Advertisement
Guest User

#OpTor

a guest
Mar 27th, 2016
10,144
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.87 KB | None | 0 0
  1. The FBI is trying to force Tor into installing a backdoor that would remove all anonymity from the Internet! Like They are trying to forcing Apple to install the backdoor in their products. It will allow the FBI to spy on you and see everything you do. With your help, we can provide the Tor Project with enough money to fight off the FBI in the courts. This is Operation Tor, or OpTor for short. Please donate and share this with your friends to stop this injustice and invasion of privacy by the government.
  2. ---------------------------------------------------------------------------
  3. + Target IP: 104.16.95.235
  4. + Target Hostname: www.fbi.gov
  5. + Target Port: 80
  6. ---------------------------------------------------------------------------
  7. + Server: cloudflare-nginx
  8. + Uncommon header 'x-frame-options' found, with contents: SAMEORIGIN
  9. + Uncommon header 'cf-ray' found, with contents: 28a5a2fd11f03e98-ZRH
  10. + Cookie __cfduid created without the httponly flag
  11. + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
  12. + OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  13. + OSVDB-3931: /myphpnuke/links.php?op=MostPopular&ratenum=[script]alert(document.cookie);[/script]&ratetype=percent: myphpnuke is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  14. + /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  15. + /modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  16. + OSVDB-4598: /members.asp?SF=%22;}alert(223344);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  17. + OSVDB-2946: /forum_members.asp?find=%22;}alert(9823);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  18. ---------------------------------------------------------------------------
  19. SSL
  20. Prefered Server Cipher(s):
  21. TLSv1 128 bits ECDHE-RSA-AES128-SHA
  22.  
  23. SSL Certificate:
  24. Version: 2
  25. Serial Number: -18446744073709551615
  26. Signature Algorithm: ecdsa-with-SHA256
  27. Issuer: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
  28. Not valid before: Jan 4 00:00:00 2016 GMT
  29. Not valid after: Dec 31 23:59:59 2016 GMT
  30. Subject: /OU=Domain Control Validated/OU=PositiveSSL Multi-Domain/CN=ssl331185.cloudflaressl.com
  31. Public Key Algorithm: id-ecPublicKey
  32. EC Public Key:
  33. Private-Key: (256 bit)
  34. pub:
  35. 04:0d:74:3c:4d:7a:96:42:3b:2f:75:74:35:cb:a5:
  36. eb:4e:b7:04:7b:b6:6f:12:c8:8f:e7:fc:68:97:9e:
  37. 0b:4d:92:52:fd:08:ef:30:6e:50:10:6f:5b:b7:01:
  38. a8:c0:81:65:52:10:42:70:23:33:05:c3:11:df:b7:
  39. b9:2a:08:c1:a0
  40. ASN1 OID: prime256v1
  41. X509v3 Extensions:
  42. X509v3 Authority Key Identifier:
  43. keyid:40:09:61:67:F0:BC:83:71:4F:DE:12:08:2C:6F:D4:D4:2B:76:3D:96
  44.  
  45. X509v3 Subject Key Identifier:
  46. ED:F5:F0:E6:80:CB:CC:FB:2E:F4:EB:32:A2:97:E0:11:2B:22:53:93
  47. X509v3 Key Usage: critical
  48. Digital Signature
  49. X509v3 Basic Constraints: critical
  50. CA:FALSE
  51. X509v3 Extended Key Usage:
  52. TLS Web Server Authentication, TLS Web Client Authentication
  53. X509v3 Certificate Policies:
  54. Policy: 1.3.6.1.4.1.6449.1.2.2.7
  55. CPS: https://secure.comodo.com/CPS
  56. Policy: 2.23.140.1.2.1
  57.  
  58. X509v3 CRL Distribution Points:
  59.  
  60. Full Name:
  61. URI:http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl
  62.  
  63. Authority Information Access:
  64. CA Issuers - URI:http://crt.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crt
  65. OCSP - URI:http://ocsp.comodoca4.com
  66.  
  67. X509v3 Subject Alternative Name:
  68. DNS:ssl331185.cloudflaressl.com, DNS:*.fbi.gov, DNS:fbi.gov
  69. Verify Certificate:
  70. ---------------------------------------------------------------------------
  71. ~Sec7
  72.  
  73. #OpTor
  74.  
  75. Follow us @OfficialSec7 For More !
  76.  
  77. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  78.  
  79. Follw нас @ OfficialSec7 Для получения более
  80.  
  81. So Show Your Support By Donating @ http://tw.gofund.me/crw6n878&pc=tw_co_share_m&rcid=d59732dcf45c11e5bde1bc764e05901c To Help @torproject Fight Away Them AssHoles @ the FBI
  82.  
  83. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement