Wrong Way

Turn back if u not sure !


Whuah... lumayan lama juga ne scanning www.rasasayang.com.my
Tapi ada hasilnya juga ternyata... nah buat kamu yg lebih jago lagi, silahkan website tersebut kamu hack! daku mendukung 100% untuk ngehack website tersebut
Nech... aku kasih bocoran service apa ja yg berjalan diwebsite tersebut... Ayo.... Ayo....!

C:\Documents and Settings\r00trat>nmap -vv -sV -O www.rasasayang.com.my

Starting Nmap 4.11 ( http://www.insecure.org/nmap ) at 2007-10-01 13:19 Korea St
andard Time
DNS resolution of 1 IPs took 4.28s.
Initiating SYN Stealth Scan against 202.157.176.17 [1680 ports] at 13:19
Discovered open port 80/tcp on 202.157.176.17
Discovered open port 3389/tcp on 202.157.176.17
Discovered open port 21/tcp on 202.157.176.17
SYN Stealth Scan Timing: About 11.13% done; ETC: 13:24 (0:04:05 remaining)
SYN Stealth Scan Timing: About 14.91% done; ETC: 13:50 (0:26:17 remaining)
Increasing send delay for 202.157.176.17 from 0 to 5 due to 22 out of 71 dropped
probes since last increase.
Increasing send delay for 202.157.176.17 from 5 to 10 due to 11 out of 11 droppe
d probes since last increase.
Increasing send delay for 202.157.176.17 from 10 to 20 due to 11 out of 11 dropp
ed probes since last increase.
Increasing send delay for 202.157.176.17 from 20 to 40 due to 11 out of 11 dropp
ed probes since last increase.
Increasing send delay for 202.157.176.17 from 40 to 80 due to 11 out of 11 dropp
ed probes since last increase.
Increasing send delay for 202.157.176.17 from 80 to 160 due to 11 out of 11 drop
ped probes since last increase.
Increasing send delay for 202.157.176.17 from 160 to 320 due to 11 out of 11 dro
pped probes since last increase.
SYN Stealth Scan Timing: About 39.23% done; ETC: 14:38 (0:47:55 remaining)
Increasing send delay for 202.157.176.17 from 320 to 640 due to 11 out of 11 dro
pped probes since last increase.
Increasing send delay for 202.157.176.17 from 640 to 1000 due to 11 out of 11 dr
opped probes since last increase.
Discovered open port 1032/tcp on 202.157.176.17
SYN Stealth Scan Timing: About 76.96% done; ETC: 15:02 (0:23:36 remaining)
Discovered open port 1433/tcp on 202.157.176.17
SYN Stealth Scan Timing: About 92.20% done; ETC: 15:11 (0:08:40 remaining)
SYN Stealth Scan Timing: About 97.50% done; ETC: 15:13 (0:02:51 remaining)
SYN Stealth Scan Timing: About 99.29% done; ETC: 15:14 (0:00:49 remaining)
The SYN Stealth Scan took 6925.48s to scan 1680 total ports.
Initiating service scan against 5 services on 202.157.176.17 at 15:15
The service scan took 66.66s to scan 5 services on 1 host.
For OSScan assuming port 21 is open, 22 is closed, and neither are firewalled
For OSScan assuming port 21 is open, 22 is closed, and neither are firewalled
Insufficient responses for TCP sequencing (0), OS detection may be less accurate

Host 202.157.176.17 appears to be up ... good.
Interesting ports on 202.157.176.17:
Not shown: 1629 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp Serv-U ftpd 4.0
22/tcp closed ssh
23/tcp closed telnet
33/tcp closed dsp
48/tcp closed auditd
63/tcp closed via-ftp
80/tcp open http Microsoft IIS webserver 6.0
85/tcp closed mit-ml-dev
96/tcp closed dixie
124/tcp closed ansatrader
143/tcp closed imap
256/tcp closed FW1-secureremote
322/tcp closed unknown
378/tcp closed dsETOS
393/tcp closed dis
442/tcp closed cvc_hostd
443/tcp closed https
554/tcp closed rtsp
565/tcp closed whoami
572/tcp closed sonar
636/tcp closed ldapssl
712/tcp closed unknown
739/tcp closed unknown
808/tcp closed ccproxy-http
815/tcp closed unknown
849/tcp closed unknown
863/tcp closed unknown
889/tcp closed unknown
920/tcp closed unknown
984/tcp closed unknown
985/tcp closed unknown
1032/tcp open msrpc Microsoft Windows RPC
1040/tcp closed netsaint
1348/tcp closed bbn-mmx
1362/tcp closed timeflies
1372/tcp closed fc-ser
1388/tcp closed objective-dbc
1433/tcp open ms-sql-s?
1492/tcp closed stone-design-1
1538/tcp closed 3ds-lm
1549/tcp closed shivahose
1723/tcp closed pptp
1986/tcp closed licensedaemon
1997/tcp closed gdp-port
2065/tcp closed dlsrpn
2106/tcp closed ekshell
2121/tcp closed ccproxy-ftp
3389/tcp open microsoft-rdp Microsoft Terminal Service
5550/tcp closed sdadmind
5977/tcp closed ncd-pref-tcp
13713/tcp closed VeritasNetbackup
Device type: general purpose|firewall
Running: Microsoft Windows 2003/.NET|NT/2K/XP, Symantec Solaris 8
OS details: Microsoft Windows 2003 Server or XP SP2, Microsoft Windows XP Pro SP
2, Symantec Enterprise Firewall v7.0.4 (on Solaris 8)
OS Fingerprint:
T1(Resp=N)
T2(Resp=N)
T3(Resp=N)
T4(Resp=N)
T5(Resp=N)
T6(Resp=N)
T7(Resp=N)
PU(Resp=Y%DF=N%TOS=0%IPLEN=B0%RIPTL=148%RID=E%RIPCK=E%UCK=F%ULEN=134%DAT=E)

Service Info: OS: Windows

Nmap finished: 1 IP address (1 host up) scanned in 7101.671 seconds
Raw packets sent: 3612 (160.080KB) | Rcvd: 104 (5604B)

4 komentar

  1. Anonymous  

    Ati-ati.. jangan-jangan itu honeypot..
    jangan cepet percaya sama yang ada di internet.

  2. Anonymous  

    hehehehehehehe....
    Gak popo... yg penting ada outputnya...
    Serang ! ! ! ! !

  3. Anonymous  

    Ini gua kasih source code webnya dalam Cold Fusion. Download di sini.

    http://www.uploadbank.com/pupload/view/467

  4. Anonymous  

    Who knows where to download XRumer 5.0 Palladium?
    Help, please. All recommend this program to effectively advertise on the Internet, this is the best program!

Post a Comment

Subscribe to: Post Comments (Atom)