + ] Found:: UNIDENTIFIED
3363
3364 _[ - ]::--------------------------------------------------------------------------------------------------------------
3365|_[ + ] [ 51 / 100 ]-[17:31:44] [ - ]
3366|_[ + ] Target:: [ https://www.actforamerica.org/legislation/federalprioritybills ]
3367|_[ + ] Exploit::
3368|_[ + ] Information Server:: , , IP::0
3369|_[ + ] More details::
3370|_[ + ] Found:: UNIDENTIFIED
3371
3372 _[ - ]::--------------------------------------------------------------------------------------------------------------
3373|_[ + ] [ 52 / 100 ]-[17:31:46] [ - ]
3374|_[ + ] Target:: [ https://www.actforamerica.org/action/omar ]
3375|_[ + ] Exploit::
3376|_[ + ] Information Server:: , , IP::0
3377|_[ + ] More details::
3378|_[ + ] Found:: UNIDENTIFIED
3379
3380 _[ - ]::--------------------------------------------------------------------------------------------------------------
3381|_[ + ] [ 53 / 100 ]-[17:31:46] [ - ]
3382|_[ + ] Target:: [ https://www.actforamerica.org/action/hr2740 ]
3383|_[ + ] Exploit::
3384|_[ + ] Information Server:: , , IP::0
3385|_[ + ] More details::
3386|_[ + ] Found:: UNIDENTIFIED
3387
3388 _[ - ]::--------------------------------------------------------------------------------------------------------------
3389|_[ + ] [ 54 / 100 ]-[17:31:48] [ - ]
3390|_[ + ] Target:: [ https://www.actforamerica.org/israel/speeches ]
3391|_[ + ] Exploit::
3392|_[ + ] Information Server:: , , IP::0
3393|_[ + ] More details::
3394|_[ + ] Found:: UNIDENTIFIED
3395
3396 _[ - ]::--------------------------------------------------------------------------------------------------------------
3397|_[ + ] [ 55 / 100 ]-[17:31:48] [ - ]
3398|_[ + ] Target:: [ https://www.actforamerica.org/search-page ]
3399|_[ + ] Exploit::
3400|_[ + ] Information Server:: , , IP::0
3401|_[ + ] More details::
3402|_[ + ] Found:: UNIDENTIFIED
3403
3404 _[ - ]::--------------------------------------------------------------------------------------------------------------
3405|_[ + ] [ 56 / 100 ]-[17:31:49] [ - ]
3406|_[ + ] Target:: [ https://www.actforamerica.org/action/borderbonds ]
3407|_[ + ] Exploit::
3408|_[ + ] Information Server:: , , IP::0
3409|_[ + ] More details::
3410|_[ + ] Found:: UNIDENTIFIED
3411
3412 _[ - ]::--------------------------------------------------------------------------------------------------------------
3413|_[ + ] [ 57 / 100 ]-[17:31:51] [ - ]
3414|_[ + ] Target:: [ https://www.actforamerica.org/action/oldglory ]
3415|_[ + ] Exploit::
3416|_[ + ] Information Server:: , , IP::0
3417|_[ + ] More details::
3418|_[ + ] Found:: UNIDENTIFIED
3419
3420 _[ - ]::--------------------------------------------------------------------------------------------------------------
3421|_[ + ] [ 58 / 100 ]-[17:31:51] [ - ]
3422|_[ + ] Target:: [ https://www.actforamerica.org/action/29 ]
3423|_[ + ] Exploit::
3424|_[ + ] Information Server:: , , IP::0
3425|_[ + ] More details::
3426|_[ + ] Found:: UNIDENTIFIED
3427
3428 _[ - ]::--------------------------------------------------------------------------------------------------------------
3429|_[ + ] [ 59 / 100 ]-[17:31:52] [ - ]
3430|_[ + ] Target:: [ https://www.actforamerica.org/action/asylumabuse ]
3431|_[ + ] Exploit::
3432|_[ + ] Information Server:: , , IP::0
3433|_[ + ] More details::
3434|_[ + ] Found:: UNIDENTIFIED
3435
3436 _[ - ]::--------------------------------------------------------------------------------------------------------------
3437|_[ + ] [ 60 / 100 ]-[17:31:54] [ - ]
3438|_[ + ] Target:: [ https://www.actforamerica.org/militaryandlawenforcement/lawenforcement ]
3439|_[ + ] Exploit::
3440|_[ + ] Information Server:: , , IP::0
3441|_[ + ] More details::
3442|_[ + ] Found:: UNIDENTIFIED
3443
3444 _[ - ]::--------------------------------------------------------------------------------------------------------------
3445|_[ + ] [ 61 / 100 ]-[17:31:54] [ - ]
3446|_[ + ] Target:: [ https://www.actforamerica.org/action/elchapo ]
3447|_[ + ] Exploit::
3448|_[ + ] Information Server:: , , IP::0
3449|_[ + ] More details::
3450|_[ + ] Found:: UNIDENTIFIED
3451
3452 _[ - ]::--------------------------------------------------------------------------------------------------------------
3453|_[ + ] [ 62 / 100 ]-[17:31:56] [ - ]
3454|_[ + ] Target:: [ https://www.actforamerica.org/action/taps ]
3455|_[ + ] Exploit::
3456|_[ + ] Information Server:: , , IP::0
3457|_[ + ] More details::
3458|_[ + ] Found:: UNIDENTIFIED
3459
3460 _[ - ]::--------------------------------------------------------------------------------------------------------------
3461|_[ + ] [ 63 / 100 ]-[17:31:57] [ - ]
3462|_[ + ] Target:: [ https://www.actforamerica.org/user/register ]
3463|_[ + ] Exploit::
3464|_[ + ] Information Server:: , , IP::0
3465|_[ + ] More details::
3466|_[ + ] Found:: UNIDENTIFIED
3467
3468 _[ - ]::--------------------------------------------------------------------------------------------------------------
3469|_[ + ] [ 64 / 100 ]-[17:31:57] [ - ]
3470|_[ + ] Target:: [ https://www.actforamerica.org/event/spacecoast ]
3471|_[ + ] Exploit::
3472|_[ + ] Information Server:: , , IP::0
3473|_[ + ] More details::
3474|_[ + ] Found:: UNIDENTIFIED
3475
3476 _[ - ]::--------------------------------------------------------------------------------------------------------------
3477|_[ + ] [ 65 / 100 ]-[17:31:59] [ - ]
3478|_[ + ] Target:: [ https://www.actforamerica.org/action/nba ]
3479|_[ + ] Exploit::
3480|_[ + ] Information Server:: , , IP::0
3481|_[ + ] More details::
3482|_[ + ] Found:: UNIDENTIFIED
3483
3484 _[ - ]::--------------------------------------------------------------------------------------------------------------
3485|_[ + ] [ 66 / 100 ]-[17:31:59] [ - ]
3486|_[ + ] Target:: [ https://www.actforamerica.org/action/fgm1 ]
3487|_[ + ] Exploit::
3488|_[ + ] Information Server:: , , IP::0
3489|_[ + ] More details::
3490|_[ + ] Found:: UNIDENTIFIED
3491
3492 _[ - ]::--------------------------------------------------------------------------------------------------------------
3493|_[ + ] [ 67 / 100 ]-[17:32:01] [ - ]
3494|_[ + ] Target:: [ https://www.actforamerica.org/action/marriottcair ]
3495|_[ + ] Exploit::
3496|_[ + ] Information Server:: , , IP::0
3497|_[ + ] More details::
3498|_[ + ] Found:: UNIDENTIFIED
3499
3500 _[ - ]::--------------------------------------------------------------------------------------------------------------
3501|_[ + ] [ 68 / 100 ]-[17:32:01] [ - ]
3502|_[ + ] Target:: [ https://www.actforamerica.org/ACTION/PROTECTANDSERVE ]
3503|_[ + ] Exploit::
3504|_[ + ] Information Server:: , , IP::0
3505|_[ + ] More details::
3506|_[ + ] Found:: UNIDENTIFIED
3507
3508 _[ - ]::--------------------------------------------------------------------------------------------------------------
3509|_[ + ] [ 69 / 100 ]-[17:32:03] [ - ]
3510|_[ + ] Target:: [ https://www.actforamerica.org/action/fto ]
3511|_[ + ] Exploit::
3512|_[ + ] Information Server:: , , IP::0
3513|_[ + ] More details::
3514|_[ + ] Found:: UNIDENTIFIED
3515
3516 _[ - ]::--------------------------------------------------------------------------------------------------------------
3517|_[ + ] [ 70 / 100 ]-[17:32:03] [ - ]
3518|_[ + ] Target:: [ https://www.actforamerica.org/action/callhyatt ]
3519|_[ + ] Exploit::
3520|_[ + ] Information Server:: , , IP::0
3521|_[ + ] More details::
3522|_[ + ] Found:: UNIDENTIFIED
3523
3524 _[ - ]::--------------------------------------------------------------------------------------------------------------
3525|_[ + ] [ 71 / 100 ]-[17:32:05] [ - ]
3526|_[ + ] Target:: [ https://www.actforamerica.org/action/bernie ]
3527|_[ + ] Exploit::
3528|_[ + ] Information Server:: , , IP::0
3529|_[ + ] More details::
3530|_[ + ] Found:: UNIDENTIFIED
3531
3532 _[ - ]::--------------------------------------------------------------------------------------------------------------
3533|_[ + ] [ 72 / 100 ]-[17:32:05] [ - ]
3534|_[ + ] Target:: [ https://www.actforamerica.org/action/warcollege ]
3535|_[ + ] Exploit::
3536|_[ + ] Information Server:: , , IP::0
3537|_[ + ] More details::
3538|_[ + ] Found:: UNIDENTIFIED
3539
3540 _[ - ]::--------------------------------------------------------------------------------------------------------------
3541|_[ + ] [ 73 / 100 ]-[17:32:07] [ - ]
3542|_[ + ] Target:: [ https://www.actforamerica.org/node/264 ]
3543|_[ + ] Exploit::
3544|_[ + ] Information Server:: , , IP::0
3545|_[ + ] More details::
3546|_[ + ] Found:: UNIDENTIFIED
3547
3548 _[ - ]::--------------------------------------------------------------------------------------------------------------
3549|_[ + ] [ 74 / 100 ]-[17:32:07] [ - ]
3550|_[ + ] Target:: [ https://www.actforamerica.org/action/impeachment ]
3551|_[ + ] Exploit::
3552|_[ + ] Information Server:: , , IP::0
3553|_[ + ] More details::
3554|_[ + ] Found:: UNIDENTIFIED
3555
3556 _[ - ]::--------------------------------------------------------------------------------------------------------------
3557|_[ + ] [ 75 / 100 ]-[17:32:09] [ - ]
3558|_[ + ] Target:: [ https://www.actforamerica.org/action/28 ]
3559|_[ + ] Exploit::
3560|_[ + ] Information Server:: , , IP::0
3561|_[ + ] More details::
3562|_[ + ] Found:: UNIDENTIFIED
3563
3564 _[ - ]::--------------------------------------------------------------------------------------------------------------
3565|_[ + ] [ 76 / 100 ]-[17:32:10] [ - ]
3566|_[ + ] Target:: [ https://www.actforamerica.org/action/buildthewall ]
