Pastebin launched a little side project called VERYVIRAL.com, check it out ;-) Want more features on Pastebin? Sign Up, it's FREE!
Guest

http://darkchan.com vulners lol pedo site

By: a guest on Sep 2nd, 2011  |  syntax: None  |  size: 25.57 KB  |  views: 683  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. http://darkchan.com a know site for pedos to  frequents
  2.  
  3. vulners mmmmmmm go get them while you can
  4.  
  5.  
  6. Vulnerability Information  
  7.  Threat Level
  8.  Acunetix Threat Level 3
  9. One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these vulnerabilities and compromise the backend database and/or deface your website.
  10.  
  11.  Alerts Found
  12. Total alerts found  310  
  13. High 29  
  14. Medium 186  
  15. Low 33  
  16. Informational 62  
  17.  
  18.  
  19.   Scan Information  
  20. Server not found!
  21. Make sure the address is spelled correctly and check your internet connection.
  22.  Target Information
  23. Target http://darkchan.com/
  24. Server banner Apache/2.2.19 (Unix) mod_ssl/2.2.19 OpenSSL/0.9.8e-fips-rhel5 mod_fcgid/2.3.5 Phusion_Passenger/2.2.15 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
  25. Operating system Unix
  26. Web server Apache 2.x
  27. Technologies PHP,mod_ssl,OpenSSL,FrontPage
  28.  
  29.  Web Scan Progress
  30. Start time 2/9/2011, 16:19:22
  31. Finish time  
  32. Scan time 1 hours, 43 minutes
  33. Scan iteration 1
  34. Scanning mode Heuristic
  35. Scanning stage Executing test modules
  36. Current module File checks (5 of 12) skip
  37. Module progress   18%
  38. Testing on /articles.php (8 of 39) skip
  39. Current test(s) Backup files
  40. Running tasks 1 ( 22 sub tasks )
  41. Total number of requests 47633
  42. Average response time (ms) 520.23
  43.  
  44.  Port Scan Progress
  45. Progress    
  46. Open ports 21/ftp, 22/ssh, 25/smtp, 80/http, 110/pop3, 143/imap, 443/https, 465/smtps, 993/imaps, 995/pop3s, 3306/mysql
  47.  
  48.  Scripts Progress
  49. Progress    
  50. Running scripts  
  51.  
  52.  
  53.  
  54.  
  55.  
  56.  
  57. Open Port 21 / ftp
  58. Port Banner
  59. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
  60. 220-You are user number 7 of 50 allowed.
  61. 220-Local time is now 10:19. Server port: 21.
  62. 220-This is a private system - No anonymous login
  63. 220-IPv6 connections are also welcome on this server.
  64. 220 You will be disconnected after 15 minutes of inactivity.
  65.  
  66. Open Port 22 / ssh
  67. Port Banner
  68. SSH-2.0-OpenSSH_4.3
  69.  
  70. Open Port 25 / smtp
  71. Port Banner
  72. 220-grange.accountservergroup.com ESMTP Exim 4.69 #1 Fri, 02 Sep 2011 10:19:46 -0500
  73. 220-We do not authorize the use of this system to transport unsolicited,
  74. 220 and/or bulk e-mail.
  75.  
  76. Open Port 80 / http
  77. Port Banner
  78. HTTP/1.1 200 OK
  79. Date: Fri, 02 Sep 2011 15:21:14 GMT
  80. Server: Apache/2.2.19 (Unix) mod_ssl/2.2.19 OpenSSL/0.9.8e-fips-rhel5 mod_fcgid/2.3.5 Phusion_Passenger/2.2.15 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
  81. Last-Modified: Tue, 31 May 2011 17:30:49 GMT
  82. ETag: "27d75e-6f-4a495c3ce4440"
  83. Accept-Ranges: bytes
  84. Content-Length: 111
  85. Connection: close
  86. Content-Type: text/html
  87.  
  88. <html><head><META HTTP-EQUIV="refresh" CONTENT="0;URL=/cgi-sys/defaultwebpage.cgi"></head><body></body></html>
  89.  
  90. Open Port 110 / pop3
  91. Port Banner
  92. +OK Dovecot ready.
  93.  
  94. Open Port 143 / imap
  95. Port Banner
  96. * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
  97.  
  98. Open Port 443 / https
  99. Port Banner
  100.  
