· 5 years ago · Dec 20, 2019, 05:06 PM
1####################################
2# Uniscan project #
3# http://uniscan.sourceforge.net/ #
4####################################
5V. 6.3
6
7
8Scan date: 20-12-2019 11:36:37
9===================================================================================================
10| [*] http://trail.elfu.org/ redirected to http://trail.elfu.org/gameselect/
11| [*] New target is: http://trail.elfu.org/gameselect/
12===================================================================================================
13| Domain: http://trail.elfu.org/gameselect/
14| Server: nginx/1.14.2
15| IP: 35.222.178.2
16===================================================================================================
17===================================================================================================
18| Looking for Drupal plugins/modules
19|
20===================================================================================================
21| WEB SERVICES
22|
23===================================================================================================
24| FAVICON.ICO
25|
26===================================================================================================
27| ERROR INFORMATION
28|
29| 404 Not Found 404 Not Found The path '/unaEu6YA5AO>3oa6+"Nk' was not found. Traceback (most recent call last): File "/usr/local/lib/python3.7/site-packages/cherrypy/_cprequest.py", line 638, in respond self._do_respond(path_info) File "/usr/local/lib/python3.7/site-packages/cherrypy/_cprequest.py", line 697, in _do_respond response.body = self.handler() File "/usr/local/lib/python3.7/site-packages/cherrypy/lib/encoding.py", line 219, in __call__ self.body = self.oldhandler(*args, **kwargs) File "/usr/local/lib/python3.7/site-packages/cherrypy/_cperror.py", line 416, in __call__ raise self cherrypy._cperror.NotFound: (404, 'The path \'/unaEu6YA5AO>3oa6+"Nk\' was not found.') Powered by CherryPy 18.4.0
30===================================================================================================
31| TYPE ERROR
32|
33===================================================================================================
34| SERVER MOBILE
35|
36===================================================================================================
37| LANGUAGE
38|
39===================================================================================================
40| INTERESTING STRINGS IN HTML
41|
42===================================================================================================
43| WHOIS
44|
45| NOT FOUND
46|
47| >>> Last update of WHOIS database: 2019-12-20T16:36:00Z <<<
48|
49|
50|
51===================================================================================================
52| BANNER GRABBING:
53| X-Xss-Protection: 1; mode=block
54===================================================================================================
55===================================================================================================
56| PING
57|
58| PING trail.elfu.org (35.222.178.2) 56(84) bytes of data.
59|
60| --- trail.elfu.org ping statistics ---
61| 4 packets transmitted, 0 received, 100% packet loss, time 3053ms
62|
63===================================================================================================
64| TRACEROUTE
65|
66| traceroute to trail.elfu.org (35.222.178.2), 30 hops max, 60 byte packets
67| 1 192.168.11.2 (192.168.11.2) 0.322 ms 0.310 ms 0.378 ms
68| 2 * * *
69| 3 * * *
70| 4 * * *
71| 5 * * *
72| 6 * * *
73| 7 * * *
74| 8 * * *
75| 9 * * *
76| 10 * * *
77| 11 * * *
78| 12 * * *
79| 13 * * *
80| 14 * * *
81| 15 * * *
82| 16 * * *
83| 17 * * *
84| 18 * * *
85| 19 * * *
86| 20 * * *
87| 21 * * *
88| 22 * * *
89| 23 * * *
90| 24 * * *
91| 25 * * *
92| 26 * * *
93| 27 * * *
94| 28 * * *
95| 29 * * *
96| 30 * * *
97===================================================================================================
98| NSLOOKUP
99|
100| Server: 192.168.11.2
101| Address: 192.168.11.2#53
102|
103| Non-authoritative answer:
104| *** Can't find trail.elfu.org: No answer