3567|_[ + ] Exploit::
3568|_[ + ] Information Server:: , , IP::0
3569|_[ + ] More details::
3570|_[ + ] Found:: UNIDENTIFIED
3571
3572 _[ - ]::--------------------------------------------------------------------------------------------------------------
3573|_[ + ] [ 77 / 100 ]-[17:32:10] [ - ]
3574|_[ + ] Target:: [ https://www.actforamerica.org/pressreleases/response_to_splc ]
3575|_[ + ] Exploit::
3576|_[ + ] Information Server:: , , IP::0
3577|_[ + ] More details::
3578|_[ + ] Found:: UNIDENTIFIED
3579
3580 _[ - ]::--------------------------------------------------------------------------------------------------------------
3581|_[ + ] [ 78 / 100 ]-[17:32:12] [ - ]
3582|_[ + ] Target:: [ https://www.actforamerica.org/militaryandlawenforcement/supportourlawenforcement ]
3583|_[ + ] Exploit::
3584|_[ + ] Information Server:: , , IP::0
3585|_[ + ] More details::
3586|_[ + ] Found:: UNIDENTIFIED
3587
3588 _[ - ]::--------------------------------------------------------------------------------------------------------------
3589|_[ + ] [ 79 / 100 ]-[17:32:12] [ - ]
3590|_[ + ] Target:: [ https://www.actforamerica.org/action/birthright ]
3591|_[ + ] Exploit::
3592|_[ + ] Information Server:: , , IP::0
3593|_[ + ] More details::
3594|_[ + ] Found:: UNIDENTIFIED
3595
3596 _[ - ]::--------------------------------------------------------------------------------------------------------------
3597|_[ + ] [ 80 / 100 ]-[17:32:13] [ - ]
3598|_[ + ] Target:: [ https://www.actforamerica.org/action/uga ]
3599|_[ + ] Exploit::
3600|_[ + ] Information Server:: , , IP::0
3601|_[ + ] More details::
3602|_[ + ] Found:: UNIDENTIFIED
3603
3604 _[ - ]::--------------------------------------------------------------------------------------------------------------
3605|_[ + ] [ 81 / 100 ]-[17:32:15] [ - ]
3606|_[ + ] Target:: [ https://www.actforamerica.org/action/thankyoutrump ]
3607|_[ + ] Exploit::
3608|_[ + ] Information Server:: , , IP::0
3609|_[ + ] More details::
3610|_[ + ] Found:: UNIDENTIFIED
3611
3612 _[ - ]::--------------------------------------------------------------------------------------------------------------
3613|_[ + ] [ 82 / 100 ]-[17:32:15] [ - ]
3614|_[ + ] Target:: [ https://www.actforamerica.org/action/sfsu ]
3615|_[ + ] Exploit::
3616|_[ + ] Information Server:: , , IP::0
3617|_[ + ] More details::
3618|_[ + ] Found:: UNIDENTIFIED
3619
3620 _[ - ]::--------------------------------------------------------------------------------------------------------------
3621|_[ + ] [ 83 / 100 ]-[17:32:17] [ - ]
3622|_[ + ] Target:: [ https://www.actforamerica.org/action/saveasia1 ]
3623|_[ + ] Exploit::
3624|_[ + ] Information Server:: , , IP::0
3625|_[ + ] More details::
3626|_[ + ] Found:: UNIDENTIFIED
3627
3628 _[ - ]::--------------------------------------------------------------------------------------------------------------
3629|_[ + ] [ 84 / 100 ]-[17:32:17] [ - ]
3630|_[ + ] Target:: [ https://www.actforamerica.org/action/masa ]
3631|_[ + ] Exploit::
3632|_[ + ] Information Server:: , , IP::0
3633|_[ + ] More details::
3634|_[ + ] Found:: UNIDENTIFIED
3635
3636 _[ - ]::--------------------------------------------------------------------------------------------------------------
3637|_[ + ] [ 85 / 100 ]-[17:32:19] [ - ]
3638|_[ + ] Target:: [ https://www.actforamerica.org/action/saveasia ]
3639|_[ + ] Exploit::
3640|_[ + ] Information Server:: , , IP::0
3641|_[ + ] More details::
3642|_[ + ] Found:: UNIDENTIFIED
3643
3644 _[ - ]::--------------------------------------------------------------------------------------------------------------
3645|_[ + ] [ 86 / 100 ]-[17:32:19] [ - ]
3646|_[ + ] Target:: [ https://www.actforamerica.org/action/trumpnominations ]
3647|_[ + ] Exploit::
3648|_[ + ] Information Server:: , , IP::0
3649|_[ + ] More details::
3650|_[ + ] Found:: UNIDENTIFIED
3651
3652 _[ - ]::--------------------------------------------------------------------------------------------------------------
3653|_[ + ] [ 87 / 100 ]-[17:32:20] [ - ]
3654|_[ + ] Target:: [ https://www.actforamerica.org/action/antifaresolution ]
3655|_[ + ] Exploit::
3656|_[ + ] Information Server:: , , IP::0
3657|_[ + ] More details::
3658|_[ + ] Found:: UNIDENTIFIED
3659
3660 _[ - ]::--------------------------------------------------------------------------------------------------------------
3661|_[ + ] [ 88 / 100 ]-[17:32:21] [ - ]
3662|_[ + ] Target:: [ https://www.actforamerica.org/issues/exposingsocialism ]
3663|_[ + ] Exploit::
3664|_[ + ] Information Server:: , , IP::0
3665|_[ + ] More details::
3666|_[ + ] Found:: UNIDENTIFIED
3667
3668 _[ - ]::--------------------------------------------------------------------------------------------------------------
3669|_[ + ] [ 89 / 100 ]-[17:32:23] [ - ]
3670|_[ + ] Target:: [ https://www.actforamerica.org/fight-back ]
3671|_[ + ] Exploit::
3672|_[ + ] Information Server:: , , IP::0
3673|_[ + ] More details::
3674|_[ + ] Found:: UNIDENTIFIED
3675
3676 _[ - ]::--------------------------------------------------------------------------------------------------------------
3677|_[ + ] [ 90 / 100 ]-[17:32:23] [ - ]
3678|_[ + ] Target:: [ https://www.actforamerica.org/action/sanctuarycities ]
3679|_[ + ] Exploit::
3680|_[ + ] Information Server:: , , IP::0
3681|_[ + ] More details::
3682|_[ + ] Found:: UNIDENTIFIED
3683
3684 _[ - ]::--------------------------------------------------------------------------------------------------------------
3685|_[ + ] [ 91 / 100 ]-[17:32:25] [ - ]
3686|_[ + ] Target:: [ https://www.actforamerica.org/action/25 ]
3687|_[ + ] Exploit::
3688|_[ + ] Information Server:: , , IP::0
3689|_[ + ] More details::
3690|_[ + ] Found:: UNIDENTIFIED
3691
3692 _[ - ]::--------------------------------------------------------------------------------------------------------------
3693|_[ + ] [ 92 / 100 ]-[17:32:25] [ - ]
3694|_[ + ] Target:: [ https://www.actforamerica.org/criticalinfrastructure/energysecurity ]
3695|_[ + ] Exploit::
3696|_[ + ] Information Server:: , , IP::0
3697|_[ + ] More details::
3698|_[ + ] Found:: UNIDENTIFIED
3699
3700 _[ - ]::--------------------------------------------------------------------------------------------------------------
3701|_[ + ] [ 93 / 100 ]-[17:32:27] [ - ]
3702|_[ + ] Target:: [ https://www.actforamerica.org/action/noamnesty ]
3703|_[ + ] Exploit::
3704|_[ + ] Information Server:: , , IP::0
3705|_[ + ] More details::
3706|_[ + ] Found:: UNIDENTIFIED
3707
3708 _[ - ]::--------------------------------------------------------------------------------------------------------------
3709|_[ + ] [ 94 / 100 ]-[17:32:27] [ - ]
3710|_[ + ] Target:: [ https://www.actforamerica.org/project/statelegteam ]
3711|_[ + ] Exploit::
3712|_[ + ] Information Server:: , , IP::0
3713|_[ + ] More details::
3714|_[ + ] Found:: UNIDENTIFIED
3715
3716 _[ - ]::--------------------------------------------------------------------------------------------------------------
3717|_[ + ] [ 95 / 100 ]-[17:32:29] [ - ]
3718|_[ + ] Target:: [ https://www.actforamerica.org/constitutionalfreedoms/fgm ]
3719|_[ + ] Exploit::
3720|_[ + ] Information Server:: , , IP::0
3721|_[ + ] More details::
3722|_[ + ] Found:: UNIDENTIFIED
3723
3724 _[ - ]::--------------------------------------------------------------------------------------------------------------
3725|_[ + ] [ 96 / 100 ]-[17:32:29] [ - ]
3726|_[ + ] Target:: [ https://www.actforamerica.org/action/21 ]
3727|_[ + ] Exploit::
3728|_[ + ] Information Server:: , , IP::0
3729|_[ + ] More details::
3730|_[ + ] Found:: UNIDENTIFIED
3731
3732 _[ - ]::--------------------------------------------------------------------------------------------------------------
3733|_[ + ] [ 97 / 100 ]-[17:32:31] [ - ]
3734|_[ + ] Target:: [ https://www.actforamerica.org/action/hyatt ]
3735|_[ + ] Exploit::
3736|_[ + ] Information Server:: , , IP::0
3737|_[ + ] More details::
3738|_[ + ] Found:: UNIDENTIFIED
3739
3740 _[ - ]::--------------------------------------------------------------------------------------------------------------
3741|_[ + ] [ 98 / 100 ]-[17:32:32] [ - ]
3742|_[ + ] Target:: [ https://www.actforamerica.org/action/02 ]
3743|_[ + ] Exploit::
3744|_[ + ] Information Server:: , , IP::0
3745|_[ + ] More details::
3746|_[ + ] Found:: UNIDENTIFIED
3747
3748 _[ - ]::--------------------------------------------------------------------------------------------------------------
3749|_[ + ] [ 99 / 100 ]-[17:32:32] [ - ]
3750|_[ + ] Target:: [ https://www.actforamerica.org/action/trumpbirthright ]
3751|_[ + ] Exploit::
3752|_[ + ] Information Server:: , , IP::0
3753|_[ + ] More details::
3754|_[ + ] Found:: UNIDENTIFIED
3755
3756[ INFO ] [ Shutting down ]
3757[ INFO ] [ End of process INURLBR at [24-10-2019 17:32:32]
3758[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
3759[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.actforamerica.org/output/inurlbr-www.actforamerica.org ]
3760|_________________________________________________________________________________________
3761
3762\_________________________________________________________________________________________/
3763######################################################################################################################################
3764Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 16:58 EDT
3765Nmap scan report for ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
3766Host is up (0.24s latency).
