Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
  • Loading branch information
DashlordBetaGouvBot committed Dec 22, 2024
1 parent 43ca797 commit 24354ec
Show file tree
Hide file tree
Showing 14 changed files with 1,335 additions and 1,476 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -3,15 +3,15 @@
"width": 1920,
"height": 1080,
"url": "https://dashlord.romin.app.cc.anje-justice.fr",
"size": 10592.909,
"size": 10592.931,
"nodes": 263,
"requests": 48,
"grade": "C",
"score": 63.0,
"ges": 1.74,
"water": 2.61,
"ecoindex_version": "5.4.2",
"date": "2024-12-15 19:19:54.999811",
"date": "2024-12-22 19:05:40.862656",
"page_type": null
}
]

Large diffs are not rendered by default.

2,290 changes: 1,134 additions & 1,156 deletions results/aHR0cHM6Ly9kYXNobG9yZC5yb21pbi5hcHAuY2MuYW5qZS1qdXN0aWNlLmZy/lhr.json

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Nmap 7.92 scan initiated Sun Dec 15 19:25:12 2024 as: nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln dashlord.romin.app.cc.anje-justice.fr
# Nmap 7.92 scan initiated Sun Dec 22 19:11:10 2024 as: nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln dashlord.romin.app.cc.anje-justice.fr
Host: 91.208.207.214 () Status: Up
Host: 91.208.207.214 () Ports: 80/open/tcp//http///, 179/filtered/tcp//bgp///, 443/open/tcp//ssl|https///, 1080/open/tcp//socks?///, 1081/open/tcp//pvuniwien?///, 3000/open/tcp//ppp?///, 5002/open/tcp//ssh//(protocol 2.0)/, 5221/open/tcp//smtp///, 5357/open/tcp//ssh//(protocol 2.0)/, 5666/open/tcp//tcpwrapped///, 5800/open/tcp//amqp//RabbitMQ 3.12.14 (0-9)/, 5902/open/tcp//tcpwrapped///, 5962/open/tcp//unknown///, 9999/open/tcp//tcpwrapped/// Ignored State: closed (986)
# Nmap done at Sun Dec 15 19:28:01 2024 -- 1 IP address (1 host up) scanned in 168.69 seconds
Host: 91.208.207.214 () Ports: 80/open/tcp//http///, 179/filtered/tcp//bgp///, 443/open/tcp//ssl|https///, 1080/open/tcp//socks?///, 1081/open/tcp//pvuniwien?///, 3000/open/tcp//ppp?///, 5002/open/tcp//ssh//(protocol 2.0)/, 5221/open/tcp//smtp//Postfix smtpd/, 5357/open/tcp//ssh//(protocol 2.0)/, 5666/open/tcp//tcpwrapped///, 5800/open/tcp//amqp//RabbitMQ 3.12.14 (0-9)/, 5902/open/tcp//tcpwrapped///, 5962/open/tcp//unknown///, 9999/open/tcp//tcpwrapped/// Ignored State: closed (986)
# Nmap done at Sun Dec 22 19:14:01 2024 -- 1 IP address (1 host up) scanned in 170.95 seconds
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@
<h1>Scan Report<br><small>Nmap 7.92</small>
</h1>
<pre style="white-space:pre-wrap; word-wrap:break-word;">nmap -sV --script vulners --script-args mincvss=5.0 -oA /data/nmapvuln dashlord.romin.app.cc.anje-justice.fr</pre>
<p class="lead">Sun Dec 15 19:25:12 2024 – Sun Dec 15 19:28:01 2024<br>1 hosts scanned.
<p class="lead">Sun Dec 22 19:11:10 2024 – Sun Dec 22 19:14:01 2024<br>1 hosts scanned.
1 hosts up.
0 hosts down.
</p>
Expand Down Expand Up @@ -123,55 +123,28 @@ <h4>Ports</h4>
HTTP/1.1 400 Bad Request
Cache-Control: no-cache
Connection: close
Content-Length: 479
Sozu-Id: 01JF5WGDGS49D6H8CGBTFF0ZXM
&lt;style&gt;pre{background:#EEE;padding:10px;border:1px solid #AAA;border-radius: 5px;}&lt;/style&gt;
&lt;h1&gt;400 Bad Request&lt;/h1&gt;
&lt;pre&gt;
"route": "GET",
"request_id": "01JF5WGDGS49D6H8CGBTFF0ZXM",
&lt;/pre&gt;
&lt;p&gt;Request could not be parsed. Parser stopped at phase: Body.&lt;/p&gt;
&lt;p&gt;Diagnostic: Could not extract the route after connection started, this should not happen.&lt;/p&gt;
&lt;p&gt;Further details:&lt;/p&gt;
&lt;pre&gt;No host given&lt;/pre&gt;
&lt;footer&gt;This is an automatic answer by Sozu.&lt;/footer&gt;