105| Authoritative answers can be found from:
106| elfu.org
107| origin = ns-cloud-e1.googledomains.com
108| mail addr = cloud-dns-hostmaster.google.com
109| serial = 1
110| refresh = 21600
111| retry = 3600
112| expire = 259200
113| minimum = 300
114| Name: trail.elfu.org
115| Address: 35.222.178.2
116===================================================================================================
117| NMAP
118|
119####################################
120# Uniscan project #
121# http://uniscan.sourceforge.net/ #
122####################################
123V. 6.3
124
125
126Scan date: 20-12-2019 11:38:51
127===================================================================================================
128| Domain: https://trail.elfu.org/gameselect/?playerid=JebediahSpringfield/
129| Server: nginx/1.14.2
130| IP: 35.222.178.2
131===================================================================================================
132===================================================================================================
133| Looking for Drupal plugins/modules
134|
135===================================================================================================
136| WEB SERVICES
137|
138===================================================================================================
139| FAVICON.ICO
140|
141===================================================================================================
142| ERROR INFORMATION
143|
144| 404 Not Found 404 Not Found The path '/3do6bydhE_\88V}B)kp' was not found. Traceback (most recent call last): File "/usr/local/lib/python3.7/site-packages/cherrypy/_cprequest.py", line 638, in respond self._do_respond(path_info) File "/usr/local/lib/python3.7/site-packages/cherrypy/_cprequest.py", line 697, in _do_respond response.body = self.handler() File "/usr/local/lib/python3.7/site-packages/cherrypy/lib/encoding.py", line 219, in __call__ self.body = self.oldhandler(*args, **kwargs) File "/usr/local/lib/python3.7/site-packages/cherrypy/_cperror.py", line 416, in __call__ raise self cherrypy._cperror.NotFound: (404, "The path '/3do6bydhE_\\88V}B)kp' was not found.") Powered by CherryPy 18.4.0
145===================================================================================================
146| TYPE ERROR
147|
148| Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-20 11:37 EST
149| NSE: Loaded 151 scripts for scanning.
150| NSE: Script Pre-scanning.
151| Initiating NSE at 11:37
152| Completed NSE at 11:37, 0.00s elapsed
153| Initiating NSE at 11:37
154| Completed NSE at 11:37, 0.00s elapsed
155| Initiating NSE at 11:37
156| Completed NSE at 11:37, 0.00s elapsed
157| Initiating Ping Scan at 11:37
158| Scanning trail.elfu.org (35.222.178.2) [4 ports]
159| Completed Ping Scan at 11:37, 0.06s elapsed (1 total hosts)
160| Initiating Parallel DNS resolution of 1 host. at 11:37
161| Completed Parallel DNS resolution of 1 host. at 11:37, 0.28s elapsed
162| Initiating SYN Stealth Scan at 11:37
163| Scanning trail.elfu.org (35.222.178.2) [1000 ports]
164| Discovered open port 80/tcp on 35.222.178.2
165| Discovered open port 443/tcp on 35.222.178.2
166| Discovered open port 22/tcp on 35.222.178.2
167| SYN Stealth Scan Timing: About 10.15% done; ETC: 11:42 (0:04:34 remaining)
168| Completed SYN Stealth Scan at 11:38, 58.77s elapsed (1000 total ports)
169| Initiating Service scan at 11:38
170| Scanning 3 services on trail.elfu.org (35.222.178.2)
171| Completed Service scan at 11:38, 12.91s elapsed (3 services on 1 host)
172| Initiating OS detection (try #1) against trail.elfu.org (35.222.178.2)
173| Initiating Traceroute at 11:38
174| Completed Traceroute at 11:38, 0.02s elapsed
175| Initiating Parallel DNS resolution of 2 hosts. at 11:38
176| Completed Parallel DNS resolution of 2 hosts. at 11:38, 0.01s elapsed
177| NSE: Script scanning 35.222.178.2.
178| Initiating NSE at 11:38
179| Completed NSE at 11:39, 5.68s elapsed
180| Initiating NSE at 11:39
181| Completed NSE at 11:39, 1.46s elapsed
182| Initiating NSE at 11:39
183| Completed NSE at 11:39, 0.00s elapsed
184| Nmap scan report for trail.elfu.org (35.222.178.2)
185| Host is up (0.023s latency).