  101. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
  102. <html>
  103.   <head>
  104.     <title>400 Bad Request</title>
  105.     <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
  106.     <style type="text/css">
  107.         body {
  108.                 font-family: Verdana, Arial, Helvetica, sans-serif;
  109.                 font-size: 12px;
  110.                 background-color:#367E8E;
  111.                 scrollbar-base-color: #005B70;
  112.                 scrollbar-arrow-color: #F3960B;
  113.                 scrollbar-DarkShadow-Color: #000000;
  114.                 color: #FFFFFF;
  115.                         margin:0;
  116.         }
  117.         a { color:#021f25; text-decoration:none}
  118.         h1 {
  119.                 font-size: 18px;
  120.                 color: #FB9802;
  121.                 padding-bottom: 10px;
  122.                 background-image: url(sys_cpanel/images/bottombody.jpg);
  123.                 background-repeat: repeat-x;
  124.                 padding:5px 0 10px 15px;
  125.                         margin:0;
  126.         }
  127.         #body-content p {
  128.                 padding-left: 25px;
  129.                 padding-right: 25px;
  130.                 line-height: 18px;
  131.                 padding-
  132. Open Port 465 / smtps
  133. Port Banner
  134. No banner available.
  135. Open Port 993 / imaps
  136. Port Banner
  137. No banner available.
  138. Open Port 995 / pop3s
  139. Port Banner
  140. No banner available.
  141. Open Port 3306 / mysql
  142. Port Banner
  143. B###
  144. 5.0.91-community-log#####1qf-Ik]p#,#!###############={xh~cU]TmIe#
  145.  
  146. List of open TCP ports
  147. Description
  148. Open Port 21 / ftp
  149. Port Banner:
  150.  
  151. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
  152. 220-You are user number 7 of 50 allowed.
  153. 220-Local time is now 10:19. Server port: 21.
  154. 220-This is a private system - No anonymous login
  155. 220-IPv6 connections are also welcome on this s ...
  156.  
  157. --------------------------------------------------------------------------------
  158.  
  159. Open Port 22 / ssh
  160. Port Banner:
  161.  
  162. SSH-2.0-OpenSSH_4.3
  163.  
  164.  
  165. --------------------------------------------------------------------------------
  166.  
  167. Open Port 25 / smtp
  168. Port Banner:
  169.  
  170. 220-grange.accountservergroup.com ESMTP Exim 4.69 #1 Fri, 02 Sep 2011 10:19:46 -0500
  171. 220-We do not authorize the use of this system to transport unsolicited,
  172. 220 and/or bulk e-mail.
  173.  
  174.  
  175. --------------------------------------------------------------------------------
  176.  
  177. Open Port 80 / http
  178. Port Banner:
  179.  
  180. HTTP/1.1 200 OK
  181. Date: Fri, 02 Sep 2011 15:21:14 GMT
  182. Server: Apache/2.2.19 (Unix) mod_ssl/2.2.19 OpenSSL/0.9.8e-fips-rhel5 mod_fcgid/2.3.5 Phusion_Passenger/2.2.15 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
  183. Last-Modified: Tue,  ...
  184.  
  185. --------------------------------------------------------------------------------
  186.  
  187. Open Port 110 / pop3
  188. Port Banner:
  189.  
  190. +OK Dovecot ready.
  191.  
  192.  
  193. --------------------------------------------------------------------------------
  194.  
  195. Open Port 143 / imap
  196. Port Banner:
  197.  
  198. * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
  199.  
  200.  
  201. --------------------------------------------------------------------------------
  202.  
  203. Open Port 443 / https
  204. Port Banner:
  205.  
  206.  
  207. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
  208. <html>
  209.   <head>
  210.     <title>400 Bad Request</title>
  211.     <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
  212.   ...
  213.  
  214. --------------------------------------------------------------------------------
  215.  
  216. Open Port 465 / smtps
  217. No port banner available.
  218.  
  219.  
  220. --------------------------------------------------------------------------------
  221.  
  222. Open Port 993 / imaps
  223. No port banner available.
  224.  
  225.  
  226. --------------------------------------------------------------------------------
  227.  
  228. Open Port 995 / pop3s
  229. No port banner available.
  230.  
  231.  
  232. --------------------------------------------------------------------------------
  233.  
  234. Open Port 3306 / mysql
  235. Port Banner:
  236.  
