Monday, February 12, 2007

adui.. sakit hati tul la..

nmap -v -A 161.139.248.244

Starting Nmap 4.20 ( http://insecure.org ) at 2007-02-12 10:28 Malay Peninsula S
tandard Time
Initiating Parallel DNS resolution of 1 host. at 10:28
Completed Parallel DNS resolution of 1 host. at 10:28, 0.00s elapsed
Initiating SYN Stealth Scan at 10:28
Scanning 161.139.248.244 [1697 ports]
Discovered open port 53/tcp on 161.139.248.244
Discovered open port 23/tcp on 161.139.248.244
Discovered open port 80/tcp on 161.139.248.244
Discovered open port 443/tcp on 161.139.248.244
Discovered open port 3389/tcp on 161.139.248.244
Discovered open port 21/tcp on 161.139.248.244
Discovered open port 554/tcp on 161.139.248.244
Discovered open port 636/tcp on 161.139.248.244
Discovered open port 25/tcp on 161.139.248.244
Discovered open port 22/tcp on 161.139.248.244
Discovered open port 113/tcp on 161.139.248.244
Discovered open port 389/tcp on 161.139.248.244
Discovered open port 1520/tcp on 161.139.248.244
Discovered open port 465/tcp on 161.139.248.244
Discovered open port 5000/tcp on 161.139.248.244
Discovered open port 79/tcp on 161.139.248.244
Discovered open port 143/tcp on 161.139.248.244
Discovered open port 569/tcp on 161.139.248.244
Discovered open port 5190/tcp on 161.139.248.244
Discovered open port 1526/tcp on 161.139.248.244
Discovered open port 749/tcp on 161.139.248.244
Discovered open port 993/tcp on 161.139.248.244
Discovered open port 37/tcp on 161.139.248.244
Discovered open port 110/tcp on 161.139.248.244
Discovered open port 513/tcp on 161.139.248.244
Discovered open port 1139/tcp on 161.139.248.244
Discovered open port 674/tcp on 161.139.248.244
Discovered open port 43/tcp on 161.139.248.244
Discovered open port 119/tcp on 161.139.248.244
Discovered open port 17/tcp on 161.139.248.244
Discovered open port 7/tcp on 161.139.248.244
Discovered open port 818/tcp on 161.139.248.244
Discovered open port 1000/tcp on 161.139.248.244
Discovered open port 9/tcp on 161.139.248.244
Discovered open port 105/tcp on 161.139.248.244
Discovered open port 1720/tcp on 161.139.248.244
Discovered open port 908/tcp on 161.139.248.244
Discovered open port 109/tcp on 161.139.248.244
Discovered open port 8080/tcp on 161.139.248.244
Discovered open port 106/tcp on 161.139.248.244
Discovered open port 13/tcp on 161.139.248.244
Discovered open port 19/tcp on 161.139.248.244
Discovered open port 819/tcp on 161.139.248.244
Discovered open port 81/tcp on 161.139.248.244
Discovered open port 8000/tcp on 161.139.248.244
Discovered open port 1755/tcp on 161.139.248.244
Discovered open port 815/tcp on 161.139.248.244
Discovered open port 563/tcp on 161.139.248.244
Discovered open port 9100/tcp on 161.139.248.244
Discovered open port 5060/tcp on 161.139.248.244
Discovered open port 6667/tcp on 161.139.248.244
Discovered open port 3269/tcp on 161.139.248.244
Discovered open port 1352/tcp on 161.139.248.244
Discovered open port 1521/tcp on 161.139.248.244
Discovered open port 1494/tcp on 161.139.248.244
Discovered open port 828/tcp on 161.139.248.244
Discovered open port 3268/tcp on 161.139.248.244
Discovered open port 7070/tcp on 161.139.248.244
Discovered open port 995/tcp on 161.139.248.244
Discovered open port 808/tcp on 161.139.248.244
Discovered open port 1498/tcp on 161.139.248.244