186| rDNS record for 35.222.178.2: 2.178.222.35.bc.googleusercontent.com
187| Not shown: 997 filtered ports
188| PORT STATE SERVICE VERSION
189| 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u1 (protocol 2.0)
190| | ssh-hostkey:
191| | 2048 b5:e0:ce:33:30:59:e5:c6:6f:0d:60:09:f0:38:74:a1 (RSA)
192| | 256 3e:85:4b:3b:71:e1:ea:79:43:dd:7f:e0:18:91:b0:4f (ECDSA)
193| |_ 256 5d:df:52:f8:4b:7b:40:90:1d:57:c0:e9:1a:d6:2f:5f (ED25519)
194| 80/tcp open http nginx 1.14.2
195| | http-methods:
196| |_ Supported Methods: GET HEAD POST OPTIONS
197| |_http-server-header: nginx/1.14.2
198| |_http-title: Did not follow redirect to https://trail.elfu.org/
199| |_https-redirect: ERROR: Script execution failed (use -d to debug)
200| 443/tcp open ssl/http nginx 1.14.2
201| |_http-favicon: Unknown favicon MD5: 92EC7AEEDF68FA643B4C05C372DB5F92
202| | http-methods:
203| |_ Supported Methods: GET HEAD POST OPTIONS
204| |_http-server-header: nginx/1.14.2
205| | http-title: Holiday Hack Trail
206| |_Requested resource was https://trail.elfu.org/gameselect/?playerid=JebediahSpringfield
207| | ssl-cert: Subject: commonName=*.elfu.org
208| | Subject Alternative Name: DNS:*.elfu.org
209| | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
210| | Public Key type: rsa
211| | Public Key bits: 2048
212| | Signature Algorithm: sha256WithRSAEncryption
213| | Not valid before: 2019-11-08T18:27:28
214| | Not valid after: 2020-02-06T18:27:28
215| | MD5: 8982 cafb 04ce c36e 85cf e659 af5e 5367
216| |_SHA-1: df8d 2f9f 24de 0726 8ce1 8e4e 4ac1 ebec 5bc3 e15a
217| Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
218| Device type: WAP|general purpose
219| Running: Actiontec embedded, Linux, Microsoft Windows XP|7|2012
220| OS CPE: cpe:/h:actiontec:mi424wr-gen3i cpe:/o:linux:linux_kernel cpe:/o:microsoft:windows_xp::sp3 cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_server_2012
221| OS details: Actiontec MI424WR-GEN3I WAP, Microsoft Windows XP SP3, Microsoft Windows XP SP3 or Windows 7 or Windows Server 2012
222| Network Distance: 2 hops
223| TCP Sequence Prediction: Difficulty=253 (Good luck!)
224| IP ID Sequence Generation: Busy server or unknown class
225| Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
226|
227| TRACEROUTE (using port 80/tcp)
228| HOP RTT ADDRESS
229| 1 0.34 ms 192.168.11.2
230| 2 0.46 ms 2.178.222.35.bc.googleusercontent.com (35.222.178.2)
231|
232| NSE: Script Post-scanning.
233| Initiating NSE at 11:39
234| Completed NSE at 11:39, 0.00s elapsed
235| Initiating NSE at 11:39
236| Completed NSE at 11:39, 0.00s elapsed
237| Initiating NSE at 11:39
238| Completed NSE at 11:39, 0.00s elapsed
239| Read data files from: /usr/bin/../share/nmap
240| OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
241| Nmap done: 1 IP address (1 host up) scanned in 84.81 seconds
242| Raw packets sent: 2063 (93.060KB) | Rcvd: 545 (43.390KB)
243===================================================================================================
244|
245| Directory check:
246===================================================================================================
247| SERVER MOBILE
248|
249===================================================================================================
250| LANGUAGE
251|
252===================================================================================================
253| INTERESTING STRINGS IN HTML
254|
255===================================================================================================
256| WHOIS
257|
258| NOT FOUND
259|
260| >>> Last update of WHOIS database: 2019-12-20T16:38:07Z <<<
261|
262|
263|
264===================================================================================================
265| BANNER GRABBING:
266| X-Xss-Protection: 1; mode=block
267===================================================================================================
268===================================================================================================
269| PING
270|
271| PING trail.elfu.org (35.222.178.2) 56(84) bytes of data.