  237. B###
  238. 5.0.91-community-log#####1qf-Ik]p#,#!###############={xh~cU]TmIe#
  239.  
  240. FTP server running
  241. Description
  242. An FTP server is running on TCP port 21.
  243.  
  244. Whois lookup
  245. Description
  246. Whois result for IP address 50.22.11.33:
  247.  
  248. % This is the RIPE Database query service.
  249. % The objects are in RPSL format.
  250. %
  251. % The RIPE Database is subject to Terms and Conditions.
  252. % See http://www.ripe.net/db/support/db-terms-conditions.pdf
  253.  
  254. % Note: this output has been filtered.
  255. %       To receive output for a database update, use the "-B" flag.
  256.  
  257. % Information related to '0.0.0.0 - 255.255.255.255'
  258.  
  259. inetnum:      0.0.0.0 - 255.255.255.255
  260. netname:      IANA-BLK
  261. descr:        The whole IPv4 address space
  262. country:      EU # Country is really world wide
  263. org:          ORG-IANA1-RIPE
  264. admin-c:      IANA1-RIPE
  265. tech-c:       IANA1-RIPE
  266. status:       ALLOCATED UNSPECIFIED
  267. remarks:      The country is really worldwide.
  268. remarks:      This address space is assigned at various other places in
  269. remarks:      the world and might therefore not be in the RIPE database.
  270. mnt-by:       RIPE-NCC-HM-MNT
  271. mnt-lower:    RIPE-NCC-HM-MNT
  272. mnt-routes:   RIPE-NCC-RPSL-MNT
  273. source:       RIPE # Filtered
  274.  
  275. organisation: ORG-IANA1-RIPE
  276. org-name:     Internet Assigned Numbers Authority
  277. org-type:     IANA
  278. address:      see http://www.iana.org
  279. remarks:      The IANA allocates IP addresses and AS number blocks to RIRs
  280. remarks:      see http://www.iana.org/ipaddress/ip-addresses.htm
  281. remarks:      and http://www.iana.org/assignments/as-numbers
  282. e-mail:       bitbucket@ripe.net
  283. admin-c:      IANA1-RIPE
  284. tech-c:       IANA1-RIPE
  285. mnt-ref:      RIPE-NCC-HM-MNT
  286. mnt-by:       RIPE-NCC-HM-MNT
  287. source:       RIPE # Filtered
  288.  
  289. role:         Internet Assigned Numbers Authority
  290. address:      see http://www.iana.org.
  291. e-mail:       bitbucket@ripe.net
  292. admin-c:      IANA1-RIPE
  293. tech-c:       IANA1-RIPE
  294. nic-hdl:      IANA1-RIPE
  295. remarks:      For more information on IANA services
  296. remarks:      go to IANA web site at http://www.iana.org.
  297. mnt-by:       RIPE-NCC-MNT
  298. source:       RIPE # Filtered
  299.  
  300.  
  301.  
  302.  
  303. MySQL server running
  304. Description
  305. A MySQL server is running on TCP port 3306.
  306. Information gathered from this service:
  307. Server version: 5.0.91-community-log
  308. Protocol version: 10
  309. Server capabilities: LONG_FLAG, CONNECT_WITH_DB, COMPRESS, PROTOCOL_41, TRANSACTIONS, MULTI_STATEMENTS
  310. Language code: 33
  311. Thread ID: 0x1a9c276
  312. Status: AUTOCOMMIT
  313.  
  314. IMAP server running
  315. Description
  316. An IMAP server is running on TCP port 143.
  317.  
  318. POP3 server running
  319. Description
  320. A POP3 server is running on TCP port 110.
  321.  
  322. SSH server running
  323. Description
  324. A SSH server is running on TCP port 22.
  325. SSH server information:
  326. Server key fingerprint: 7c777351cea92e5ec851de273b161ca0
  327. SSH version: SSH2
  328. Encryption algorithm client to server: AES128 CTR
  329. Encryption algorithm server to client: AES128 CTR
  330. Mac algorithm client to server: HMAC with SHA-256 digest
  331. Mac algorithm server to client: HMAC with SHA-256 digest
  332. Public key algorithm: Certificate is signed using RSA digital signature with MD2 digest
  333.  
