Information Gathering

yeahh ...
I can be a chore again from my teacher. what is the job?


# "Thats right, information Gathering"
what is Information Gathering?
information gathering is the first step in hacking / pentesting, all the information you can get here. information gathering consists of two parts:
A. Technical
    Technical Information gathering actively use the tools available. Technical information gathering also divided into two more:

1. Active Information Gathering
usually we use the tool to search for information (scanning or mapping)
2. Passive information Gathering
we usually use search engines to find information (sodanhq or netcraft)

B. non Technical
     This kind of information gathering does not actively involve the tools available (social engineering), we are like in the life of our targets.


first,
I want to explain to the Active Information Gathering is the use nmap tool for finding information on a web page, for example: www.spentera.com


I do a nslookup to find the original IP of the target. By doing this command I can also get information about IP blocks owned by the target.

Spoiler:

root @ bt: ~ # nslookup www.spentera.com

and the results are as follows:
we can see from the name, listed name: www.spentera.com
and from IP addresses we can see: 108 162 195 184





very simple

and after that we use whois
and can be seen above there are already some information. if you want a fuller could try nmap tool.


root@bt:~# nmap -v -A www.spentera.com

Spoiler:

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-09-07 23:05 WIT
NSE: Loaded 87 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 23:05
Scanning www.spentera.com (108.162.195.84) [4 ports]
Completed Ping Scan at 23:05, 0.12s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 23:05
Completed Parallel DNS resolution of 1 host. at 23:05, 0.07s elapsed
Initiating SYN Stealth Scan at 23:05
Scanning www.spentera.com (108.162.195.84) [1000 ports]
Discovered open port 8080/tcp on 108.162.195.84
Discovered open port 80/tcp on 108.162.195.84
Discovered open port 53/tcp on 108.162.195.84
Completed SYN Stealth Scan at 23:05, 5.99s elapsed (1000 total ports)
Initiating Service scan at 23:05
Scanning 3 services on www.spentera.com (108.162.195.84)
Completed Service scan at 23:06, 14.32s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against www.spentera.com (108.162.195.84)
Initiating Traceroute at 23:06
Completed Traceroute at 23:06, 0.05s elapsed
Initiating Parallel DNS resolution of 8 hosts. at 23:06
Completed Parallel DNS resolution of 8 hosts. at 23:06, 0.04s elapsed
NSE: Script scanning 108.162.195.84.
Initiating NSE at 23:06
Completed NSE at 23:07, 80.31s elapsed
Nmap scan report for www.spentera.com (108.162.195.84)
Host is up (0.035s latency).
Other addresses for www.spentera.com (not scanned): 108.162.195.184
Not shown: 995 filtered ports
PORT     STATE  SERVICE     VERSION
53/tcp   open   domain      Mikrotik RouterOS named or OpenDNS Updater
80/tcp   open   http?
| http-robots.txt: 2 disallowed entries
|_/wp-admin/ /wp-includes/
|_http-title: Spentera
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-favicon: Unknown favicon MD5: 9D18E1A2864621A28221EBABDE39B9BE
443/tcp  closed https
8080/tcp open   http-proxy?
8443/tcp closed https-alt
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=5.61TEST4%I=7%D=9/7%Time=504A1B61%P=i686-pc-linux-gnu%r(Ge
