Rabu, 25 Januari 2012

Information Gathering http://www.is2c-dojo.com/


tarting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-01-26 02:36 WIT
NSE: Loaded 87 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 02:36
Scanning 67.222.154.106 [4 ports]
Completed Ping Scan at 02:36, 0.63s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 02:36
Completed Parallel DNS resolution of 1 host. at 02:36, 0.93s elapsed
Initiating SYN Stealth Scan at 02:36
Scanning gudeg.partnerit.us (67.222.154.106) [1000 ports]
Discovered open port 21/tcp on 67.222.154.106
Discovered open port 995/tcp on 67.222.154.106
Discovered open port 110/tcp on 67.222.154.106
Discovered open port 53/tcp on 67.222.154.106
Discovered open port 80/tcp on 67.222.154.106

Completed SYN Stealth Scan at 02:37, 31.11s elapsed (1000 total ports)
Initiating Service scan at 02:37
Scanning 9 services on gudeg.partnerit.us (67.222.154.106)
Completed Service scan at 02:37, 8.39s elapsed (9 services on 1 host)
Initiating OS detection (try #1) against gudeg.partnerit.us (67.222.154.106)
Retrying OS detection (try #2) against gudeg.partnerit.us (67.222.154.106)
Initiating Traceroute at 02:37
Completed Traceroute at 02:37, 1.07s elapsed
Initiating Parallel DNS resolution of 2 hosts. at 02:37
Completed Parallel DNS resolution of 2 hosts. at 02:37, 0.07s elapsed
NSE: Script scanning 67.222.154.106.
Initiating NSE at 02:37
Completed NSE at 02:39, 116.87s elapsed
Nmap scan report for gudeg.partnerit.us (67.222.154.106)
Host is up (0.21s latency).
Not shown: 988 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp?
|_ftp-bounce: no banner
22/tcp closed ssh
53/tcp open domain Mikrotik RouterOS named or OpenDNS Updater
80/tcp open http-proxy Squid webproxy 2.7.STABLE3
| http-open-proxy: Potentially OPEN proxy.
|_Methods supported: GET HEAD
110/tcp open pop3?
143/tcp open imap?
| imap-capabilities:
|_ ERROR: Failed to connect to server
443/tcp open https?
|_ssl-cert: TIMEOUT
465/tcp open smtps?
|_smtp-commands: Couldn't establish connection on port 465
|_ssl-cert: TIMEOUT
587/tcp closed submission
993/tcp open imaps?
|_ssl-cert: TIMEOUT
995/tcp open pop3s?
|_ssl-cert: TIMEOUT
3000/tcp closed ppp
OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
No OS matches for host
Network Distance: 2 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 52.38 ms 192.168.100.254
2 50.80 ms gudeg.partnerit.us (67.222.154.106)
NSE: Script Post-scanning.
Read data files from: /usr/local/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 180.93 seconds
Raw packets sent: 2172 (101.432KB) | Rcvd: 49 (2.190KB) 

Information Gathering www.is2c-dojo.net
Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-01-26 01:36 WIT
NSE: Loaded 87 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 01:36
Scanning 67.222.154.106 [4 ports]
Completed Ping Scan at 01:36, 0.63s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 01:36
Completed Parallel DNS resolution of 1 host. At 01:36, 0.93s elapsed
Initiating SYN Stealth Scan at 01:36
Scanning gudeg.partnerit.us (67.222.154.106) [1000 ports]
Discovered open port 21/tcp on 67.222.154.106
Discovered open port 995/tcp on 67.222.154.106
Discovered open port 110/tcp on 67.222.154.106
Discovered open port 53/tcp on 67.222.154.106
Discovered open port 80/tcp on 67.222.154.106

Completed SYN Stealth Scan at 01:37, 31.11s elapsed (1000 total ports)
Initiating Service scan at 01:37
Scanning 9 services on gudeg.partnerit.us (67.222.154.106)
Completed Service scan at 01:37, 8.39s elapsed (9 services on 1 host)
Initiating OS detection (try #1) against gudeg.partnerit.us (67.222.154.106)
Retrying OS detection (try #2) against gudeg.partnerit.us (67.222.154.106)
Initiating Traceroute at 01:37
Completed Traceroute at 01:37, 1.07s elapsed
Initiating Parallel DNS resolution of 2 hosts. at 01:37
Completed Parallel DNS resolution of 2 hosts. at 01:37, 0.07s elapsed
NSE: Script scanning 67.222.154.106.
Initiating NSE at 01:37
Completed NSE at 01:39, 116.87s elapsed
Nmap scan report for gudeg.partnerit.us (67.222.154.106)
Host is up (0.21s latency).
Not shown: 988 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp?
|_ftp-bounce: no banner
22/tcp closed ssh
53/tcp open domain Mikrotik RouterOS named or OpenDNS Updater
80/tcp open http-proxy Squid webproxy 2.7.STABLE3
| http-open-proxy: Potentially OPEN proxy.
|_Methods supported: GET HEAD
110/tcp open pop3?
143/tcp open imap?
| imap-capabilities:
|_ ERROR: Failed to connect to server
443/tcp open https?
|_ssl-cert: TIMEOUT
465/tcp open smtps?
|_smtp-commands: Couldn't establish connection on port 465
|_ssl-cert: TIMEOUT
587/tcp closed submission
993/tcp open imaps?
|_ssl-cert: TIMEOUT
995/tcp open pop3s?
|_ssl-cert: TIMEOUT
3000/tcp closed ppp
OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
No OS matches for host
Network Distance: 2 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 52.38 ms 192.168.100.254
2 50.80 ms gudeg.partnerit.us (67.222.154.106)
NSE: Script Post-scanning.
Read data files from: /usr/local/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 180.93 seconds
Raw packets sent: 2172 (101.432KB) | Rcvd: 49 (2.190KB) 