  334. SMTP server running
  335. Description
  336. A SMTP server is running on TCP port 25. Information gathered from this service:
  337. EHLO returns:
  338.  250-grange.accountservergroup.com Hello
  339. 250-SIZE 52428800
  340. 250-PIPELINING
  341. 250-AUTH PLAIN LOGIN
  342. 250-STARTTLS
  343. 250 HELP
  344. HELP returns:
  345.  214-Commands supported:
  346. 214 AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  347.  
  348. SSL server running [443]
  349. Description
  350. A SSL2 server is running on TCP port 443.
  351.  
  352.  
  353.  
  354. SSL server information:
  355. Version: SSL2,SSL3,TLS1
  356. Ciphers suported:
  357. - SSL2_CK_RC4_128_WITH_MD5(OpenSSL ciphername: RC4-MD5, Protocol version: SSLv2, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: RC4(128), Message authentication code: MD5) - High strength
  358. - SSL2_CK_RC4_128_EXPORT40_WITH_MD5(OpenSSL ciphername: EXP-RC4-MD5, Protocol version: SSLv2, Key Exchange: RSA(512), Autentication: RSA, Symmetric encryption method: RC4(40), Message authentication code: MD5, export) - Low strength
  359. - SSL2_CK_RC2_128_CBC_WITH_MD5(OpenSSL ciphername: RC2-CBC-MD5, Protocol version: SSLv2, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: RC2(128), Message authentication code: MD5) - High strength
  360. - SSL2_CK_RC2_128_CBC_EXPORT40_WITH_MD5(OpenSSL ciphername: EXP-RC2-CBC-MD5, Protocol version: SSLv2, Key Exchange: RSA(512), Autentication: RSA, Symmetric encryption method: RC2(40), Message authentication code: MD5, export) - Low strength
  361. - SSL2_CK_DES_64_CBC_WITH_MD5(OpenSSL ciphername: DES-CBC-MD5, Protocol version: SSLv2, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: DES(56), Message authentication code: MD5) - Low strength
  362. - SSL2_CK_DES_192_EDE3_CBC_WITH_MD5(OpenSSL ciphername: DES-CBC3-MD5, Protocol version: SSLv2, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: 3DES(168), Message authentication code: MD5) - High strength
  363.  
  364.  
  365.  
  366. Certificate:
  367.  
  368. Issuer:
  369.    Country Name: GB
  370.    State Or Province Name: Greater Manchester
  371.    Locality Name: Salford
  372.    Organization Name: Comodo CA Limited
  373.    Common Name: PositiveSSL CA
  374. Recipient:
  375.    Organizational Unit Name: Domain Control Validated
  376.    Organizational Unit Name: PositiveSSL Wildcard
  377.    Common Name: *.accountservergroup.com
  378.  
  379. Certificate version: 2
  380. Serial number:       77325af3c2b4635e1d63e0a0b3744750
  381. Finger print:        63a70123bbb27a1445520ee9f601273e
  382. Algorithm ID:        1.2.840.113549.1.1.5
  383. Valability start:    Thu Oct 28 01:00:00 UTC+0100 2010
  384. Valability end:      Sun Oct 28 00:59:59 UTC+0100 2012
  385. Expire in:           421 days
  386.  
  387.  
  388. A SSL3 server is running on TCP port 443.
  389.  
  390.  
  391.  
