-
Exploitation & Vulnerability Test ‘ by Anon-Ninja-Cat ❤ For full Report see Anon Ninja Cat’ who will contact Infosec Cat ‘who will get Clearance from Cone Cat to Access the Cyber Hive index.
-
-
We Are Anonymous
-
We Are Legion
-
We Are Ghosts of the CyberHive.
-
Anon Familia ❤
-
——————————————————
-
-
-
IP Address 72.52.12.83 <<< unknown.prolexic.com < Prolexic: DoS and DDoS Protection )
-
-
Server Type Apache
-
-
-
-
Host is up (0.012s latency).
-
rDNS record for 72.52.12.83: unknown.prolexic.com
-
PORT STATE SERVICE
-
80/tcp open http
-
-
Target IP: 72.52.12.83 <<< prolexic.com < Prolexic: DoS and DDoS Protection )
-
-
+ Target Hostname: www.sonypictures.com
-
+ Target Port: 80
-
+ Start Time: 2014-12-02 08:00:59 (GMT-5)
-
—————————————————————————
-
+ Server: Apache
-
+ robots.txt contains 2 entries which should be manually viewed.
-
+ ETag header found on server, fields: 0x4fad 0x5092bb9bcf9a9
-
+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
-
+ /WEB-INF/web.xml: JRUN default file found.
-
+ OSVDB-9392: /userinfo.php?uid=1;: Xoops portal gives detailed error messages including SQL syntax and may allow an exploit.
-
+ OSVDB-3092: /beta/: This might be interesting…
-
+ OSVDB-3092: /test.txt: This might be interesting…
-
+ OSVDB-3233: /netbasic/websinfo.bas: Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.
-
+ OSVDB-3092: /tv/: This might be interesting… potential country code (Tuvalu)
-
/maintenance/: Admin login page/section found.
-
-
11 site(s) hosted on ip 72.52.12.83
-
Location: Hollywood,United States
-
-
sonypictures.com
-
d-9.com
-
thisistheend.com
-
thesocialnetwork-movie.com
-
dragontattoo.com
-
sonypictures.net
-
sonypicturesanimation.com
-
entertheunderworld.com
-
skyfall-movie.com
-
smurfhappens.com
-
omnicorp.com
-
-
======================================================================================================
-
-
Server:Apache
-
IP Address:198.212.50.74
-
Port:443
-
Hostname:www.sonypictures.com
-
-
sonypictures.com A 5 minutes 198.212.50.74
-
-
report for 198.212.50.74
-
Host is up (0.024s latency).
-
PORT STATE SERVICE
-
80/tcp open http
-
443/tcp open https
-
-
mail.sonypictures.com A 5 minutes 209.0.235.15 (US)
-
test.sonypictures.com A 5 minutes 64.37.182.123 (San Diego, CA, US)
-
-
-
DOMAINS:
-
-
ultraviolet.sonypictures.co.nz, ultraviolet.sonypictures.com.au
-
-
Serial Number:18DAD19E267DE8BB4A2158CDCC6B3B4A
-
Fingerprint (SHA-1):4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
-
-
Serial Number:5B88DA6C7ADA7A593E729363BCB75843
-
Fingerprint (SHA-1):8AE1D106CACCD3A2B7CBBF0FD8447EF02CB6E869
-
-
# robots.txt for SonyPictures.com
-
User-agent: *
-
Disallow: /global
-
Disallow: /homevideo/bluray/ajax
-
-
-
-
-
-
-
-
-
-
-
-
-
==================================================================================================================
-
-
-
Cookie: NSC_tpozqjd-83+63+23+94-91=ffffffffc5dc2c5345525d5f4f58455e445a4a423660; sto-id-20480=KFBOAAAKFAAA
-
-
crossdomain.xml” file allows access from: “www.sonypictures.com
-
crossdomain.xml” file allows access from: “flash.sonypictures.com
-
crossdomain.xml” file allows access from: “secure.sonypictures.com
-
crossdomain.xml” file allows access from: “www.sonypictures.net
-
crossdomain.xml” file allows access from: “www.sonypictures.co.uk
-
crossdomain.xml” file allows access from: “www.sonypictures.com.au
-
crossdomain.xml” file allows access from: “www.sonypictures.jp
-
crossdomain.xml” file allows access from: “www.sonywonder.com
-
crossdomain.xml” file allows access from: “www.wheeloffortune.com
