Apache 2.4.38
tcp/443 tcp/80
nginx
tcp/8443
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e0780e27c9e80e27c9e80e27c9e80e27c9e80e27c9e
Symfony profiler enabled: https://agendalbp.netissedev.com/_profiler/empty/search/results
Open service 51.83.13.26:443 · agendalbp.netissedev.com
2024-05-01 01:24
HTTP/1.1 200 OK Date: Wed, 01 May 2024 01:25:01 GMT Server: Apache/2.4.38 (Debian) Cache-Control: no-cache, private X-Debug-Token: fa49e7 X-Debug-Token-Link: https://agendalbp.netissedev.com/_profiler/fa49e7 X-Robots-Tag: noindex Vary: Accept-Encoding Connection: close Transfer-Encoding: chunked Content-Type: text/html; charset=UTF-8
Open service 51.83.13.26:443 · agendalbp.netissedev.com
2024-04-28 21:50
HTTP/1.1 200 OK Date: Sun, 28 Apr 2024 21:51:27 GMT Server: Apache/2.4.38 (Debian) Cache-Control: no-cache, private X-Debug-Token: f76614 X-Debug-Token-Link: https://agendalbp.netissedev.com/_profiler/f76614 X-Robots-Tag: noindex Vary: Accept-Encoding Connection: close Transfer-Encoding: chunked Content-Type: text/html; charset=UTF-8
Open service 51.83.13.26:443 · agendalbp.netissedev.com
2024-04-19 01:37
HTTP/1.1 200 OK Date: Fri, 19 Apr 2024 01:37:45 GMT Server: Apache/2.4.38 (Debian) Cache-Control: no-cache, private X-Debug-Token: 15caa2 X-Debug-Token-Link: https://agendalbp.netissedev.com/_profiler/15caa2 X-Robots-Tag: noindex Vary: Accept-Encoding Connection: close Transfer-Encoding: chunked Content-Type: text/html; charset=UTF-8
Open service 51.83.13.26:443 · agendalbp.netissedev.com
2024-04-18 17:15
HTTP/1.1 200 OK Date: Thu, 18 Apr 2024 17:15:15 GMT Server: Apache/2.4.38 (Debian) Cache-Control: no-cache, private X-Debug-Token: 31dc39 X-Debug-Token-Link: https://agendalbp.netissedev.com/_profiler/31dc39 X-Robots-Tag: noindex Vary: Accept-Encoding Connection: close Transfer-Encoding: chunked Content-Type: text/html; charset=UTF-8
Open service 51.83.13.26:80 · agendalbp.netissedev.com
2024-04-18 17:15
HTTP/1.1 301 Moved Permanently Date: Thu, 18 Apr 2024 17:15:10 GMT Server: Apache/2.4.38 (Debian) Location: https://agendalbp.netissedev.com/ Content-Length: 241 Connection: close Content-Type: text/html; charset=iso-8859-1 Page title: 301 Moved Permanently <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>301 Moved Permanently</title> </head><body> <h1>Moved Permanently</h1> <p>The document has moved <a href="https://agendalbp.netissedev.com/">here</a>.</p> </body></html>
Open service 51.83.13.26:8443 · agendalbp.netissedev.com
2024-04-18 17:15
HTTP/1.1 200 OK Server: nginx Date: Thu, 18 Apr 2024 17:15:11 GMT Content-Type: text/html; charset=utf8 Transfer-Encoding: chunked Connection: close Vary: Accept-Encoding Strict-Transport-Security: max-age=63072000 X-Content-Type-Options: nosniff X-XSS-Protection: 1; mode=block Permissions-Policy: interest-cohort=() Page title: Jitsi Meet <html itemscope itemtype="http://schema.org/Product" prefix="og: http://ogp.me/ns#" xmlns="http://www.w3.org/1999/html"> <head> <meta charset="utf-8"> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0"> <meta name="theme-color" content="#2A3A4B"> <base href="/" /> <link rel="apple-touch-icon" href="images/apple-touch-icon.png"> <link rel="stylesheet" href="css/all.css?v=7874"> <link rel="manifest" id="manifest-placeholder"> <script> function contextRoot(pathname) { const contextRootEndIndex = pathname.lastIndexOf('/'); return ( contextRootEndIndex === -1 ? '/' : pathname.substring(0, contextRootEndIndex + 1) ); } window.EXCALIDRAW_ASSET_PATH = 'libs/'; // Dynamically generate the manifest location URL. It must be served from the document origin, and we may have // the base pointing to the CDN. This way we can generate a full URL which will bypass the base. document.querySelector('#manifest-placeholder').setAttribute('href', window.location.origin + contextRoot(window.location.pathname) + 'manifest.json'); document.addEventListener('DOMContentLoaded', () => { if (!JitsiMeetJS.app) { return; } JitsiMeetJS.app.renderEntryPoint({ Component: JitsiMeetJS.app.entryPoints.APP }) const inIframe = () => { try { return window.self !== window.top; } catch (e) { return true; } }; const isElectron = navigator.userAgent.includes('Electron'); const shouldRegisterWorker = !isElectron && !inIframe() && 'serviceWorker' in navigator; if (shouldRegisterWorker) { navigator.serviceWorker .register(window.location.origin + contextRoot(window.location.pathname) + 'pwa-worker.js') .then(reg => { console.log('Service worker registered.', reg); }) .catch(err => { console.log(err); }); } }); </script> <script> // IE11 and earlier can be identified via their user agent and be // redirected to a page that is known to have no newer js syntax. if (window.navigator.userAgent.match(/(MSIE|Trident)/)) { var roomName = encodeURIComponent(window.location.pathname); window.location.pathname = 'static/recommendedBrowsers.html'; } window.indexLoadedTime = window.performance.now(); console.log("(TIME) index.html loaded:\t", indexLoadedTime); // XXX the code below listeners for errors and displays an error message // in the document body when any of the required files fails to load. // The intention is to prevent from displaying broken page. var criticalFiles = [ "config.js", "utils.js", "do_external_connect.js", "interface_config.js", "lib-jitsi-meet.min.js", "app.bundle.min.js", "all.css?v=7874" ]; var loadErrHandler = function(e) { var target = e.target; // Error on <script> and <link>(CSS) // <script> will have .src and <link> .href var fileRef = (target.src ? target.src : target.href); if (("SCRIPT" === target.tagName || "LINK" === target.tagName) && criticalFiles.some( function(file) { return fileRef.indexOf(file) !== -1 })) { window.onload = function() { // The whole complex part below implements page reloads with // "exponential backoff". The retry attempt is passes as // "rCou