Talk:Operation: Vox Populi, Vox Dei

From /i/nsurgency W/i/ki
Revision as of 02:07, 10 May 2010 by >Theguy
Jump to navigationJump to search

You have my bow. --Atlus 17:55, 4 May 2010 (UTC)

Data Pool

ITT DUMP RANDOM INTEL BELOW TO BE ANALYZED AND SORTED KTHXBAI--The Anonymous Legionaire 20:05, 8 May 2010 (UTC)

http://anonym.to/?http://www.santanna.va/index.php?page=%2Fetc%2Fpasswd We can administrate this one, no need to hack it again Thxb0f*VS 16:06, 9 May 2010 (UTC)

http://anonym.to/?http://ts.catholica.va:8081/http://paenitentiaria.catholica.va:90/paenitentiaria/index.php?idrel=64&lng=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd

http://anonym.to/?http://www.ppoomm.va <-- way, way, out of date copy of Apache. Java Webserver 7.0!!! http://mlists.vatican.va/mailman/ <-- again, out of date, badly. This server appears to be their mission control for shitty chainmail.

From who.is:
person: Stefano Pasquini
address: Holy See - Vatican City State
address: Internet Office of the Holy See
address: Cortile del Triangolo
address: V-00120 Vatican City State
address: Vatican City State
phone: +39 06 69893461
phone: +39 06 69882102
fax-no: +39 06 69882067
e-mail: pasquini@vatican.va

Dr. Stefano Pasquini
Vatican City, Vatican City State - Vatican City
Chief Internet Evangelist

Other: Vatican City Vatican City State VA 00120
Host Name IP Address(es)
john.vatican.va. 212.77.0.110
2a01:b8:0:1:212:77:0:110
dns.nic.it. 192.12.192.5
2a00:d40:1:1:0:0:0:5
michael.vatican.va. 212.77.0.2
2a01:b8:0:1:212:77:0:2
osiris.namex.it. 193.201.40.6
2001:7f8:10:f00a:0:0:0:6
seth.namex.it. 193.201.40.7
2001:7f8:10:f00a:0:0:0:7
ns-va.ripe.net. 193.0.12.98
2001:610:240:0:53:cc:12:98

source:http://www.iana.org/domains/root/db/va.html
More servers: Server
dns.nic.it (193.205.245.5)
dns2.it.net (151.1.2.1)
dxmon.cern.ch (192.65.185.10)
john.vatican.va (212.77.0.110)
michael.vatican.va (212.77.0.2)
ns.ripe.net (193.0.0.193)
ns.urbe.it (193.43.128.2)

Anti-Vatican Websites List

Hereis a list of anti-Vatican websites that I stumbled upon.] Subcategories Include:

Anti-Catholic Organizations
Maybe we could pose as a member from one of the listed organizations?
Organizations with Anti-Catholic Material
To assist in your psyops ^.-
Presumably anti-Catholic Churches
We could pose as activists from these churches, too.
User-Generated websites -nuclearkittens 05:04, 9 May 2010 (UTC)

- Thanks Nuclearkittens. This will help quite a bit. Integrating it into main raid page. --The Anonymous Legionaire 04:32, 9 May 2010 (UTC)

No problem. By the way, do you know what version of Apache the Vatican servers are running? -nuclearkittens 05:04, 9 May 2010 (UTC)

They have multiple servers, and not all of them are using apache. However, as announced by anon on IRC, the main one uses version 2.0.58 Thxb0f*VS 12:47, 9 May 2010 (UTC)

The Vulnerabilities can be found at http://httpd.apache.org/security/vulnerabilities_20.html Quite a few, you'll see. Look for those affecting 2.0.58 --Theguy 15:19, 9 May 2010 (UTC)

Nmap Dumps

Only contribute if you know what you are doing and use stealthy scans!!!

www.vatican.va

Starting Nmap 4.76 ( http://nmap.org ) at *time censored*
Interesting ports on www.vatican.va (212.77.1.247):
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.0.58 ((Unix))
No OS matches for host


real scan or is this a fake fingerprint. Apache httpd 2.0.58 soudns to retro. 2006 maybe fake make a better scan or this op getting moar fail

http://pastebin.org/215580
Is real -.- Wanted to post the one with packet trace and traceroute but it is too much work getting my IP out. Also why are tor exit nodes blocked here. Oh well...stupid vandals --Theguy 02:07, 10 May 2010 (UTC)

ts.catholica.va

Starting Nmap 4.76 ( http://nmap.org ) at *time censored*
Interesting ports on ts.catholica.va (212.77.4.95):
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Sun Java System httpd 7.0
No OS matches for host

TRACEROUTE (using port 53/tcp)

  • traceroute censored*

OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 57.75 seconds