3767Not shown: 994 filtered ports, 4 closed ports
3768Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
3769PORT STATE SERVICE
377080/tcp open http
3771443/tcp open https
3772
3773Nmap done: 1 IP address (1 host up) scanned in 16.33 seconds
3774######################################################################################################################################
3775Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 16:58 EDT
3776Nmap scan report for ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
3777Host is up (0.20s latency).
3778Not shown: 2 filtered ports
3779PORT STATE SERVICE
378053/udp open|filtered domain
378167/udp open|filtered dhcps
378268/udp open|filtered dhcpc
378369/udp open|filtered tftp
378488/udp open|filtered kerberos-sec
3785123/udp open|filtered ntp
3786139/udp open|filtered netbios-ssn
3787161/udp open|filtered snmp
3788162/udp open|filtered snmptrap
3789389/udp open|filtered ldap
3790500/udp open|filtered isakmp
3791520/udp open|filtered route
37922049/udp open|filtered nfs
3793
3794Nmap done: 1 IP address (1 host up) scanned in 4.63 seconds
3795######################################################################################################################################
3796HTTP/1.1 301 Moved Permanently
3797Date: Thu, 24 Oct 2019 20:58:38 GMT
3798Server: Apache/2.4.18 (Ubuntu)
3799Location: https://www.actforamerica.org/
3800Content-Type: text/html; charset=iso-8859-1
3801######################################################################################################################################
3802//html5shim.googlecode.com/svn/trunk/html5.js
3803https://fonts.googleapis.com/css?family=Roboto:300,300i,400,400i,500,500i,700,700i,900,900i
3804https://twitter.com/ACTforAmerica
3805https://www.actforamerica.org
3806https://www.actforamerica.org/modules/comment/comment.css?pzqepo
3807https://www.actforamerica.org/modules/field/theme/field.css?pzqepo
3808https://www.actforamerica.org/modules/forum/forum.css?pzqepo
3809https://www.actforamerica.org/modules/node/node.css?pzqepo
3810https://www.actforamerica.org/modules/poll/poll.css?pzqepo
3811https://www.actforamerica.org/modules/system/system.base.css?pzqepo
3812https://www.actforamerica.org/modules/system/system.menus.css?pzqepo
3813https://www.actforamerica.org/modules/system/system.messages.css?pzqepo
3814https://www.actforamerica.org/modules/system/system.theme.css?pzqepo
3815https://www.actforamerica.org/modules/user/user.css?pzqepo
3816https://www.actforamerica.org/policy
3817https://www.actforamerica.org/search-page
3818https://www.actforamerica.org/sites/all/custom_ext/org.civicrm.shoreditch/css/custom-civicrm.css?pzqepo
3819https://www.actforamerica.org/sites/all/libraries/colorbox/example1/colorbox.css?pzqepo
3820https://www.actforamerica.org/sites/all/libraries/flexslider/flexslider.css?pzqepo
3821https://www.actforamerica.org/sites/all/modules/cctags/cctags.css?pzqepo
3822https://www.actforamerica.org/sites/all/modules/civicrm/css/civicrm.css?pzqepo
3823https://www.actforamerica.org/sites/all/modules/civicrm/css/crm-i.css?pzqepo
3824https://www.actforamerica.org/sites/all/modules/contrib/ckeditor/css/ckeditor.css?pzqepo
3825https://www.actforamerica.org/sites/all/modules/contrib/esign/css/esign.css?pzqepo
3826https://www.actforamerica.org/sites/all/modules/contrib/field_hidden/field_hidden.css?pzqepo
3827https://www.actforamerica.org/sites/all/modules/contrib/logintoboggan/logintoboggan.css?pzqepo
3828https://www.actforamerica.org/sites/all/modules/ctools/css/ctools.css?pzqepo
3829https://www.actforamerica.org/sites/all/modules/date/date_api/date.css?pzqepo
3830https://www.actforamerica.org/sites/all/modules/dismiss/css/dismiss.base.css?pzqepo
3831https://www.actforamerica.org/sites/all/modules/flexslider/assets/css/flexslider_img.css?pzqepo
3832https://www.actforamerica.org/sites/all/modules/panels/css/panels.css?pzqepo
3833https://www.actforamerica.org/sites/all/modules/panels/plugins/layouts/flexible/flexible.css?pzqepo
3834https://www.actforamerica.org/sites/all/modules/tipsy/stylesheets/tipsy.css?pzqepo
3835https://www.actforamerica.org/sites/all/modules/tm_font_awesome/css/font-awesome.css?pzqepo
3836https://www.actforamerica.org/sites/all/modules/ubercart/uc_file/uc_file.css?pzqepo
3837https://www.actforamerica.org/sites/all/modules/ubercart/uc_order/uc_order.css?pzqepo
3838https://www.actforamerica.org/sites/all/modules/ubercart/uc_product/uc_product.css?pzqepo
3839https://www.actforamerica.org/sites/all/modules/ubercart/uc_store/uc_store.css?pzqepo
3840https://www.actforamerica.org/sites/all/modules/views/css/views.css?pzqepo
3841https://www.actforamerica.org/sites/all/themes/theme1008/css/boilerplate.css?pzqepo
3842https://www.actforamerica.org/sites/all/themes/theme1008/css/custom.css?pzqepo
3843https://www.actforamerica.org/sites/all/themes/theme1008/css/maintenance-page.css?pzqepo
3844https://www.actforamerica.org/sites/all/themes/theme1008/css/skeleton.css?pzqepo
3845https://www.actforamerica.org/sites/all/themes/theme1008/css/style.css?pzqepo
3846https://www.actforamerica.org/sites/default/files/act_logo1_0.png
3847https://www.actforamerica.org/sites/default/files/ctools/css/2af122ee5a52d2af15d667bdd60e700e.css?pzqepo
3848https://www.actforamerica.org/termsofservice
3849https://www.facebook.com/actforamerica
3850https://www.googletagmanager.com/gtag/js?id=UA-124850613-1
3851https://www.googletagmanager.com/ns.html?id=GTM-5PK789R
3852https://www.youtube.com/user/act4america
3853<script src='/sites/all/modules/jquery_update/replace/jquery/1.10/jquery.min.js'>\x3C/script>
3854/sites/all/themes/theme1008/images/act_logo.png
3855//storage.ie6countdown.com/assets/100/images/banners/warning_bar_0000_us.jpg
3856text/css
3857text/javascript
3858//windows.microsoft.com/en-US/internet-explorer/products/ie/home?ocid=ie6_countdown_bannercode
3859#####################################################################################################################################
3860http://35.153.8.200 [301 Moved Permanently] Apache[2.4.18], Country[UNITED STATES][US], HTTPServer[Ubuntu Linux][Apache/2.4.18 (Ubuntu)], IP[35.153.8.200], RedirectLocation[https://www.actforamerica.org/], Title[301 Moved Permanently]
3861https://www.actforamerica.org/ [200 OK] Apache[2.4.18], Content-Language[en], Cookies[SSESS586d7b686dbf38938d315f79815252f8], Country[UNITED STATES][US], Drupal, Frame, HTML5, HTTPServer[Ubuntu Linux][Apache/2.4.18 (Ubuntu)], HttpOnly[SSESS586d7b686dbf38938d315f79815252f8], IP[35.153.8.200], JQuery[1.10,1.10.2], MetaGenerator[Drupal 7 (http://drupal.org)], Script[text/javascript], Title[ActForAmerica | since 2000], UncommonHeaders[x-content-type-options,x-drupal-cache,x-generator], X-Frame-Options[SAMEORIGIN], YouTube
3862######################################################################################################################################
3863
3864wig - WebApp Information Gatherer
3865
3866
3867Scanning https://www.actforamerica.org...
3868_______________________________________ SITE INFO _______________________________________
3869IP Title
387035.153.8.200 ActForAmerica | since 2000
3871
3872________________________________________ VERSION ________________________________________
3873Name Versions Type
3874Drupal 7.41 | 7.42 | 7.43 | 7.44 | 7.50 CMS
3875Apache 2.4.18 Platform
3876jQuery 1.4.4 JavaScript
3877Ubuntu 16.04 OS
3878
3879______________________________________ INTERESTING ______________________________________
3880URL Note Type
3881/install.php Drupal installation file Interesting
3882/robots.txt robots.txt index Interesting
3883/install.php Installation file Interesting
3884
3885_________________________________________ TOOLS _________________________________________
3886Name Link Software
3887droopescan https://github.com/droope/droopescan Drupal
3888CMSmap https://github.com/Dionach/CMSmap Drupal
3889
3890____________________________________ VULNERABILITIES ____________________________________
3891Affected #Vulns Link
3892Drupal 7.41 8 http://cvedetails.com/version/192974
3893Drupal 7.42 7 http://cvedetails.com/version/192973
3894Drupal 7.43 2 http://cvedetails.com/version/201714
3895
3896_________________________________________________________________________________________
3897Time: 1.5 sec Urls: 461 Fingerprints: 40401
3898######################################################################################################################################
3899Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 17:00 EDT
3900NSE: Loaded 163 scripts for scanning.
3901NSE: Script Pre-scanning.
3902Initiating NSE at 17:00
3903Completed NSE at 17:00, 0.00s elapsed
3904Initiating NSE at 17:00
3905Completed NSE at 17:00, 0.00s elapsed
3906Initiating Parallel DNS resolution of 1 host. at 17:00
3907Completed Parallel DNS resolution of 1 host. at 17:00, 0.02s elapsed
3908Initiating SYN Stealth Scan at 17:00
3909Scanning ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200) [1 port]
3910Discovered open port 80/tcp on 35.153.8.200
3911Completed SYN Stealth Scan at 17:00, 0.25s elapsed (1 total ports)
3912Initiating Service scan at 17:00
3913Scanning 1 service on ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
3914Completed Service scan at 17:00, 6.66s elapsed (1 service on 1 host)
3915Initiating OS detection (try #1) against ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
3916Retrying OS detection (try #2) against ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
3917Initiating Traceroute at 17:00
3918Completed Traceroute at 17:00, 6.40s elapsed
3919Initiating Parallel DNS resolution of 12 hosts. at 17:00
3920Completed Parallel DNS resolution of 12 hosts. at 17:00, 0.42s elapsed
3921NSE: Script scanning 35.153.8.200.
3922Initiating NSE at 17:00
3923NSE: [http-wordpress-enum 35.153.8.200:80] got no answers from pipelined queries
3924Completed NSE at 17:02, 133.00s elapsed
3925Initiating NSE at 17:02
3926Completed NSE at 17:02, 1.25s elapsed
3927Nmap scan report for ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
3928Host is up (0.27s latency).