272|
273| --- trail.elfu.org ping statistics ---
274| 4 packets transmitted, 0 received, 100% packet loss, time 3038ms
275|
276===================================================================================================
277| TRACEROUTE
278|
279| traceroute to trail.elfu.org (35.222.178.2), 30 hops max, 60 byte packets
280| 1 192.168.11.2 (192.168.11.2) 0.312 ms 0.301 ms 0.287 ms
281| 2 * * *
282| 3 * * *
283| 4 * * *
284| 5 * * *
285| 6 * * *
286| 7 * * *
287| 8 * * *
288| 9 * * *
289| 10 * * *
290| 11 * * *
291| 12 * * *
292| 13 * * *
293| 14 * * *
294| 15 * * *
295| 16 * * *
296| 17 * * *
297| 18 * * *
298| 19 * * *
299| 20 * * *
300| 21 * * *
301| 22 * * *
302| 23 * * *
303| 24 * * *
304| 25 * * *
305| 26 * * *
306| 27 * * *
307| 28 * * *
308| 29 * * *
309| 30 * * *
310===================================================================================================
311| NSLOOKUP
312|
313| Server: 192.168.11.2
314| Address: 192.168.11.2#53
315|
316| Non-authoritative answer:
317| *** Can't find trail.elfu.org: No answer
318| Authoritative answers can be found from:
319| elfu.org
320| origin = ns-cloud-e1.googledomains.com
321| mail addr = cloud-dns-hostmaster.google.com
322| serial = 1
323| refresh = 21600
324| retry = 3600
325| expire = 259200
326| minimum = 300
327| Name: trail.elfu.org
328| Address: 35.222.178.2
329===================================================================================================
330| NMAP
331|
332| Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-20 11:39 EST
333| NSE: Loaded 151 scripts for scanning.
334| NSE: Script Pre-scanning.
335| Initiating NSE at 11:39
336| Completed NSE at 11:39, 0.00s elapsed
337| Initiating NSE at 11:39
338| Completed NSE at 11:39, 0.00s elapsed
339| Initiating NSE at 11:39
340| Completed NSE at 11:39, 0.00s elapsed
341| Initiating Ping Scan at 11:39
342| Scanning trail.elfu.org (35.222.178.2) [4 ports]
343| Completed Ping Scan at 11:39, 0.06s elapsed (1 total hosts)
344| Initiating Parallel DNS resolution of 1 host. at 11:39
345| Completed Parallel DNS resolution of 1 host. at 11:39, 0.25s elapsed
346| Initiating SYN Stealth Scan at 11:39
347| Scanning trail.elfu.org (35.222.178.2) [1000 ports]
348| Discovered open port 80/tcp on 35.222.178.2
349| Discovered open port 443/tcp on 35.222.178.2
350| Discovered open port 22/tcp on 35.222.178.2
351| Increasing send delay for 35.222.178.2 from 0 to 5 due to 11 out of 18 dropped probes since last increase.
352| Completed SYN Stealth Scan at 11:40, 29.96s elapsed (1000 total ports)
353| Initiating Service scan at 11:40
354| Scanning 3 services on trail.elfu.org (35.222.178.2)
355| Completed Service scan at 11:40, 5.01s elapsed (3 services on 1 host)
356| Initiating OS detection (try #1) against trail.elfu.org (35.222.178.2)
357| Initiating Traceroute at 11:40
358| Completed Traceroute at 11:40, 9.07s elapsed
359| NSE: Script scanning 35.222.178.2.
360| Initiating NSE at 11:40
361| Completed NSE at 11:40, 5.83s elapsed
362| Initiating NSE at 11:40
363| Completed NSE at 11:40, 0.76s elapsed
364| Initiating NSE at 11:40
365| Completed NSE at 11:40, 0.00s elapsed
366| Nmap scan report for trail.elfu.org (35.222.178.2)
367| Host is up (0.027s latency).