SF:tRequest,7D9,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20cloudflare-nginx\r\n
SF:Date:\x20Fri,\x2007\x20Sep\x202012\x2017:06:12\x20GMT\r\nContent-Type:\
SF:x20text/html\r\nConnection:\x20close\r\nCache-Control:\x20max-age=15\r\
SF:nExpires:\x20Fri,\x2007\x20Sep\x202012\x2017:06:27\x20GMT\r\n\r\n<!DOCT
SF:YPE\x20HTML>\n<html\x20lang=\"en-US\">\n\x20\x20\x20\x20<head>\n\x20\x2
SF:0\x20\x20\x20\x20\x20\x20<meta\x20http-equiv=\"content-type\"\x20conten
SF:t=\"text/html;\x20charset=UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<me
SF:ta\x20charset=\"UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<title>\x20\|
SF:\x20Error</title>\n\n\x20\x20\x20\x20\x20\x20\x20\x20<link\x20rel=\"sty
SF:lesheet\"\x20media=\"screen\"\x20href=\"/cdn-cgi/styles/error\.css\"\x2
SF:0/>\n\x20\x20\x20\x20</head>\n\x20\x20\x20\x20<body>\n\x20\x20\x20\x20\
SF:x20\x20\x20\x20<ul\x20id=\"Alerts\">\n\x20\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20<li\x20class=\"alert\">\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20<img\x20src=\"/cdn-cgi/images/challeng
SF:e/alert\.gif\"\x20alert=\"Error!\"\x20/>\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20<h1\x20class=\"cferror_title\">Direc
SF:t\x20IP\x20Access\x20Not\x20Allowed</h1>\x20\x20<!--\x20Error\x20#1003\
SF:x20-->\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20<p\x20class=\"cferror_msg\">You've\x20requested\x20an\
SF:x20IP\x20address\x20that\x20is\x20part\x20of\x20the\x20<a\x20href=\"htt
SF:ps://www\.cloudflare\.com/\"\x20target=\"_blank\">CloudFlare</a>\x20net
SF:work\.\x20If\x20you\x20a")%r(HTTPOptions,7D9,"HTTP/1\.1\x20200\x20OK\r\
SF:nServer:\x20cloudflare-nginx\r\nDate:\x20Fri,\x2007\x20Sep\x202012\x201
SF:7:06:12\x20GMT\r\nContent-Type:\x20text/html\r\nConnection:\x20close\r\
SF:nCache-Control:\x20max-age=15\r\nExpires:\x20Fri,\x2007\x20Sep\x202012\
SF:x2017:06:27\x20GMT\r\n\r\n<!DOCTYPE\x20HTML>\n<html\x20lang=\"en-US\">\
SF:n\x20\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20http-
SF:equiv=\"content-type\"\x20content=\"text/html;\x20charset=UTF-8\">\n\x2
SF:0\x20\x20\x20\x20\x20\x20\x20<meta\x20charset=\"UTF-8\">\n\x20\x20\x20\
SF:x20\x20\x20\x20\x20<title>\x20\|\x20Error</title>\n\n\x20\x20\x20\x20\x
SF:20\x20\x20\x20<link\x20rel=\"stylesheet\"\x20media=\"screen\"\x20href=\
SF:"/cdn-cgi/styles/error\.css\"\x20/>\n\x20\x20\x20\x20</head>\n\x20\x20\
SF:x20\x20<body>\n\x20\x20\x20\x20\x20\x20\x20\x20<ul\x20id=\"Alerts\">\n\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<li\x20class=\"alert\">\
SF:n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<img\x
SF:20src=\"/cdn-cgi/images/challenge/alert\.gif\"\x20alert=\"Error!\"\x20/
SF:>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<h1\
SF:x20class=\"cferror_title\">Direct\x20IP\x20Access\x20Not\x20Allowed</h1
SF:>\x20\x20<!--\x20Error\x20#1003\x20-->\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<p\x20class=\"cferror_
SF:msg\">You've\x20requested\x20an\x20IP\x20address\x20that\x20is\x20part\
SF:x20of\x20the\x20<a\x20href=\"https://www\.cloudflare\.com/\"\x20target=
SF:\"_blank\">CloudFlare</a>\x20network\.\x20If\x20you\x20a");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8080-TCP:V=5.61TEST4%I=7%D=9/7%Time=504A1B61%P=i686-pc-linux-gnu%r(
SF:GetRequest,7D9,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20cloudflare-nginx\r
