Download link:
matchstick-flingone-b2g2.0-201409281739-mk808b.img.7z
You are also going to need an app for your phone:
Starting Nmap 6.47 ( http://nmap.org ) at 2014-10-06 22:23 Eastern Daylight Time NSE: Loaded 118 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 22:24 Scanning 192.168.1.1 [1 port] Completed ARP Ping Scan at 22:24, 0.64s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 22:24 Completed Parallel DNS resolution of 1 host. at 22:24, 16.50s elapsed Initiating SYN Stealth Scan at 22:24 Scanning 192.168.1.1 [1000 ports] Discovered open port 8888/tcp on 192.168.1.1 Discovered open port 53/tcp on 192.168.1.1 Discovered open port 8009/tcp on 192.168.1.1 Discovered open port 9001/tcp on 192.168.1.1 Discovered open port 9000/tcp on 192.168.1.1 Discovered open port 8008/tcp on 192.168.1.1 Discovered open port 5555/tcp on 192.168.1.1 Discovered open port 8011/tcp on 192.168.1.1 Discovered open port 666/tcp on 192.168.1.1 Completed SYN Stealth Scan at 22:24, 6.81s elapsed (1000 total ports) Initiating Service scan at 22:24 Scanning 9 services on 192.168.1.1 Service scan Timing: About 33.33% done; ETC: 22:26 (0:01:14 remaining) Completed Service scan at 22:26, 101.95s elapsed (9 services on 1 host) Initiating OS detection (try #1) against 192.168.1.1 NSE: Script scanning 192.168.1.1. Initiating NSE at 22:26 Completed NSE at 22:26, 30.42s elapsed Nmap scan report for 192.168.1.1 Host is up (0.0068s latency). Not shown: 991 closed ports PORT STATE SERVICE VERSION 53/tcp open domain dnsmasq 2.51 | dns-nsid: |_ bind.version: dnsmasq-2.51 666/tcp open tcpwrapped 5555/tcp open freeciv? 8008/tcp open http |_http-methods: No Allow or Public header in OPTIONS response (status code 404) | http-server-header: Software version grabbed from Server header. | Consider submitting a service fingerprint. |_Run with --script-args http-server-header.skip |_http-title: Site doesn't have a title. 8009/tcp open ssl/ajp13? |_ajp-methods: Failed to get a valid response for the OPTION request | ssl-cert: Subject: commonName=agent1/organizationName=Joyent/stateOrProvinceName=CA/countryName=US | Issuer: commonName=ca1/organizationName=Joyent/stateOrProvinceName=CA/countryName=US | Public Key type: rsa | Public Key bits: 512 | Not valid before: 2011-03-14T17:29:12+00:00 | Not valid after: 2038-07-29T17:29:12+00:00 | MD5: aac6 a91b 7b84 f922 9556 0a6a 4fa6 e7a6 |_SHA-1: 55ca 1f2a 59f6 131b ab35 917b 923d c9fa d94e 9448 | sslv2: | SSLv2 supported |_ ciphers: none 8011/tcp open unknown 8888/tcp open sun-answerbook? 9000/tcp open cslistener? 9001/tcp open tor-orport? 3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8888-TCP:V=6.47%I=7%D=10/6%Time=54334EE6%P=i686-pc-windows-windows% SF:r(GetRequest,368,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x20text/html\ SF:r\nDate:\x20Sun,\x2028\x20Sep\x202014\x2010:45:20\x20GMT\r\nConnection: SF:\x20close\r\n\r\n<html\x20xmlns=http://www\.w3\.org/1999/xhtml>\n\x20\x SF:20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<title>web\x20setting SF:</title>\n\x20\x20\x20\x20</head>\n\x20\x20\x20\x20<body>\n\x20\x20\x20 SF:\x20\x20\x20\x20\x20<h1>web\x20setting</h1>\n\x20\x20\x20\x20\x20\x20\x SF:20\x20<form\x20name=\"seting\"\x20action=\"setting\"\x20method=\"post\" SF:>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20flingname:\n\x20\x20 SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<input\x20type=\"text\"\x20name SF:=\"name\"\x20/><br\x20/>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\ SF:x20wifiname:\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<input\x2 SF:0type=\"text\"\x20maxlength=32\x20name=\"wifi\"\x20/><br\x20/>\n\x20\x2 SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20wifipassword:\n\x20\x20\x20\x2 SF:0\x20\x20\x20\x20\x20\x20\x20\x20<input\x20type=\"password\"\x20name=\" SF:password\"\x20/><br\x20/>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20 SF:\x20language:\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<input\x SF:20type=\"text\"\x20name=\"language\"\x20/><br\x20/>\n\x20\x20\x20\x20\x SF:20\x20\x20\x20\x20\x20\x20\x20macAddress:\n\x20\x20\x20\x20\x20\x20\x20 SF:\x20\x20\x20\x20\x20<input\x20type=\"text\"\x20name=\"macAddress\"\x20/ SF:><br\x20/>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20timezone:\n SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<input\x20type=\"text\" SF:\x20name=\"timezone\"\x20/><br\x20/>\n\x20\x20\x20\x20\x20\x20\x20\x20\ SF:x20\x20\x20\x20<input\x20type=\"submit\"\x20value=\"Submit\"\x20/>\n\x2 SF:0\x20\x20\x20\x20\x20\x20\x20</form>\n\x20\x20\x20\x20</body>\n</html>" SF:)%r(HTTPOptions,368,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x20text/ht