368| rDNS record for 35.222.178.2: 2.178.222.35.bc.googleusercontent.com
369| Not shown: 997 filtered ports
370| PORT STATE SERVICE VERSION
371| 22/tcp open tcpwrapped
372| |_ssh-hostkey: ERROR: Script execution failed (use -d to debug)
373| 80/tcp open tcpwrapped
374| | http-methods:
375| |_ Supported Methods: GET HEAD POST OPTIONS
376| |_http-server-header: nginx/1.14.2
377| |_http-title: Did not follow redirect to https://trail.elfu.org/
378| |_https-redirect: ERROR: Script execution failed (use -d to debug)
379| 443/tcp open tcpwrapped
380| |_http-server-header: nginx/1.14.2
381| |_http-title: 400 The plain HTTP request was sent to HTTPS port
382| | ssl-cert: Subject: commonName=*.elfu.org
383| | Subject Alternative Name: DNS:*.elfu.org
384| | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
385| | Public Key type: rsa
386| | Public Key bits: 2048
387| | Signature Algorithm: sha256WithRSAEncryption
388| | Not valid before: 2019-11-08T18:27:28
389| | Not valid after: 2020-02-06T18:27:28
390| | MD5: 8982 cafb 04ce c36e 85cf e659 af5e 5367
391| |_SHA-1: df8d 2f9f 24de 0726 8ce1 8e4e 4ac1 ebec 5bc3 e15a
392| Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
393| Device type: specialized|WAP|phone
394| Running: iPXE 1.X, Linux 2.4.X|2.6.X, Sony Ericsson embedded
395| OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:sonyericsson:u8i_vivaz
396| OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone
397|
398| TRACEROUTE (using port 80/tcp)
399| HOP RTT ADDRESS
400| 1 ... 30
401|
402| NSE: Script Post-scanning.
403| Initiating NSE at 11:40
404| Completed NSE at 11:40, 0.00s elapsed
405| Initiating NSE at 11:40
406| Completed NSE at 11:40, 0.00s elapsed
407| Initiating NSE at 11:40
408| Completed NSE at 11:40, 0.00s elapsed
409| Read data files from: /usr/bin/../share/nmap
410| OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
411| Nmap done: 1 IP address (1 host up) scanned in 55.97 seconds
412| Raw packets sent: 2179 (98.444KB) | Rcvd: 3303 (247.845KB)
413===================================================================================================
414|
415| Directory check:
416| Skipped because https://trail.elfu.org/gameselect/?playerid=JebediahSpringfield/uniscan803/ did not return the code 404
417===================================================================================================
418|
419| File check:
420| Skipped because https://trail.elfu.org/gameselect/?playerid=JebediahSpringfield/uniscan472/ did not return the code 404
421===================================================================================================
422|
423| Check robots.txt:
424|
425| Check sitemap.xml:
426===================================================================================================
427|
428| Crawler Started:
429| Plugin name: FCKeditor upload test v.1 Loaded.
430| Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
431| Plugin name: Upload Form Detect v.1.1 Loaded.
432| Plugin name: Code Disclosure v.1.1 Loaded.
433| Plugin name: E-mail Detection v.1.1 Loaded.
434| Plugin name: External Host Detect v.1.2 Loaded.
435| Plugin name: phpinfo() Disclosure v.1 Loaded.
436| Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
437| [+] Crawling finished, 1 URL's found!
438|
439| FCKeditor File Upload:
440|
441| Timthumb:
442|
443| File Upload Forms:
444|
445| Source Code Disclosure:
446|
447| E-mails:
448|
449| External hosts:
450|
451| PHPinfo() Disclosure:
452|
453| Web Backdoors:
454|
455| Ignored Files:
456===================================================================================================
457| Dynamic tests:
458| Plugin name: Learning New Directories v.1.2 Loaded.
459| Plugin name: FCKedior tests v.1.1 Loaded.
460| Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
461| Plugin name: Find Backup Files v.1.2 Loaded.