Information Gathering http://www.spentara.com/
Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-01-26 23:23 WIT
NSE: Loaded 87 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 02:23
Scanning 74.81.66.104 [4 ports]
Completed Ping Scan at 02:23, 1.60s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 02:23
Completed Parallel DNS resolution of 1 host. at 02:23, 3.16s elapsed
Initiating SYN Stealth Scan at 02:23
Scanning server28.web-hosting.com (74.81.66.104) [1000 ports]
Discovered open port 443/tcp on 74.81.66.104
Discovered open port 80/tcp on 74.81.66.104
Discovered open port 53/tcp on 74.81.66.104
Discovered open port 993/tcp on 74.81.66.104
Discovered open port 21/tcp on 74.81.66.104

SYN Stealth Scan Timing: About 34.20% done; ETC: 02:25 (0:01:00 remaining)
Completed SYN Stealth Scan at 02:24, 69.00s elapsed (1000 total ports)
Initiating Service scan at 02:24
Scanning 8 services on server28.web-hosting.com (74.81.66.104)
Completed Service scan at 02:24, 9.53s elapsed (8 services on 1 host)
Initiating OS detection (try #1) against server28.web-hosting.com (74.81.66.104)
Retrying OS detection (try #2) against server28.web-hosting.com (74.81.66.104)
Initiating Traceroute at 02:25
Completed Traceroute at 02:25, 0.13s elapsed
Initiating Parallel DNS resolution of 2 hosts. at 02:25
Completed Parallel DNS resolution of 2 hosts. at 02:25, 0.12s elapsed
NSE: Script scanning 74.81.66.104.
Initiating NSE at 02:25
Completed NSE at 02:27, 159.48s elapsed
Nmap scan report for server28.web-hosting.com (74.81.66.104)
Host is up (0.59s latency).
Not shown: 991 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp?
|_ftp-bounce: no banner
53/tcp open domain Mikrotik RouterOS named or OpenDNS Updater
80/tcp open http-proxy Squid webproxy 2.7.STABLE3
| http-open-proxy: Potentially OPEN proxy.
|_Methods supported: GET HEAD
110/tcp open pop3?
143/tcp open imap?
| imap-capabilities:
|_ ERROR: Failed to connect to server
443/tcp open https?
|_ssl-cert: TIMEOUT
587/tcp closed submission
993/tcp open imaps?
|_ssl-cert: TIMEOUT
995/tcp open pop3s?
|_ssl-cert: TIMEOUT
OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
No OS matches for host
Network Distance: 2 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 129.80 ms 192.168.100.254
2 128.49 ms server28.web-hosting.com (74.81.66.104)
NSE: Script Post-scanning.
Read data files from: /usr/local/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 267.11 seconds
Raw packets sent: 3193 (146.296KB) | Rcvd: 86 (4.683KB)
root@bt:/pentest/enumeration/web/whatweb# ./whatweb -v spentera.com
http://spentera.com/ [301]
http://spentera.com [301] RedirectLocation[http://www.spentera.com/], x-pingback[http://www.spentera.com/xmlrpc.php], Country[UNITED STATES][US], PHP[5.3.8], IP[74.81.66.104], Cookies[PHPSESSID], Apache, X-Powered-By[PHP/5.3.8], UncommonHeaders[x-pingback], HTTPServer[Apache]
URL : http://spentera.com
Status : 301
Apache
Description: The Apache HTTP Server Project is an effort to develop and
maintain an open-source HTTP server for modern operating
systems including UNIX and Windows NT. The goal of this
project is to provide a secure, efficient and extensible
server that provides HTTP services in sync with the current
HTTP standards. - homepage: http://httpd.apache.org/
Cookies
Description: Display the names of cookies in the HTTP headers. The
values are not returned to save on space.
String : PHPSESSID
Country
Description: GeoIP IP2Country lookup. To refresh DB, replace
IpToCountry.csv and remove country-ips.dat. GeoIP database
from http://software77.net/geo-ip/. Local IPv4 addresses
are represented as ZZ according to an ISO convention.
Lookup code developed by Matthias Wachter for rubyquiz.com
and used with permission.
String : UNITED STATES
Module : US
HTTPServer
Description: HTTP server header string. This plugin also attempts to
identify the operating system from the server header.
String : Apache (from server string)
IP
Description: IP address of the target, if available.
String : 74.81.66.104
PHP
Description: PHP is a widely-used general-purpose scripting language
that is especially suited for Web development and can be
embedded into HTML. This plugin identifies PHP errors,
modules and versions and extracts the local file path and
username if present. - Homepage: http://www.php.net/
Version : 5.3.8
RedirectLocation
Description: HTTP Server string location. used with http-status 301 and
302
String : http://www.spentera.com/ (from location)
UncommonHeaders
Description: Uncommon HTTP server headers. The blacklist includes all
the standard headers and many non standard but common ones.
Interesting but fairly common headers should have their own
plugins, eg. x-powered-by, server and x-aspnet-version.
Info about headers can be found at www.http-stats.com
String : x-pingback (from headers)
X-Powered-By
Description: X-Powered-By HTTP header
String : PHP/5.3.8 (from x-powered-by string)
x-pingback
Description: A pingback is one of three types of linkbacks, methods for
Web authors to request notification when somebody links to
one of their documents. This enables authors to keep track
of who is linking to, or referring to their articles. Some
weblog software, such as Movable Type, Serendipity,
WordPress and Telligent Community, support automatic
pingbacks
 String : http://www.spentera.com/xmlrpc.php


Tidak ada komentar:

Posting Komentar