Apache
tcp/80
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c1a5d9b0f1a5d9b0ff409caf11ff359d77c753bf17c753bf1
Found 3 files trough .DS_Store spidering: /assets /assets/img /assets/js
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07b044f90eb044f90eb044f90eb044f90eb044f90e
Symfony profiler enabled: http://crazy-bets.pl/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c1a5d9b0f1a5d9b0ff409caf11ff359d77c753bf17c753bf1
Found 3 files trough .DS_Store spidering: /assets /assets/img /assets/js
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c1a5d9b0f1a5d9b0ff409caf11ff359d77c753bf17c753bf1
Found 3 files trough .DS_Store spidering: /assets /assets/img /assets/js
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c1a5d9b0f1a5d9b0ff409caf11ff359d77c753bf17c753bf1
Found 3 files trough .DS_Store spidering: /assets /assets/img /assets/js
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07618cabd5618cabd5618cabd5618cabd5618cabd5
Symfony profiler enabled: https://crazy-bets.pl/_profiler/empty/search/results
Open service 103.224.182.242:80 · crazy-bets.pl
2024-11-15 19:22
HTTP/1.1 200 OK date: Fri, 15 Nov 2024 19:22:36 GMT server: Apache set-cookie: __tad=1731698556.4117399; expires=Mon, 13-Nov-2034 19:22:36 GMT; Max-Age=315360000 vary: Accept-Encoding content-length: 1037 content-type: text/html; charset=UTF-8 connection: close Page title: crazy-bets.pl <html> <head> <title>crazy-bets.pl</title> <script type="text/javascript" src="/js/fingerprint/iife.min.js"></script> <script type="text/javascript"> var redirect_link = 'http://crazy-bets.pl/?'; // Set a timeout of 300 microseconds to execute a redirect if the fingerprint promise fails for some reason function fallbackRedirect() { window.location.replace(redirect_link+'fp=-7'); } try { const rdrTimeout = setTimeout(fallbackRedirect, 300); var fpPromise = FingerprintJS.load({monitoring: false}); fpPromise .then(fp => fp.get()) .then( result => { var fprt = 'fp='+result.visitorId; clearTimeout(rdrTimeout); window.location.replace(redirect_link+fprt); }); } catch(err) { fallbackRedirect(); } </script> <style> body { background:#101c36 } </style> </head> <body bgcolor="#ffffff" text="#000000"> <div style='display: none;'><a href='http://crazy-bets.pl/?fp=-3'>Click here to enter</a></div> <noscript><meta http-equiv="refresh" content="0; URL=http://crazy-bets.pl/?fp=-5"></noscript> </body> </html>