SF:\nDate:\x20Fri,\x2007\x20Sep\x202012\x2017:06:12\x20GMT\r\nContent-Type
SF::\x20text/html\r\nConnection:\x20close\r\nCache-Control:\x20max-age=15\
SF:r\nExpires:\x20Fri,\x2007\x20Sep\x202012\x2017:06:27\x20GMT\r\n\r\n<!DO
SF:CTYPE\x20HTML>\n<html\x20lang=\"en-US\">\n\x20\x20\x20\x20<head>\n\x20\
SF:x20\x20\x20\x20\x20\x20\x20<meta\x20http-equiv=\"content-type\"\x20cont
SF:ent=\"text/html;\x20charset=UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<
SF:meta\x20charset=\"UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<title>\x20
SF:\|\x20Error</title>\n\n\x20\x20\x20\x20\x20\x20\x20\x20<link\x20rel=\"s
SF:tylesheet\"\x20media=\"screen\"\x20href=\"/cdn-cgi/styles/error\.css\"\
SF:x20/>\n\x20\x20\x20\x20</head>\n\x20\x20\x20\x20<body>\n\x20\x20\x20\x2
SF:0\x20\x20\x20\x20<ul\x20id=\"Alerts\">\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20<li\x20class=\"alert\">\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20<img\x20src=\"/cdn-cgi/images/challe
SF:nge/alert\.gif\"\x20alert=\"Error!\"\x20/>\n\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20<h1\x20class=\"cferror_title\">Dir
SF:ect\x20IP\x20Access\x20Not\x20Allowed</h1>\x20\x20<!--\x20Error\x20#100
SF:3\x20-->\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20<p\x20class=\"cferror_msg\">You've\x20requested\x20a
SF:n\x20IP\x20address\x20that\x20is\x20part\x20of\x20the\x20<a\x20href=\"h
SF:ttps://www\.cloudflare\.com/\"\x20target=\"_blank\">CloudFlare</a>\x20n
SF:etwork\.\x20If\x20you\x20a")%r(HTTPOptions,7D9,"HTTP/1\.1\x20200\x20OK\
SF:r\nServer:\x20cloudflare-nginx\r\nDate:\x20Fri,\x2007\x20Sep\x202012\x2
SF:017:06:12\x20GMT\r\nContent-Type:\x20text/html\r\nConnection:\x20close\
SF:r\nCache-Control:\x20max-age=15\r\nExpires:\x20Fri,\x2007\x20Sep\x20201
SF:2\x2017:06:27\x20GMT\r\n\r\n<!DOCTYPE\x20HTML>\n<html\x20lang=\"en-US\"
SF:>\n\x20\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20htt
SF:p-equiv=\"content-type\"\x20content=\"text/html;\x20charset=UTF-8\">\n\
SF:x20\x20\x20\x20\x20\x20\x20\x20<meta\x20charset=\"UTF-8\">\n\x20\x20\x2
SF:0\x20\x20\x20\x20\x20<title>\x20\|\x20Error</title>\n\n\x20\x20\x20\x20
SF:\x20\x20\x20\x20<link\x20rel=\"stylesheet\"\x20media=\"screen\"\x20href
SF:=\"/cdn-cgi/styles/error\.css\"\x20/>\n\x20\x20\x20\x20</head>\n\x20\x2
SF:0\x20\x20<body>\n\x20\x20\x20\x20\x20\x20\x20\x20<ul\x20id=\"Alerts\">\
SF:n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<li\x20class=\"alert\"
SF:>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<img
SF:\x20src=\"/cdn-cgi/images/challenge/alert\.gif\"\x20alert=\"Error!\"\x2
SF:0/>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<h
SF:1\x20class=\"cferror_title\">Direct\x20IP\x20Access\x20Not\x20Allowed</
SF:h1>\x20\x20<!--\x20Error\x20#1003\x20-->\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<p\x20class=\"cferro
SF:r_msg\">You've\x20requested\x20an\x20IP\x20address\x20that\x20is\x20par
SF:t\x20of\x20the\x20<a\x20href=\"https://www\.cloudflare\.com/\"\x20targe
SF:t=\"_blank\">CloudFlare</a>\x20network\.\x20If\x20you\x20a");
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:kernel:2.6
OS details: Linux 2.6.15 - 2.6.30
Uptime guess: 0.453 days (since Fri Sep  7 12:14:22 2012)
Network Distance: 8 hops
TCP Sequence Prediction: Difficulty=204 (Good luck!)
IP ID Sequence Generation: All zeros

