FakeShop; Flavolada.com - https://www.flavolada.com/

FakeShop;
Flavolada
The scam data bank:
IBAN: IT63X3253203200006571770739
Intestatario: Angela Cenci
BIC (SWIFT): SIGPITM1XXX

1 Like

Courtesy of comsic-1337x

As always,

Enjoy the information <3

PORT     STATE SERVICE  VERSION
2053/tcp open  ssl/http nginx
| ssl-cert: Subject: commonName=*.flavolada.com
| Subject Alternative Name: DNS:*.flavolada.com, DNS:flavolada.com
| Issuer: commonName=E1/organizationName=Let's Encrypt/countryName=US
| Public Key type: ec
| Public Key bits: 256
| Signature Algorithm: ecdsa-with-SHA384
| Not valid before: 2022-07-26T08:54:35
| Not valid after:  2022-10-24T08:54:34
| MD5:   6672 d16a ad5d c617 06c8 2b92 f7a9 f1d7
|_SHA-1: dbc6 1ed9 4bf2 ddaa a5be eacb 75f5 14ad cb75 7fe6
|_http-server-header: cloudflare
|_http-title: 400 The plain HTTP request was sent to HTTPS port
2082/tcp open  http     Cloudflare http proxy
|_http-server-header: cloudflare
|_http-title: Did not follow redirect to https://flavolada.com/
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
2083/tcp open  ssl/http nginx
| ssl-cert: Subject: commonName=*.flavolada.com
| Subject Alternative Name: DNS:*.flavolada.com, DNS:flavolada.com
| Issuer: commonName=E1/organizationName=Let's Encrypt/countryName=US
| Public Key type: ec
| Public Key bits: 256
| Signature Algorithm: ecdsa-with-SHA384
| Not valid before: 2022-07-26T08:54:35
| Not valid after:  2022-10-24T08:54:34
| MD5:   6672 d16a ad5d c617 06c8 2b92 f7a9 f1d7
|_SHA-1: dbc6 1ed9 4bf2 ddaa a5be eacb 75f5 14ad cb75 7fe6
|_http-server-header: cloudflare
|_http-title: 400 The plain HTTP request was sent to HTTPS port
2086/tcp open  http     Cloudflare http proxy
|_http-server-header: cloudflare
|_http-title: Did not follow redirect to https://flavolada.com/
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
2087/tcp open  ssl/http nginx
| ssl-cert: Subject: commonName=*.flavolada.com
| Subject Alternative Name: DNS:*.flavolada.com, DNS:flavolada.com
| Issuer: commonName=E1/organizationName=Let's Encrypt/countryName=US
| Public Key type: ec
| Public Key bits: 256
| Signature Algorithm: ecdsa-with-SHA384
| Not valid before: 2022-07-26T08:54:35
| Not valid after:  2022-10-24T08:54:34
| MD5:   6672 d16a ad5d c617 06c8 2b92 f7a9 f1d7
|_SHA-1: dbc6 1ed9 4bf2 ddaa a5be eacb 75f5 14ad cb75 7fe6
|_http-server-header: cloudflare
|_http-title: 400 The plain HTTP request was sent to HTTPS port
2096/tcp open  ssl/http nginx
|_http-server-header: cloudflare
| ssl-cert: Subject: commonName=*.flavolada.com
| Subject Alternative Name: DNS:*.flavolada.com, DNS:flavolada.com
| Issuer: commonName=E1/organizationName=Let's Encrypt/countryName=US
| Public Key type: ec
| Public Key bits: 256
| Signature Algorithm: ecdsa-with-SHA384
| Not valid before: 2022-07-26T08:54:35
| Not valid after:  2022-10-24T08:54:34
| MD5:   6672 d16a ad5d c617 06c8 2b92 f7a9 f1d7
|_SHA-1: dbc6 1ed9 4bf2 ddaa a5be eacb 75f5 14ad cb75 7fe6
|_http-title: 400 The plain HTTP request was sent to HTTPS port
8443/tcp open  ssl/http Cloudflare http proxy
| ssl-cert: Subject: commonName=*.flavolada.com
| Subject Alternative Name: DNS:*.flavolada.com, DNS:flavolada.com
| Issuer: commonName=E1/organizationName=Let's Encrypt/countryName=US
| Public Key type: ec
| Public Key bits: 256
| Signature Algorithm: ecdsa-with-SHA384
| Not valid before: 2022-07-26T08:54:35
| Not valid after:  2022-10-24T08:54:34
| MD5:   6672 d16a ad5d c617 06c8 2b92 f7a9 f1d7
|_SHA-1: dbc6 1ed9 4bf2 ddaa a5be eacb 75f5 14ad cb75 7fe6
|_http-server-header: cloudflare
|_http-title: 400 The plain HTTP request was sent to HTTPS port
8880/tcp open  http     Cloudflare http proxy
|_http-server-header: cloudflare
|_http-title: Did not follow redirect to https://flavolada.com/
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS`Preformatted text`