  392. SSL server information:
  393. Version: SSL2,SSL3,TLS1
  394. Ciphers suported:
  395. - SSL3_CK_RSA_RC4_40_MD5(OpenSSL ciphername: EXP-RC4-MD5, Protocol version: SSLv3, Key Exchange: RSA(512), Autentication: RSA, Symmetric encryption method: RC4(40), Message authentication code: MD5, export) - Low strength
  396. - SSL3_CK_RSA_RC4_128_MD5(OpenSSL ciphername: RC4-MD5, Protocol version: SSLv3, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: RC4(128), Message authentication code: MD5) - High strength
  397. - SSL3_CK_RSA_RC4_128_SHA(OpenSSL ciphername: RC4-SHA, Protocol version: SSLv3, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: RC4(128), Message authentication code: SHA1) - High strength
  398. - SSL3_CK_RSA_RC2_40_MD5(OpenSSL ciphername: EXP-RC2-CBC-MD5, Protocol version: SSLv3, Key Exchange: RSA(512), Autentication: RSA, Symmetric encryption method: RC2(40), Message authentication code: MD5, export) - Low strength
  399. - SSL3_CK_RSA_DES_40_CBC_SHA(OpenSSL ciphername: EXP-DES-CBC-SHA, Protocol version: SSLv3, Key Exchange: RSA(512), Autentication: RSA, Symmetric encryption method: DES(40), Message authentication code: SHA1, export) - Low strength
  400. - SSL3_CK_RSA_DES_64_CBC_SHA(OpenSSL ciphername: DES-CBC-SHA, Protocol version: SSLv3, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: DES(56), Message authentication code: SHA1) - Low strength
  401. - SSL3_CK_RSA_DES_192_CBC3_SHA(OpenSSL ciphername: DES-CBC3-SHA, Protocol version: SSLv3, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: 3DES(168), Message authentication code: SHA1) - High strength
  402. - SSL3_CK_EDH_RSA_DES_40_CBC_SHA(OpenSSL ciphername: EXP-EDH-RSA-DES-CBC-SHA, Protocol version: SSLv3, Key Exchange: DH(512), Autentication: RSA, Symmetric encryption method: DES(40), Message authentication code: SHA1, export) - Low strength
  403. - SSL3_CK_EDH_RSA_DES_64_CBC_SHA(OpenSSL ciphername: EDH-RSA-DES-CBC-SHA, Protocol version: SSLv3, Key Exchange: DH, Autentication: RSA, Symmetric encryption method: DES(56), Message authentication code: SHA1) - Low strength
  404. - SSL3_CK_EDH_RSA_DES_192_CBC3_SHA(OpenSSL ciphername: EDH-RSA-DES-CBC3-SHA, Protocol version: SSLv3, Key Exchange: DH, Autentication: RSA, Symmetric encryption method: 3DES(168), Message authentication code: SHA1) - High strength
  405.  
  406.  
  407.  
  408. Certificate 1:
  409.  
  410. Issuer:
  411.    Country Name: GB
  412.    State Or Province Name: Greater Manchester
  413.    Locality Name: Salford
  414.    Organization Name: Comodo CA Limited
  415.    Common Name: PositiveSSL CA
  416. Recipient:
  417.    Organizational Unit Name: Domain Control Validated
  418.    Organizational Unit Name: PositiveSSL Wildcard
  419.    Common Name: *.accountservergroup.com
  420.  
  421. Certificate version: 2
  422. Serial number:       77325af3c2b4635e1d63e0a0b3744750
  423. Finger print:        63a70123bbb27a1445520ee9f601273e
  424. Algorithm ID:        1.2.840.113549.1.1.5
  425. Valability start:    Thu Oct 28 01:00:00 UTC+0100 2010
  426. Valability end:      Sun Oct 28 00:59:59 UTC+0100 2012
  427. Expire in:           421 days
  428. Certificate 2:
  429.  
  430. Issuer:
  431.    Country Name: US
  432.    State Or Province Name: UT
  433.    Locality Name: Salt Lake City
  434.    Organization Name: The USERTRUST Network
  435.    Organizational Unit Name: http://www.usertrust.com
  436.    Common Name: UTN-USERFirst-Hardware
  437. Recipient:
  438.    Country Name: GB
  439.    State Or Province Name: Greater Manchester
  440.    Locality Name: Salford
  441.    Organization Name: Comodo CA Limited
  442.    Common Name: PositiveSSL CA
  443.  
  444. Certificate version: 2
  445. Serial number:       4ccd4a9a5b4513218ccf902f8b2b5171
  446. Finger print:        1cc11164ea48a004ce49c317ee723ed0
  447. Algorithm ID:        1.2.840.113549.1.1.5
  448. Valability start:    Mon Sep 18 01:00:00 UTC+0100 2006
  449. Valability end:      Sat May 30 11:48:38 UTC+0100 2020
  450. Expire in:           3192 days
  451. Certificate 3:
  452.  
  453. Issuer:
  454.    Country Name: SE
  455.    Organization Name: AddTrust AB
  456.    Organizational Unit Name: AddTrust External TTP Network
  457.    Common Name: AddTrust External CA Root
  458. Recipient:
  459.    Country Name: US
  460.    State Or Province Name: UT
  461.    Locality Name: Salt Lake City
  462.    Organization Name: The USERTRUST Network
  463.    Organizational Unit Name: http://www.usertrust.com
  464.    Common Name: UTN-USERFirst-Hardware
  465.  