462| Plugin name: Blind SQL-injection tests v.1.3 Loaded.
463| Plugin name: Local File Include tests v.1.1 Loaded.
464| Plugin name: PHP CGI Argument Injection v.1.1 Loaded.
465| Plugin name: Remote Command Execution tests v.1.1 Loaded.
466| Plugin name: Remote File Include tests v.1.2 Loaded.
467| Plugin name: SQL-injection tests v.1.2 Loaded.
468| Plugin name: Cross-Site Scripting tests v.1.2 Loaded.
469| Plugin name: Web Shell Finder v.1.3 Loaded.
470| [+] 0 New directories added
471|
472|
473| FCKeditor tests:
474|
475|
476| Timthumb < 1.33 vulnerability:
477|
478|
479| Backup Files:
480|
481|
482| Blind SQL Injection:
483|
484|
485| Local File Include:
486|
487|
488| PHP CGI Argument Injection:
489|
490|
491| Remote Command Execution:
492|
493|
494| Remote File Include:
495|
496|
497| SQL Injection:
498|
499|
500| Cross-Site Scripting (XSS):
501|
502|
503| Web Shell Finder:
504===================================================================================================
505Scan end date: 20-12-2019 11:41:19
506
507
508
509HTML report saved in: report/trail.elfu.org.html
510| [+] CODE: 200 URL: http://trail.elfu.org/gameselect/index/
511===================================================================================================
512|
513| File check:
514| [+] CODE: 200 URL: http://trail.elfu.org/gameselect/favicon.ico
515===================================================================================================
516|
517| Check robots.txt:
518|
519| Check sitemap.xml:
520===================================================================================================
521|
522| Crawler Started:
523| Plugin name: FCKeditor upload test v.1 Loaded.
524| Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
525| Plugin name: Upload Form Detect v.1.1 Loaded.
526| Plugin name: Code Disclosure v.1.1 Loaded.
527| Plugin name: E-mail Detection v.1.1 Loaded.
528| Plugin name: External Host Detect v.1.2 Loaded.
529| Plugin name: phpinfo() Disclosure v.1 Loaded.
530| Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
531| [+] Crawling finished, 12 URL's found!
532|
533| FCKeditor File Upload:
534|
535| Timthumb:
536|
537| File Upload Forms:
538|
539| Source Code Disclosure:
540|
541| E-mails:
542|
543| External hosts:
544|
545| PHPinfo() Disclosure:
546|
547| Web Backdoors:
548|
549| Ignored Files:
550===================================================================================================
551| Dynamic tests:
552| Plugin name: Learning New Directories v.1.2 Loaded.
553| Plugin name: FCKedior tests v.1.1 Loaded.
554| Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
555| Plugin name: Find Backup Files v.1.2 Loaded.
556| Plugin name: Blind SQL-injection tests v.1.3 Loaded.
557| Plugin name: Local File Include tests v.1.1 Loaded.
558| Plugin name: PHP CGI Argument Injection v.1.1 Loaded.
559| Plugin name: Remote Command Execution tests v.1.1 Loaded.
560| Plugin name: Remote File Include tests v.1.2 Loaded.
561| Plugin name: SQL-injection tests v.1.2 Loaded.
562| Plugin name: Cross-Site Scripting tests v.1.2 Loaded.
563| Plugin name: Web Shell Finder v.1.3 Loaded.
564| [+] 1 New directories added
565|
566|
567| FCKeditor tests:
568|
569|
570| Timthumb < 1.33 vulnerability:
571|
572|
573| Backup Files:
574|
575|
576| Blind SQL Injection:
577|
578|
579| Local File Include:
580|
581|
582| PHP CGI Argument Injection:
583|
584|
585| Remote Command Execution:
586|
587|
588| Remote File Include:
589|
590|
591| SQL Injection:
592|
593|
594| Cross-Site Scripting (XSS):
595|
596|
597| Web Shell Finder:
598===================================================================================================
599Scan end date: 20-12-2019 11:48:41
600
601
602
603HTML report saved in: report/trail.elfu.org.html