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   3.53 ms  192.168.150.1
2   4.42 ms  185.sub171.pika.net.id (117.103.171.185)
3   11.93 ms 172.30.7.1
4   20.66 ms lintasarta.idc3d.pika.net.id (117.103.168.29)
5   19.56 ms ip-29-217.sdi.net.id (103.11.29.217)
6   20.65 ms ip-29-254.sdi.net.id (103.11.29.254)
7   34.34 ms 202.79.197.132
8   44.85 ms 108.162.195.84

NSE: Script Post-scanning.
Read data files from: /usr/local/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 104.00 seconds
           Raw packets sent: 2047 (91.754KB) | Rcvd: 33 (1.910KB)
I think it is enough to see  information the web page : www.spentera.com








after that continued to page website: www.is2c-dojo.com
to more fully able to use nmap tool.

root@bt:~# nmap -v -A www.is2c-dojo.com
Spoiler:

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-09-07 23:14 WIT
NSE: Loaded 87 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 23:14
Scanning www.is2c-dojo.com (108.162.199.180) [4 ports]
Completed Ping Scan at 23:14, 0.13s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 23:14
Completed Parallel DNS resolution of 1 host. at 23:14, 0.08s elapsed
Initiating SYN Stealth Scan at 23:14
Scanning www.is2c-dojo.com (108.162.199.180) [1000 ports]
Discovered open port 53/tcp on 108.162.199.180
Discovered open port 80/tcp on 108.162.199.180
Discovered open port 8080/tcp on 108.162.199.180
Completed SYN Stealth Scan at 23:14, 14.93s elapsed (1000 total ports)
Initiating Service scan at 23:14
Scanning 3 services on www.is2c-dojo.com (108.162.199.180)
Completed Service scan at 23:15, 14.87s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against www.is2c-dojo.com (108.162.199.180)
Initiating Traceroute at 23:15
Completed Traceroute at 23:15, 0.06s elapsed
Initiating Parallel DNS resolution of 8 hosts. at 23:15
Completed Parallel DNS resolution of 8 hosts. at 23:15, 0.09s elapsed
NSE: Script scanning 108.162.199.180.
Initiating NSE at 23:15
Completed NSE at 23:16, 76.00s elapsed
Nmap scan report for www.is2c-dojo.com (108.162.199.180)
Host is up (0.042s latency).
Other addresses for www.is2c-dojo.com (not scanned): 108.162.199.80
Not shown: 995 filtered ports
PORT     STATE  SERVICE     VERSION
53/tcp   open   domain      Mikrotik RouterOS named or OpenDNS Updater
80/tcp   open   http?
|_http-methods: No Allow or Public header in OPTIONS response (status code 301)
| http-robots.txt: 1 disallowed entry
|_/
|_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
| http-title: IS2C | Information Security Shinobi Camp
|_Requested resource was http://is2c-dojo.com/
443/tcp  closed https
8080/tcp open   http-proxy?
8443/tcp closed https-alt
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=5.61TEST4%I=7%D=9/7%Time=504A1D86%P=i686-pc-linux-gnu%r(Ge
SF:tRequest,7D9,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20cloudflare-nginx\r\n
SF:Date:\x20Fri,\x2007\x20Sep\x202012\x2017:15:21\x20GMT\r\nContent-Type:\
SF:x20text/html\r\nConnection:\x20close\r\nCache-Control:\x20max-age=15\r\
SF:nExpires:\x20Fri,\x2007\x20Sep\x202012\x2017:15:36\x20GMT\r\n\r\n<!DOCT
SF:YPE\x20HTML>\n<html\x20lang=\"en-US\">\n\x20\x20\x20\x20<head>\n\x20\x2
SF:0\x20\x20\x20\x20\x20\x20<meta\x20http-equiv=\"content-type\"\x20conten
SF:t=\"text/html;\x20charset=UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<me
SF:ta\x20charset=\"UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<title>\x20\|