  466. Certificate version: 2
  467. Serial number:       5242064a4f37fe4369487a9667ff5d27
  468. Finger print:        4524333a6d95630e78ee90395ebfc670
  469. Algorithm ID:        1.2.840.113549.1.1.5
  470. Valability start:    Tue Jun 7 09:09:10 UTC+0100 2005
  471. Valability end:      Sat May 30 11:48:38 UTC+0100 2020
  472. Expire in:           3192 days
  473.  
  474.  
  475. A TLS1 server is running on TCP port 443.
  476.  
  477.  
  478.  
  479. SSL server information:
  480. Version: SSL2,SSL3,TLS1
  481. Ciphers suported:
  482. - TLS1_CK_RSA_EXPORT_WITH_RC4_40_MD5(OpenSSL ciphername: EXP-RC4-MD5, Protocol version: TLSv1, Key Exchange: RSA(512), Autentication: RSA, Symmetric encryption method: RC4(40), Message authentication code: MD5, export) - Low strength
  483. - TLS1_CK_RSA_WITH_RC4_128_MD5(OpenSSL ciphername: RC4-MD5, Protocol version: TLSv1, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: RC4(128), Message authentication code: MD5) - High strength
  484. - TLS1_CK_RSA_WITH_RC4_128_SHA(OpenSSL ciphername: RC4-SHA, Protocol version: TLSv1, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: RC4(128), Message authentication code: SHA1) - High strength
  485. - TLS1_CK_RSA_EXPORT_WITH_RC2_CBC_40_MD5(OpenSSL ciphername: EXP-RC2-CBC-MD5, Protocol version: TLSv1, Key Exchange: RSA(512), Autentication: RSA, Symmetric encryption method: RC2(40), Message authentication code: MD5, export) - Low strength
  486. - TLS1_CK_RSA_EXPORT_WITH_DES40_CBC_SHA(OpenSSL ciphername: EXP-DES-CBC-SHA, Protocol version: TLSv1, Key Exchange: RSA(512), Autentication: RSA, Symmetric encryption method: DES(40), Message authentication code: SHA1, export) - Low strength
  487. - TLS1_CK_RSA_WITH_DES_CBC_SHA(OpenSSL ciphername: DES-CBC-SHA, Protocol version: TLSv1, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: DES(56), Message authentication code: SHA1) - Low strength
  488. - TLS1_CK_RSA_WITH_3DES_EDE_CBC_SHA(OpenSSL ciphername: DES-CBC3-SHA, Protocol version: TLSv1, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: 3DES(168), Message authentication code: SHA1) - High strength
  489. - TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA(OpenSSL ciphername: EXP-EDH-RSA-DES-CBC-SHA, Protocol version: TLSv1, Key Exchange: DH(512), Autentication: RSA, Symmetric encryption method: DES(40), Message authentication code: SHA1, export) - Low strength
  490. - TLS1_CK_DHE_RSA_WITH_DES_CBC_SHA(OpenSSL ciphername: EDH-RSA-DES-CBC-SHA, Protocol version: TLSv1, Key Exchange: DH, Autentication: RSA, Symmetric encryption method: DES(56), Message authentication code: SHA1) - Low strength
  491. - TLS1_CK_DHE_RSA_WITH_3DES_EDE_CBC_SHA(OpenSSL ciphername: EDH-RSA-DES-CBC3-SHA, Protocol version: TLSv1, Key Exchange: DH, Autentication: RSA, Symmetric encryption method: 3DES(168), Message authentication code: SHA1) - High strength
  492. - TLS1_CK_RSA_WITH_AES_128_CBC_SHA(OpenSSL ciphername: AES128-SHA, Protocol version: TLSv1, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: AES(128), Message authentication code: SHA1) - High strength
  493. - TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA(OpenSSL ciphername: DHE-RSA-AES128-SHA, Protocol version: TLSv1, Key Exchange: DH, Autentication: RSA, Symmetric encryption method: AES(128), Message authentication code: SHA1) - High strength
  494. - TLS1_CK_RSA_WITH_AES_256_CBC_SHA(OpenSSL ciphername: AES256-SHA, Protocol version: TLSv1, Key Exchange: RSA, Autentication: RSA, Symmetric encryption method: AES(256), Message authentication code: SHA1) - High strength
  495. - TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA(OpenSSL ciphername: DHE-RSA-AES256-SHA, Protocol version: TLSv1, Key Exchange: DH, Autentication: RSA, Symmetric encryption method: AES(256), Message authentication code: SHA1) - High strength
  496.  
