SonyPictures/Exploits
From the New York Times:
But Sony was newly rattled by the leak of internal documents, some of which were published late Monday on Fusion, an upstart cable network and news site, after first appearing on Pastebin, the anonymous Internet posting site. The documents contained the pre-bonus annual salaries of senior executives, 17 of whom are shown earning more than $1 million a year.
via Hackers Pirate Sony Films and Leak Studio Salaries – NYTimes.com.
### BEGIN REPOST ###
-
Exploitation & Vulnerability Test ‘ by Anon-Ninja-Cat ❤ For full Report see Anon Ninja Cat’ who will contact Infosec Cat ‘who will get Clearance from Cone Cat to Access the Cyber Hive index.
-
We Are Anonymous
-
We Are Legion
-
We Are Ghosts of the CyberHive.
-
Anon Familia ❤
-
——————————————————
-
http://www.sonypictures.com/ (Hollywood, FL, US)
-
IP Address 72.52.12.83 <<< unknown.prolexic.com < Prolexic: DoS and DDoS Protection )
-
Server Type Apache
-
report for http://www.sonypictures.com (72.52.12.83) <<< unknown.prolexic.com < Prolexic: DoS and DDoS Protection )
-
Host is up (0.012s latency).
-
rDNS record for 72.52.12.83: unknown.prolexic.com
-
PORT STATE SERVICE
-
80/tcp open http
-
Target IP: 72.52.12.83 <<< prolexic.com < Prolexic: DoS and DDoS Protection )
-
+ Target Hostname: www.sonypictures.com
-
+ Target Port: 80
-
+ Start Time: 2014-12-02 08:00:59 (GMT-5)
-
—————————————————————————
-
+ Server: Apache
-
+ robots.txt contains 2 entries which should be manually viewed.
-
+ ETag header found on server, fields: 0x4fad 0x5092bb9bcf9a9
-
+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
-
+ /WEB-INF/web.xml: JRUN default file found.
-
+ OSVDB-9392: /userinfo.php?uid=1;: Xoops portal gives detailed error messages including SQL syntax and may allow an exploit.
-
+ OSVDB-3092: /beta/: This might be interesting…
-
+ OSVDB-3092: /test.txt: This might be interesting…
-
+ OSVDB-3233: /netbasic/websinfo.bas: Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.
-
+ OSVDB-3092: /tv/: This might be interesting… potential country code (Tuvalu)
-
/maintenance/: Admin login page/section found.
-
11 site(s) hosted on ip 72.52.12.83
-
Location: Hollywood,United States
-
sonypictures.com
-
d-9.com
-
thisistheend.com
-
thesocialnetwork-movie.com
-
dragontattoo.com
-
sonypictures.net
-
sonypicturesanimation.com
-
entertheunderworld.com
-
skyfall-movie.com
-
smurfhappens.com
-
omnicorp.com
-
======================================================================================================
-
Server:Apache
-
IP Address:198.212.50.74
-
Port:443
-
Hostname:www.sonypictures.com
-
sonypictures.com A 5 minutes 198.212.50.74
-
report for 198.212.50.74
-
Host is up (0.024s latency).
-
PORT STATE SERVICE
-
80/tcp open http
-
443/tcp open https
-
mail.sonypictures.com A 5 minutes 209.0.235.15 (US)
-
test.sonypictures.com A 5 minutes 64.37.182.123 (San Diego, CA, US)
-
http://www.sonypictures.com A 5 minutes 72.52.12.83 (Hollywood, FL, US)
-
DOMAINS:
-
http://www.sonypictures.com, sonypictures.com, ultraviolet.sonypictures.com, uv.sonypictures.com,
-
ultraviolet.sonypictures.co.nz, ultraviolet.sonypictures.com.au
-
Serial Number:18DAD19E267DE8BB4A2158CDCC6B3B4A
-
Fingerprint (SHA-1):4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
-
Serial Number:5B88DA6C7ADA7A593E729363BCB75843
-
Fingerprint (SHA-1):8AE1D106CACCD3A2B7CBBF0FD8447EF02CB6E869
-
# robots.txt for SonyPictures.com
-
User-agent: *
-
Disallow: /global
-
Disallow: /homevideo/bluray/ajax
-
The target site has no DNS wildcard, and the contents of http://sonypictures.com/search differ from the contents of http://www.sonypictures.com
-
The contents of http://72.52.12.83 differ from the contents of http://www.sonypictures.com
-
A robots.txt file was found at: “http://www.sonypictures.com/robots.txt”.
-
The URL: “http://www.sonypictures.com/” sent the cookie: “NSC_tpozqjd-83+63+23+94-91=ffffffffc5dc2c5345525d5f4f58455e445a4a423660;path=/;httponly”.
-
The URL: “http://www.sonypictures.com/” sent the cookie: “sto-id-20480=KABOAAAKFAAA; Expires=Fri, 29-Nov-2024 14:28:16 GMT; Path=/”.
