User:Neur0X/porz

DNS resolution of 1 IPs took 0.80s. Initiating SYN Stealth Scan against f4.f5.1243.static.theplanet.com (67.18.245.2 44) [1680 ports] at 02:06 Server is open, vulnerable to null byte bug on port 80 Discovered open port 25/tcp on 67.18.245.244 Discovered open port 53/tcp on 67.18.245.244 Discovered open port 21/tcp on 67.18.245.244 Discovered open port 80/tcp on 67.18.245.244 Discovered open port 22/tcp on 67.18.245.244 Requesting priviledged acess Discovered open port 443/tcp on 67.18.245.244 Increasing send delay for 67.18.245.244 from 0 to 5 due to 27 out of 88 dropped probes since last increase. Synthesizing remote files... Discovered open port 143/tcp on 67.18.245.244 SYN Stealth Scan Timing: About 29.70% done; ETC: 02:07 (0:01:11 remaining) Discovered open port 110/tcp on 67.18.245.244 Discovered open port 26/tcp on 67.18.245.244 Discovered open port 3306/tcp on 67.18.245.244 Discovered open port 111/tcp on 67.18.245.244 Discovered open port 995/tcp on 67.18.245.244 Discovered open port 1/tcp on 67.18.245.244 Discovered open port 465/tcp on 67.18.245.244 Discovered open port 993/tcp on 67.18.245.244 The SYN Stealth Scan took 84.13s to scan 1680 total ports. Initiating service scan against 15 services on f4.f5.1243.static.theplanet.com ( 67.18.245.244) at 02:07 Warning: Servicescan failed to fill info_template (subjectlen: 3250). Too long? Match string was line 2683: v/Apache httpd/$1/$2 The service scan took 65.94s to scan 15 services on 1 host. For OSScan assuming port 1 is open, 2 is closed, and neither are firewalled For OSScan assuming port 1 is open, 2 is closed, and neither are firewalled Insufficient responses for TCP sequencing (0), OS detection may be less accurate

For OSScan assuming port 1 is open, 2 is closed, and neither are firewalled Host f4.f5.1243.static.theplanet.com (67.18.245.244) appears to be up ... good. Interesting ports on f4.f5.1243.static.theplanet.com (67.18.245.244): Not shown: 1658 closed ports PORT    STATE    SERVICE      VERSION 1/tcp   open     tcpwrapped 21/tcp  open     ftp          PureFTPd 22/tcp  open     ssh          OpenSSH 3.5p1 (protocol 1.99) 25/tcp  open     smtp         Exim smtpd 4.52 26/tcp  open     smtp         Exim smtpd 4.52 53/tcp  open     domain       ISC Bind 9.2.1 80/tcp  open     http         Apache httpd 1.3.33 110/tcp open     pop3         cppop pop3d 19.0 111/tcp open     rpcbind? 135/tcp filtered msrpc 136/tcp filtered profile 137/tcp filtered netbios-ns 138/tcp filtered netbios-dgm 139/tcp filtered netbios-ssn 143/tcp open     imap         UW Imapd 2003.339-cpanel 443/tcp open     ssl          OpenSSL 445/tcp filtered microsoft-ds 465/tcp open     ssl          OpenSSL 993/tcp open     ssl          OpenSSL 995/tcp open     ssl          OpenSSL 1720/tcp filtered H.323/Q.931 3306/tcp open    mysql        MySQL 4.0.27-standard No exact OS matches for host (If you know what OS is running on it, see http://w ww.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=4.11%P=i686-pc-windows-windows%D=6/30%Tm=44A4C00F%O=1%C=2) TSeq(Class=RI%gcd=1%SI=329DB6%IPID=Z%TS=U) T1(Resp=Y%DF=Y%W=16D0%ACK=O%Flags=A%Ops=) TSeq(Class=RI%gcd=1%SI=330935%IPID=Z%TS=U) T1(Resp=Y%DF=Y%W=16D0%ACK=S++%Flags=AS%Ops=M) T2(Resp=N) T1(Resp=Y%DF=Y%W=16D0%ACK=S++%Flags=AS%Ops=M) T2(Resp=N) T3(Resp=Y%DF=Y%W=16D0%ACK=O%Flags=A%Ops=) T2(Resp=N) T3(Resp=Y%DF=Y%W=16D0%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T3(Resp=Y%DF=Y%W=16D0%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=Y%DF=N%TOS=22%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E) T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=Y%DF=N%TOS=22%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E) PU(Resp=Y%DF=N%TOS=22%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E)

TCP Sequence Prediction: Class=random positive increments Difficulty=3344693 (Good luck!) IPID Sequence Generation: All zeros Service Info: Host: night.bbhosts.net

Nmap finished: 1 IP address (1 host up) scanned in 199.250 seconds Raw packets sent: 1929 (86.400KB) | Rcvd: 1871 (87.255KB)