suip.biz Open in urlscan Pro
185.117.153.79  Public Scan

URL: https://suip.biz/?act=report&id=5fd247305dd774b7a00e0bd72dc6b548
Submission: On September 24 via manual from AR — Scanned from ES

Form analysis 0 forms found in the DOM

Text Content

   
 * suIP.biz
 * | LocalBitcoins |
 * | VDS |
 * | Donation |
 * | Feedback |



Online services based on Miloserdov.org

--------------------------------------------------------------------------------

IP Ranges Composing

 * Browsable location lists and their IP addresses
 * All IP of locality (region, city)
 * All IP of countries
 * All IP of ISPs
 * All IP of continents
 * All IP of Autonomous System (AS)
 * IP ranges of all Internet Service Providers (ISPs) and organizations

Find out information about yourself

 * Find out my IP
 * Find out your User Agent
 * Checking whether my real IP leaking (it tries to reveal proxy)
 * Traceroute to me
 * Do I have IPv6

Information Gathering

 * Find out the location and Internet service provider by IP
 * Find out the location and Internet service provider by IPv6
 * IP or Websites Information Gathering
 * Identify CMS of Websites
 * WebApp Information Gatherer
 * Generate and test domain typos and variations
 * Web-sites on a single IP
 * IP address of a web-site
 * IP address history of web sites
 * List ALL DNS records
 * Viewing specific DNS records of a site
 * HTTP response headers
 * Trace URL's jumps across the rel links to obtain the last URL
 * Checking the existence of a given mail
 * Check the existence of a profile
 * Search for profiles by full names
 * Checking the existence of domains
 * Convert IP address to hostname
 * Autonomous System Number Lookup by IP Address
 * Search user in social media
 * OSINT Tool for All-In-One Web Reconnaissance
 * .onion sites (hidden services) without Tor
 * NetBIOS, SMB and Samba Scanner
 * Checking if a site is accessible via the Tor network

Information exfiltration from cache and web archives

 * Display page from Google cache
 * Simultaneous search in several web archives

IP calculators

 * IP Subnet Calculator
 * IPv6 Subnet Calculator
 * IP address converter
 * IP address aggregator
 * Network Ranges in CIDR
 * Split subnet by Network Mask
 * Split subnet by size
 * Binary IP to standard view
 * Convert IP Addresses to Binary
 * Decimal IP to normal form
 * IP to Decimal
 * Hexadecimal IP to normal form
 * IP to Hexadecimal Number
 * Octal number to IP
 * IP to octal number
 * IPv6 decompression
 * Convert to CIDR and aggregating IP ranges
 * Convert CIDR notation to IP ranges

Bypassing the prohibition of displaying source HTML code, bypassing social
content lockers

 * Service bypassing blocking view source page
 * Bypassing social content lockers

Advanced search engines usage

 * Advanced Google search

Encoding

 * Encoding detection and encoding convertor
 * Base64 encoding of files and strings
 * Decoding files and strings from Base64

Anti CloudFlare techniques

 * Whether a site behind CloudFlare
 * Utilize misconfigured DNS and old database records to find hidden IP's behind
   the CloudFlare network
 * Disclosure of real IP of sites are behind Cloudflare, Incapsula, SUCURI and
   other WAF

Images and Metadata

 * Geotagging
 * List all metadata of a file
 * Cleaning up metadata in photos
 * Removing metadata in office and other files
 * Universal Image Converter
 * View the JPG quality level (image compression rate)
 * PDF to JPG conversion
 * JPG to PDF conversion
 * Web-site screenshots
 * Checking my webcam online

Information about phone numbers

 * International Calling Codes and Area Codes

Web Application Vulnerability Scanners

 * Black box WordPress vulnerability scanner online
 * Detecting SQL injection flaws online
 * Drupal and SilverStripe Vulnerability Scanner

Web Server Vulnerability Scanners

 * Web server scanner (Nikto)
 * Open ports and running services scanner (nmap) online
 * GUI Nmap online scanner with options
 * IPv6 addresses Port scaning
 * Testing TLS/SSL encryption
 * Security scanner for HTTP response headers
 * WAF (Web Application Firewall) detection and identification service

Subdomains and hidden files

 * Search all subdomains of a website
 * Subdomain discovery (the second method)
 * Instant search of subdomains of any site (the third method)

Getting Information on MAC Addresses

 * Determine the device manufacturer (vendor) by MAC address

Web server analysis

 * Apache log analysis
 * IP ping and IPv6 ping
 * Traceroute IP, IPv6, and Web Sites

Hashes, checksums

 * Hash type identification
 * NTLM Hash Generator

E-mail Analysis

 * Extracting all information from an e-mail letter

Analysis of files

 * Determining file type without extension
 * Extract all strings from executable file
 * Show information about the executable file
 * Retrieving content from .DS_Store

Convert values

 * Convert geographic coordinates from decimal to degrees, minutes and seconds
   format
 * Convert geographic coordinates from degrees to decimal format

QR codes

 * QR code generator for text
 * QR code generator for coordinates
 * QR code generator with phone number
 * QR code generator with website address or file to download
 * SMS message in QR code
 * E-mail in QR code
 * QR code generator for Wi-Fi connection
 * QR code to add a contact to the address book
 * QR code to add an event to the calendar