Content-Length: 6160
Sozu-Id: 01JFQWFRT5ZWZDVC7794KVHAMN
&lt;!doctype html&gt;
&lt;html lang=en-US&gt;
&lt;head&gt;
&lt;meta charset=utf-8&gt;
&lt;meta name="viewport" content="width=device-width" /&gt;
&lt;title&gt;400 Bad Request&lt;/title&gt;
&lt;style&gt;.content,section{align-self:center}:root{--font-family:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif;--justify-important:center;--bg-color:white;--width-content:1080px;--color-accent:#F1F0FB;--border-radius:0;--color-text:rgb(29, 29, 31);--color-code:#3a3871;--border-color:rgba(34, 36, 38, 0.15);--logo-color:#aaa}.content,body{flex-direction:column;display:flex}body,html{scroll-behavior:smooth;height:100%;-webkit-font-smoothing:antialiased;font-family:var(--font-family);background-color:var(--bg-color)}button#copy-btn,code{
HTTPOptions:
HTTP/1.1 400 Bad Request
Cache-Control: no-cache
Connection: close
Content-Length: 483
Sozu-Id: 01JF5WGKHKKGRTMKY059P6H56B
&lt;style&gt;pre{background:#EEE;padding:10px;border:1px solid #AAA;border-radius: 5px;}&lt;/style&gt;
&lt;h1&gt;400 Bad Request&lt;/h1&gt;
&lt;pre&gt;
"route": "OPTIONS",
"request_id": "01JF5WGKHKKGRTMKY059P6H56B",
&lt;/pre&gt;
&lt;p&gt;Request could not be parsed. Parser stopped at phase: Body.&lt;/p&gt;
&lt;p&gt;Diagnostic: Could not extract the route after connection started, this should not happen.&lt;/p&gt;
&lt;p&gt;Further details:&lt;/p&gt;
&lt;pre&gt;No host given&lt;/pre&gt;
&lt;footer&gt;This is an automatic answer by Sozu.&lt;/footer&gt;
RTSPRequest:
HTTP/1.1 400 Bad Request
Cache-Control: no-cache
Connection: close
Content-Length: 885
Sozu-Id: 01JF5WGKPVH36QA5RBQKES8DY8
&lt;style&gt;pre{background:#EEE;padding:10px;border:1px solid #AAA;border-radius: 5px;}&lt;/style&gt;
&lt;h1&gt;400 Bad Request&lt;/h1&gt;
&lt;pre&gt;
"route": "",
"request_id": "01JF5WGKPVH36QA5RBQKES8DY8",
&lt;/pre&gt;
&lt;p&gt;Request could not be parsed. Parser stopped at phase: StatusLine.&lt;/p&gt;
&lt;p&gt;Diagnostic: The request line is invalid. Make sure it is well formated and all characters are LATIN-1 (no UTF-8 allowed).&lt;/p&gt;
&lt;p&gt;Further details:&lt;/p&gt;
&lt;pre&gt;Parsed successfully:
Partially parsed (valid):
OPTIONS /
Invalid:</pre>
Content-Length: 6164
Sozu-Id: 01JFQWFYW97Q4HT2G4ZF7WX3C3
&lt;!doctype html&gt;
&lt;html lang=en-US&gt;
&lt;head&gt;
&lt;meta charset=utf-8&gt;
&lt;meta name="viewport" content="width=device-width" /&gt;
&lt;title&gt;400 Bad Request&lt;/title&gt;
&lt;style&gt;.content,section{align-self:center}:root{--font-family:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif;--justify-important:center;--bg-color:white;--width-content:1080px;--color-accent:#F1F0FB;--border-radius:0;--color-text:rgb(29, 29, 31);--color-code:#3a3871;--border-color:rgba(34, 36, 38, 0.15);--logo-color:#aaa}.content,body{flex-direction:column;display:flex}body,html{scroll-behavior:smooth;height:100%;-webkit-font-smoothing:antialiased;font-family:var(--font-family);background-color:var(--bg-color)}button#copy-btn,code{</pre>
</td></tr>
<tr class="warning">
<td>179</td>
Expand Down Expand Up @@ -225,24 +198,25 @@ <h4>Ports</h4>
<a href="https://nvd.nist.gov/vuln/search/results?form_type=Advanced&amp;cves=on&amp;cpe_version="></a><h5>fingerprint-strings</h5>
<pre style="white-space:pre-wrap; word-wrap:break-word;">
Kerberos:
dF=9
QSKS4
%h7|GEa
v[^oArb
@L;~/
$J&lt;9O
[h&lt;7k
eDjP
0j,_{#
QN#DQ
G;Q.
RjZ_
?eG"R
Gx4$6e!xU
S3kK
\xa0
SMBProgNeg:
F%K_
E8x)
{Db/X
a,Bq{
peBC
TLSSessionReq:
z[PK-
MA@P
/jtE
WqTmBCe
0V&gt;,
yvn8
CLu\[
w7W"n
.'QJ0)
][pfr</pre>
\xec
Dr@e
\x9aT</pre>
