JustPaste.it

#OpIsrael Details

Operation Israel

 

original file:

https://justpaste.it/OpIsrael04

twitter hashtag: #HedefTarget

 

Procedure steps:

1- identify a target. ie www.pmo.gov.il

check the selected target on host.io

https://host.io/pmo.gov.il

notice the result as:

A   is using port 80 443

NS is using port 53 11211

MX is using port 25 11211

record the IP numbers

 

2- find more IP & target status with the right port

use check-host.net info

https://check-host.net/ip-info?host=www.pmo.gov.il

notice Cidr / range. range us using port 161 11211

record the IP numbers. left site IP is enough

IP which is not local to the country, is not needed

 

use check-host.net "tcp port"

site or IP:Port

it's default port 80 if not specified www.pmo.gov.il

https://check-host.net/check-tcp?host=www.pmo.gov.il

www.pmo.gov.il:443

https://check-host.net/check-tcp?host=www.pmo.gov.il:443

 

3- now check nameserver "ns"

in our target ns is  dns3.gov.il

check must be dns3.gov.il:53 & dns3.gov.il:11211

https://check-host.net/ip-info?host=dns3.gov.il:53

https://check-host.net/check-tcp?host=dns3.gov.il:53

record the IP numbers & range

 

4- Target status / Tangodown

https://host.io/ns/dns3.gov.il

nameserver ns is hosting a number of sites

when all connections are red in here

https://check-host.net/check-tcp?host=dns3.gov.il:53

then: select any domain listed in host.io

ie  mfa.gov.il

open the site, & copy the screen with error page

the other sites are with same tango status.

 

-------------------------------------------------------------------------------

extra online tools are useful to find information

ie:

http://ports.my-addr.com/check-all-open-ports-online.php

 

Port 11211 is always ddosable closed or open

Fire by order  01 then next

 

01-------------- Target details ---------------------------------------------------------

Port 443 80 >

www. gov. il = 147.237.0.206

main* Port 53 11211>

dns3. gov. il = 62.219.20.20

Port 53 161 11211>

Cidr route range = 62.219.0.0 -62.219.21.255

Cidr route range = 147.237.0.0 -147.237.255.255

 

Status check:

https://check-host.net/check-report/10ed968kb64

 

02-------------- Target details ---------------------------------------------------------

Israel defense Forces IDF IP list:

ns hit Port 53 & 11211 >

62.219.128.128

212.179.7.7

192.115.132.132

hit Port 161 11211 > Cidr route range = 195.160.240.0

Fire Port 25 11211 > = 82.80.219.169 = 82.80.219.170

 

03-------------- Target details ---------------------------------------------------------

Israel top level net
 
main* ns- Port 53 11211
lookup.iucc.ac.il. <=> 128.139.34.240
sdns.iucc.ac.il. <=> 128.139.197.11
mdns.iucc.ac.il. <=> 128.139.197.10
lmd.iucc.ac.il. => 128.139.204.250

 

 
Port 161 11211
Cidr route range
128.139.32.0

 

 

03-------------- Target details ---------------------------------------------------------

Port 53 11211>

ns1.bezeqint. net = 62.219.128.128

ns2.bezeqint. net = 212.179.7.7

ns3.bezeqint. net = 192.115.132.132

Port 161 11211> Cidr route range= 62.219.110.0

Cidr route range= 212.179.7.0

Cidr route range= 192.115.128.0

 

04-------------- Target details ---------------------------------------------------------

Ben Gurion & Ramon airports Israel Airports Authority Cloud hosted>

www. iaa. gov .il

main* ns- Port 53 11211

swallow.iaa. gov. il = 192.115.178.17

albatros.iaa. gov. il = 192.115.178.3

Port 161 11211 Cidr route range 192.115.176.0