Assalamualaikum WBT,

httpd vulnerable to DDoS. Setting AutoCommit dalam MySQL, takleh  
rollback..ehehee..OPEN Relay Mail
.......

Muzamir bin Mokhtar,
http://muzzoshah.blogspot.com
http://muzzotechspot.blogspot.com


----- Message from [email protected] ---------
     Date: Fri, 23 Sep 2011 21:30:22 +0800
     From: Harisfazillah Jamel <[email protected]>
Reply-To: "Open Web Application Security Project (OWASP) Malaysia  
Local Chapter" <[email protected]>
  Subject: [OWASP-Malaysia] [KUIZ] Cari Kelemahan Sebuah Perisian Dari  
Hasil NMAP Ini
       To: "Open Web Application Security Project (OWASP) Malaysia  
Local Chapter" <[email protected]>
       Cc: [email protected]


> Cari Kelemahan Sebuah Perisian Dari Hasil NMAP Ini
>
> Kuiz untuk hari ini.
>
>
> :)
>
>
> -----------
>
> linuxmalaysia@linuxmalaysia-laptop:~$ sudo nmap -sS -sU -T4 -A -v -PE
> -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script all 127.0.0.1
>
> Starting Nmap 5.00 ( http://nmap.org ) at 2011-09-23 20:53 MYT
> NSE: Loaded 59 scripts for scanning.
> Initiating SYN Stealth Scan at 20:53
> Scanning localhost (127.0.0.1) [1000 ports]
> Discovered open port 25/tcp on 127.0.0.1
> Discovered open port 80/tcp on 127.0.0.1
> Discovered open port 53/tcp on 127.0.0.1
> Discovered open port 3306/tcp on 127.0.0.1
> Discovered open port 9050/tcp on 127.0.0.1
> Discovered open port 5432/tcp on 127.0.0.1
> Discovered open port 5902/tcp on 127.0.0.1
> Discovered open port 5800/tcp on 127.0.0.1
> Discovered open port 631/tcp on 127.0.0.1
> Completed SYN Stealth Scan at 20:53, 0.07s elapsed (1000 total ports)
> Initiating UDP Scan at 20:53
> Scanning localhost (127.0.0.1) [1000 ports]
> Completed UDP Scan at 20:53, 1.24s elapsed (1000 total ports)
> Initiating Service scan at 20:53
> Scanning 13 services on localhost (127.0.0.1)
> Discovered open port 53/udp on 127.0.0.1
> Discovered open|filtered port 53/udp on localhost (127.0.0.1) is  
> actually open
> Completed Service scan at 20:54, 55.04s elapsed (13 services on 1 host)
> Initiating OS detection (try #1) against localhost (127.0.0.1)
> Retrying OS detection (try #2) against localhost (127.0.0.1)
> Retrying OS detection (try #3) against localhost (127.0.0.1)
> Retrying OS detection (try #4) against localhost (127.0.0.1)
> Retrying OS detection (try #5) against localhost (127.0.0.1)
> NSE: Script scanning 127.0.0.1.
> NSE: Starting runlevel 1 scan
> Initiating NSE at 20:54
> Completed NSE at 20:54, 14.02s elapsed
> NSE: Script Scanning completed.
> Host localhost (127.0.0.1) is up (0.000075s latency).
> Interesting ports on localhost (127.0.0.1):
> Not shown: 1987 closed ports
> PORT     STATE         SERVICE    VERSION
> 25/tcp   open          smtp       Postfix smtpd
> |_ smtp-commands: EHLO linuxmalaysia-laptop, PIPELINING, SIZE
> 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN
> |_ banner: 220 linuxmalaysia-laptop ESMTP Postfix (Ubuntu)
> |_ smtp-open-relay: OPEN RELAY found.
> 53/tcp   open          domain     ISC BIND 9.7.0-P1
> |  dns-zone-transfer:
> |  localhost  SOA     localhost root.localhost
> |  localhost  NS      localhost
> |  localhost  A       127.0.0.1
> |  localhost  AAAAA
> |_ localhost  SOA     localhost root.localhost
> 80/tcp   open          http       Apache httpd 2.2.14 ((Ubuntu))
> |_ html-title: Site doesn't have a title (text/html).
> |_ http-iis-webdav-vuln: ERROR: This web server is not supported.
> 631/tcp  open          ipp        CUPS 1.4
> 3306/tcp open          mysql      MySQL 5.1.41-3ubuntu12.10
> |  banner: A\x00\x00\x00\x0A5.1.41-3ubuntu12.10\x00#\x00\x00\x00KO/:ubjm\x
> |_ 00\xFF\xF7\x08\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x...
> |  mysql-info: Protocol: 10
> |  Version: 5.1.41-3ubuntu12.10
> |  Thread ID: 36
> |  Some Capabilities: Long Passwords, Connect with DB, Compress, ODBC,
> Transactions, Secure Connection
> |  Status: Autocommit
> |_ Salt: OMpnYRnT9`Y{$96@|tOn
> 5432/tcp open          postgresql PostgreSQL DB
> 5800/tcp open          vnc        iTALC
> |_ banner: ISD 001.000
> 5902/tcp open          vnc        VNC (protocol 3.8)
> |_ banner: RFB 003.008
> 9050/tcp open          tor-socks  Tor SOCKS Proxy
> 53/udp   open          domain     ISC BIND 9.7.0-P1
> |_ dns-recursion: Recursion appears to be enabled
> |_ dns-random-srcport: 209.85.174.84 is GREAT: 6 queries in 4.6
> seconds from 6 ports with std dev 4202
> |_ dns-random-txid: 209.85.174.81 is GREAT: 25 queries in 12.6 seconds
> from 25 txids with std dev 18176
> 68/udp   open|filtered dhcpc
> 631/udp  open|filtered ipp
> 5353/udp open|filtered zeroconf
> No exact OS matches for host (If you know what OS is running on it,
> see http://nmap.org/submit/ ).
> TCP/IP fingerprint:
> OS:SCAN(V=5.00%D=9/23%OT=25%CT=1%CU=2%PV=N%DS=0%G=Y%TM=4E7C8191%P=i686-pc-l
> OS:inux-gnu)SEQ(SP=C5%GCD=1%ISR=CC%TI=Z%CI=Z%II=I%TS=8)OPS(O1=M400CST11NW6%
> OS:O2=M400CST11NW6%O3=M400CNNT11NW6%O4=M400CST11NW6%O5=M400CST11NW6%O6=M400
> OS:CST11)WIN(W1=8000%W2=8000%W3=8000%W4=8000%W5=8000%W6=8000)ECN(R=Y%DF=Y%T
> OS:=40%W=8018%O=M400CNNSNW6%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)
> OS:T2(R=N)T3(R=Y%DF=Y%T=40%W=8000%S=O%A=S+%F=AS%O=M400CST11NW6%RD=0%Q=)T4(R
> OS:=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=
> OS:AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=
> OS:40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID
> OS:=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)
>
> Uptime guess: 0.101 days (since Fri Sep 23 18:29:41 2011)
> Network Distance: 0 hops
> TCP Sequence Prediction: Difficulty=197 (Good luck!)
> IP ID Sequence Generation: All zeros
> Service Info: Host:  linuxmalaysia-laptop
>
> Read data files from: /usr/share/nmap
> OS and Service detection performed. Please report any incorrect
> results at http://nmap.org/submit/ .
> Nmap done: 1 IP address (1 host up) scanned in 82.64 seconds
>            Raw packets sent: 2099 (80.102KB) | Rcvd: 3220 (155.222KB)
> _______________________________________________
> OWASP-Malaysia mailing list
> [email protected]
> https://lists.owasp.org/mailman/listinfo/owasp-malaysia
>
> OWASP Malaysia Wiki
> http://www.owasp.my
>
> OWASP Malaysia Facebook
> http://www.facebook.com/OWASP.Malaysia
>
> OWASP Malaysia Twitter #owaspmy
> http://www.twitter.com/owaspmy
>
> --
> This message has been scanned for viruses and dangerous content by  
> MySpamGuard State Government of Pahang, Malaysia and is believed to  
> be clean.
>
>
> --
> This message has been scanned for viruses and
> dangerous content by MailScanner, and is
> believed to be clean.
>
>


