yeahh ...
I can be a chore again from my teacher. what is the job?
# "Thats right, information Gathering"
what is Information Gathering?
information gathering is the first step in hacking / pentesting, all the information you can get here. information gathering consists of two parts:
A. Technical
Technical Information gathering actively use the tools available. Technical information gathering also divided into two more:
1. Active Information Gathering
usually we use the tool to search for information (scanning or mapping)
2. Passive information Gathering
we usually use search engines to find information (sodanhq or netcraft)
B. non Technical
This kind of information gathering does not actively involve the tools available (social engineering), we are like in the life of our targets.
first,
I want to explain to the Active Information Gathering is the use nmap tool for finding information on a web page, for example: www.spentera.com
I do a nslookup to find the original IP of the target. By doing this command I can also get information about IP blocks owned by the target.
very simple
and after that we use whois
and can be seen above there are already some information. if you want a fuller could try nmap tool.
root@bt:~# nmap -v -A www.spentera.com
Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-09-07 23:05 WIT
NSE: Loaded 87 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 23:05
Scanning www.spentera.com (108.162.195.84) [4 ports]
Completed Ping Scan at 23:05, 0.12s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 23:05
Completed Parallel DNS resolution of 1 host. at 23:05, 0.07s elapsed
Initiating SYN Stealth Scan at 23:05
Scanning www.spentera.com (108.162.195.84) [1000 ports]
Discovered open port 8080/tcp on 108.162.195.84
Discovered open port 80/tcp on 108.162.195.84
Discovered open port 53/tcp on 108.162.195.84
Completed SYN Stealth Scan at 23:05, 5.99s elapsed (1000 total ports)
Initiating Service scan at 23:05
Scanning 3 services on www.spentera.com (108.162.195.84)
Completed Service scan at 23:06, 14.32s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against www.spentera.com (108.162.195.84)
Initiating Traceroute at 23:06
Completed Traceroute at 23:06, 0.05s elapsed
Initiating Parallel DNS resolution of 8 hosts. at 23:06
Completed Parallel DNS resolution of 8 hosts. at 23:06, 0.04s elapsed
NSE: Script scanning 108.162.195.84.
Initiating NSE at 23:06
Completed NSE at 23:07, 80.31s elapsed
Nmap scan report for www.spentera.com (108.162.195.84)
Host is up (0.035s latency).
Other addresses for www.spentera.com (not scanned): 108.162.195.184
Not shown: 995 filtered ports
PORT STATE SERVICE VERSION
53/tcp open domain Mikrotik RouterOS named or OpenDNS Updater
80/tcp open http?
| http-robots.txt: 2 disallowed entries
|_/wp-admin/ /wp-includes/
|_http-title: Spentera
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-favicon: Unknown favicon MD5: 9D18E1A2864621A28221EBABDE39B9BE
443/tcp closed https
8080/tcp open http-proxy?
8443/tcp closed https-alt
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=5.61TEST4%I=7%D=9/7%Time=504A1B61%P=i686-pc-linux-gnu%r(Ge
SF:tRequest,7D9,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20cloudflare-nginx\r\n
SF:Date:\x20Fri,\x2007\x20Sep\x202012\x2017:06:12\x20GMT\r\nContent-Type:\
SF:x20text/html\r\nConnection:\x20close\r\nCache-Control:\x20max-age=15\r\