</td></tr>
<tr class="success">
<td title="Port">5002</td>
Expand All @@ -264,28 +238,11 @@ <h4>Ports</h4>
<td title="Protocol">tcp</td>
<td title="State / Reason">open<br>syn-ack</td>
<td title="Service">smtp</td>
<td title="Product"></td>
<td title="Product">Postfix smtpd</td>
<td title="Version"></td>
<td title="Extra Info"></td>
</tr>
<tr><td colspan="7">
<a href="https://nvd.nist.gov/vuln/search/results?form_type=Advanced&amp;cves=on&amp;cpe_version="></a><h5>fingerprint-strings</h5>
<pre style="white-space:pre-wrap; word-wrap:break-word;">
GenericLines, GetRequest:
220 mailhog.example ESMTP MailHog
Unrecognised command
Unrecognised command
Hello:
220 mailhog.example ESMTP MailHog
250-Hello
250-PIPELINING
AUTH PLAIN
Help:
220 mailhog.example ESMTP MailHog
Unrecognised command
NULL:
220 mailhog.example ESMTP MailHog</pre>
</td></tr>
<tr><td colspan="7"><a href="https://nvd.nist.gov/vuln/search/results?form_type=Advanced&amp;cves=on&amp;cpe_version=cpe:/a:postfix:postfix">cpe:/a:postfix:postfix</a></td></tr>
<tr class="success">
<td title="Port">5357</td>
<td title="Protocol">tcp</td>
Expand Down Expand Up @@ -455,9 +412,9 @@ <h2 id="openservices" class="target">Open Services</h2>
<td>5221</td>
<td>tcp</td>
<td>smtp</td>
<td>Postfix smtpd</td>
<td></td>
<td></td>
<td></td>
<td>cpe:/a:postfix:postfix</td>
<td></td>
</tr>
<tr>
Expand Down
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"host":"dashlord.romin.app.cc.anje-justice.fr","protocol":"tcp","closed_ports":"986","open_ports":[{"service":{"name":"http","id":"80","vulnerabilities":[]}},{"service":{"name":"bgp","id":"179","vulnerabilities":[]}},{"service":{"name":"https","id":"443","vulnerabilities":[]}},{"service":{"name":"socks","id":"1080","vulnerabilities":[]}},{"service":{"name":"pvuniwien","id":"1081","vulnerabilities":[]}},{"service":{"name":"ppp","id":"3000","vulnerabilities":[]}},{"service":{"name":"ssh","id":"5002","vulnerabilities":[]}},{"service":{"name":"smtp","id":"5221","vulnerabilities":[]}},{"service":{"name":"ssh","id":"5357","vulnerabilities":[]}},{"service":{"name":"tcpwrapped","id":"5666","vulnerabilities":[]}},{"service":{"name":"amqp","product":"RabbitMQ","id":"5800","version":"3.12.14","vulnerabilities":[]}},{"service":{"name":"tcpwrapped","id":"5902","vulnerabilities":[]}},{"service":{"name":"unknown","id":"5962","vulnerabilities":[]}},{"service":{"name":"tcpwrapped","id":"9999","vulnerabilities":[]}}],"grade":"B"}
{"host":"dashlord.romin.app.cc.anje-justice.fr","protocol":"tcp","closed_ports":"986","open_ports":[{"service":{"name":"http","id":"80","vulnerabilities":[]}},{"service":{"name":"bgp","id":"179","vulnerabilities":[]}},{"service":{"name":"https","id":"443","vulnerabilities":[]}},{"service":{"name":"socks","id":"1080","vulnerabilities":[]}},{"service":{"name":"pvuniwien","id":"1081","vulnerabilities":[]}},{"service":{"name":"ppp","id":"3000","vulnerabilities":[]}},{"service":{"name":"ssh","id":"5002","vulnerabilities":[]}},{"service":{"name":"smtp","product":"Postfix smtpd","id":"5221","vulnerabilities":[]}},{"service":{"name":"ssh","id":"5357","vulnerabilities":[]}},{"service":{"name":"tcpwrapped","id":"5666","vulnerabilities":[]}},{"service":{"name":"amqp","product":"RabbitMQ","id":"5800","version":"3.12.14","vulnerabilities":[]}},{"service":{"name":"tcpwrapped","id":"5902","vulnerabilities":[]}},{"service":{"name":"unknown","id":"5962","vulnerabilities":[]}},{"service":{"name":"tcpwrapped","id":"9999","vulnerabilities":[]}}],"grade":"B"}
Loading

0 comments on commit 24354ec

Please sign in to comment.