3929
3930PORT STATE SERVICE VERSION
393180/tcp open http Apache httpd 2.4.18
3932|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
3933| http-brute:
3934|_ Path "/" does not require authentication
3935|_http-chrono: Request times for /; avg: 9458.41ms; min: 1859.19ms; max: 16306.11ms
3936|_http-csrf: Couldn't find any CSRF vulnerabilities.
3937|_http-date: Thu, 24 Oct 2019 21:00:40 GMT; -17s from local time.
3938|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
3939|_http-dombased-xss: Couldn't find any DOM based XSS.
3940|_http-errors: Couldn't find any error pages.
3941|_http-feed: Couldn't find any feeds.
3942|_http-fetch: Please enter the complete path of the directory to save data in.
3943| http-headers:
3944| Date: Thu, 24 Oct 2019 21:00:40 GMT
3945| Server: Apache/2.4.18 (Ubuntu)
3946| Location: https://www.actforamerica.org/
3947| Content-Length: 344
3948| Connection: close
3949| Content-Type: text/html; charset=iso-8859-1
3950|
3951|_ (Request type: GET)
3952|_http-jsonp-detection: Couldn't find any JSONP endpoints.
3953|_http-mobileversion-checker: No mobile version detected.
3954|_http-security-headers:
3955| http-sitemap-generator:
3956| Directory structure:
3957| Longest directory structure:
3958| Depth: 0
3959| Dir: /
3960| Total files found (by extension):
3961|_
3962|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
3963|_http-title: Did not follow redirect to https://www.actforamerica.org/
3964|_http-traceroute: ERROR: Script execution failed (use -d to debug)
3965| http-vhosts:
3966| 18 names had status 301
3967|_109 names had status ERROR
3968|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
3969|_http-xssed: No previously reported XSS vuln.
3970| vulners:
3971| cpe:/a:apache:http_server:2.4.18:
3972| CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
3973| CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
3974| CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
3975| CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
3976| CVE-2019-0211 7.2 https://vulners.com/cve/CVE-2019-0211
3977| CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
3978| CVE-2017-15715 6.8 https://vulners.com/cve/CVE-2017-15715
3979| CVE-2019-10082 6.4 https://vulners.com/cve/CVE-2019-10082
3980| CVE-2017-9788 6.4 https://vulners.com/cve/CVE-2017-9788
3981| CVE-2019-10098 5.8 https://vulners.com/cve/CVE-2019-10098
3982| CVE-2019-0220 5.0 https://vulners.com/cve/CVE-2019-0220
3983| CVE-2019-0196 5.0 https://vulners.com/cve/CVE-2019-0196
3984| CVE-2018-17199 5.0 https://vulners.com/cve/CVE-2018-17199
3985| CVE-2018-1333 5.0 https://vulners.com/cve/CVE-2018-1333
3986| CVE-2017-9798 5.0 https://vulners.com/cve/CVE-2017-9798
3987| CVE-2017-15710 5.0 https://vulners.com/cve/CVE-2017-15710
3988| CVE-2016-8743 5.0 https://vulners.com/cve/CVE-2016-8743
3989| CVE-2016-8740 5.0 https://vulners.com/cve/CVE-2016-8740
3990| CVE-2016-4979 5.0 https://vulners.com/cve/CVE-2016-4979
3991| CVE-2019-0197 4.9 https://vulners.com/cve/CVE-2019-0197
3992| CVE-2019-10092 4.3 https://vulners.com/cve/CVE-2019-10092
3993| CVE-2018-11763 4.3 https://vulners.com/cve/CVE-2018-11763
3994| CVE-2016-4975 4.3 https://vulners.com/cve/CVE-2016-4975
3995| CVE-2016-1546 4.3 https://vulners.com/cve/CVE-2016-1546
3996| CVE-2018-1283 3.5 https://vulners.com/cve/CVE-2018-1283
3997|_ CVE-2016-8612 3.3 https://vulners.com/cve/CVE-2016-8612
3998| vulscan: VulDB - https://vuldb.com:
3999| [88747] Apache HTTP Server 2.4.17/2.4.18 mod_http2 denial of service
4000| [76731] Apache HTTP Server 2.4.12 ErrorDocument 400 Crash denial of service
4001| [74367] Apache HTTP Server up to 2.4.12 mod_lua lua_request.c wsupgrade denial of service
4002| [68575] Apache HTTP Server up to 2.4.10 LuaAuthzProvider mod_lua.c privilege escalation
4003| [68435] Apache HTTP Server 2.4.10 mod_proxy_fcgi.c handle_headers denial of service
4004| [13300] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi setuid privilege escalation
4005| [13299] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi Content-Type Header information disclosure
4006| [136374] Apache HTTP Server up to 2.4.38 Slash Regular Expression unknown vulnerability
4007| [136373] Apache HTTP Server 2.4.34/2.4.35/2.4.36/2.4.37/2.4.38 HTTP2 Request Crash denial of service
4008| [136372] Apache HTTP Server up to 2.4.38 HTTP2 Request unknown vulnerability
4009| [133112] Apache HTTP Server up to 2.4.38 mod_auth_digest race condition privilege escalation
4010| [133111] Apache HTTP Server 2.4.37/2.4.38 mod_ssl Bypass privilege escalation
4011| [130341] Apache HTTP Server 2.4.37 mod_ssl Loop denial of service
4012| [130330] Apache HTTP Server up to 2.4.37 mod_session Expired privilege escalation
4013| [130329] Apache HTTP Server 2.4.37 mod_http2 Slowloris denial of service
4014| [124447] Apache HTTP Server up to 2.4.34 SETTINGS Frame denial of service
4015| [121910] Apache HTTP Server 2.4.33 mod_md HTTP Requests denial of service
4016| [122569] Apache HTTP Server up to 2.4.33 HTTP2 Request denial of service
4017| [115061] Apache HTTP Server up to 2.4.29 HTTP Digest Authentication Challenge HTTP Requests Replay privilege escalation
4018| [115060] Apache HTTP Server up to 2.4.29 mod_cache_socache Request Header Crash denial of service
4019| [115059] Apache HTTP Server up to 2.4.29 HTTP2 NULL Pointer Dereference denial of service
4020| [115058] Apache HTTP Server up to 2.4.29 HTTP Header Crash denial of service
4021| [115057] Apache HTTP Server up to 2.4.29 mod_session Variable Name Cache privilege escalation
4022| [115039] Apache HTTP Server up to 2.4.29 FilesMatch File Upload privilege escalation
4023| [114258] Apache HTTP Server up to 2.4.22 mod_cluster Segmentation Fault denial of service
4024| [104986] Apache CXF 2.4.5/2.5.1 WS-SP UsernameToken Policy SOAP Request weak authentication
4025| [103521] Apache HTTP Server 2.4.26 HTTP2 Free memory corruption
4026| [94627] Apache HTTP Server up to 2.4.24 mod_auth_digest Crash denial of service
4027| [94626] Apache HTTP Server up to 2.4.24 mod_session_crypto Padding weak encryption
4028| [94625] Apache HTTP Server up to 2.4.24 Response Split privilege escalation
4029| [93958] Apache HTTP Server up to 2.4.23 mod_http2 h2_stream.c denial of service
4030| [89669] Apache HTTP Server up to 2.4.23 RFC 3875 Namespace Conflict Environment Variable Open Redirect
4031| [88667] Apache HTTP Server up to 2.4.20 mod_http2 Certificate weak authentication
4032| [77083] Apache Groovy up to 2.4.3 MethodClosure.java MethodClosure memory corruption
4033| [76733] Apache HTTP Server 2.4.7/2.4.8/2.4.9/2.4.10/2.4.12 ap_some_auth_required unknown vulnerability
4034| [76732] Apache HTTP Server 2.4.7/2.4.8/2.4.9/2.4.10/2.4.12 Request apr_brigade_flatten privilege escalation
4035| [73106] Apache Hadoop up to 2.4.0 Symlink privilege escalation
4036| [67183] Apache HTTP Server up to 2.4.9 mod_proxy denial of service
4037| [67180] Apache HTTP Server up to 2.4.9 WinNT MPM Memory Leak denial of service
4038| [67185] Apache HTTP Server up to 2.4.9 mod_status Heap-Based memory corruption
4039| [67184] Apache HTTP Server 2.4.5/2.4.6 mod_cache NULL Pointer Dereference denial of service
4040| [67182] Apache HTTP Server up to 2.4.9 mod_deflate Memory Consumption denial of service
4041| [67181] Apache HTTP Server up to 2.4.9 mod_cgid denial of service
4042| [12667] Apache HTTP Server 2.4.7 mod_log_config.c log_cookie denial of service
4043| [9683] Apache HTTP Server 2.4.5 mod_session_dbd denial of service
4044| [7202] Apache HTTP Server 2.4.2 on Oracle Solaris ld_library_path cross site scripting
4045| [62417] Apache CXF 2.4.7/2.4.8/2.5.3/2.5.4/2.6.1 spoofing
4046| [6092] Apache HTTP Server 2.4.0/2.4.1/2.4.2 mod_proxy_ajp.c information disclosure
4047| [6090] Apache HTTP Server 2.4.0/2.4.1/2.4.2 mod_proxy_http.c information disclosure
4048| [9673] Apache HTTP Server up to 2.4.4 mod_dav mod_dav.c Request denial of service
4049|
4050| MITRE CVE - https://cve.mitre.org:
4051| [CVE-2013-2249] mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
4052| [CVE-2012-4558] Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
4053| [CVE-2012-3502] The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.
4054| [CVE-2012-3499] Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
4055| [CVE-2012-3451] Apache CXF before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote attackers to execute unintended web-service operations by sending a header with a SOAP Action String that is inconsistent with the message body.
4056| [CVE-2012-2687] Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
4057| [CVE-2012-2379] Apache CXF 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.
4058| [CVE-2012-2378] Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) EncryptedElements policies.
