# Information Provided By: Insidious
# Filename:Lily-lily_1426567-70.48.236.99.txt

[Basic Information]
name:Kaelyn Lily Ann Mackay
age range:15-18
gender/sex:Female
type: person
date of birth:null
is from:Ontario, Canada (CA)

education:Still in High School
occupation:None

emails:
-kaelynlilymackay@gmail.com
-kaelyn.mackay@gmail.com
-kaelynannmackay@icloud.com

instagram pages:
-lily_1426567

user id:null (she blocked me, i can't get it)
facebook uid:null (she blocked me, i can't get it)
facebook page:null
tiktok account:null
snapchat account:null

phone number:+1-519-788-1531
current location:St. Thomas, Ontario, Canada (CA)

[IP Information]
IP:70.48.236.99
Version:IPv4
Hostname:bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca
Local IP:null
ISP:Bell Canada
ORG:Bell DSL Internet Ontario
AS:AS577 Bell Canada
ASName/Network:BACOM
ASNumber:577

Protocols:50001/tcp - ssl/http lighttpd
[#End of IP Information]

[Nmap Report]
Starting Nmap 7.91 ( https://nmap.org ) at 2021-09-17 11:24 CDT
NSE: Loaded 149 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 11:24
Completed NSE at 11:24, 10.01s elapsed
Initiating NSE at 11:24
Completed NSE at 11:24, 0.00s elapsed
Initiating Ping Scan at 11:24
Scanning 70.48.236.99 [4 ports]
Completed Ping Scan at 11:24, 0.02s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 11:24
Completed Parallel DNS resolution of 1 host. at 11:24, 0.06s elapsed
Initiating SYN Stealth Scan at 11:24
Scanning bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca (70.48.236.99) [1000 ports]
Discovered open port 50001/tcp on 70.48.236.99
Completed SYN Stealth Scan at 11:24, 10.77s elapsed (1000 total ports)
Initiating Service scan at 11:24
Scanning 1 service on bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca (70.48.236.99)
Completed Service scan at 11:25, 29.59s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca (70.48.236.99)
Retrying OS detection (try #2) against bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca (70.48.236.99)
Initiating Traceroute at 11:25
Completed Traceroute at 11:25, 0.05s elapsed
Initiating Parallel DNS resolution of 1 host. at 11:25
Completed Parallel DNS resolution of 1 host. at 11:25, 0.02s elapsed
NSE: Script scanning 70.48.236.99.
Initiating NSE at 11:25
Completed NSE at 11:26, 69.14s elapsed
Initiating NSE at 11:26
Completed NSE at 11:26, 16.62s elapsed
Nmap scan report for bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca (70.48.236.99)
Host is up (0.013s latency).
Not shown: 999 filtered ports
PORT      STATE SERVICE  VERSION
50001/tcp open  ssl/http lighttpd
|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-method-tamper:
|   VULNERABLE:
|   Authentication bypass by HTTP verb tampering
|     State: VULNERABLE (Exploitable)
|       This web server contains password protected resources vulnerable to authentication bypass
|       vulnerabilities via HTTP verb tampering. This is often found in web servers that only limit access to the
|        common HTTP methods and in misconfigured .htaccess files.
|
|     Extra information:
|
|   URIs suspected to be vulnerable to HTTP verb tampering:
|     / [HEAD]
|
|     References:
|       http://www.imperva.com/resources/glossary/http_verb_tampering.html
|       https://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_%28OWASP-CM-008%29
|       http://www.mkit.com.ar/labs/htexploit/
|_      http://capec.mitre.org/data/definitions/274.html
|_http-server-header: HTTP Server
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
|_sslv2-drown:
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: bridge|general purpose|switch
Running (JUST GUESSING): Oracle Virtualbox (99%), QEMU (96%), Bay Networks embedded (90%)
OS CPE: cpe:/o:oracle:virtualbox cpe:/a:qemu:qemu cpe:/h:baynetworks:baystack_450
Aggressive OS guesses: Oracle Virtualbox (99%), QEMU user mode network gateway (96%), Bay Networks BayStack 450 switch (software version 3.1.0.22) (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=37 (Good luck!)
IP ID Sequence Generation: Randomized

TRACEROUTE (using port 80/tcp)
HOP RTT     ADDRESS
1   1.71 ms 10.0.2.2
2   1.45 ms bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca (70.48.236.99)

NSE: Script Post-scanning.
Initiating NSE at 11:26
Completed NSE at 11:26, 0.00s elapsed
Initiating NSE at 11:26
Completed NSE at 11:26, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 146.89 seconds
           Raw packets sent: 3077 (139.964KB) | Rcvd: 45 (1.884KB)
[#End of Nmap Report]