SF:nExpires:\x20Fri,\x2007\x20Sep\x202012\x2017:06:27\x20GMT\r\n\r\n<!DOCT
SF:YPE\x20HTML>\n<html\x20lang=\"en-US\">\n\x20\x20\x20\x20<head>\n\x20\x2
SF:0\x20\x20\x20\x20\x20\x20<meta\x20http-equiv=\"content-type\"\x20conten
SF:t=\"text/html;\x20charset=UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<me
SF:ta\x20charset=\"UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<title>\x20\|
SF:\x20Error</title>\n\n\x20\x20\x20\x20\x20\x20\x20\x20<link\x20rel=\"sty
SF:lesheet\"\x20media=\"screen\"\x20href=\"/cdn-cgi/styles/error\.css\"\x2
SF:0/>\n\x20\x20\x20\x20</head>\n\x20\x20\x20\x20<body>\n\x20\x20\x20\x20\
SF:x20\x20\x20\x20<ul\x20id=\"Alerts\">\n\x20\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20<li\x20class=\"alert\">\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20<img\x20src=\"/cdn-cgi/images/challeng
SF:e/alert\.gif\"\x20alert=\"Error!\"\x20/>\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20<h1\x20class=\"cferror_title\">Direc
SF:t\x20IP\x20Access\x20Not\x20Allowed</h1>\x20\x20<!--\x20Error\x20#1003\
SF:x20-->\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20<p\x20class=\"cferror_msg\">You've\x20requested\x20an\
SF:x20IP\x20address\x20that\x20is\x20part\x20of\x20the\x20<a\x20href=\"htt
SF:ps://www\.cloudflare\.com/\"\x20target=\"_blank\">CloudFlare</a>\x20net
SF:work\.\x20If\x20you\x20a")%r(HTTPOptions,7D9,"HTTP/1\.1\x20200\x20OK\r\
SF:nServer:\x20cloudflare-nginx\r\nDate:\x20Fri,\x2007\x20Sep\x202012\x201
SF:7:06:12\x20GMT\r\nContent-Type:\x20text/html\r\nConnection:\x20close\r\
SF:nCache-Control:\x20max-age=15\r\nExpires:\x20Fri,\x2007\x20Sep\x202012\
SF:x2017:06:27\x20GMT\r\n\r\n<!DOCTYPE\x20HTML>\n<html\x20lang=\"en-US\">\
SF:n\x20\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20http-
SF:equiv=\"content-type\"\x20content=\"text/html;\x20charset=UTF-8\">\n\x2
SF:0\x20\x20\x20\x20\x20\x20\x20<meta\x20charset=\"UTF-8\">\n\x20\x20\x20\
SF:x20\x20\x20\x20\x20<title>\x20\|\x20Error</title>\n\n\x20\x20\x20\x20\x
SF:20\x20\x20\x20<link\x20rel=\"stylesheet\"\x20media=\"screen\"\x20href=\
SF:"/cdn-cgi/styles/error\.css\"\x20/>\n\x20\x20\x20\x20</head>\n\x20\x20\
SF:x20\x20<body>\n\x20\x20\x20\x20\x20\x20\x20\x20<ul\x20id=\"Alerts\">\n\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<li\x20class=\"alert\">\
SF:n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<img\x
SF:20src=\"/cdn-cgi/images/challenge/alert\.gif\"\x20alert=\"Error!\"\x20/
SF:>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<h1\
SF:x20class=\"cferror_title\">Direct\x20IP\x20Access\x20Not\x20Allowed</h1
SF:>\x20\x20<!--\x20Error\x20#1003\x20-->\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<p\x20class=\"cferror_
SF:msg\">You've\x20requested\x20an\x20IP\x20address\x20that\x20is\x20part\
SF:x20of\x20the\x20<a\x20href=\"https://www\.cloudflare\.com/\"\x20target=
SF:\"_blank\">CloudFlare</a>\x20network\.\x20If\x20you\x20a");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8080-TCP:V=5.61TEST4%I=7%D=9/7%Time=504A1B61%P=i686-pc-linux-gnu%r(
SF:GetRequest,7D9,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20cloudflare-nginx\r
SF:\nDate:\x20Fri,\x2007\x20Sep\x202012\x2017:06:12\x20GMT\r\nContent-Type
SF::\x20text/html\r\nConnection:\x20close\r\nCache-Control:\x20max-age=15\
SF:r\nExpires:\x20Fri,\x2007\x20Sep\x202012\x2017:06:27\x20GMT\r\n\r\n<!DO
SF:CTYPE\x20HTML>\n<html\x20lang=\"en-US\">\n\x20\x20\x20\x20<head>\n\x20\