4059| [CVE-2012-0883] envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
4060| [CVE-2011-2516] Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
4061|
4062| SecurityFocus - https://www.securityfocus.com/bid/:
4063| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
4064| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
4065| [15413] PHP Apache 2 Virtual() Safe_Mode and Open_Basedir Restriction Bypass Vulnerability
4066| [15177] PHP Apache 2 Local Denial of Service Vulnerability
4067| [6065] Apache 2 WebDAV CGI POST Request Information Disclosure Vulnerability
4068| [5816] Apache 2 mod_dav Denial Of Service Vulnerability
4069| [5486] Apache 2.0 CGI Path Disclosure Vulnerability
4070| [5485] Apache 2.0 Path Disclosure Vulnerability
4071| [5434] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
4072| [5256] Apache httpd 2.0 CGI Error Path Disclosure Vulnerability
4073| [4057] Apache 2 for Windows OPTIONS request Path Disclosure Vulnerability
4074| [4056] Apache 2 for Windows php.exe Path Disclosure Vulnerability
4075|
4076| IBM X-Force - https://exchange.xforce.ibmcloud.com:
4077| [75211] Debian GNU/Linux apache 2 cross-site scripting
4078|
4079| Exploit-DB - https://www.exploit-db.com:
4080| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
4081| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
4082| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
4083| [28424] Apache 2.x HTTP Server Arbitrary HTTP Request Headers Security Weakness
4084| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
4085| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
4086| [27135] Apache Struts 2 DefaultActionMapper Prefixes OGNL Code Execution
4087| [26710] Apache CXF prior to 2.5.10, 2.6.7 and 2.7.4 - Denial of Service
4088| [24590] Apache 2.0.x mod_ssl Remote Denial of Service Vulnerability
4089| [23581] Apache 2.0.4x mod_perl Module File Descriptor Leakage Vulnerability
4090| [23482] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (2)
4091| [23481] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (1)
4092| [23296] Red Hat Apache 2.0.40 Directory Index Default Configuration Error
4093| [23282] apache cocoon 2.14/2.2 - Directory Traversal vulnerability
4094| [22191] Apache Web Server 2.0.x MS-DOS Device Name Denial of Service Vulnerability
4095| [21854] Apache 2.0.39/40 Oversized STDERR Buffer Denial of Service Vulnerability
4096| [21719] Apache 2.0 Path Disclosure Vulnerability
4097| [21697] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
4098| [20272] Apache 1.2.5/1.3.1,UnityMail 2.0 MIME Header DoS Vulnerability
4099| [19828] Cobalt RaQ 2.0/3.0 Apache .htaccess Disclosure Vulnerability
4100| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
4101| [18329] Apache Struts2 <= 2.3.1 - Multiple Vulnerabilities
4102| [17691] Apache Struts < 2.2.0 - Remote Command Execution
4103| [15319] Apache 2.2 (Windows) Local Denial of Service
4104| [14617] Apache JackRabbit 2.0.0 webapp XPath Injection
4105| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
4106| [8458] Apache Geronimo <= 2.1.3 - Multiple Directory Traversal Vulnerabilities
4107| [5330] Apache 2.0 mod_jk2 2.0.2 - Remote Buffer Overflow Exploit (win32)
4108| [3996] Apache 2.0.58 mod_rewrite Remote Overflow Exploit (win2k3)
4109| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
4110| [1056] Apache <= 2.0.49 Arbitrary Long HTTP Headers Denial of Service
4111| [855] Apache <= 2.0.52 HTTP GET request Denial of Service Exploit
4112| [132] Apache 1.3.x - 2.0.48 - mod_userdir Remote Users Disclosure Exploit
4113| [38] Apache <= 2.0.45 APR Remote Exploit -Apache-Knacker.pl
4114| [34] Webfroot Shoutbox < 2.32 (Apache) Remote Exploit
4115| [11] Apache <= 2.0.44 Linux Remote Denial of Service Exploit
4116| [9] Apache HTTP Server 2.x Memory Leak Exploit
4117|
4118| OpenVAS (Nessus) - http://www.openvas.org:
4119| [855524] Solaris Update for Apache 2 120544-14
4120| [855077] Solaris Update for Apache 2 120543-14
4121| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
4122| [72626] Debian Security Advisory DSA 2579-1 (apache2)
4123| [71551] Gentoo Security Advisory GLSA 201206-25 (apache)
4124| [71550] Gentoo Security Advisory GLSA 201206-24 (apache tomcat)
4125| [71485] Debian Security Advisory DSA 2506-1 (libapache-mod-security)
4126| [71256] Debian Security Advisory DSA 2452-1 (apache2)
4127| [71238] Debian Security Advisory DSA 2436-1 (libapache2-mod-fcgid)
4128| [70724] Debian Security Advisory DSA 2405-1 (apache2)
4129| [70235] Debian Security Advisory DSA 2298-2 (apache2)
4130| [70233] Debian Security Advisory DSA 2298-1 (apache2)
4131| [69988] Debian Security Advisory DSA 2279-1 (libapache2-mod-authnz-external)
4132| [69338] Debian Security Advisory DSA 2202-1 (apache2)
4133| [65131] SLES9: Security update for Apache 2 oes/CORE
4134| [64426] Gentoo Security Advisory GLSA 200907-04 (apache)
4135| [61381] Gentoo Security Advisory GLSA 200807-06 (apache)
4136| [60582] Gentoo Security Advisory GLSA 200803-19 (apache)
4137| [58745] Gentoo Security Advisory GLSA 200711-06 (apache)
4138| [57851] Gentoo Security Advisory GLSA 200608-01 (apache)
4139| [56246] Gentoo Security Advisory GLSA 200602-03 (Apache)
4140| [55392] Gentoo Security Advisory GLSA 200509-12 (Apache)
4141| [55129] Gentoo Security Advisory GLSA 200508-15 (apache)
4142| [54739] Gentoo Security Advisory GLSA 200411-18 (apache)
4143| [54724] Gentoo Security Advisory GLSA 200411-03 (apache)
4144| [54712] Gentoo Security Advisory GLSA 200410-21 (apache)
4145| [54689] Gentoo Security Advisory GLSA 200409-33 (net=www/apache)
4146| [54677] Gentoo Security Advisory GLSA 200409-21 (apache)
4147| [54610] Gentoo Security Advisory GLSA 200407-03 (Apache)
4148| [54601] Gentoo Security Advisory GLSA 200406-16 (Apache)
4149| [54590] Gentoo Security Advisory GLSA 200406-05 (Apache)
4150| [54582] Gentoo Security Advisory GLSA 200405-22 (Apache)
4151| [54529] Gentoo Security Advisory GLSA 200403-04 (Apache)
4152| [54499] Gentoo Security Advisory GLSA 200310-04 (Apache)
4153| [54498] Gentoo Security Advisory GLSA 200310-03 (Apache)
4154| [11092] Apache 2.0.39 Win32 directory traversal
4155| [66081] SLES11: Security update for Apache 2
4156| [66074] SLES10: Security update for Apache 2
4157| [66070] SLES9: Security update for Apache 2
4158| [65893] SLES10: Security update for Apache 2
4159| [65888] SLES10: Security update for Apache 2
4160| [65510] SLES9: Security update for Apache 2
4161| [65249] SLES9: Security update for Apache 2
4162| [65230] SLES9: Security update for Apache 2
4163| [65228] SLES9: Security update for Apache 2
4164| [65207] SLES9: Security update for Apache 2
4165| [65136] SLES9: Security update for Apache 2
4166| [65017] SLES9: Security update for Apache 2
4167|
4168| SecurityTracker - https://www.securitytracker.com:
4169| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
4170| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
4171| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
4172| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
4173| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
4174|
4175| OSVDB - http://www.osvdb.org:
4176| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
4177|_
4178Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4179Device type: general purpose|specialized|storage-misc
4180Running (JUST GUESSING): Linux 3.X (89%), Crestron 2-Series (87%), HP embedded (85%)
4181OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:crestron:2_series cpe:/h:hp:p2000_g3
4182Aggressive OS guesses: Linux 3.10 - 3.13 (89%), Crestron XPanel control system (87%), HP P2000 G3 NAS device (85%)
4183No exact OS matches for host (test conditions non-ideal).
4184Uptime guess: 18.715 days (since Sat Oct 5 23:53:31 2019)
4185Network Distance: 29 hops
4186TCP Sequence Prediction: Difficulty=262 (Good luck!)
4187IP ID Sequence Generation: All zeros
4188Service Info: Host: www.actforamerica.org
4189
4190TRACEROUTE (using port 80/tcp)
4191HOP RTT ADDRESS
41921 279.12 ms 10.242.204.1
41932 279.17 ms 45.131.5.3
41943 279.20 ms 109.236.95.228
41954 279.22 ms be4381.rcr21.rtm01.atlas.cogentco.com (149.6.110.89)
41965 279.25 ms be3382.ccr41.lon13.atlas.cogentco.com (154.54.39.217)
41976 378.69 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
41987 378.69 ms be3496.ccr31.jfk10.atlas.cogentco.com (154.54.0.142)
41998 279.30 ms 38.140.107.42
42009 378.73 ms 52.93.31.61
420110 178.34 ms 52.93.4.58
420211 ...
420312 222.82 ms 54.240.229.149
420413 ... 28
420529 251.91 ms ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
4206
4207NSE: Script Post-scanning.
4208Initiating NSE at 17:02
4209Completed NSE at 17:02, 0.00s elapsed
4210Initiating NSE at 17:02
4211Completed NSE at 17:02, 0.00s elapsed
4212######################################################################################################################################
4213Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 17:03 EDT
4214NSE: Loaded 163 scripts for scanning.
4215NSE: Script Pre-scanning.
4216Initiating NSE at 17:03
4217Completed NSE at 17:03, 0.00s elapsed
4218Initiating NSE at 17:03
4219Completed NSE at 17:03, 0.00s elapsed
4220Initiating Parallel DNS resolution of 1 host. at 17:03
4221Completed Parallel DNS resolution of 1 host. at 17:03, 0.02s elapsed
4222Initiating SYN Stealth Scan at 17:03
4223Scanning ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200) [1 port]
4224Completed SYN Stealth Scan at 17:03, 0.27s elapsed (1 total ports)
4225Initiating Service scan at 17:03
4226Initiating OS detection (try #1) against ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
4227Retrying OS detection (try #2) against ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
4228Initiating Traceroute at 17:03
4229Completed Traceroute at 17:03, 6.40s elapsed
4230Initiating Parallel DNS resolution of 11 hosts. at 17:03
4231Completed Parallel DNS resolution of 11 hosts. at 17:03, 0.39s elapsed
4232NSE: Script scanning 35.153.8.200.
4233Initiating NSE at 17:03
4234Completed NSE at 17:03, 0.01s elapsed
4235Initiating NSE at 17:03
4236Completed NSE at 17:03, 0.00s elapsed
4237Nmap scan report for ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
4238Host is up (0.21s latency).
4239
4240PORT STATE SERVICE VERSION
4241443/tcp filtered https
4242Too many fingerprints match this host to give specific OS details
4243
4244TRACEROUTE (using proto 1/icmp)
4245HOP RTT ADDRESS
42461 278.38 ms 10.242.204.1
42472 278.42 ms 45.131.5.3
42483 278.41 ms 109.236.95.230
42494 278.43 ms be4381.rcr21.rtm01.atlas.cogentco.com (149.6.110.89)
42505 278.45 ms be3382.ccr41.lon13.atlas.cogentco.com (154.54.39.217)
42516 378.45 ms be2317.ccr41.jfk02.atlas.cogentco.com (154.54.30.185)
42527 378.47 ms be3495.ccr31.jfk10.atlas.cogentco.com (66.28.4.182)
42538 378.42 ms 38.140.106.162
42549 378.49 ms 52.93.31.33
425510 178.46 ms 52.93.4.32
425611 296.04 ms 52.93.4.32
425712 302.60 ms 54.240.229.143
425813 ... 30
4259
4260NSE: Script Post-scanning.