ā€“

{
  "host": "www.flavolada.com",
  "ip": "104.21.23.178",
  "port": "443",
  "banner": "cloudflare",
  "vulnerabilities": [
    {
      "id": "999957",
      "OSVDB": "0",
      "method": "GET",
      "url": "/",
      "msg": "The anti-clickjacking X-Frame-Options header is not present."
    },
    {
      "id": "999100",
      "OSVDB": "0",
      "method": "GET",
      "url": "/",
      "msg": "Uncommon header 'alt-svc' found, with contents: h3=\":443\"; ma=86400, h3-29=\":443\"; ma=86400"
    },
    {
      "id": "999970",
      "OSVDB": "0",
      "method": "GET",
      "url": "/",
      "msg": "The site uses SSL and the Strict-Transport-Security HTTP header is not defined."
    },
    {
      "id": "999103",
      "OSVDB": "0",
      "method": "GET",
      "url": "/",
      "msg": "The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type."
    },
    {
      "id": "999100",
      "OSVDB": "0",
      "method": "GET",
      "url": "/index.php?",
      "msg": "Uncommon header 'x-redirect-by' found, with contents: WordPress"
    },
    {
      "id": "999997",
      "OSVDB": "0",
      "method": "GET",
      "url": "/wp-admin/admin-ajax.php",
      "msg": "Entry '/wp-admin/admin-ajax.php' in robots.txt returned a non-forbidden or redirect HTTP code (400)"
    },
    {
      "id": "999996",
      "OSVDB": "0",
      "method": "GET",
      "url": "/robots.txt",
      "msg": "\"robots.txt\" contains 2 entries which should be manually viewed."
    },
    {
      "id": "999966",
      "OSVDB": "0",
      "method": "GET",
      "url": "/",
      "msg": "The Content-Encoding header is set to \"deflate\" this may mean that the server is vulnerable to the BREACH attack."
    }
  ]
}

ā€“

---------
Searching at CVE (https://cve.mitre.org) for vulnerabilities...

 -Last Reports:

        + CVE-2022-2225 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2225

        + CVE-2022-2147 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2147

        + CVE-2022-2145 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2145

        + CVE-2021-43800 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43800

        + CVE-2021-3912 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3912

        + CVE-2021-3911 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3911

        + CVE-2021-3910 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3910

        + CVE-2021-3909 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3909

        + CVE-2021-3908 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3908

        + CVE-2021-3907 -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3907

---------
[Extra Info]
---------
Biggest File: https://www.flavolada.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
---------

ā€“

WordPress Version
     - 6.0.1

Theme
    - Nozama 1.9.3

2 WordPress Users:
   - admin
   - [detected but not enumerated]

image

ā€“

SSL analysis:
---
 * Certificates Information:
       Hostname sent for SNI:             flavolada.com
       Number of certificates detected:   1


     Certificate #0 ( _EllipticCurvePublicKey )
       SHA1 Fingerprint:                  dbc61ed94bf2ddaaa5beeacb75f514adcb757fe6
       Common Name:                       *.flavolada.com
       Issuer:                            E1
       Serial Number:                     347145266269400426503927101099124089937872
       Not Before:                        2022-07-26
       Not After:                         2022-10-24
       Public Key Algorithm:              _EllipticCurvePublicKey
       Signature Algorithm:               sha384
       Key Size:                          256
       Curve:                             secp256r1
       DNS Subject Alternative Names:     ['*.flavolada.com', 'flavolada.com']

