Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Your connection is not private
- Attackers might be trying to steal your information from support.google.com (for example, passwords, messages, or credit cards). NET::ERR_CERT_WEAK_SIGNATURE_ALGORITHM
- ReloadHIDE ADVANCED
- support.google.com normally uses encryption to protect your information. When Google Chrome tried to connect to support.google.com this time, the website sent back unusual and incorrect credentials. This may happen when an attacker is trying to pretend to be support.google.com, or a Wi-Fi sign-in screen has interrupted the connection. Your information is still secure because Google Chrome stopped the connection before any data was exchanged.
- You cannot visit support.google.com right now because the website uses HSTS. Network errors and attacks are usually temporary, so this page will probably work later. Learn more.
- chrome://net-internals/#events&q=type:SOCKET%20is:active
- capturing events (6939)
- Capture
- Export
- Import
- Proxy
- Events
- Timeline
- DNS
- Sockets
- Alt-Svc
- HTTP/2
- QUIC
- SDCH
- Cache
- Modules
- HSTS
- Bandwidth
- Prerender
- (?)
- type:SOCKET
- 129 of 578
- ID Source Type Description
- 272 SOCKET
- 590 SOCKET
- 656 SOCKET
- 662 SOCKET
- 667 SOCKET
- 686 SOCKET
- 706 SOCKET
- 753 UDP_SOCKET
- 756 SOCKET pm/ssl/clients4.google.com:443
- 760 UDP_SOCKET
- 763 SOCKET pm/ssl/clients4.google.com:443
- 769 UDP_SOCKET
- 773 SOCKET pm/ssl/redirector.gvt1.com:443
- 778 UDP_SOCKET
- 782 SOCKET pm/ssl/clients4.google.com:443
- 786 UDP_SOCKET
- 789 SOCKET pm/ssl/clients4.google.com:443
- 793 UDP_SOCKET
- 796 SOCKET pm/ssl/clients4.google.com:443
- 801 UDP_SOCKET
- 805 SOCKET ssl/support.google.com:443
- 812 SOCKET pm/www.gstatic.com:80
- 816 UDP_SOCKET
- 820 SOCKET pm/ssl/clients4.google.com:443
- 824 UDP_SOCKET
- 827 SOCKET pm/ssl/clients4.google.com:443
- 833 UDP_SOCKET
- 843 SOCKET pm/ssl/clients4.google.com:443
- 844 SOCKET ssl/support.google.com:443
- 848 UDP_SOCKET
- 852 SOCKET pm/ssl/beacons.gcp.gvt2.com:443
- 858 SOCKET pm/ssl/beacons.gcp.gvt2.com:443
- 865 SOCKET pm/ssl/beacons.gvt2.com:443
- 871 SOCKET pm/ssl/beacons.gvt2.com:443
- 883 SOCKET pm/ssl/beacons2.gvt2.com:443
- 884 SOCKET pm/ssl/beacons2.gvt2.com:443
- 896 SOCKET pm/ssl/beacons3.gvt2.com:443
- 897 SOCKET pm/ssl/beacons3.gvt2.com:443
- 909 SOCKET pm/ssl/beacons4.gvt2.com:443
- 910 SOCKET pm/ssl/beacons4.gvt2.com:443
- 919 SOCKET pm/ssl/beacons5.gvt2.com:443
- 924 UDP_SOCKET
- 928 SOCKET pm/ssl/accounts.google.com:443
- 935 SOCKET pm/ssl/beacons5.gvt3.com:443
- 943 SOCKET pm/ssl/beacons.gcp.gvt2.com:443
- 947 UDP_SOCKET
- 950 SOCKET pm/ssl/clients4.google.com:443
- 955 UDP_SOCKET
- 958 SOCKET ssl/support.google.com:443
- 965 SOCKET pm/www.gstatic.com:80
- 969 UDP_SOCKET
- 972 SOCKET pm/ssl/beacons.gvt2.com:443
- 978 SOCKET pm/ssl/beacons2.gvt2.com:443
- 984 SOCKET pm/ssl/beacons3.gvt2.com:443
- 992 UDP_SOCKET
- 996 SOCKET pm/ssl/clients4.google.com:443
- 1000 UDP_SOCKET
- 1003 SOCKET pm/ssl/clients4.google.com:443
- 1007 UDP_SOCKET
- 1011 SOCKET pm/ssl/clients4.google.com:443
- 1015 UDP_SOCKET
- 1018 SOCKET pm/ssl/clients4.google.com:443
- 1022 UDP_SOCKET
- 1026 SOCKET pm/ssl/clients4.google.com:443