4261Initiating NSE at 17:03
4262Completed NSE at 17:03, 0.00s elapsed
4263Initiating NSE at 17:03
4264Completed NSE at 17:03, 0.00s elapsed
4265######################################################################################################################################
4266Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 17:03 EDT
4267NSE: Loaded 47 scripts for scanning.
4268NSE: Script Pre-scanning.
4269Initiating NSE at 17:03
4270Completed NSE at 17:03, 0.00s elapsed
4271Initiating NSE at 17:03
4272Completed NSE at 17:03, 0.00s elapsed
4273Initiating Ping Scan at 17:03
4274Scanning 35.153.8.200 [4 ports]
4275Completed Ping Scan at 17:03, 0.39s elapsed (1 total hosts)
4276Initiating Parallel DNS resolution of 1 host. at 17:03
4277Completed Parallel DNS resolution of 1 host. at 17:03, 0.04s elapsed
4278Initiating SYN Stealth Scan at 17:03
4279Scanning ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200) [65535 ports]
4280SYN Stealth Scan Timing: About 3.76% done; ETC: 17:17 (0:13:14 remaining)
4281SYN Stealth Scan Timing: About 9.88% done; ETC: 17:14 (0:09:17 remaining)
4282SYN Stealth Scan Timing: About 18.03% done; ETC: 17:12 (0:06:54 remaining)
4283SYN Stealth Scan Timing: About 28.73% done; ETC: 17:10 (0:05:00 remaining)
4284SYN Stealth Scan Timing: About 39.14% done; ETC: 17:10 (0:03:55 remaining)
4285SYN Stealth Scan Timing: About 52.14% done; ETC: 17:09 (0:02:46 remaining)
4286SYN Stealth Scan Timing: About 64.27% done; ETC: 17:09 (0:01:57 remaining)
4287SYN Stealth Scan Timing: About 78.64% done; ETC: 17:08 (0:01:05 remaining)
4288Completed SYN Stealth Scan at 17:08, 280.53s elapsed (65535 total ports)
4289Initiating Service scan at 17:08
4290Initiating OS detection (try #1) against ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
4291Retrying OS detection (try #2) against ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
4292Initiating Traceroute at 17:08
4293Completed Traceroute at 17:08, 6.28s elapsed
4294Initiating Parallel DNS resolution of 14 hosts. at 17:08
4295Completed Parallel DNS resolution of 14 hosts. at 17:08, 0.27s elapsed
4296NSE: Script scanning 35.153.8.200.
4297Initiating NSE at 17:08
4298Completed NSE at 17:08, 0.00s elapsed
4299Initiating NSE at 17:08
4300Completed NSE at 17:08, 0.00s elapsed
4301Nmap scan report for ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
4302Host is up (0.26s latency).
4303Not shown: 65530 filtered ports
4304PORT STATE SERVICE VERSION
430525/tcp closed smtp
4306139/tcp closed netbios-ssn
4307445/tcp closed microsoft-ds
43088080/tcp closed http-proxy
43098983/tcp closed unknown
4310Too many fingerprints match this host to give specific OS details
4311Network Distance: 29 hops
4312
4313TRACEROUTE (using port 8080/tcp)
4314HOP RTT ADDRESS
43151 242.98 ms 10.242.204.1
43162 243.01 ms 45.131.5.3
43173 102.48 ms 109.236.95.224
43184 242.94 ms hu0-1-0-7.rcr21.ams06.atlas.cogentco.com (149.14.93.73)
43195 243.02 ms be3383.ccr42.lon13.atlas.cogentco.com (154.54.57.253)
43206 243.15 ms be12194.ccr41.lon13.atlas.cogentco.com (154.54.56.93)
43217 243.18 ms be3495.ccr31.jfk10.atlas.cogentco.com (66.28.4.182)
43228 243.13 ms 38.140.107.42
43239 243.26 ms 52.93.31.49
432410 243.41 ms 52.93.31.59
432511 255.14 ms 52.93.4.10
432612 251.15 ms 54.240.229.141
432713 ...
432814 351.84 ms 54.240.229.143
432915 ... 28
433029 397.23 ms ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
4331
4332NSE: Script Post-scanning.
4333Initiating NSE at 17:08
4334Completed NSE at 17:08, 0.00s elapsed
4335Initiating NSE at 17:08
4336Completed NSE at 17:08, 0.00s elapsed
4337######################################################################################################################################
4338Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 17:08 EDT
4339NSE: Loaded 47 scripts for scanning.
4340NSE: Script Pre-scanning.
4341Initiating NSE at 17:08
4342Completed NSE at 17:08, 0.00s elapsed
4343Initiating NSE at 17:08
4344Completed NSE at 17:08, 0.00s elapsed
4345Initiating Parallel DNS resolution of 1 host. at 17:08
4346Completed Parallel DNS resolution of 1 host. at 17:08, 0.02s elapsed
4347Initiating UDP Scan at 17:08
4348Scanning ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200) [15 ports]
4349Completed UDP Scan at 17:08, 4.28s elapsed (15 total ports)
4350Initiating Service scan at 17:08
4351Scanning 13 services on ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
4352Service scan Timing: About 7.69% done; ETC: 17:29 (0:19:24 remaining)
4353Completed Service scan at 17:10, 102.60s elapsed (13 services on 1 host)
4354Initiating OS detection (try #1) against ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
4355Retrying OS detection (try #2) against ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
4356Initiating Traceroute at 17:10
4357Completed Traceroute at 17:10, 7.21s elapsed
4358Initiating Parallel DNS resolution of 1 host. at 17:10
4359Completed Parallel DNS resolution of 1 host. at 17:10, 0.00s elapsed
4360NSE: Script scanning 35.153.8.200.
4361Initiating NSE at 17:10
4362Completed NSE at 17:10, 7.65s elapsed
4363Initiating NSE at 17:10
4364Completed NSE at 17:10, 1.78s elapsed
4365Nmap scan report for ec2-35-153-8-200.compute-1.amazonaws.com (35.153.8.200)
4366Host is up (0.20s latency).
4367
4368PORT STATE SERVICE VERSION
436953/udp open|filtered domain
437067/udp open|filtered dhcps
437168/udp open|filtered dhcpc
437269/udp open|filtered tftp
437388/udp open|filtered kerberos-sec
4374123/udp open|filtered ntp
4375137/udp filtered netbios-ns
4376138/udp filtered netbios-dgm
4377139/udp open|filtered netbios-ssn
4378161/udp open|filtered snmp
4379162/udp open|filtered snmptrap
4380389/udp open|filtered ldap
4381500/udp open|filtered isakmp
4382|_ike-version: ERROR: Script execution failed (use -d to debug)
4383520/udp open|filtered route
43842049/udp open|filtered nfs
4385Too many fingerprints match this host to give specific OS details
4386
4387TRACEROUTE (using port 137/udp)
4388HOP RTT ADDRESS
43891 183.32 ms 10.242.204.1
43902 ... 3
43914 99.76 ms 10.242.204.1
43925 300.95 ms 10.242.204.1
43936 300.95 ms 10.242.204.1
43947 300.96 ms 10.242.204.1
43958 300.94 ms 10.242.204.1
43969 201.28 ms 10.242.204.1
439710 100.80 ms 10.242.204.1
439811 ... 18
439919 128.41 ms 10.242.204.1
440020 101.42 ms 10.242.204.1
440121 157.13 ms 10.242.204.1
440222 ... 29
440330 100.37 ms 10.242.204.1
4404
4405NSE: Script Post-scanning.