SF:\x20Error</title>\n\n\x20\x20\x20\x20\x20\x20\x20\x20<link\x20rel=\"sty
SF:lesheet\"\x20media=\"screen\"\x20href=\"/cdn-cgi/styles/error\.css\"\x2
SF:0/>\n\x20\x20\x20\x20</head>\n\x20\x20\x20\x20<body>\n\x20\x20\x20\x20\
SF:x20\x20\x20\x20<ul\x20id=\"Alerts\">\n\x20\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20<li\x20class=\"alert\">\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20<img\x20src=\"/cdn-cgi/images/challeng
SF:e/alert\.gif\"\x20alert=\"Error!\"\x20/>\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20<h1\x20class=\"cferror_title\">Direc
SF:t\x20IP\x20Access\x20Not\x20Allowed</h1>\x20\x20<!--\x20Error\x20#1003\
SF:x20-->\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20<p\x20class=\"cferror_msg\">You've\x20requested\x20an\
SF:x20IP\x20address\x20that\x20is\x20part\x20of\x20the\x20<a\x20href=\"htt
SF:ps://www\.cloudflare\.com/\"\x20target=\"_blank\">CloudFlare</a>\x20net
SF:work\.\x20If\x20you\x20a")%r(HTTPOptions,7D9,"HTTP/1\.1\x20200\x20OK\r\
SF:nServer:\x20cloudflare-nginx\r\nDate:\x20Fri,\x2007\x20Sep\x202012\x201
SF:7:15:21\x20GMT\r\nContent-Type:\x20text/html\r\nConnection:\x20close\r\
SF:nCache-Control:\x20max-age=15\r\nExpires:\x20Fri,\x2007\x20Sep\x202012\
SF:x2017:15:36\x20GMT\r\n\r\n<!DOCTYPE\x20HTML>\n<html\x20lang=\"en-US\">\
SF:n\x20\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20http-
SF:equiv=\"content-type\"\x20content=\"text/html;\x20charset=UTF-8\">\n\x2
SF:0\x20\x20\x20\x20\x20\x20\x20<meta\x20charset=\"UTF-8\">\n\x20\x20\x20\
SF:x20\x20\x20\x20\x20<title>\x20\|\x20Error</title>\n\n\x20\x20\x20\x20\x
SF:20\x20\x20\x20<link\x20rel=\"stylesheet\"\x20media=\"screen\"\x20href=\
SF:"/cdn-cgi/styles/error\.css\"\x20/>\n\x20\x20\x20\x20</head>\n\x20\x20\
SF:x20\x20<body>\n\x20\x20\x20\x20\x20\x20\x20\x20<ul\x20id=\"Alerts\">\n\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<li\x20class=\"alert\">\
SF:n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<img\x
SF:20src=\"/cdn-cgi/images/challenge/alert\.gif\"\x20alert=\"Error!\"\x20/
SF:>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<h1\
SF:x20class=\"cferror_title\">Direct\x20IP\x20Access\x20Not\x20Allowed</h1
SF:>\x20\x20<!--\x20Error\x20#1003\x20-->\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<p\x20class=\"cferror_
SF:msg\">You've\x20requested\x20an\x20IP\x20address\x20that\x20is\x20part\
SF:x20of\x20the\x20<a\x20href=\"https://www\.cloudflare\.com/\"\x20target=
SF:\"_blank\">CloudFlare</a>\x20network\.\x20If\x20you\x20a");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8080-TCP:V=5.61TEST4%I=7%D=9/7%Time=504A1D86%P=i686-pc-linux-gnu%r(
SF:GetRequest,7D9,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20cloudflare-nginx\r
SF:\nDate:\x20Fri,\x2007\x20Sep\x202012\x2017:15:21\x20GMT\r\nContent-Type
SF::\x20text/html\r\nConnection:\x20close\r\nCache-Control:\x20max-age=15\
SF:r\nExpires:\x20Fri,\x2007\x20Sep\x202012\x2017:15:36\x20GMT\r\n\r\n<!DO
SF:CTYPE\x20HTML>\n<html\x20lang=\"en-US\">\n\x20\x20\x20\x20<head>\n\x20\
SF:x20\x20\x20\x20\x20\x20\x20<meta\x20http-equiv=\"content-type\"\x20cont
SF:ent=\"text/html;\x20charset=UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<
SF:meta\x20charset=\"UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<title>\x20
SF:\|\x20Error</title>\n\n\x20\x20\x20\x20\x20\x20\x20\x20<link\x20rel=\"s
SF:tylesheet\"\x20media=\"screen\"\x20href=\"/cdn-cgi/styles/error\.css\"\