- 1030 UDP_SOCKET
- 1033 SOCKET pm/ssl/clients4.google.com:443
- 1037 UDP_SOCKET
- 1041 SOCKET pm/ssl/clients4.google.com:443
- 1047 SOCKET pm/ssl/clients4.google.com:443
- 1051 UDP_SOCKET
- 1055 SOCKET pm/ssl/clients4.google.com:443
- 1059 UDP_SOCKET
- 1062 SOCKET pm/ssl/clients4.google.com:443
- 1066 UDP_SOCKET
- 1070 SOCKET ssl/accounts.google.com:443
- 1075 UDP_SOCKET
- 1079 SOCKET ssl/support.google.com:443
- 1086 SOCKET pm/www.gstatic.com:80
- 1091 UDP_SOCKET
- 1094 SOCKET ssl/support.google.com:443
- 1098 UDP_SOCKET
- 1102 SOCKET pm/ssl/clients4.google.com:443
- 1106 UDP_SOCKET
- 1109 SOCKET pm/ssl/clients4.google.com:443
- 1114 UDP_SOCKET
- 1117 SOCKET ssl/support.google.com:443
- 1123 UDP_SOCKET
- 1125 SOCKET pm/www.gstatic.com:80
- 1129 UDP_SOCKET
- 1133 SOCKET pm/ssl/clients4.google.com:443
- 1137 UDP_SOCKET
- 1140 SOCKET pm/ssl/clients4.google.com:443
- 1144 UDP_SOCKET
- 1148 SOCKET pm/ssl/accounts.google.com:443
- 1155 SOCKET pm/ssl/beacons.gcp.gvt2.com:443
- 1162 SOCKET pm/ssl/beacons.gvt2.com:443
- 1169 SOCKET pm/ssl/beacons2.gvt2.com:443
- 1176 SOCKET pm/ssl/beacons3.gvt2.com:443
- 1180 UDP_SOCKET
- 1184 SOCKET pm/ssl/beacons4.gvt2.com:443
- 1191 SOCKET pm/ssl/beacons5.gvt2.com:443
- 1198 SOCKET pm/ssl/beacons5.gvt3.com:443
- 1204 UDP_SOCKET
- 1208 SOCKET pm/ssl/clients4.google.com:443
- 1212 UDP_SOCKET
- 1215 SOCKET pm/ssl/clients4.google.com:443
- 1219 UDP_SOCKET
- 1223 SOCKET pm/ssl/clients4.google.com:443
- 1227 UDP_SOCKET
- 1230 SOCKET pm/ssl/clients4.google.com:443
- 1234 UDP_SOCKET
- 1238 SOCKET pm/ssl/clients4.google.com:443
- 1242 UDP_SOCKET
- 1246 SOCKET pm/ssl/clients4.google.com:443
- 1250 UDP_SOCKET
- 1254 SOCKET pm/ssl/clientservices.googleapis.com:443
- 1262 SOCKET pm/ssl/clients4.google.com:443
- 1266 UDP_SOCKET
- 1270 SOCKET pm/ssl/clients4.google.com:443
- 1275 UDP_SOCKET
- 1279 SOCKET pm/ssl/clients4.google.com:443
- 1283 UDP_SOCKET
- 1287 SOCKET pm/ssl/clients4.google.com:443
- 1291 UDP_SOCKET
- 1295 SOCKET pm/ssl/clients4.google.com:443
- 1299 UDP_SOCKET
- 1303 SOCKET pm/ssl/clients4.google.com:443
- 1307 UDP_SOCKET
- 1311 SOCKET pm/ssl/clients4.google.com:443
- 1079: SOCKET
- ssl/support.google.com:443
- Start Time: 2017-11-15 15:42:42.709
- t=961610 [st= 0] +SOCKET_ALIVE [dt=103]
- --> source_dependency = 1077 (TRANSPORT_CONNECT_JOB)
- t=961610 [st= 0] +TCP_CONNECT [dt=43]
- --> address_list = ["216.58.192.78:443"]
- t=961610 [st= 0] TCP_CONNECT_ATTEMPT [dt=42]
- --> address = "216.58.192.78:443"
- t=961653 [st= 43] -TCP_CONNECT
- --> source_address = "192.168.1.74:57388"
- t=961653 [st= 43] +SOCKET_IN_USE [dt=60]
- --> source_dependency = 1076 (SSL_CONNECT_JOB)
- t=961653 [st= 43] +SSL_CONNECT [dt=59]
- t=961653 [st= 43] SOCKET_BYTES_SENT
- --> byte_count = 206
- t=961709 [st= 99] SOCKET_BYTES_RECEIVED
- --> byte_count = 2836
- t=961710 [st=100] SOCKET_BYTES_RECEIVED
- --> byte_count = 1533
- t=961711 [st=101] +SSL_GET_CHANNEL_ID [dt=0]
- --> ephemeral = true
- --> service = "007ACE9A88030000"
- --> store = "E0B0788188030000"
- t=961711 [st=101] -SSL_GET_CHANNEL_ID
- --> key = "62091788B4C593B169C0517AF5559A250CD385FC3F42474F24BFDFD56A408A80731C03BA315C27087255485FB36AEEB44A73D38945C8431FFF42CC9A0F498BD8"
- --> net_error = 0 (?)