4406Initiating NSE at 17:10
4407Completed NSE at 17:10, 0.00s elapsed
4408Initiating NSE at 17:10
4409Completed NSE at 17:10, 0.00s elapsed
4410######################################################################################################################################
4411Hosts
4412=====
4413
4414address mac name os_name os_flavor os_sp purpose info comments
4415------- --- ---- ------- --------- ----- ------- ---- --------
441635.153.8.200 ec2-35-153-8-200.compute-1.amazonaws.com Unknown device
4417
4418Services
4419========
4420
4421host port proto name state info
4422---- ---- ----- ---- ----- ----
442335.153.8.200 25 tcp smtp closed
442435.153.8.200 53 udp domain unknown
442535.153.8.200 67 udp dhcps unknown
442635.153.8.200 68 udp dhcpc unknown
442735.153.8.200 69 udp tftp unknown
442835.153.8.200 88 udp kerberos-sec unknown
442935.153.8.200 123 udp ntp unknown
443035.153.8.200 137 udp netbios-ns filtered
443135.153.8.200 138 udp netbios-dgm filtered
443235.153.8.200 139 tcp netbios-ssn closed
443335.153.8.200 139 udp netbios-ssn unknown
443435.153.8.200 161 udp snmp unknown
443535.153.8.200 162 udp snmptrap unknown
443635.153.8.200 389 udp ldap unknown
443735.153.8.200 445 tcp microsoft-ds closed
443835.153.8.200 500 udp isakmp unknown
443935.153.8.200 520 udp route unknown
444035.153.8.200 2049 udp nfs unknown
444135.153.8.200 8080 tcp http-proxy closed
444235.153.8.200 8983 tcp closed ######################################################################################################################################
4443[+] Themes found:
4444 seven https://www.actforamerica.org/themes/seven/
4445 garland https://www.actforamerica.org/themes/garland/
4446
4447[+] Possible interesting urls found:
4448 Default admin - https://www.actforamerica.org/user/login
4449
4450[+] Possible version(s):
4451 7.61
4452 7.62
4453 7.63
4454 7.64
4455 7.65
4456 7.66
4457 7.67
4458
4459[+] Plugins found:
4460 ctools https://www.actforamerica.org/sites/all/modules/ctools/
4461 https://www.actforamerica.org/sites/all/modules/ctools/LICENSE.txt
4462 https://www.actforamerica.org/sites/all/modules/ctools/API.txt
4463 token https://www.actforamerica.org/sites/all/modules/token/
4464 https://www.actforamerica.org/sites/all/modules/token/README.txt
4465 https://www.actforamerica.org/sites/all/modules/token/LICENSE.txt
4466 views https://www.actforamerica.org/sites/all/modules/views/
4467 https://www.actforamerica.org/sites/all/modules/views/README.txt
4468 https://www.actforamerica.org/sites/all/modules/views/LICENSE.txt
4469 libraries https://www.actforamerica.org/sites/all/modules/libraries/
4470 https://www.actforamerica.org/sites/all/modules/libraries/CHANGELOG.txt
4471 https://www.actforamerica.org/sites/all/modules/libraries/README.txt
4472 https://www.actforamerica.org/sites/all/modules/libraries/LICENSE.txt
4473 webform https://www.actforamerica.org/sites/all/modules/webform/
4474 https://www.actforamerica.org/sites/all/modules/webform/LICENSE.txt
4475 jquery_update https://www.actforamerica.org/sites/all/modules/jquery_update/
4476 https://www.actforamerica.org/sites/all/modules/jquery_update/README.txt
4477 https://www.actforamerica.org/sites/all/modules/jquery_update/LICENSE.txt
4478 admin_menu https://www.actforamerica.org/sites/all/modules/admin_menu/
4479 https://www.actforamerica.org/sites/all/modules/admin_menu/CHANGELOG.txt
4480 https://www.actforamerica.org/sites/all/modules/admin_menu/README.txt
4481 https://www.actforamerica.org/sites/all/modules/admin_menu/LICENSE.txt
4482 date https://www.actforamerica.org/sites/all/modules/date/
4483 https://www.actforamerica.org/sites/all/modules/date/CHANGELOG.txt
4484 https://www.actforamerica.org/sites/all/modules/date/README.txt
4485 https://www.actforamerica.org/sites/all/modules/date/LICENSE.txt
4486 link https://www.actforamerica.org/sites/all/modules/link/
4487 https://www.actforamerica.org/sites/all/modules/link/README.txt
4488 https://www.actforamerica.org/sites/all/modules/link/LICENSE.txt
4489 module_filter https://www.actforamerica.org/sites/all/modules/module_filter/
4490 https://www.actforamerica.org/sites/all/modules/module_filter/CHANGELOG.txt
4491 https://www.actforamerica.org/sites/all/modules/module_filter/README.txt
4492 https://www.actforamerica.org/sites/all/modules/module_filter/LICENSE.txt
4493 captcha https://www.actforamerica.org/sites/all/modules/captcha/
4494 https://www.actforamerica.org/sites/all/modules/captcha/README.txt
4495 https://www.actforamerica.org/sites/all/modules/captcha/LICENSE.txt
4496 wysiwyg https://www.actforamerica.org/sites/all/modules/wysiwyg/
4497 https://www.actforamerica.org/sites/all/modules/wysiwyg/CHANGELOG.txt
4498 https://www.actforamerica.org/sites/all/modules/wysiwyg/README.txt
4499 https://www.actforamerica.org/sites/all/modules/wysiwyg/LICENSE.txt
4500 colorbox https://www.actforamerica.org/sites/all/modules/colorbox/
4501 https://www.actforamerica.org/sites/all/modules/colorbox/README.txt
4502 https://www.actforamerica.org/sites/all/modules/colorbox/LICENSE.txt
4503 media https://www.actforamerica.org/sites/all/modules/media/
4504 https://www.actforamerica.org/sites/all/modules/media/CHANGELOG.txt
4505 https://www.actforamerica.org/sites/all/modules/media/README.txt
4506 https://www.actforamerica.org/sites/all/modules/media/LICENSE.txt
4507 https://www.actforamerica.org/sites/all/modules/media/API.txt
4508 views_slideshow https://www.actforamerica.org/sites/all/modules/views_slideshow/
4509 https://www.actforamerica.org/sites/all/modules/views_slideshow/README.txt
4510 https://www.actforamerica.org/sites/all/modules/views_slideshow/LICENSE.txt
4511 redirect https://www.actforamerica.org/sites/all/modules/redirect/
4512 https://www.actforamerica.org/sites/all/modules/redirect/README.txt
4513 https://www.actforamerica.org/sites/all/modules/redirect/LICENSE.txt
4514 panels https://www.actforamerica.org/sites/all/modules/panels/
4515 https://www.actforamerica.org/sites/all/modules/panels/CHANGELOG.txt
4516 https://www.actforamerica.org/sites/all/modules/panels/README.txt
4517 https://www.actforamerica.org/sites/all/modules/panels/LICENSE.txt
4518 menu_block https://www.actforamerica.org/sites/all/modules/menu_block/
4519 https://www.actforamerica.org/sites/all/modules/menu_block/README.txt
4520 https://www.actforamerica.org/sites/all/modules/menu_block/LICENSE.txt
4521 block_class https://www.actforamerica.org/sites/all/modules/block_class/
4522 https://www.actforamerica.org/sites/all/modules/block_class/README.txt
4523 https://www.actforamerica.org/sites/all/modules/block_class/LICENSE.txt
4524 mailsystem https://www.actforamerica.org/sites/all/modules/mailsystem/
4525 https://www.actforamerica.org/sites/all/modules/mailsystem/README.txt
4526 https://www.actforamerica.org/sites/all/modules/mailsystem/LICENSE.txt
4527 recaptcha https://www.actforamerica.org/sites/all/modules/recaptcha/
4528 https://www.actforamerica.org/sites/all/modules/recaptcha/README.txt
4529 https://www.actforamerica.org/sites/all/modules/recaptcha/LICENSE.txt
4530 superfish https://www.actforamerica.org/sites/all/modules/superfish/
4531 https://www.actforamerica.org/sites/all/modules/superfish/CHANGELOG.txt
4532 https://www.actforamerica.org/sites/all/modules/superfish/README.txt
4533 https://www.actforamerica.org/sites/all/modules/superfish/LICENSE.txt
4534 smtp https://www.actforamerica.org/sites/all/modules/smtp/
4535 https://www.actforamerica.org/sites/all/modules/smtp/README.txt
4536 https://www.actforamerica.org/sites/all/modules/smtp/LICENSE.txt
4537 job_scheduler https://www.actforamerica.org/sites/all/modules/job_scheduler/
4538 https://www.actforamerica.org/sites/all/modules/job_scheduler/CHANGELOG.txt
4539 https://www.actforamerica.org/sites/all/modules/job_scheduler/README.txt
4540 https://www.actforamerica.org/sites/all/modules/job_scheduler/LICENSE.txt
4541 flexslider https://www.actforamerica.org/sites/all/modules/flexslider/
4542 https://www.actforamerica.org/sites/all/modules/flexslider/README.txt
4543 https://www.actforamerica.org/sites/all/modules/flexslider/LICENSE.txt
4544 calendar https://www.actforamerica.org/sites/all/modules/calendar/
4545 https://www.actforamerica.org/sites/all/modules/calendar/CHANGELOG.txt
4546 https://www.actforamerica.org/sites/all/modules/calendar/README.txt
4547 https://www.actforamerica.org/sites/all/modules/calendar/LICENSE.txt
4548 feeds https://www.actforamerica.org/sites/all/modules/feeds/
4549 https://www.actforamerica.org/sites/all/modules/feeds/CHANGELOG.txt
4550 https://www.actforamerica.org/sites/all/modules/feeds/README.txt
4551 https://www.actforamerica.org/sites/all/modules/feeds/LICENSE.txt
4552 media_youtube https://www.actforamerica.org/sites/all/modules/media_youtube/
4553 https://www.actforamerica.org/sites/all/modules/media_youtube/README.txt
4554 https://www.actforamerica.org/sites/all/modules/media_youtube/LICENSE.txt
4555 plupload https://www.actforamerica.org/sites/all/modules/plupload/
4556 https://www.actforamerica.org/sites/all/modules/plupload/CHANGELOG.txt
4557 https://www.actforamerica.org/sites/all/modules/plupload/README.txt
4558 https://www.actforamerica.org/sites/all/modules/plupload/LICENSE.txt
4559 views_accordion https://www.actforamerica.org/sites/all/modules/views_accordion/
4560 https://www.actforamerica.org/sites/all/modules/views_accordion/README.txt
4561 https://www.actforamerica.org/sites/all/modules/views_accordion/LICENSE.txt
4562 options_element https://www.actforamerica.org/sites/all/modules/options_element/
4563 https://www.actforamerica.org/sites/all/modules/options_element/LICENSE.txt
4564 entity_view_mode https://www.actforamerica.org/sites/all/modules/entity_view_mode/
4565 https://www.actforamerica.org/sites/all/modules/entity_view_mode/LICENSE.txt
4566 shortcode https://www.actforamerica.org/sites/all/modules/shortcode/
4567 https://www.actforamerica.org/sites/all/modules/shortcode/CHANGELOG.txt
4568 https://www.actforamerica.org/sites/all/modules/shortcode/README.txt
4569 https://www.actforamerica.org/sites/all/modules/shortcode/LICENSE.txt
4570 ubercart https://www.actforamerica.org/sites/all/modules/ubercart/
4571 https://www.actforamerica.org/sites/all/modules/ubercart/CHANGELOG.txt
4572 https://www.actforamerica.org/sites/all/modules/ubercart/README.txt
4573 https://www.actforamerica.org/sites/all/modules/ubercart/LICENSE.txt
4574 addthis https://www.actforamerica.org/sites/all/modules/addthis/
4575 https://www.actforamerica.org/sites/all/modules/addthis/CHANGELOG.txt
4576 https://www.actforamerica.org/sites/all/modules/addthis/README.txt
4577 https://www.actforamerica.org/sites/all/modules/addthis/LICENSE.txt
4578 flexslider_views_slideshow https://www.actforamerica.org/sites/all/modules/flexslider_views_slideshow/
4579 https://www.actforamerica.org/sites/all/modules/flexslider_views_slideshow/README.txt
4580 https://www.actforamerica.org/sites/all/modules/flexslider_views_slideshow/LICENSE.txt
4581 semanticviews https://www.actforamerica.org/sites/all/modules/semanticviews/
4582 https://www.actforamerica.org/sites/all/modules/semanticviews/README.txt
4583 https://www.actforamerica.org/sites/all/modules/semanticviews/LICENSE.txt
4584 term_reference_tree https://www.actforamerica.org/sites/all/modules/term_reference_tree/
4585 https://www.actforamerica.org/sites/all/modules/term_reference_tree/LICENSE.txt
4586 retina_images https://www.actforamerica.org/sites/all/modules/retina_images/
4587 https://www.actforamerica.org/sites/all/modules/retina_images/LICENSE.txt
4588 find_content https://www.actforamerica.org/sites/all/modules/find_content/
4589 https://www.actforamerica.org/sites/all/modules/find_content/README.txt
4590 https://www.actforamerica.org/sites/all/modules/find_content/LICENSE.txt
4591 views_isotope https://www.actforamerica.org/sites/all/modules/views_isotope/
4592 https://www.actforamerica.org/sites/all/modules/views_isotope/README.txt
4593 https://www.actforamerica.org/sites/all/modules/views_isotope/LICENSE.txt
4594 addressfield_tokens https://www.actforamerica.org/sites/all/modules/addressfield_tokens/
4595 https://www.actforamerica.org/sites/all/modules/addressfield_tokens/LICENSE.txt
4596 jqeasing https://www.actforamerica.org/sites/all/modules/jqeasing/
4597 https://www.actforamerica.org/sites/all/modules/jqeasing/README.txt
4598 https://www.actforamerica.org/sites/all/modules/jqeasing/LICENSE.txt
4599 demo https://www.actforamerica.org/sites/all/modules/demo/
4600 https://www.actforamerica.org/sites/all/modules/demo/CHANGELOG.txt
4601 https://www.actforamerica.org/sites/all/modules/demo/README.txt
4602 https://www.actforamerica.org/sites/all/modules/demo/LICENSE.txt
4603 tipsy https://www.actforamerica.org/sites/all/modules/tipsy/
4604 https://www.actforamerica.org/sites/all/modules/tipsy/README.txt
4605 https://www.actforamerica.org/sites/all/modules/tipsy/LICENSE.txt
4606 toolbar_admin_menu https://www.actforamerica.org/sites/all/modules/toolbar_admin_menu/
4607 https://www.actforamerica.org/sites/all/modules/toolbar_admin_menu/LICENSE.txt
4608 dismiss https://www.actforamerica.org/sites/all/modules/dismiss/
4609 https://www.actforamerica.org/sites/all/modules/dismiss/LICENSE.txt
4610 simple_subscription https://www.actforamerica.org/sites/all/modules/simple_subscription/
4611 https://www.actforamerica.org/sites/all/modules/simple_subscription/LICENSE.txt
4612 cctags https://www.actforamerica.org/sites/all/modules/cctags/
4613 https://www.actforamerica.org/sites/all/modules/cctags/README.txt
4614 https://www.actforamerica.org/sites/all/modules/cctags/LICENSE.txt
4615 image https://www.actforamerica.org/modules/image/
4616 profile https://www.actforamerica.org/modules/profile/
4617 php https://www.actforamerica.org/modules/php/
4618######################################################################################################################################
4619[INFO] ------TARGET info------
4620[*] TARGET: https://www.actforamerica.org/
4621[*] TARGET IP: 35.153.8.200
4622[INFO] NO load balancer detected for www.actforamerica.org...
