hacking wp

 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-09 13:41 EDT

NSE: Loaded 156 scripts for scanning.

NSE: Script Pre-scanning.

Initiating NSE at 13:41

Completed NSE at 13:41, 0.00s elapsed

Initiating NSE at 13:41

Completed NSE at 13:41, 0.00s elapsed

Initiating NSE at 13:41

Completed NSE at 13:41, 0.00s elapsed

Initiating Ping Scan at 13:41

Scanning www.jtkswk.gov.my (103.42.207.56) [4 ports]

Completed Ping Scan at 13:41, 0.03s elapsed (1 total hosts)

Initiating Parallel DNS resolution of 1 host. at 13:41

Completed Parallel DNS resolution of 1 host. at 13:41, 0.48s elapsed

Initiating SYN Stealth Scan at 13:41

Scanning www.jtkswk.gov.my (103.42.207.56) [1000 ports]

Discovered open port 443/tcp on 103.42.207.56

Discovered open port 21/tcp on 103.42.207.56

Discovered open port 80/tcp on 103.42.207.56

Discovered open port 554/tcp on 103.42.207.56

Discovered open port 1723/tcp on 103.42.207.56

Completed SYN Stealth Scan at 13:41, 4.89s elapsed (1000 total ports)

Initiating Service scan at 13:41

Scanning 5 services on www.jtkswk.gov.my (103.42.207.56)

Completed Service scan at 13:41, 5.03s elapsed (5 services on 1 host)

Initiating OS detection (try #1) against www.jtkswk.gov.my (103.42.207.56)

Retrying OS detection (try #2) against www.jtkswk.gov.my (103.42.207.56)

Initiating Traceroute at 13:42

Completed Traceroute at 13:42, 0.03s elapsed

Initiating Parallel DNS resolution of 2 hosts. at 13:42

Completed Parallel DNS resolution of 2 hosts. at 13:42, 0.08s elapsed

NSE: Script scanning 103.42.207.56.

Initiating NSE at 13:42

Completed NSE at 13:42, 18.15s elapsed

Initiating NSE at 13:42

Completed NSE at 13:43, 68.30s elapsed

Initiating NSE at 13:43

Completed NSE at 13:43, 0.00s elapsed

Nmap scan report for www.jtkswk.gov.my (103.42.207.56)

Host is up (0.011s latency).

Other addresses for www.jtkswk.gov.my (not scanned): 2404:160:0:f:0:5:672a:cf38

Not shown: 995 filtered tcp ports (no-response)

PORT     STATE SERVICE        VERSION

21/tcp   open  tcpwrapped

80/tcp   open  tcpwrapped

|_http-title: Did not follow redirect to https://www.jtkswk.gov.my

|_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips

| http-methods: 

|_  Supported Methods: GET HEAD POST OPTIONS

443/tcp  open  ssl/tcpwrapped

|_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips

| http-title: Portal Rasmi Jabatan Tenaga Kerja Sarawak – Portal rasmi...

|_Requested resource was https://www.jtkswk.gov.my/v2/

| ssl-cert: Subject: commonName=www.jtkswk.gov.my/organizationName=JABATAN TENAGA KERJA SARAWAK/stateOrProvinceName=SARAWAK/countryName=MY

| Subject Alternative Name: DNS:www.jtkswk.gov.my, DNS:jtkswkapps.jtkswk.gov.my, DNS:jtkswk.gov.my

| Issuer: commonName=GlobalSign RSA OV SSL CA 2018/organizationName=GlobalSign nv-sa/countryName=BE

| Public Key type: rsa

| Public Key bits: 2048

| Signature Algorithm: sha256WithRSAEncryption

| Not valid before: 2024-04-29T09:16:18

| Not valid after:  2025-05-31T09:16:17

| MD5:   d994:5de0:bae0:332b:15f6:33ba:3e3f:f958

|_SHA-1: d5c2:20ad:f67b:fa22:0fe9:26d7:cbc9:0a3b:e412:896b

|_http-generator: WordPress 6.4.3

| http-methods: 

|_  Supported Methods: GET HEAD POST OPTIONS

|_ssl-date: TLS randomness does not represent time

554/tcp  open  tcpwrapped

1723/tcp open  tcpwrapped

Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port

Device type: bridge|general purpose

Running (JUST GUESSING): Oracle Virtualbox (93%), QEMU (89%)

OS CPE: cpe:/o:oracle:virtualbox cpe:/a:qemu:qemu

Aggressive OS guesses: Oracle Virtualbox (93%), QEMU user mode network gateway (89%)

No exact OS matches for host (test conditions non-ideal).

Network Distance: 2 hops

TCP Sequence Prediction: Difficulty=20 (Good luck!)

IP ID Sequence Generation: Randomized


TRACEROUTE (using port 80/tcp)

HOP RTT     ADDRESS

1   9.74 ms 10.0.2.2

2   9.82 ms 103.42.207.56


NSE: Script Post-scanning.

Initiating NSE at 13:43

Completed NSE at 13:43, 0.00s elapsed

Initiating NSE at 13:43

Completed NSE at 13:43, 0.00s elapsed

Initiating NSE at 13:43

Completed NSE at 13:43, 0.00s elapsed

Read data files from: /usr/share/nmap

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 102.35 seconds

           Raw packets sent: 2097 (97.252KB) | Rcvd: 48 (2.036KB)


Comments

Popular posts from this blog

How to DDOS an IP using HOIC