Special pages

 * Usage server resources
 * Raw IP search
 * Donation
 * На русском


REPORT



        ___
       __H__
 ___ ___[.]_____ ___ ___  {1.6.8#stable}
|_ -| . [)]     | .'| . |
|___|_  [']_|_|_|__,|  _|
      |_|V...       |_|   https://sqlmap.org

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting @ 22:38:11 /2022-09-24/

[22:38:11] [WARNING] unable to create output directory '/srv/http/.local/share/sqlmap/output' ([Errno 13] Permission denied: '/srv/http/.local'). Using temporary directory '/tmp/sqlmapoutput8j464qyw' instead
[22:38:11] [WARNING] unable to create history directory '/srv/http/.local/share/sqlmap/history' ([Errno 13] Permission denied: '/srv/http/.local'). Using temporary directory '/tmp/sqlmaphistory80m3quwi' instead
[22:38:11] [INFO] using 'STDIN' for parsing targets list
[1/?] URL:
GET https://gestionturismo.sanjuan.gob.ar/api/turismo/mostrarDepartamentos.php?id=3
do you want to test this URL? [Y/n/q]
> Y
[22:38:11] [INFO] testing URL 'https://gestionturismo.sanjuan.gob.ar/api/turismo/mostrarDepartamentos.php?id=3'
[22:38:11] [INFO] using '/tmp/sqlmapoutput8j464qyw/results-09242022_1038pm.csv' as the CSV results file in multiple targets mode
[22:38:11] [INFO] testing connection to the target URL
[22:38:17] [WARNING] there is a DBMS error found in the HTTP response body which could interfere with the results of the tests
[22:38:17] [INFO] checking if the target is protected by some kind of WAF/IPS
[22:38:21] [INFO] testing if the target URL content is stable
[22:38:24] [INFO] target URL content is stable
[22:38:24] [INFO] testing if GET parameter 'id' is dynamic
[22:38:28] [WARNING] GET parameter 'id' does not appear to be dynamic
[22:38:32] [INFO] heuristic (basic) test shows that GET parameter 'id' might be injectable (possible DBMS: 'MySQL')
[22:38:35] [INFO] testing for SQL injection on GET parameter 'id'
it looks like the back-end DBMS is 'MySQL'. Do you want to skip test payloads specific for other DBMSes? [Y/n] Y
for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] Y
[22:38:35] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[22:38:52] [INFO] testing 'Boolean-based blind - Parameter replace (original value)'
[22:38:55] [INFO] testing 'Generic inline queries'
[22:38:58] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (MySQL comment)'
[22:40:14] [INFO] testing 'OR boolean-based blind - WHERE or HAVING clause (MySQL comment)'
[22:42:23] [INFO] testing 'OR boolean-based blind - WHERE or HAVING clause (NOT - MySQL comment)'
[22:43:33] [INFO] testing 'MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause'
[22:45:43] [INFO] testing 'MySQL AND boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (MAKE_SET)'
[22:48:01] [INFO] testing 'MySQL OR boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (MAKE_SET)'
[22:53:11] [INFO] testing 'MySQL AND boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (ELT)'
[22:54:45] [INFO] testing 'MySQL OR boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (ELT)'
[22:57:29] [INFO] testing 'MySQL AND boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (bool*int)'
[22:59:04] [INFO] testing 'MySQL OR boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (bool*int)'
[23:01:53] [INFO] testing 'MySQL boolean-based blind - Parameter replace (MAKE_SET)'
[23:01:55] [INFO] testing 'MySQL boolean-based blind - Parameter replace (MAKE_SET - original value)'
[23:01:55] [INFO] testing 'MySQL boolean-based blind - Parameter replace (ELT)'
[23:01:58] [INFO] testing 'MySQL boolean-based blind - Parameter replace (ELT - original value)'
[23:01:58] [INFO] testing 'MySQL boolean-based blind - Parameter replace (bool*int)'
[23:02:00] [INFO] testing 'MySQL boolean-based blind - Parameter replace (bool*int - original value)'
[23:02:00] [INFO] testing 'MySQL >= 5.0 boolean-based blind - ORDER BY, GROUP BY clause'
[23:02:04] [INFO] testing 'MySQL >= 5.0 boolean-based blind - ORDER BY, GROUP BY clause (original value)'
[23:02:04] [INFO] testing 'MySQL < 5.0 boolean-based blind - ORDER BY, GROUP BY clause'
[23:02:04] [INFO] testing 'MySQL < 5.0 boolean-based blind - ORDER BY, GROUP BY clause (original value)'
[23:02:04] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Stacked queries'
[23:03:01] [INFO] testing 'MySQL < 5.0 boolean-based blind - Stacked queries'
[23:03:01] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (BIGINT UNSIGNED)'
[23:05:13] [CRITICAL] unable to connect to the target URL or proxy. sqlmap is going to retry the request(s)
[23:05:47] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (BIGINT UNSIGNED)'
[23:07:45] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXP)'
[23:08:10] [WARNING] user aborted during detection phase
how do you want to proceed? [ne(X)t target/(s)kip current test/(e)nd detection phase/(n)ext parameter/(c)hange verbosity/(q)uit] 
[*] ending @ 23:08:11 /2022-09-24/



Download in PDF




YOU MAY ALSO LIKE:




If you want to contribute, you can make donation for adding new services:

 * PayPal: alexey@miloserdov.org
 * Bitcoin: Click for Address