SF:x20\x20\x20\x20\x20\x20\x20<meta\x20http-equiv=\"content-type\"\x20cont
SF:ent=\"text/html;\x20charset=UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<
SF:meta\x20charset=\"UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<title>\x20
SF:\|\x20Error</title>\n\n\x20\x20\x20\x20\x20\x20\x20\x20<link\x20rel=\"s
SF:tylesheet\"\x20media=\"screen\"\x20href=\"/cdn-cgi/styles/error\.css\"\
SF:x20/>\n\x20\x20\x20\x20</head>\n\x20\x20\x20\x20<body>\n\x20\x20\x20\x2
SF:0\x20\x20\x20\x20<ul\x20id=\"Alerts\">\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20<li\x20class=\"alert\">\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20<img\x20src=\"/cdn-cgi/images/challe
SF:nge/alert\.gif\"\x20alert=\"Error!\"\x20/>\n\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20<h1\x20class=\"cferror_title\">Dir
SF:ect\x20IP\x20Access\x20Not\x20Allowed</h1>\x20\x20<!--\x20Error\x20#100
SF:3\x20-->\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20<p\x20class=\"cferror_msg\">You've\x20requested\x20a
SF:n\x20IP\x20address\x20that\x20is\x20part\x20of\x20the\x20<a\x20href=\"h
SF:ttps://www\.cloudflare\.com/\"\x20target=\"_blank\">CloudFlare</a>\x20n
SF:etwork\.\x20If\x20you\x20a")%r(HTTPOptions,7D9,"HTTP/1\.1\x20200\x20OK\
SF:r\nServer:\x20cloudflare-nginx\r\nDate:\x20Fri,\x2007\x20Sep\x202012\x2
SF:017:06:12\x20GMT\r\nContent-Type:\x20text/html\r\nConnection:\x20close\
SF:r\nCache-Control:\x20max-age=15\r\nExpires:\x20Fri,\x2007\x20Sep\x20201
SF:2\x2017:06:27\x20GMT\r\n\r\n<!DOCTYPE\x20HTML>\n<html\x20lang=\"en-US\"
SF:>\n\x20\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20htt
SF:p-equiv=\"content-type\"\x20content=\"text/html;\x20charset=UTF-8\">\n\
SF:x20\x20\x20\x20\x20\x20\x20\x20<meta\x20charset=\"UTF-8\">\n\x20\x20\x2
SF:0\x20\x20\x20\x20\x20<title>\x20\|\x20Error</title>\n\n\x20\x20\x20\x20
SF:\x20\x20\x20\x20<link\x20rel=\"stylesheet\"\x20media=\"screen\"\x20href
SF:=\"/cdn-cgi/styles/error\.css\"\x20/>\n\x20\x20\x20\x20</head>\n\x20\x2
SF:0\x20\x20<body>\n\x20\x20\x20\x20\x20\x20\x20\x20<ul\x20id=\"Alerts\">\
SF:n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<li\x20class=\"alert\"
SF:>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<img
SF:\x20src=\"/cdn-cgi/images/challenge/alert\.gif\"\x20alert=\"Error!\"\x2
SF:0/>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<h
SF:1\x20class=\"cferror_title\">Direct\x20IP\x20Access\x20Not\x20Allowed</
SF:h1>\x20\x20<!--\x20Error\x20#1003\x20-->\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<p\x20class=\"cferro
SF:r_msg\">You've\x20requested\x20an\x20IP\x20address\x20that\x20is\x20par
SF:t\x20of\x20the\x20<a\x20href=\"https://www\.cloudflare\.com/\"\x20targe
SF:t=\"_blank\">CloudFlare</a>\x20network\.\x20If\x20you\x20a");
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:kernel:2.6
OS details: Linux 2.6.15 - 2.6.30
Uptime guess: 0.453 days (since Fri Sep 7 12:14:22 2012)
Network Distance: 8 hops
TCP Sequence Prediction: Difficulty=204 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 3.53 ms 192.168.150.1
2 4.42 ms 185.sub171.pika.net.id (117.103.171.185)
3 11.93 ms 172.30.7.1
4 20.66 ms lintasarta.idc3d.pika.net.id (117.103.168.29)
5 19.56 ms ip-29-217.sdi.net.id (103.11.29.217)
6 20.65 ms ip-29-254.sdi.net.id (103.11.29.254)
7 34.34 ms 202.79.197.132
8 44.85 ms 108.162.195.84
NSE: Script Post-scanning.