SF:x20/>\n\x20\x20\x20\x20</head>\n\x20\x20\x20\x20<body>\n\x20\x20\x20\x2
SF:0\x20\x20\x20\x20<ul\x20id=\"Alerts\">\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20<li\x20class=\"alert\">\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20<img\x20src=\"/cdn-cgi/images/challe
SF:nge/alert\.gif\"\x20alert=\"Error!\"\x20/>\n\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20<h1\x20class=\"cferror_title\">Dir
SF:ect\x20IP\x20Access\x20Not\x20Allowed</h1>\x20\x20<!--\x20Error\x20#100
SF:3\x20-->\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20<p\x20class=\"cferror_msg\">You've\x20requested\x20a
SF:n\x20IP\x20address\x20that\x20is\x20part\x20of\x20the\x20<a\x20href=\"h
SF:ttps://www\.cloudflare\.com/\"\x20target=\"_blank\">CloudFlare</a>\x20n
SF:etwork\.\x20If\x20you\x20a")%r(HTTPOptions,7D9,"HTTP/1\.1\x20200\x20OK\
SF:r\nServer:\x20cloudflare-nginx\r\nDate:\x20Fri,\x2007\x20Sep\x202012\x2
SF:017:15:21\x20GMT\r\nContent-Type:\x20text/html\r\nConnection:\x20close\
SF:r\nCache-Control:\x20max-age=15\r\nExpires:\x20Fri,\x2007\x20Sep\x20201
SF:2\x2017:15:36\x20GMT\r\n\r\n<!DOCTYPE\x20HTML>\n<html\x20lang=\"en-US\"
SF:>\n\x20\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20htt
SF:p-equiv=\"content-type\"\x20content=\"text/html;\x20charset=UTF-8\">\n\
SF:x20\x20\x20\x20\x20\x20\x20\x20<meta\x20charset=\"UTF-8\">\n\x20\x20\x2
SF:0\x20\x20\x20\x20\x20<title>\x20\|\x20Error</title>\n\n\x20\x20\x20\x20
SF:\x20\x20\x20\x20<link\x20rel=\"stylesheet\"\x20media=\"screen\"\x20href
SF:=\"/cdn-cgi/styles/error\.css\"\x20/>\n\x20\x20\x20\x20</head>\n\x20\x2
SF:0\x20\x20<body>\n\x20\x20\x20\x20\x20\x20\x20\x20<ul\x20id=\"Alerts\">\
SF:n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<li\x20class=\"alert\"
SF:>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<img
SF:\x20src=\"/cdn-cgi/images/challenge/alert\.gif\"\x20alert=\"Error!\"\x2
SF:0/>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<h
SF:1\x20class=\"cferror_title\">Direct\x20IP\x20Access\x20Not\x20Allowed</
SF:h1>\x20\x20<!--\x20Error\x20#1003\x20-->\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<p\x20class=\"cferro
SF:r_msg\">You've\x20requested\x20an\x20IP\x20address\x20that\x20is\x20par
SF:t\x20of\x20the\x20<a\x20href=\"https://www\.cloudflare\.com/\"\x20targe
SF:t=\"_blank\">CloudFlare</a>\x20network\.\x20If\x20you\x20a");
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:kernel:2.6
OS details: Linux 2.6.15 - 2.6.30
Uptime guess: 0.460 days (since Fri Sep  7 12:14:22 2012)
Network Distance: 8 hops
TCP Sequence Prediction: Difficulty=201 (Good luck!)
IP ID Sequence Generation: All zeros

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   3.58 ms  192.168.150.1
2   3.64 ms  185.sub171.pika.net.id (117.103.171.185)
3   5.16 ms  172.30.7.1
4   18.08 ms lintasarta.idc3d.pika.net.id (117.103.168.29)
5   19.82 ms ip-29-217.sdi.net.id (103.11.29.217)
6   18.15 ms ip-29-254.sdi.net.id (103.11.29.254)
7   32.35 ms 202.79.197.132
8   58.56 ms 108.162.199.180

NSE: Script Post-scanning.
Read data files from: /usr/local/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 109.13 seconds
           Raw packets sent: 2053 (92.018KB) | Rcvd: 36 (2.030KB)






wow..... its amazing.
The next update will be visible the next day
Thanks for your attention 



0 komentar:

Posting Komentar

Diberdayakan oleh Blogger.

Copyright © / scxo2oco71

Template by : Urang-kurai / powered by :blogger