____ _ _ | _ \ _____ _| |__ (_)_ __ | | | |/ _ \ \/ / '_ \| | '_ \ | |_| | (_) > <| |_) | | | | | |____/ \___/_/\_\_.__/|_|_| |_|
Title:EsqueleSquad by SubFire
Created:Aug 9th, 2020
Created by: Anonymous
Views: 613
Comments: 2
Username: Anonymous - (Login)
Please note that all posted information is publicly available and must follow our TOS.
— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — Antes de comentar, decir que este es el dox original creado el dia 9 de agosto de 2020, por SubFire, el dox no debe ser resubido, solo si se le añaden cosas pero siempre respetando y añadiendo al autor. ¡No os hagais los vivos tratando de haceros los doxers! — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — Codigo del sitio web: http://www.mediafire.com/file/o8uu4joqxdisv5q/EsqueleSquad_by_Subfire.zip/file — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — Scaneo profesional + vulnerabilidades (PT) http://www.mediafire.com/file/mhxcxpqbnd2kthd/scan_report_%25281%2529.pdf/file — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — Información del sitio web (Whatweb) Status : 200 OK Title : <None> IP : 172.67.184.69 Country : RESERVED, ZZ Summary : HTML5, JQuery[3.5.1], CloudFlare, Bootstrap[4.4.1], HttpOnly[__cfduid], HTTPServer[cloudflare], UncommonHeaders[x-content-type-options,cf-cache-status,cf-request-id,expect-ct,cf-ray,alt-svc], X-Frame-Options[DENY], Script[d76954a8285addf26d7b1066-text/javascript], Cookies[__cfduid] Detected Plugins: [ Bootstrap ] Bootstrap is an open source toolkit for developing with HTML, CSS, and JS. Version : 4.4.1 Version : 4.4.1 Website : https://getbootstrap.com/ [ CloudFlare ] CloudFlare is a content delivery network. Its features include DDoS protection and Web Application Firewall functionality Google Dorks: (1) Website : https://www.cloudflare.com/ [ Cookies ] Display the names of cookies in the HTTP headers. The values are not returned to save on space. String : __cfduid [ HTML5 ] HTML version 5, detected by the doctype declaration [ HTTPServer ] HTTP server header string. This plugin also attempts to identify the operating system from the server header. String : cloudflare (from server string) [ HttpOnly ] If the HttpOnly flag is included in the HTTP set-cookie response header and the browser supports it then the cookie cannot be accessed through client side script - More Info: http://en.wikipedia.org/wiki/HTTP_cookie String : __cfduid [ JQuery ] A fast, concise, JavaScript that simplifies how to traverse HTML documents, handle events, perform animations, and add AJAX. Version : 3.5.1 Website : http://jquery.com/ [ Script ] This plugin detects instances of script HTML elements and returns the script language/type. String : d76954a8285addf26d7b1066-text/javascript [ UncommonHeaders ] Uncommon HTTP server headers. The blacklist includes all the standard headers and many non standard but common ones. Interesting but fairly common headers should have their own plugins, eg. x-powered-by, server and x-aspnet-version. Info about headers can be found at www.http-stats.com String : x-content-type-options,cf-cache-status,cf-request-id,expect-ct,cf-ray,alt-svc (from headers) [ X-Frame-Options ] This plugin retrieves the X-Frame-Options value from the HTTP header. - More Info: http://msdn.microsoft.com/en-us/library/cc288472%28VS.85%29. aspx String : DENY HTTP Headers: HTTP/1.1 200 OK Date: Sun, 09 Aug 2020 16:16:49 GMT Content-Type: text/html; charset=UTF-8 Transfer-Encoding: chunked Connection: close Set-Cookie: __cfduid=dfdd49bfe42fba81419955abd4ebdcd6a1596989809; expires=Tue, 08-Sep-20 16:16:49 GMT; path=/; domain=.esquelesquad.rip; HttpOnly; SameSite=Lax; Secure X-Frame-Options: DENY X-Content-Type-Options: nosniff Vary: Accept-Encoding CF-Cache-Status: EXPIRED cf-request-id: 04759bb9b00000114dfbb24200000001 Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct" Server: cloudflare CF-RAY: 5c02c8a2b973114d-MAD Content-Encoding: gzip alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400 — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —
4 years ago
4 years ago