-
crossdomain.xml” file allows access from: “www.vannastyle.com
-
crossdomain.xml” file allows access from: “www.jeopardy.com
-
crossdomain.xml” file allows access from: “www.007.com
-
crossdomain.xml” file allows access from: “www.battlela.com
-
crossdomain.xml” file allows access from: “www.district9movie.com
-
crossdomain.xml” file allows access from: “www.multinationalunited.com
-
crossdomain.xml” file allows access from: “www.residentevil-movie.com
-
-
The mail account: “jarancio@sonypictures.com
-
The mail account: “alouie@sonypictures.com
-
The mail account: “bjames@sonypictures.com
-
The mail account: “amcelroy@sonypictures.com
-
The mail account: “klee@sonypictures.com
-
The mail account: “KKim@sonypictures.com
-
The mail account: “ctewksbury@sonypictures.com
-
The mail account: “stanimoto@sonypictures.com
-
The mail account: “nbaleva@sonypictures.com
-
The mail account: “cpoon@sonypictures.com
-
The mail account: “bspaulding@sonypictures.com
-
The mail account: “sbrooks@sonypictures.com
-
The mail account: “croze@sonypictures.com
-
The mail account: “richs@sonypictures.com
-
The mail account: “kwilliams@sonypictures.com
-
The mail account: “djordan@sonypictures.com
-
======================================================================================================================
-
EXPLOITS:
-
-
Server does not use secure renegotiation settings
-
Site is more vulnerable to Denial of Service (DOS) attacks
-
-
Server does not have session resumption enabled
-
Users may experience slower performance
-
-
Server has not enabled HTTP Strict-Transport-Security
-
Users may be exposed to man-in-the-middle attacks
-
-
Server doesn’t prefer ciphers that enable forward secrecy.
-
Encrypted communications captured today are at risk of being decrypted by an attacker in the future.
-
-
Server uses RC4 cipher with modern browsers
-
More secure ciphers are available for TLS 1.1 and newer
-
-
Server is using RC4-based ciphersuites which have known vulnerabilities
-
Evaluate your client compatibility requirements to determine if you can disable RC4-based ciphersuites
-
-
Server configuration does not meet FIPS guidelines
-
Federal standards for data handling are not being met
-
-
Server does not have OCSP stapling configured
-
Users may receive slower performance and privacy may be reduced
-
-
SSL 2.0 Disabled:Pass
-
SSL 3.0 Disabled:Pass
-
TLS 1.0 Enabled:Pass
-
TLS 1.1 Enabled:Pass
-
TLS 1.2 Enabled:Pass
-
Weak ciphersuites disabled:Pass
-
Certificates configured correctly:Pass
-
Secure renegotiation configured:Fail <<<<<
-
Session resumption configured:Fail <<<<<<
-
BEAST Vulnerability:Pass
-
OCSP Stapling:Fail <<<<<<
-
PCI Compliant:Pass
-
FIPS Compliant:Fail <<<<
-
Forward Secrecy Supported:Fail <<<<<
-
Heartbleed Vulnerability:Pass
-
-
Certificate validation URIs resolve to IPv6 addresses:Fail
-
-
Strict Transport Security:Fail <<<<<
-
Mixed Content (HTTP and HTTPS):Timed Out <<<<<<
-
Domain name resolves to IPv4 address:Pass
-
Domain name resolves to IPv6 address:Fail <<<<<
-
-
-
To Sony ‘ it is dissapointing to see a multi billion dollar Company ‘ have a GRADE F/ website System ?Yes i have Graded you ? i could strip & found more Exploits & Error’s ‘all day long.this Exploitation & Vulnerability Test is 43% ‘ Pull YouR sOcKS uP ‘ oh and “FURY” was a good Movie , you could make a Movie about how Sony got Hacked ‘ i assure you it would be a Box Office HIT . p.s. you gonna have to take a pay cut & Fire someone in your Computer WEB/Security/ Department ???? ASAP