4623[*] DNS servers: ns47.domaincontrol.com.
4624[*] TARGET server: Apache/2.4.18 (Ubuntu)
4625[*] CC: US
4626[*] Country: United States
4627[*] RegionCode: VA
4628[*] RegionName: Virginia
4629[*] City: Ashburn
4630[*] ASN: AS14618
4631[*] BGP_PREFIX: 35.153.0.0/16
4632[*] ISP: AMAZON-AES - Amazon.com, Inc., US
4633[INFO] SSL/HTTPS certificate detected
4634[*] Issuer: issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
4635[*] Subject: subject=CN = actforamerica.org
4636[ALERT] Let's Encrypt is commonly used for Phishing
4637[INFO] DNS enumeration:
4638[*] ftp.actforamerica.org actforamerica.org. 35.153.8.200
4639[*] search.actforamerica.org 35.153.8.200
4640[*] vpn.actforamerica.org 34.200.140.165
4641[INFO] Possible abuse mails are:
4642[*] abuse@actforamerica.org
4643[*] abuse@www.actforamerica.org
4644[INFO] NO PAC (Proxy Auto Configuration) file FOUND
4645[ALERT] robots.txt file FOUND in http://www.actforamerica.org/robots.txt
4646[INFO] Checking for HTTP status codes recursively from http://www.actforamerica.org/robots.txt
4647[INFO] Status code Folders
4648[*] 200 http://www.actforamerica.org/filter/tips/
4649[*] 200 http://www.actforamerica.org/INSTALL.mysql.txt
4650[*] 200 http://www.actforamerica.org/install.php
4651[*] 200 http://www.actforamerica.org/INSTALL.sqlite.txt
4652[*] 200 http://www.actforamerica.org/INSTALL.txt
4653[*] 200 http://www.actforamerica.org/LICENSE.txt
4654[*] 200 http://www.actforamerica.org/MAINTAINERS.txt
4655[*] 200 http://www.actforamerica.org/node/add/
4656[*] 200 http://www.actforamerica.org/?q=filter/tips/
4657[*] 200 http://www.actforamerica.org/?q=node/add/
4658[*] 200 http://www.actforamerica.org/?q=user/login/
4659[*] 200 http://www.actforamerica.org/?q=user/password/
4660[*] 200 http://www.actforamerica.org/?q=user/register/
4661[*] 200 http://www.actforamerica.org/user/login/
4662[*] 200 http://www.actforamerica.org/user/password/
4663[*] 200 http://www.actforamerica.org/user/register/
4664[INFO] Starting FUZZing in http://www.actforamerica.org/FUzZzZzZzZz...
4665[INFO] Status code Folders
4666[ALERT] Look in the source code. It may contain passwords
4667[INFO] SAME content in http://www.actforamerica.org/ AND http://35.153.8.200/
4668[INFO] Links found from https://www.actforamerica.org/:
4669[*] https://twitter.com/ACTforAmerica
4670[*] https://www.actforamerica.org/
4671[*] https://www.actforamerica.org/aboutact
4672[*] https://www.actforamerica.org/aboutbrigitte
4673[*] https://www.actforamerica.org/accomplishments/federalbillspassed
4674[*] https://www.actforamerica.org/Action-Center
4675[*] https://www.actforamerica.org/action/wall?id=7&reset=1
4676[*] https://www.actforamerica.org/civicrm/contribute/transact?reset=1&id=6
4677[*] https://www.actforamerica.org/ConstitutionalFreedoms
4678[*] https://www.actforamerica.org/constitutionalfreedoms/FGM
4679[*] https://www.actforamerica.org/ConstitutionalFreedoms/Free-speech-protection
4680[*] https://www.actforamerica.org/ConstitutionalFreedoms/Honor-Violence
4681[*] https://www.actforamerica.org/ConstitutionalFreedoms/Textbook-Reform
4682[*] https://www.actforamerica.org/contact
4683[*] https://www.actforamerica.org/#content
4684[*] https://www.actforamerica.org/CriticalInfrastructure
4685[*] https://www.actforamerica.org/CriticalInfrastructure/EMP-Protection
4686[*] https://www.actforamerica.org/criticalinfrastructure/energysecurity
4687[*] https://www.actforamerica.org/faq
4688[*] https://www.actforamerica.org/highprioritylegislation
4689[*] https://www.actforamerica.org/Immigration
4690[*] https://www.actforamerica.org/Immigration/Border-Security
4691[*] https://www.actforamerica.org/immigration/end-chain-migration
4692[*] https://www.actforamerica.org/immigration/end-sanctuary-cities
4693[*] https://www.actforamerica.org/immigration/end-visa-lottery
4694[*] https://www.actforamerica.org/Israel
4695[*] https://www.actforamerica.org/Israel/Speeches
4696[*] https://www.actforamerica.org/Israel/Support-For-Israel
4697[*] https://www.actforamerica.org/issues
4698[*] https://www.actforamerica.org/join-the-movement
4699[*] https://www.actforamerica.org/#main-menu
4700[*] https://www.actforamerica.org/manage/donation
4701[*] https://www.actforamerica.org/militaryandlawenforcement
4702[*] https://www.actforamerica.org/militaryandlawenforcement/lawenforcement
4703[*] https://www.actforamerica.org/militaryandlawenforcement/supportourlawenforcement
4704[*] https://www.actforamerica.org/militaryandlawenforcement/supportourmilitary
4705[*] https://www.actforamerica.org/Mission
4706[*] https://www.actforamerica.org/newsletter-subscription
4707[*] https://www.actforamerica.org/node/17357
4708[*] https://www.actforamerica.org/policy
4709[*] https://www.actforamerica.org/pressreleases
4710[*] https://www.actforamerica.org/project/bgtour
4711[*] https://www.actforamerica.org/splc
4712[*] https://www.actforamerica.org/takeaction
4713[*] https://www.actforamerica.org/termsofservice
4714[*] https://www.actforamerica.org/terrorism
4715[*] https://www.actforamerica.org/terrorism/Benghazi
4716[*] https://www.actforamerica.org/terrorism/muslim-brotherhood
4717[*] https://www.actforamerica.org/terrorism/the-islamic-state
4718[*] https://www.actforamerica.org/user/login?current=home
4719[*] https://www.facebook.com/actforamerica
4720[*] https://www.googletagmanager.com/ns.html?id=GTM-5PK789R
4721[*] https://www.youtube.com/embed/mD0uKeqZszM
4722[*] https://www.youtube.com/embed/zf8U5NR0q8I
4723[*] https://www.youtube.com/user/act4america
4724[INFO] GOOGLE has 1,060,000 results (0.26 seconds) about http://www.actforamerica.org/
4725[INFO] BING shows 35.153.8.200 is shared with 15 hosts/vhosts
4726[INFO] Shodan detected the following opened ports on 35.153.8.200:
4727[*] 0
4728[*] 1
4729[*] 443
4730[*] 5
4731[*] 80
4732[*] 9
4733[INFO] ------VirusTotal SECTION------
4734[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
4735[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
4736[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
4737[INFO] ------Alexa Rank SECTION------
4738[INFO] Percent of Visitors Rank in Country:
4739[INFO] Percent of Search Traffic:
4740[INFO] Percent of Unique Visits:
4741[INFO] Total Sites Linking In:
4742[*] Total Sites
4743[INFO] Useful links related to www.actforamerica.org - 35.153.8.200:
4744[*] https://www.virustotal.com/pt/ip-address/35.153.8.200/information/
4745[*] https://www.hybrid-analysis.com/search?host=35.153.8.200
4746[*] https://www.shodan.io/host/35.153.8.200
4747[*] https://www.senderbase.org/lookup/?search_string=35.153.8.200
4748[*] https://www.alienvault.com/open-threat-exchange/ip/35.153.8.200
4749[*] http://pastebin.com/search?q=35.153.8.200
4750[*] http://urlquery.net/search.php?q=35.153.8.200
4751[*] http://www.alexa.com/siteinfo/www.actforamerica.org
4752[*] http://www.google.com/safebrowsing/diagnostic?site=www.actforamerica.org
4753[*] https://censys.io/ipv4/35.153.8.200
4754[*] https://www.abuseipdb.com/check/35.153.8.200
4755[*] https://urlscan.io/search/#35.153.8.200
4756[*] https://github.com/search?q=35.153.8.200&type=Code
4757[INFO] Useful links related to AS14618 - 35.153.0.0/16:
4758[*] http://www.google.com/safebrowsing/diagnostic?site=AS:14618
4759[*] https://www.senderbase.org/lookup/?search_string=35.153.0.0/16
4760[*] http://bgp.he.net/AS14618
4761[*] https://stat.ripe.net/AS14618
4762[INFO] Date: 24/10/19 | Time: 16:32:25
4763[INFO] Total time: 5 minute(s) and 34 second(s)
4764#######################################################################################################################################
4765 Anonymous JTSEC #OpDomesticTerrorism Full Recon #11