Anonymous ID: eaf9f0 June 17, 2018, 2:22 a.m. No.1782670   🗄️.is 🔗kun   >>2672 >>2673 >>2680 >>2704

>>1782605

 

156.146.2.159 www.katespadeandcompany.com.

156.146.2.159 jobs.katespadeandcompany.com

127.0.0.1 localhost.katespadeandcompany.com

156.146.2.180 mx2.katespadeandcompany.com.

156.146.2.184 ns2.katespadeandcompany.com.

156.146.2.188 mx2-ks.katespadeandcompany.com.

156.146.2.180 mx.katespadeandcompany.com

156.146.1.180 mx1.katespadeandcompany.com.

156.146.1.184 ns1.katespadeandcompany.com.

156.146.1.188 mx1-ks.katespadeandcompany.com.

156.146.1.189 ft.katespadeandcompany.com.

156.146.1.180 mx.katespadeandcompany.com

156.146.1.184 ns1.katespadeandcompany.com

156.146.2.184 ns2.katespadeandcompany.com

156.146.1.170 mx1.katespadeandcompany.com.

156.146.1.170 smtp.katespadeandcompany.com

156.146.2.170 mx2.katespadeandcompany.com.

156.146.2.170 smtp.katespadeandcompany.com

156.146.2.159 www.katespadeandcompany.com

156.146.1.159 www.katespadeandcompany.com.

156.146.1.159 www1.katespadeandcompany.com

156.146.2.159 www2.katespadeandcompany.com

 

Subnets found (may want to probe here using nmap or unicornscan):

127.0.0.0-255 : 1 hostnames found.

156.146.1.0-255 : 10 hostnames found.

156.146.2.0-255 : 11 hostnames found.

 

HOST 156.146.1.0 = Windows 7 SP 1 machine

 

Launching Sparta………………………………

Port 21 scan 1 complete

Port 443 Scanning……………………………………………………………………………………………………………………………………………………………………………… Finished!

Anonymous ID: eaf9f0 June 17, 2018, 2:27 a.m. No.1782686   🗄️.is 🔗kun   >>2688

>>1782673

its all good. Just scanning ports on thier network. Im halfway in. found a windows 7 machine that they use on 21 for ftp file downloads. ITS WIDE OPEN ;) THought about leaving a sniffer on it too see what they upload, but ssince its sercvice pack 1 should be able to comp it.

Anonymous ID: eaf9f0 June 17, 2018, 2:31 a.m. No.1782691   🗄️.is 🔗kun   >>2700

>>1782688

Thanks. Need to break it off at this point and back off. Stop in tommorrow to see if I was detected. I doubt it though. As open as this network it. THis machine has SERVICE PACK 1! And its last reboot was on May 17. Admin is one lazy motherfucker.

Anonymous ID: eaf9f0 June 17, 2018, 2:39 a.m. No.1782725   🗄️.is 🔗kun   >>2732

>>1782680

well I gotta be careful. Clown hackers watching me. Now that I doxxed my activities, I suspect they will try to catch me. I didnt find much in there anyway. Working on a few other projects.

Anonymous ID: eaf9f0 June 17, 2018, 2:42 a.m. No.1782736   🗄️.is 🔗kun   >>2761

>>1782704

Just scanning thier network looking for exploits. Good places to hide shit. I see port 443 is open, Canon multifunction devices use port 443 to upload thier service info to headquarters through a service mode troubleshooting system called imageware remote. Thought about watching it for more open doorways. Plus you can intercept document scans that way. See what them childraping fucks are scanning to their computers.

 

What am I looking for? Never know till I see it.

 

;)