Read data files from: /usr/local/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 104.00 seconds
Raw packets sent: 2047 (91.754KB) | Rcvd: 33 (1.910KB)
I think it is enough to see information the web page : www.spentera.com
after that continued to page website: www.is2c-dojo.com
to more fully able to use nmap tool.
root@bt:~# nmap -v -A www.is2c-dojo.com
Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-09-07 23:14 WIT
NSE: Loaded 87 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 23:14
Scanning www.is2c-dojo.com (108.162.199.180) [4 ports]
Completed Ping Scan at 23:14, 0.13s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 23:14
Completed Parallel DNS resolution of 1 host. at 23:14, 0.08s elapsed
Initiating SYN Stealth Scan at 23:14
Scanning www.is2c-dojo.com (108.162.199.180) [1000 ports]
Discovered open port 53/tcp on 108.162.199.180
Discovered open port 80/tcp on 108.162.199.180
Discovered open port 8080/tcp on 108.162.199.180
Completed SYN Stealth Scan at 23:14, 14.93s elapsed (1000 total ports)
Initiating Service scan at 23:14
Scanning 3 services on www.is2c-dojo.com (108.162.199.180)
Completed Service scan at 23:15, 14.87s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against www.is2c-dojo.com (108.162.199.180)
Initiating Traceroute at 23:15
Completed Traceroute at 23:15, 0.06s elapsed
Initiating Parallel DNS resolution of 8 hosts. at 23:15
Completed Parallel DNS resolution of 8 hosts. at 23:15, 0.09s elapsed
NSE: Script scanning 108.162.199.180.
Initiating NSE at 23:15
Completed NSE at 23:16, 76.00s elapsed
Nmap scan report for www.is2c-dojo.com (108.162.199.180)
Host is up (0.042s latency).
Other addresses for www.is2c-dojo.com (not scanned): 108.162.199.80
Not shown: 995 filtered ports
PORT STATE SERVICE VERSION
53/tcp open domain Mikrotik RouterOS named or OpenDNS Updater
80/tcp open http?
|_http-methods: No Allow or Public header in OPTIONS response (status code 301)
| http-robots.txt: 1 disallowed entry
|_/
|_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
| http-title: IS2C | Information Security Shinobi Camp
|_Requested resource was http://is2c-dojo.com/
443/tcp closed https
8080/tcp open http-proxy?
8443/tcp closed https-alt
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=5.61TEST4%I=7%D=9/7%Time=504A1D86%P=i686-pc-linux-gnu%r(Ge
SF:tRequest,7D9,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20cloudflare-nginx\r\n
SF:Date:\x20Fri,\x2007\x20Sep\x202012\x2017:15:21\x20GMT\r\nContent-Type:\
SF:x20text/html\r\nConnection:\x20close\r\nCache-Control:\x20max-age=15\r\
SF:nExpires:\x20Fri,\x2007\x20Sep\x202012\x2017:15:36\x20GMT\r\n\r\n<!DOCT
SF:YPE\x20HTML>\n<html\x20lang=\"en-US\">\n\x20\x20\x20\x20<head>\n\x20\x2
SF:0\x20\x20\x20\x20\x20\x20<meta\x20http-equiv=\"content-type\"\x20conten
SF:t=\"text/html;\x20charset=UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<me
SF:ta\x20charset=\"UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<title>\x20\|
SF:\x20Error</title>\n\n\x20\x20\x20\x20\x20\x20\x20\x20<link\x20rel=\"sty
SF:lesheet\"\x20media=\"screen\"\x20href=\"/cdn-cgi/styles/error\.css\"\x2
SF:0/>\n\x20\x20\x20\x20</head>\n\x20\x20\x20\x20<body>\n\x20\x20\x20\x20\
