# Information Provided By: Insidious # Filename:Lily-lily_1426567-70.48.236.99.txt [Basic Information] name:Kaelyn Lily Ann Mackay age range:15-18 gender/sex:Female type: person date of birth:null is from:Ontario, Canada (CA) education:Still in High School occupation:None emails: -kaelynlilymackay@gmail.com -kaelyn.mackay@gmail.com -kaelynannmackay@icloud.com instagram pages: -lily_1426567 user id:null (she blocked me, i can't get it) facebook uid:null (she blocked me, i can't get it) facebook page:null tiktok account:null snapchat account:null phone number:+1-519-788-1531 current location:St. Thomas, Ontario, Canada (CA) [IP Information] IP:70.48.236.99 Version:IPv4 Hostname:bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca Local IP:null ISP:Bell Canada ORG:Bell DSL Internet Ontario AS:AS577 Bell Canada ASName/Network:BACOM ASNumber:577 Protocols:50001/tcp - ssl/http lighttpd [#End of IP Information] [Nmap Report] Starting Nmap 7.91 ( https://nmap.org ) at 2021-09-17 11:24 CDT NSE: Loaded 149 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 11:24 Completed NSE at 11:24, 10.01s elapsed Initiating NSE at 11:24 Completed NSE at 11:24, 0.00s elapsed Initiating Ping Scan at 11:24 Scanning 70.48.236.99 [4 ports] Completed Ping Scan at 11:24, 0.02s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 11:24 Completed Parallel DNS resolution of 1 host. at 11:24, 0.06s elapsed Initiating SYN Stealth Scan at 11:24 Scanning bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca (70.48.236.99) [1000 ports] Discovered open port 50001/tcp on 70.48.236.99 Completed SYN Stealth Scan at 11:24, 10.77s elapsed (1000 total ports) Initiating Service scan at 11:24 Scanning 1 service on bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca (70.48.236.99) Completed Service scan at 11:25, 29.59s elapsed (1 service on 1 host) Initiating OS detection (try #1) against bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca (70.48.236.99) Retrying OS detection (try #2) against bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca (70.48.236.99) Initiating Traceroute at 11:25 Completed Traceroute at 11:25, 0.05s elapsed Initiating Parallel DNS resolution of 1 host. at 11:25 Completed Parallel DNS resolution of 1 host. at 11:25, 0.02s elapsed NSE: Script scanning 70.48.236.99. Initiating NSE at 11:25 Completed NSE at 11:26, 69.14s elapsed Initiating NSE at 11:26 Completed NSE at 11:26, 16.62s elapsed Nmap scan report for bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca (70.48.236.99) Host is up (0.013s latency). Not shown: 999 filtered ports PORT STATE SERVICE VERSION 50001/tcp open ssl/http lighttpd |_http-aspnet-debug: ERROR: Script execution failed (use -d to debug) |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. | http-method-tamper: | VULNERABLE: | Authentication bypass by HTTP verb tampering | State: VULNERABLE (Exploitable) | This web server contains password protected resources vulnerable to authentication bypass | vulnerabilities via HTTP verb tampering. This is often found in web servers that only limit access to the | common HTTP methods and in misconfigured .htaccess files. | | Extra information: | | URIs suspected to be vulnerable to HTTP verb tampering: | / [HEAD] | | References: | http://www.imperva.com/resources/glossary/http_verb_tampering.html | https://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_%28OWASP-CM-008%29 | http://www.mkit.com.ar/labs/htexploit/ |_ http://capec.mitre.org/data/definitions/274.html |_http-server-header: HTTP Server |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. |_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug) |_sslv2-drown: Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: bridge|general purpose|switch Running (JUST GUESSING): Oracle Virtualbox (99%), QEMU (96%), Bay Networks embedded (90%) OS CPE: cpe:/o:oracle:virtualbox cpe:/a:qemu:qemu cpe:/h:baynetworks:baystack_450 Aggressive OS guesses: Oracle Virtualbox (99%), QEMU user mode network gateway (96%), Bay Networks BayStack 450 switch (software version 3.1.0.22) (90%) No exact OS matches for host (test conditions non-ideal). Network Distance: 2 hops TCP Sequence Prediction: Difficulty=37 (Good luck!) IP ID Sequence Generation: Randomized TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 1.71 ms 10.0.2.2 2 1.45 ms bras-base-sttmon2805w-grc-34-70-48-236-99.dsl.bell.ca (70.48.236.99) NSE: Script Post-scanning. Initiating NSE at 11:26 Completed NSE at 11:26, 0.00s elapsed Initiating NSE at 11:26 Completed NSE at 11:26, 0.00s elapsed Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 146.89 seconds Raw packets sent: 3077 (139.964KB) | Rcvd: 45 (1.884KB) [#End of Nmap Report]