SF:ml\r\nDate:\x20Sun,\x2028\x20Sep\x202014\x2010:45:20\x20GMT\r\nConnecti SF:on:\x20close\r\n\r\n<html\x20xmlns=http://www\.w3\.org/1999/xhtml>\n\x2 SF:0\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<title>web\x20sett SF:ing</title>\n\x20\x20\x20\x20</head>\n\x20\x20\x20\x20<body>\n\x20\x20\ SF:x20\x20\x20\x20\x20\x20<h1>web\x20setting</h1>\n\x20\x20\x20\x20\x20\x2 SF:0\x20\x20<form\x20name=\"seting\"\x20action=\"setting\"\x20method=\"pos SF:t\">\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20flingname:\n\x20\ SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<input\x20type=\"text\"\x20n SF:ame=\"name\"\x20/><br\x20/>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x SF:20\x20wifiname:\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<input SF:\x20type=\"text\"\x20maxlength=32\x20name=\"wifi\"\x20/><br\x20/>\n\x20 SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20wifipassword:\n\x20\x20\x20 SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20<input\x20type=\"password\"\x20name SF:=\"password\"\x20/><br\x20/>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\ SF:x20\x20language:\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<inpu SF:t\x20type=\"text\"\x20name=\"language\"\x20/><br\x20/>\n\x20\x20\x20\x2 SF:0\x20\x20\x20\x20\x20\x20\x20\x20macAddress:\n\x20\x20\x20\x20\x20\x20\ SF:x20\x20\x20\x20\x20\x20<input\x20type=\"text\"\x20name=\"macAddress\"\x SF:20/><br\x20/>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20timezone SF::\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<input\x20type=\"tex SF:t\"\x20name=\"timezone\"\x20/><br\x20/>\n\x20\x20\x20\x20\x20\x20\x20\x SF:20\x20\x20\x20\x20<input\x20type=\"submit\"\x20value=\"Submit\"\x20/>\n SF:\x20\x20\x20\x20\x20\x20\x20\x20</form>\n\x20\x20\x20\x20</body>\n</htm SF:l>"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port9000-TCP:V=6.47%I=7%D=10/6%Time=54334EEB%P=i686-pc-windows-windows% SF:r(GetRequest,74,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x20text/plain\ SF:r\nDate:\x20Sun,\x2028\x20Sep\x202014\x2010:45:25\x20GMT\r\nConnection: SF:\x20close\r\n\r\nNot\x20implemented")%r(HTTPOptions,74,"HTTP/1\.1\x2020 SF:0\x20OK\r\nContent-Type:\x20text/plain\r\nDate:\x20Sun,\x2028\x20Sep\x2 SF:02014\x2010:45:25\x20GMT\r\nConnection:\x20close\r\n\r\nNot\x20implemen SF:ted")%r(FourOhFourRequest,74,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x SF:20text/plain\r\nDate:\x20Sun,\x2028\x20Sep\x202014\x2010:45:34\x20GMT\r SF:\nConnection:\x20close\r\n\r\nNot\x20implemented"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port9001-TCP:V=6.47%I=7%D=10/6%Time=54334EEB%P=i686-pc-windows-windows% SF:r(GetRequest,6B,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x20application SF:/json\r\nDate:\x20Sun,\x2028\x20Sep\x202014\x2010:45:25\x20GMT\r\nConne SF:ction:\x20close\r\n\r\n")%r(HTTPOptions,6B,"HTTP/1\.1\x20200\x20OK\r\nC SF:ontent-Type:\x20application/json\r\nDate:\x20Sun,\x2028\x20Sep\x202014\ SF:x2010:45:28\x20GMT\r\nConnection:\x20close\r\n\r\n")%r(FourOhFourReques SF:t,6B,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x20application/json\r\nDa SF:te:\x20Sun,\x2028\x20Sep\x202014\x2010:45:40\x20GMT\r\nConnection:\x20c SF:lose\r\n\r\n"); MAC Address: 00:22:F4:61:C8:C1 (Ampak Technology) Device type: general purpose Running: Linux 2.6.X|3.X OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 OS details: Linux 2.6.32 - 3.10 Uptime guess: 0.002 days (since Mon Oct 06 22:24:04 2014) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=255 (Good luck!) IP ID Sequence Generation: All zeros TRACEROUTE HOP RTT ADDRESS 1 6.76 ms 192.168.1.1 NSE: Script Post-scanning. Read data files from: C:\Program Files (x86)\Nmap OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 168.35 seconds Raw packets sent: 1101 (49.238KB) | Rcvd: 1022 (41.728KB) [IMG]file:///C:\Users\test\AppData\Local\Temp\msohtmlclip1\01\clip_image001.png[/IMG]
There are currently 8769 users online. 5 members and 8764 guests.
Most users ever online was 16,134 at 08:28 on 08-11-2023.
We process personal data about users of our site, through the use of cookies and other technologies, to deliver our services, personalize advertising, and to analyze site activity. We may share certain information about our users with our advertising and analytics partners. For additional details, refer to our Privacy Policy.
By clicking "I AGREE" below, you agree to our Privacy Policy and our personal data processing and cookie practices as described therein. You also acknowledge that this forum may be hosted outside your country and you consent to the collection, storage, and processing of your data in the country where this forum is hosted.
Comment