SF:x20\x20\x20\x20<ul\x20id=\"Alerts\">\n\x20\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20<li\x20class=\"alert\">\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20<img\x20src=\"/cdn-cgi/images/challeng
SF:e/alert\.gif\"\x20alert=\"Error!\"\x20/>\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20<h1\x20class=\"cferror_title\">Direc
SF:t\x20IP\x20Access\x20Not\x20Allowed</h1>\x20\x20<!--\x20Error\x20#1003\
SF:x20-->\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20<p\x20class=\"cferror_msg\">You've\x20requested\x20an\
SF:x20IP\x20address\x20that\x20is\x20part\x20of\x20the\x20<a\x20href=\"htt
SF:ps://www\.cloudflare\.com/\"\x20target=\"_blank\">CloudFlare</a>\x20net
SF:work\.\x20If\x20you\x20a")%r(HTTPOptions,7D9,"HTTP/1\.1\x20200\x20OK\r\
SF:nServer:\x20cloudflare-nginx\r\nDate:\x20Fri,\x2007\x20Sep\x202012\x201
SF:7:15:21\x20GMT\r\nContent-Type:\x20text/html\r\nConnection:\x20close\r\
SF:nCache-Control:\x20max-age=15\r\nExpires:\x20Fri,\x2007\x20Sep\x202012\
SF:x2017:15:36\x20GMT\r\n\r\n<!DOCTYPE\x20HTML>\n<html\x20lang=\"en-US\">\
SF:n\x20\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20http-
SF:equiv=\"content-type\"\x20content=\"text/html;\x20charset=UTF-8\">\n\x2
SF:0\x20\x20\x20\x20\x20\x20\x20<meta\x20charset=\"UTF-8\">\n\x20\x20\x20\
SF:x20\x20\x20\x20\x20<title>\x20\|\x20Error</title>\n\n\x20\x20\x20\x20\x
SF:20\x20\x20\x20<link\x20rel=\"stylesheet\"\x20media=\"screen\"\x20href=\
SF:"/cdn-cgi/styles/error\.css\"\x20/>\n\x20\x20\x20\x20</head>\n\x20\x20\
SF:x20\x20<body>\n\x20\x20\x20\x20\x20\x20\x20\x20<ul\x20id=\"Alerts\">\n\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<li\x20class=\"alert\">\
SF:n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<img\x
SF:20src=\"/cdn-cgi/images/challenge/alert\.gif\"\x20alert=\"Error!\"\x20/
SF:>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<h1\
SF:x20class=\"cferror_title\">Direct\x20IP\x20Access\x20Not\x20Allowed</h1
SF:>\x20\x20<!--\x20Error\x20#1003\x20-->\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<p\x20class=\"cferror_
SF:msg\">You've\x20requested\x20an\x20IP\x20address\x20that\x20is\x20part\
SF:x20of\x20the\x20<a\x20href=\"https://www\.cloudflare\.com/\"\x20target=
SF:\"_blank\">CloudFlare</a>\x20network\.\x20If\x20you\x20a");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8080-TCP:V=5.61TEST4%I=7%D=9/7%Time=504A1D86%P=i686-pc-linux-gnu%r(
SF:GetRequest,7D9,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20cloudflare-nginx\r
SF:\nDate:\x20Fri,\x2007\x20Sep\x202012\x2017:15:21\x20GMT\r\nContent-Type
SF::\x20text/html\r\nConnection:\x20close\r\nCache-Control:\x20max-age=15\
SF:r\nExpires:\x20Fri,\x2007\x20Sep\x202012\x2017:15:36\x20GMT\r\n\r\n<!DO
SF:CTYPE\x20HTML>\n<html\x20lang=\"en-US\">\n\x20\x20\x20\x20<head>\n\x20\
SF:x20\x20\x20\x20\x20\x20\x20<meta\x20http-equiv=\"content-type\"\x20cont
SF:ent=\"text/html;\x20charset=UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<
SF:meta\x20charset=\"UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<title>\x20
SF:\|\x20Error</title>\n\n\x20\x20\x20\x20\x20\x20\x20\x20<link\x20rel=\"s
SF:tylesheet\"\x20media=\"screen\"\x20href=\"/cdn-cgi/styles/error\.css\"\
