1
Hacking and Security / Re: Site injectable?
« on: December 10, 2012, 08:08:53 pm »
Thank you for the nice explanation!
How did you find out which keywords are getting filtered out? Just trying or software?
And yeah, the whole software set is old on their server.
How did you find out which keywords are getting filtered out? Just trying or software?
And yeah, the whole software set is old on their server.
Quote
Starting Nmap 5.00 ( http://nmap.org ) at 2012-12-02 22:48 CET
Interesting ports on 69.36.8.247:
Not shown: 976 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD 1.3.3c
22/tcp open ssh OpenSSH 3.9p1 (protocol 1.99)
25/tcp open smtp Courier smtpd
26/tcp open smtp Courier smtpd
53/tcp open domain ISC BIND 9.2.4
80/tcp open http Apache httpd 1.3.41 ((Unix) PHP/5.2.14 FrontPage/5.0.2.2510 mod_ssl/2.8.31 OpenSSL/0.9.7a)
110/tcp open pop3 Courier pop3d
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
143/tcp open imap Courier Imapd (released 2010)
443/tcp open http Apache httpd 1.3.41 ((Unix) PHP/5.2.14 FrontPage/5.0.2.2510 mod_ssl/2.8.31 OpenSSL/0.9.7a)
445/tcp filtered microsoft-ds
587/tcp open smtp Courier smtpd
993/tcp open ssl/imaps?
995/tcp open ssl/pop3s?
3000/tcp open http ServerCP httpd
3001/tcp open http Apache httpd 1.3.41 ((Unix) PHP/5.2.14 FrontPage/5.0.2.2510 mod_ssl/2.8.31 OpenSSL/0.9.7a)
3306/tcp open mysql MySQL 5.0.91-community
4321/tcp open http Apache httpd 1.3.41 ((Unix) PHP/5.2.14 FrontPage/5.0.2.2510 mod_ssl/2.8.31 OpenSSL/0.9.7a)
5432/tcp open postgresql PostgreSQL DB
6666/tcp filtered irc
6667/tcp filtered irc
6668/tcp filtered irc
6669/tcp filtered irc
Service Info: Host: server2.tantrix.com; OS: Unix
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 30.78 seconds