----- End message from [email protected] -----



----------------------------------------------------------------
DISCLAIMER:
This e-mail and the attachment is from State Government of Pahang,  
Malaysia. It is intended solely for the person to whom they are  
addressed and may be confidential and privileged. If you are not the  
intended recipient, you are notified that disclosing, distributing,  
copying or taking any action in reliance of the content of this  
information is strictly prohibited. Please notify the sender  
immediately if you have received this e-mail and delete it from your  
system. The recipient should check the e-mail and any attachment for  
the presence of viruses that could be transmitted via e-mail. Email  
transmission cannot be guaranteed to be secure or error free as  
information could be intercepted, corrupted, lost, destroyed,  
incomplete or contain viruses. State Government of Pahang, Malaysia  
accepts no liability for any errors or omissions in the contents of  
this message which arises as a result of e-mail transmission.  
Opinions, conclusions and other information in this e-mail that does  
not relate to the official business of State Government of Pahang,  
Malaysia shall be understood as neither given nor endorsed by State  
Government of Pahang, Malaysia.


-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

_______________________________________________
OWASP-Malaysia mailing list
[email protected]
https://lists.owasp.org/mailman/listinfo/owasp-malaysia

OWASP Malaysia Wiki
http://www.owasp.my

OWASP Malaysia Facebook
http://www.facebook.com/OWASP.Malaysia

OWASP Malaysia Twitter #owaspmy
http://www.twitter.com/owaspmy

Reply via email to