Caddy
tcp/443 tcp/80
Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3df372350d4001392d4001392d4001392d4001392
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON print$ IPC$
The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a65227eddc385
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/wulabing/3DCEList.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a65227eddc385
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/wulabing/3DCEList.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
Open service 107.182.21.44:445
2024-12-22 01:00
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 107.182.21.44:445
2024-12-20 00:31
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 107.182.21.44:445
2024-12-18 01:42
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 107.182.21.44:80
2024-12-17 20:51
HTTP/1.1 308 Permanent Redirect Connection: close Location: https://107.182.21.44/ Server: Caddy Date: Tue, 17 Dec 2024 20:51:56 GMT Content-Length: 0
Open service 107.182.21.44:445
2024-12-15 23:41
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 107.182.21.44:445
2024-12-13 23:57
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 107.182.21.44:80 · wow.leahcim.xyz
2024-12-13 05:34
HTTP/1.1 308 Permanent Redirect Connection: close Location: https://wow.leahcim.xyz/ Server: Caddy Date: Fri, 13 Dec 2024 05:34:49 GMT Content-Length: 0
Open service 107.182.21.44:443 · wow.leahcim.xyz
2024-12-13 05:34
HTTP/1.1 200 OK Alt-Svc: h3=":443"; ma=2592000 Server: Caddy Date: Fri, 13 Dec 2024 05:34:47 GMT Content-Length: 0 Connection: close
Open service 107.182.21.44:445
2024-12-12 00:27
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 107.182.21.44:445
2024-12-02 01:35
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 107.182.21.44:445
2024-11-30 00:53
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 107.182.21.44:445
2024-11-28 01:00
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0