-
The URL: “http://www.sonypictures.com/” returned a response that may contain a “SHA1” hash. The hash is: “bf433b366f10c888002d617a38d2309abe303d79”
-
==================================================================================================================
-
GET http://www.sonypictures.com/crossdomain.xml HTTP/1.1
-
Cookie: NSC_tpozqjd-83+63+23+94-91=ffffffffc5dc2c5345525d5f4f58455e445a4a423660; sto-id-20480=KFBOAAAKFAAA
-
crossdomain.xml” file allows access from: “www.sonypictures.com
-
crossdomain.xml” file allows access from: “flash.sonypictures.com
-
crossdomain.xml” file allows access from: “secure.sonypictures.com
-
crossdomain.xml” file allows access from: “www.sonypictures.net
-
crossdomain.xml” file allows access from: “www.sonypictures.co.uk
-
crossdomain.xml” file allows access from: “www.sonypictures.com.au
-
crossdomain.xml” file allows access from: “www.sonypictures.jp
-
crossdomain.xml” file allows access from: “www.sonywonder.com
-
crossdomain.xml” file allows access from: “www.wheeloffortune.com
-
crossdomain.xml” file allows access from: “www.vannastyle.com
-
crossdomain.xml” file allows access from: “www.jeopardy.com
-
crossdomain.xml” file allows access from: “www.007.com
-
crossdomain.xml” file allows access from: “www.battlela.com
-
crossdomain.xml” file allows access from: “www.district9movie.com
-
crossdomain.xml” file allows access from: “www.multinationalunited.com
-
crossdomain.xml” file allows access from: “www.residentevil-movie.com
-
The mail account: “jarancio@sonypictures.com
-
The mail account: “alouie@sonypictures.com
-
The mail account: “bjames@sonypictures.com
-
The mail account: “amcelroy@sonypictures.com
-
The mail account: “klee@sonypictures.com
-
The mail account: “KKim@sonypictures.com
-
The mail account: “ctewksbury@sonypictures.com
-
The mail account: “stanimoto@sonypictures.com
-
The mail account: “nbaleva@sonypictures.com
-
The mail account: “cpoon@sonypictures.com
-
The mail account: “bspaulding@sonypictures.com
-
The mail account: “sbrooks@sonypictures.com
-
The mail account: “croze@sonypictures.com
-
The mail account: “richs@sonypictures.com
-
The mail account: “kwilliams@sonypictures.com
-
The mail account: “djordan@sonypictures.com
-
======================================================================================================================
-
EXPLOITS:
-
Server does not use secure renegotiation settings
-
Site is more vulnerable to Denial of Service (DOS) attacks
-
Server does not have session resumption enabled
-
Users may experience slower performance
-
Server has not enabled HTTP Strict-Transport-Security
-
Users may be exposed to man-in-the-middle attacks
-
Server doesn’t prefer ciphers that enable forward secrecy.
-
Encrypted communications captured today are at risk of being decrypted by an attacker in the future.
-
Server uses RC4 cipher with modern browsers
-
More secure ciphers are available for TLS 1.1 and newer
-
Server is using RC4-based ciphersuites which have known vulnerabilities
-
Evaluate your client compatibility requirements to determine if you can disable RC4-based ciphersuites
-
Server configuration does not meet FIPS guidelines
-
Federal standards for data handling are not being met
-
Server does not have OCSP stapling configured
-
Users may receive slower performance and privacy may be reduced
-
SSL 2.0 Disabled:Pass
-
SSL 3.0 Disabled:Pass
-
TLS 1.0 Enabled:Pass
-
TLS 1.1 Enabled:Pass
-
TLS 1.2 Enabled:Pass
-
Weak ciphersuites disabled:Pass
-
Certificates configured correctly:Pass
-
Secure renegotiation configured:Fail <<<<<
-
Session resumption configured:Fail <<<<<<
-
BEAST Vulnerability:Pass
-
OCSP Stapling:Fail <<<<<<
-
PCI Compliant:Pass
-
FIPS Compliant:Fail <<<<
-
Forward Secrecy Supported:Fail <<<<<
-
Heartbleed Vulnerability:Pass
-
Certificate validation URIs resolve to IPv6 addresses:Fail
-
Strict Transport Security:Fail <<<<<
-
Mixed Content (HTTP and HTTPS):Timed Out <<<<<<
-
Domain name resolves to IPv4 address:Pass
-
Domain name resolves to IPv6 address:Fail <<<<<
-
To Sony ‘ it is dissapointing to see a multi billion dollar Company ‘ have a GRADE F/ website System ?Yes i have Graded you ? i could strip & found more Exploits & Error’s ‘all day long.this Exploitation & Vulnerability Test is 43% ‘ Pull YouR sOcKS uP ‘ oh and “FURY” was a good Movie , you could make a Movie about how Sony got Hacked ‘ i assure you it would be a Box Office HIT . p.s. you gonna have to take a pay cut & Fire someone in your Computer WEB/Security/ Department ???? ASAP