  497.  
  498.  
  499. Certificate 1:
  500.  
  501. Issuer:
  502.    Country Name: GB
  503.    State Or Province Name: Greater Manchester
  504.    Locality Name: Salford
  505.    Organization Name: Comodo CA Limited
  506.    Common Name: PositiveSSL CA
  507. Recipient:
  508.    Organizational Unit Name: Domain Control Validated
  509.    Organizational Unit Name: PositiveSSL Wildcard
  510.    Common Name: *.accountservergroup.com
  511.  
  512. Certificate version: 2
  513. Serial number:       77325af3c2b4635e1d63e0a0b3744750
  514. Finger print:        63a70123bbb27a1445520ee9f601273e
  515. Algorithm ID:        1.2.840.113549.1.1.5
  516. Valability start:    Thu Oct 28 01:00:00 UTC+0100 2010
  517. Valability end:      Sun Oct 28 00:59:59 UTC+0100 2012
  518. Expire in:           421 days
  519. Certificate 2:
  520.  
  521. Issuer:
  522.    Country Name: US
  523.    State Or Province Name: UT
  524.    Locality Name: Salt Lake City
  525.    Organization Name: The USERTRUST Network
  526.    Organizational Unit Name: http://www.usertrust.com
  527.    Common Name: UTN-USERFirst-Hardware
  528. Recipient:
  529.    Country Name: GB
  530.    State Or Province Name: Greater Manchester
  531.    Locality Name: Salford
  532.    Organization Name: Comodo CA Limited
  533.    Common Name: PositiveSSL CA
  534.  
  535. Certificate version: 2
  536. Serial number:       4ccd4a9a5b4513218ccf902f8b2b5171
  537. Finger print:        1cc11164ea48a004ce49c317ee723ed0
  538. Algorithm ID:        1.2.840.113549.1.1.5
  539. Valability start:    Mon Sep 18 01:00:00 UTC+0100 2006
  540. Valability end:      Sat May 30 11:48:38 UTC+0100 2020
  541. Expire in:           3192 days
  542. Certificate 3:
  543.  
  544. Issuer:
  545.    Country Name: SE
  546.    Organization Name: AddTrust AB
  547.    Organizational Unit Name: AddTrust External TTP Network
  548.    Common Name: AddTrust External CA Root
  549. Recipient:
  550.    Country Name: US
  551.    State Or Province Name: UT
  552.    Locality Name: Salt Lake City
  553.    Organization Name: The USERTRUST Network
  554.    Organizational Unit Name: http://www.usertrust.com
  555.    Common Name: UTN-USERFirst-Hardware
  556.  
  557. Certificate version: 2
  558. Serial number:       5242064a4f37fe4369487a9667ff5d27
  559. Finger print:        4524333a6d95630e78ee90395ebfc670
  560. Algorithm ID:        1.2.840.113549.1.1.5
  561. Valability start:    Tue Jun 7 09:09:10 UTC+0100 2005
  562. Valability end:      Sat May 30 11:48:38 UTC+0100 2020
  563. Expire in:           3192 days
  564.  
  565.  
  566.  