     Certificate #0 - Trust
       Hostname Validation:               OK - Certificate matches server hostname
       Android CA Store (9.0.0_r9):       OK - Certificate is trusted
       Apple CA Store (iOS 13, iPadOS 13, macOS 10.15, watchOS 6, and tvOS 13):OK - Certificate is trusted
       Java CA Store (jdk-13.0.2):        OK - Certificate is trusted
       Mozilla CA Store (2020-09-17):     OK - Certificate is trusted
       Windows CA Store (2020-10-01):     OK - Certificate is trusted
       Symantec 2018 Deprecation:         OK - Not a Symantec-issued certificate
       Received Chain:                    *.flavolada.com --> E1 --> ISRG Root X2 --> ISRG Root X1
       Verified Chain:                    *.flavolada.com --> E1 --> ISRG Root X2 --> ISRG Root X1
       Received Chain Contains Anchor:    OK - Anchor certificate not sent
       Received Chain Order:              OK - Order is valid
       Verified Chain contains SHA1:      OK - No SHA1-signed certificate in the verified certificate chain

     Certificate #0 - Extensions
       OCSP Must-Staple:                  NOT SUPPORTED - Extension not found
       Certificate Transparency:          WARNING - Only 2 SCTs included but Google recommends 3 or more

     Certificate #0 - OCSP Stapling
                                          NOT SUPPORTED - Server did not send back an OCSP response

 * TLS 1.2 Cipher suites:
     Attempted to connect using 158 cipher suites.

     The server accepted the following 7 cipher suites:
        TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256     256       ECDH: x25519 (253 bits)
        TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384           256       ECDH: prime256v1 (256 bits)
        TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384           256       ECDH: prime256v1 (256 bits)
        TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA              256       ECDH: prime256v1 (256 bits)
        TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256           128       ECDH: prime256v1 (256 bits)
        TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256           128       ECDH: prime256v1 (256 bits)
        TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA              128       ECDH: prime256v1 (256 bits)

     The group of cipher suites supported by the server has the following properties:
       Forward Secrecy                    OK - Supported
       Legacy RC4 Algorithm               OK - Not Supported

     The server has no preferred cipher suite.


 * TLS 1.3 Cipher suites:
     Attempted to connect using 5 cipher suites.

     The server accepted the following 3 cipher suites:
        TLS_CHACHA20_POLY1305_SHA256                      256       ECDH: x25519 (253 bits)
        TLS_AES_256_GCM_SHA384                            256       ECDH: x25519 (253 bits)
        TLS_AES_128_GCM_SHA256                            128       ECDH: x25519 (253 bits)

     The group of cipher suites supported by the server has the following properties:
       Forward Secrecy                    OK - Supported
       Legacy RC4 Algorithm               OK - Not Supported

     The server is configured to prefer the following cipher suite:
        TLS_AES_256_GCM_SHA384                            256       ECDH: x25519 (253 bits)


 * SSL 3.0 Cipher suites:
     Attempted to connect using 80 cipher suites; the server rejected all cipher suites.

 * TLS 1.1 Cipher suites:
     Attempted to connect using 80 cipher suites.

     The server accepted the following 2 cipher suites:
        TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA              256       ECDH: prime256v1 (256 bits)
        TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA              128       ECDH: prime256v1 (256 bits)

     The group of cipher suites supported by the server has the following properties:
       Forward Secrecy                    OK - Supported
       Legacy RC4 Algorithm               OK - Not Supported

     The server is configured to prefer the following cipher suite:
        TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA              128       ECDH: prime256v1 (256 bits)


 * OpenSSL Heartbleed:
                                          OK - Not vulnerable to Heartbleed

 * TLS 1.0 Cipher suites:
     Attempted to connect using 80 cipher suites.

     The server accepted the following 2 cipher suites:
        TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA              256       ECDH: prime256v1 (256 bits)
        TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA              128       ECDH: prime256v1 (256 bits)

     The group of cipher suites supported by the server has the following properties:
       Forward Secrecy                    OK - Supported
       Legacy RC4 Algorithm               OK - Not Supported

     The server is configured to prefer the following cipher suite:
        TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA              128       ECDH: prime256v1 (256 bits)


 * SSL 2.0 Cipher suites:
     Attempted to connect using 7 cipher suites; the server rejected all cipher suites.

ā€“
I might have more fun, but this is enough funsies for now <3

lmao - anyway, enjoy :+1:

Hello there,

Iā€™m going to take a look :slight_smile:

Idem criminal gang;

https://www.ponzada.com/

Other scam data Bank:
IBAN: IT58I3253203200006571741134
Account: Sharon Ghidelli
BIC: SIGPITM1XXX