Interesting ports on 77.44.210.6:
Not shown: 979 closed ports
PORT STATE SERVICE
22/tcp filtered ssh
23/tcp filtered telnet
80/tcp open http
81/tcp open hosts2-ns
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
443/tcp open https
514/tcp open shell
1720/tcp filtered H.323/Q.931
1723/tcp filtered pptp
2000/tcp filtered callbook
3128/tcp open squid-http
4444/tcp filtered krb524
5060/tcp filtered sip
8000/tcp open http-alt
8008/tcp open http
8080/tcp open http-proxy
8081/tcp open blackice-icecap
8088/tcp open unknown
8090/tcp open unknown
9090/tcp open zeus-admin
---------------------------------------------------------------------------
+ Target IP: 213.178.225.50
+ Target Hostname: scs-net.org
+ Target Port: 80
+ Start Time: 2012-03-10 17:38:20
---------------------------------------------------------------------------
+ Server: Microsoft-IIS/6.0
- Root page / redirects to: /portal/
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ Microsoft-IIS/6.0 appears to be outdated (4.0 for NT 4, 5.0 for Win2k, current is at least 7.0)
+ Retrieved X-Powered-By header: ASP.NET
+ Retrieved microsoftofficewebserver header: 5.0_Pub
+ Retrieved x-aspnet-version header: 2.0.50727
+ Uncommon header 'microsoftofficewebserver' found, with contents: 5.0_Pub
+ Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST
+ Public HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST
+ OSVDB-396: /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted.
+ OSVDB-3233: /postinfo.html: Microsoft FrontPage default file found.
+ OSVDB-3092: /guest/: This might be interesting...
+ OSVDB-3233: /_vti_inf.html: FrontPage is installed and reveals its version number (check HTML source for more information).
+ OSVDB-3500: /_vti_bin/fpcount.exe: Frontpage counter CGI has been found. FP Server version 97 allows remote users to execute arbitrary system commands, though a vulnerability in this version could not be confirmed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-1376. http://www.securityfocus.com/bid/2252.
+ OSVDB-67: /_vti_bin/shtml.dll/_vti_rpc: The anonymous FrontPage user is revealed through a crafted POST.
+ 3818 items checked: 13 item(s) reported on remote host