  567. Alerts summary
  568. SQL injection
  569. /listing
  570. p
  571. /listing.php
  572. page
  573. Cross Site Scripting
  574. /listing.php
  575. user
  576. Application error message
  577. /
  578. siteviews
  579. /api
  580. u
  581. /create.html.php
  582. tooltips
  583. /creating.php
  584. rimage
  585. /enter
  586. pass
  587. /enter.php
  588. passcode
  589. /includes/pixelate.php
  590. siteviews
  591. safe
  592. referer
  593. file
  594. user-agent
  595. tooltips
  596. client-ip
  597. x-forwarded-for
  598. accept-language
  599. /jane.wordassociation.php
  600. read
  601. /listing.php
  602. posts
  603. /refer.php
  604. safe
  605. siteviews
  606. email
  607. /rss.xml
  608. board
  609. PHP invalid data type error message
  610. /includes/pixelate.php
  611. referer
  612. safe
  613. client-ip
  614. x-forwarded-for
  615. siteviews
  616. accept-language
  617. user-agent
  618. tooltips
  619. User credentials are sent in clear text
  620. /invite.php
  621. /invite.php (GET thread=1544891)
  622. /invite.php (GET thread=1548567)
  623. /invite.php (GET thread=1734227)
  624. /invite.php (GET thread=2819285)
  625. /invite.php (GET thread=4100766)
  626. /invite.php (GET thread=4805247)
  627. /invite.php (GET thread=4966186)
  628. /invite.php (GET thread=5261558)
  629. /invite.php (GET thread=5354877)
  630. /invite.php (GET thread=5702220)
  631. /invite.php (GET thread=5922864)
  632. /invite.php (GET thread=6664829)
  633. /invite.php (GET thread=6692069)
  634. /invite.php (GET thread=7128533)
  635. /invite.php (GET thread=7335990)
  636. /invite.php (GET thread=7549190)
  637. /invite.php (GET thread=7992200)
  638. /invite.php (GET thread=8057787)
  639. /invite.php (GET thread=8394496)
  640. /invite.php (GET thread=9123139)
  641. /invite.php (GET thread=9223793)
  642. /invite.php (GET thread=9652143)
  643. /invite.php (GET thread=9679538)
  644. /invite.php (GET user=alito)
  645. /invite.php (GET user=av0n)
  646. /invite.php (GET user=goaty)
  647. /invite.php (GET user=OP)
  648. /invite.php (POST user=acUn3t1x&email=sample%40email%2Etst&thread=&password=g00dPa%24%24w0rD&message=)
  649. /login
  650. /login.php
  651. File upload
  652. /creating.php
  653. TRACE Method Enabled
  654. Web Server
  655. Password type input with autocomplete enabled
  656. /invite.php
  657. /invite.php (GET thread=1544891)
  658. /invite.php (GET thread=1548567)
  659. /invite.php (GET thread=1734227)
  660. /invite.php (GET thread=2819285)
  661. /invite.php (GET thread=4100766)
  662. /invite.php (GET thread=4805247)
  663. /invite.php (GET thread=4966186)
  664. /invite.php (GET thread=5261558)
  665. /invite.php (GET thread=5354877)
  666. /invite.php (GET thread=5702220)
  667. /invite.php (GET thread=5922864)
  668. /invite.php (GET thread=6664829)
  669. /invite.php (GET thread=6692069)
  670. /invite.php (GET thread=7128533)
  671. /invite.php (GET thread=7335990)
  672. /invite.php (GET thread=7549190)
  673. /invite.php (GET thread=7992200)
  674. /invite.php (GET thread=8057787)
  675. /invite.php (GET thread=8394496)
  676. /invite.php (GET thread=9123139)
  677. /invite.php (GET thread=9223793)
  678. /invite.php (GET thread=9652143)
  679. /invite.php (GET thread=9679538)
  680. /invite.php (GET user=alito)
  681. /invite.php (GET user=av0n)
  682. /invite.php (GET user=goaty)
  683. /invite.php (GET user=OP)
  684. /invite.php (POST user=acUn3t1x&email=sample%40email%2Etst&thread=&password=g00dPa%24%24w0rD&message=)
  685. /login
  686. /login.php
  687. /register
  688. /register.php
  689. /register.php (GET boardID=400)
  690. Broken links
  691. /2558201
  692. /2819285
  693. /3339788
  694. /3346525
  695. /4490221
  696. /4534287
  697. /5087584
  698. /5474616
  699. /6227525
  700. /7453843
  701. /8196117
  702. /8258086
  703. /8514560
  704. /9760291
  705. /<a href=
  706. /a
  707. /includes/function.imagecreatefromjpeg
  708. /includes/function.imagecreatetruecolor
  709. /securimage/about.php
  710. /securimage/create.php
  711. /securimage/help.php
  712. /securimage/help.php (GET view=rules)
  713. /securimage/index.php
  714. /securimage/listing.php
  715. /securimage/listing.php (GET page=1&news=yes)
  716. /securimage/login.php
  717. /securimage/register.php
  718. /securimage/togglehelp.php
  719.  
  720.  
  721.  
  722. Alerts summary
  723. SSL 2.0 deprecated protocol
  724. Server
  725. SSL weak ciphers
  726. Server