Discovered open port 88/tcp on 161.139.248.244
Discovered open port 1433/tcp on 161.139.248.244
Discovered open port 70/tcp on 161.139.248.244
Completed SYN Stealth Scan at 10:28, 22.63s elapsed (1697 total ports)
Initiating Service scan at 10:28
Scanning 63 services on 161.139.248.244
Completed Service scan at 10:28, 10.42s elapsed (64 services on 1 host)
Initiating OS detection (try #1) against 161.139.248.244
Host 161.139.248.244 appears to be up ... good.
Interesting ports on 161.139.248.244:
Not shown: 1632 filtered ports
PORT STATE SERVICE VERSION
7/tcp open tcpwrapped
9/tcp open tcpwrapped
13/tcp open tcpwrapped
17/tcp open tcpwrapped
19/tcp open tcpwrapped
21/tcp open tcpwrapped
22/tcp open tcpwrapped
23/tcp open tcpwrapped
25/tcp open tcpwrapped
37/tcp open tcpwrapped
43/tcp open tcpwrapped
53/tcp open tcpwrapped
70/tcp open tcpwrapped
79/tcp open tcpwrapped
80/tcp open http Microsoft IIS webserver 6.0
81/tcp open tcpwrapped
88/tcp open tcpwrapped
105/tcp open tcpwrapped
106/tcp open tcpwrapped
109/tcp open tcpwrapped
110/tcp open pop3-proxy AVG pop3 proxy (broken)
113/tcp open tcpwrapped
119/tcp open tcpwrapped
143/tcp open tcpwrapped
389/tcp open tcpwrapped
443/tcp open tcpwrapped
465/tcp open tcpwrapped
513/tcp open tcpwrapped
554/tcp open tcpwrapped
563/tcp open tcpwrapped
569/tcp open tcpwrapped
636/tcp open tcpwrapped
674/tcp open tcpwrapped
749/tcp open tcpwrapped
808/tcp open tcpwrapped
815/tcp open tcpwrapped
818/tcp open tcpwrapped
819/tcp open tcpwrapped
828/tcp open tcpwrapped
908/tcp open tcpwrapped
993/tcp open tcpwrapped
995/tcp open tcpwrapped
1000/tcp open tcpwrapped
1139/tcp open tcpwrapped
1352/tcp open tcpwrapped
1433/tcp open tcpwrapped
1494/tcp open tcpwrapped
1498/tcp open tcpwrapped
1520/tcp open tcpwrapped
1521/tcp open tcpwrapped
1526/tcp open tcpwrapped
1720/tcp open tcpwrapped
1723/tcp closed pptp
1755/tcp open tcpwrapped
3268/tcp open tcpwrapped
3269/tcp open tcpwrapped
3389/tcp open microsoft-rdp Microsoft Terminal Service
5000/tcp open tcpwrapped
5060/tcp open tcpwrapped
5190/tcp open tcpwrapped
6667/tcp open tcpwrapped
7070/tcp open tcpwrapped
8000/tcp open tcpwrapped
8080/tcp open tcpwrapped
9100/tcp open jetdirect?
Device type: general purpose
Running: Microsoft Windows 2000|2003
OS details: Microsoft Windows 2000 SP4, Microsoft Windows Server 2003 Enterprise
Edition 64-Bit SP1
TCP Sequence Prediction: Difficulty=247 (Good luck!)
IPID Sequence Generation: Busy server or unknown class
Service Info: OS: Windows

OS and Service detection performed. Please report any incorrect results at http:
//insecure.org/nmap/submit/ .
Nmap finished: 1 IP address (1 host up) scanned in 35.563 seconds
Raw packets sent: 3350 (148.946KB) | Rcvd: 86 (4354B)


okeh.. confirm IIS 6.0

HTTP/1.1 200 OK
Via: 1.1 PROXY5
Content-Length: 1433
Date: Mon, 12 Feb 2007 02:37:32 GMT
Content-Location: http://161.139.248.244/iisstart.htm
Content-Type: text/html
Last-Modified: Fri, 21 Feb 2003 10:48:30 GMT
Accept-Ranges: bytes
ETag: "05367c596d9c21:29d"
Server: Microsoft-IIS/6.0

foxkid.. tlg cari exploit IIS 6.0

1 Comment and put their link:

Anonymous said...

penat mate aku scroll...

Recent Post

© 2011 ~Menempuh Arus Masa-Life-Photography~, AllRightsReserved.

Designed by ScreenWritersArena