SF:x20/>\n\x20\x20\x20\x20</head>\n\x20\x20\x20\x20<body>\n\x20\x20\x20\x2
SF:0\x20\x20\x20\x20<ul\x20id=\"Alerts\">\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20<li\x20class=\"alert\">\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20<img\x20src=\"/cdn-cgi/images/challe
SF:nge/alert\.gif\"\x20alert=\"Error!\"\x20/>\n\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20<h1\x20class=\"cferror_title\">Dir
SF:ect\x20IP\x20Access\x20Not\x20Allowed</h1>\x20\x20<!--\x20Error\x20#100
SF:3\x20-->\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20<p\x20class=\"cferror_msg\">You've\x20requested\x20a
SF:n\x20IP\x20address\x20that\x20is\x20part\x20of\x20the\x20<a\x20href=\"h
SF:ttps://www\.cloudflare\.com/\"\x20target=\"_blank\">CloudFlare</a>\x20n
SF:etwork\.\x20If\x20you\x20a")%r(HTTPOptions,7D9,"HTTP/1\.1\x20200\x20OK\
SF:r\nServer:\x20cloudflare-nginx\r\nDate:\x20Fri,\x2007\x20Sep\x202012\x2
SF:017:15:21\x20GMT\r\nContent-Type:\x20text/html\r\nConnection:\x20close\
SF:r\nCache-Control:\x20max-age=15\r\nExpires:\x20Fri,\x2007\x20Sep\x20201
SF:2\x2017:15:36\x20GMT\r\n\r\n<!DOCTYPE\x20HTML>\n<html\x20lang=\"en-US\"
SF:>\n\x20\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20htt
SF:p-equiv=\"content-type\"\x20content=\"text/html;\x20charset=UTF-8\">\n\
SF:x20\x20\x20\x20\x20\x20\x20\x20<meta\x20charset=\"UTF-8\">\n\x20\x20\x2
SF:0\x20\x20\x20\x20\x20<title>\x20\|\x20Error</title>\n\n\x20\x20\x20\x20
SF:\x20\x20\x20\x20<link\x20rel=\"stylesheet\"\x20media=\"screen\"\x20href
SF:=\"/cdn-cgi/styles/error\.css\"\x20/>\n\x20\x20\x20\x20</head>\n\x20\x2
SF:0\x20\x20<body>\n\x20\x20\x20\x20\x20\x20\x20\x20<ul\x20id=\"Alerts\">\
SF:n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<li\x20class=\"alert\"
SF:>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<img
SF:\x20src=\"/cdn-cgi/images/challenge/alert\.gif\"\x20alert=\"Error!\"\x2
SF:0/>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<h
SF:1\x20class=\"cferror_title\">Direct\x20IP\x20Access\x20Not\x20Allowed</
SF:h1>\x20\x20<!--\x20Error\x20#1003\x20-->\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<p\x20class=\"cferro
SF:r_msg\">You've\x20requested\x20an\x20IP\x20address\x20that\x20is\x20par
SF:t\x20of\x20the\x20<a\x20href=\"https://www\.cloudflare\.com/\"\x20targe
SF:t=\"_blank\">CloudFlare</a>\x20network\.\x20If\x20you\x20a");
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:kernel:2.6
OS details: Linux 2.6.15 - 2.6.30
Uptime guess: 0.460 days (since Fri Sep 7 12:14:22 2012)
Network Distance: 8 hops
TCP Sequence Prediction: Difficulty=201 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 3.58 ms 192.168.150.1
2 3.64 ms 185.sub171.pika.net.id (117.103.171.185)
3 5.16 ms 172.30.7.1
4 18.08 ms lintasarta.idc3d.pika.net.id (117.103.168.29)
5 19.82 ms ip-29-217.sdi.net.id (103.11.29.217)
6 18.15 ms ip-29-254.sdi.net.id (103.11.29.254)
7 32.35 ms 202.79.197.132
8 58.56 ms 108.162.199.180
NSE: Script Post-scanning.
Read data files from: /usr/local/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 109.13 seconds
Raw packets sent: 2053 (92.018KB) | Rcvd: 36 (2.030KB)
0 komentar:
Posting Komentar