Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- The FBI is trying to force Tor into installing a backdoor that would remove all anonymity from the Internet! Like They are trying to forcing Apple to install the backdoor in their products. It will allow the FBI to spy on you and see everything you do. With your help, we can provide the Tor Project with enough money to fight off the FBI in the courts. This is Operation Tor, or OpTor for short. Please donate and share this with your friends to stop this injustice and invasion of privacy by the government.
- ---------------------------------------------------------------------------
- + Target IP: 104.16.95.235
- + Target Hostname: www.fbi.gov
- + Target Port: 80
- ---------------------------------------------------------------------------
- + Server: cloudflare-nginx
- + Uncommon header 'x-frame-options' found, with contents: SAMEORIGIN
- + Uncommon header 'cf-ray' found, with contents: 28a5a2fd11f03e98-ZRH
- + Cookie __cfduid created without the httponly flag
- + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
- + OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-3931: /myphpnuke/links.php?op=MostPopular&ratenum=[script]alert(document.cookie);[/script]&ratetype=percent: myphpnuke is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-4598: /members.asp?SF=%22;}alert(223344);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2946: /forum_members.asp?find=%22;}alert(9823);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- ---------------------------------------------------------------------------
- SSL
- Prefered Server Cipher(s):
- TLSv1 128 bits ECDHE-RSA-AES128-SHA
- SSL Certificate:
- Version: 2
- Serial Number: -18446744073709551615
- Signature Algorithm: ecdsa-with-SHA256
- Issuer: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
- Not valid before: Jan 4 00:00:00 2016 GMT
- Not valid after: Dec 31 23:59:59 2016 GMT
- Subject: /OU=Domain Control Validated/OU=PositiveSSL Multi-Domain/CN=ssl331185.cloudflaressl.com
- Public Key Algorithm: id-ecPublicKey
- EC Public Key:
- Private-Key: (256 bit)
- pub:
- 04:0d:74:3c:4d:7a:96:42:3b:2f:75:74:35:cb:a5:
- eb:4e:b7:04:7b:b6:6f:12:c8:8f:e7:fc:68:97:9e:
- 0b:4d:92:52:fd:08:ef:30:6e:50:10:6f:5b:b7:01:
- a8:c0:81:65:52:10:42:70:23:33:05:c3:11:df:b7:
- b9:2a:08:c1:a0
- ASN1 OID: prime256v1
- X509v3 Extensions:
- X509v3 Authority Key Identifier:
- keyid:40:09:61:67:F0:BC:83:71:4F:DE:12:08:2C:6F:D4:D4:2B:76:3D:96
- X509v3 Subject Key Identifier:
- ED:F5:F0:E6:80:CB:CC:FB:2E:F4:EB:32:A2:97:E0:11:2B:22:53:93
- X509v3 Key Usage: critical
- Digital Signature
- X509v3 Basic Constraints: critical
- CA:FALSE
- X509v3 Extended Key Usage:
- TLS Web Server Authentication, TLS Web Client Authentication
- X509v3 Certificate Policies:
- Policy: 1.3.6.1.4.1.6449.1.2.2.7
- CPS: https://secure.comodo.com/CPS
- Policy: 2.23.140.1.2.1
- X509v3 CRL Distribution Points:
- Full Name:
- URI:http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl
- Authority Information Access:
- CA Issuers - URI:http://crt.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crt
- OCSP - URI:http://ocsp.comodoca4.com
- X509v3 Subject Alternative Name:
- DNS:ssl331185.cloudflaressl.com, DNS:*.fbi.gov, DNS:fbi.gov
- Verify Certificate:
- ---------------------------------------------------------------------------
- ~Sec7
- #OpTor
- Follow us @OfficialSec7 For More !
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Follw нас @ OfficialSec7 Для получения более
- So Show Your Support By Donating @ http://tw.gofund.me/crw6n878&pc=tw_co_share_m&rcid=d59732dcf45c11e5bde1bc764e05901c To Help @torproject Fight Away Them AssHoles @ the FBI
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement