Some kirjutas: ↑16 Apr, 2025 13:39
Annan teada, mida huvitavat leian õhtupoole
Ühesõnaga on see üks suur nothingburger ("mittemidagiburger"), vähemalt minu jaoks.
10 terabaiti unustage kohe ära, 23.6 giga lahtipakitult (vähemalt see 18 gigane rar). Võib-olla on see 10 TB-ne failikogum kuskil, kuhu lihtsurelikud ei pääse.
Eks ta vajaks veidi rohkem kammimist ja tublisti rohkem vene keele oskust, kui seda mul on aastatega tekkinud ja külge jäänud.
Kaustade struktuur:
-Part1
-- Anonymous betrayer Yun66n Twitter account vulnerabilities
-- ...
-- Leaked Data of Russian insurance company 'Ренессанс Страхование'
--- Leaked documents
--- Vulnerabilities
---- Fetched data.txt
-- ...
-- Vulnerabilities of Russian TV channel Russia 1
-Part2
-...
-Part 5
Selle kindlustusettevõtte "Fetched data.txt" sisu on järgnev:
+ Target IP: 194.190.22.68
+ Target Hostname: eosagou.renins.ru
+ Target Port: 443
---------------------------------------------------------------------------
+ SSL Info: Subject: /C=RU/ST=Moscow/L=Moscow/O=PJSC Renaissance Insurance Group/CN=*.renins.ru
Altnames: *.renins.ru, renins.ru
Ciphers: TLS_AES_128_GCM_SHA256
Issuer: /C=BE/O=GlobalSign nv-sa/CN=GlobalSign RSA OV SSL CA 2018
---------------------------------------------------------------------------
+ Server: ddos-guard
+ /: The anti-clickjacking X-Frame-Options header is not present. See:
https://developer.mozilla.org/en-US/doc ... me-Options
+ /: The site uses TLS and the Strict-Transport-Security HTTP header is not defined. See:
https://developer.mozilla.org/en-US/doc ... t-Security
+ /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See:
https://www.netsparker.com/web-vulnerab ... pe-header/
+ All CGI directories 'found', use '-C none' to test none
+ : Server banner changed from 'ddos-guard' to 'ngjit'.
+ Server is using a wildcard certificate: *.renins.ru. See:
https://en.wikipedia.org/wiki/Wildcard_certificate
Ühesõnaga esimese läbijooksmisega 80-90% kaustade sisust ongi mingid IP aadressid ja sinna kuuluvad "Vulnerabilites" ("Haavatavused") tekst, kas siis .png või .txt kujul.
Keegi pädevam IT turvalisuse alal võiks kosta, mida see "Vulnerabilities" endast kujutab, sest chatGPT viskab sellise vastuse:
This is an output summary from a web vulnerability scanner or reconnaissance tool like **Nikto**, **Nmap**, or **SSLyze**. It gives technical details about a web server, specifically:
- **IP/Hostname/Port**: It's scanning `194.190.22.68` (`eosagou.renins.ru`) over **HTTPS** (port 443).
- **SSL Info**: Shows the SSL/TLS certificate's subject, alternative names, encryption cipher, and issuer.
- **Web Server**: Initially `ddos-guard`, later showing `ngjit` (likely a reverse proxy or CDN).
- **Security Headers Missing**:
- `X-Frame-Options`: Prevents clickjacking – **missing**.
- `Strict-Transport-Security (HSTS)`: Enforces HTTPS – **missing**.
- `X-Content-Type-Options`: Prevents MIME-type sniffing – **missing**.
- **Wildcard Certificate**: One cert covers all subdomains under `renins.ru`.
These findings indicate potential **security hardening issues** but not necessarily vulnerabilities.
Ja selleks et erutust veidi allapoole tuua, siis Donald Trump kaustas on ainult järgnev (pildid manuses):
Mõnes kaustas pilte siin seal, mõni "andmebaas" Exceli kujul, PDF failid, kodulehtede failid (.css ja .html failid, mõni JSON ka).
Ehk keegi leiab midagi põnevamat seal, mina seda ei suutnud leida. Sensatsionalism mu jaoks. Üpris mõned failid aastast 2022 ja juba ammu tiirelnud internetis (nt pildid vene neonatsidest).
Dugini telegrammi kanali fail "Fetched data.txt" annab läbi chatgpt sellise vastuse:
This is the output of a **security scan (likely from Nikto or a similar vulnerability scanner)** targeting the Telegram server (`149.154.167.99`, `t.me`). It lists:
- Server configuration details (e.g. server type, SSL certificate info)
- Headers and their potential weaknesses
- **Hundreds of exposed or misconfigured paths** like `.sql`, `.pem`, `.jks`, `.tar.gz`, and various admin panels
- Known vulnerabilities in third-party applications (e.g. phpMyAdmin, TYPO3, guestbooks, shopping carts)
- Potential backup or sensitive files that should not be public
The goal is to identify **misconfigurations, exposed files, and known vulnerabilities** on a web server.
Ehk viitsin mõni õhtu veidi rohkem kraami uurida, sest seal 44 382 faili ja 2 952 kausta. Aga ma usun, et las ta jäägu sobiva luureteenistuse või uuriva ajakirjanduse lahendada ja lahata.