- t=961712 [st=102] SOCKET_BYTES_SENT
- --> byte_count = 242
- t=961712 [st=102] SSL_CERTIFICATES_RECEIVED
- --> certificates =
- -----BEGIN CERTIFICATE-----
- MIIHgzCCBmugAwIBAgIIEojxr/BBTqowDQYJKoZIhvcNAQELBQAwSTELMAkGA1UE
- BhMCVVMxEzARBgNVBAoTCkdvb2dsZSBJbmMxJTAjBgNVBAMTHEdvb2dsZSBJbnRl
- cm5ldCBBdXRob3JpdHkgRzIwHhcNMTcxMTAxMTM0MjQ1WhcNMTgwMTI0MTMzMDAw
- WjBmMQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwN
- TW91bnRhaW4gVmlldzETMBEGA1UECgwKR29vZ2xlIEluYzEVMBMGA1UEAwwMKi5n
- b29nbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE5oZCExXTgjzUXxue
- FOiCbtPGk6PmdkaU/VmXI5iy1OP04gxBBxl7CCmM3TKX1DQsnZ/FE/haOC+GKx80
- fiF55aOCBRswggUXMBMGA1UdJQQMMAoGCCsGAQUFBwMBMA4GA1UdDwEB/wQEAwIH
- gDCCA+EGA1UdEQSCA9gwggPUggwqLmdvb2dsZS5jb22CDSouYW5kcm9pZC5jb22C
- FiouYXBwZW5naW5lLmdvb2dsZS5jb22CEiouY2xvdWQuZ29vZ2xlLmNvbYIUKi5k
- YjgzMzk1My5nb29nbGUuY26CBiouZy5jb4IOKi5nY3AuZ3Z0Mi5jb22CFiouZ29v
- Z2xlLWFuYWx5dGljcy5jb22CCyouZ29vZ2xlLmNhggsqLmdvb2dsZS5jbIIOKi5n
- b29nbGUuY28uaW6CDiouZ29vZ2xlLmNvLmpwgg4qLmdvb2dsZS5jby51a4IPKi5n
- b29nbGUuY29tLmFygg8qLmdvb2dsZS5jb20uYXWCDyouZ29vZ2xlLmNvbS5icoIP
- Ki5nb29nbGUuY29tLmNvgg8qLmdvb2dsZS5jb20ubXiCDyouZ29vZ2xlLmNvbS50
- coIPKi5nb29nbGUuY29tLnZuggsqLmdvb2dsZS5kZYILKi5nb29nbGUuZXOCCyou
- Z29vZ2xlLmZyggsqLmdvb2dsZS5odYILKi5nb29nbGUuaXSCCyouZ29vZ2xlLm5s
- ggsqLmdvb2dsZS5wbIILKi5nb29nbGUucHSCEiouZ29vZ2xlYWRhcGlzLmNvbYIP
- Ki5nb29nbGVhcGlzLmNughQqLmdvb2dsZWNvbW1lcmNlLmNvbYIRKi5nb29nbGV2
- aWRlby5jb22CDCouZ3N0YXRpYy5jboINKi5nc3RhdGljLmNvbYIKKi5ndnQxLmNv
- bYIKKi5ndnQyLmNvbYIUKi5tZXRyaWMuZ3N0YXRpYy5jb22CDCoudXJjaGluLmNv
- bYIQKi51cmwuZ29vZ2xlLmNvbYIWKi55b3V0dWJlLW5vY29va2llLmNvbYINKi55
- b3V0dWJlLmNvbYIWKi55b3V0dWJlZWR1Y2F0aW9uLmNvbYIHKi55dC5iZYILKi55
- dGltZy5jb22CGmFuZHJvaWQuY2xpZW50cy5nb29nbGUuY29tggthbmRyb2lkLmNv
- bYIbZGV2ZWxvcGVyLmFuZHJvaWQuZ29vZ2xlLmNughxkZXZlbG9wZXJzLmFuZHJv
- aWQuZ29vZ2xlLmNuggRnLmNvggZnb28uZ2yCFGdvb2dsZS1hbmFseXRpY3MuY29t
- ggpnb29nbGUuY29tghJnb29nbGVjb21tZXJjZS5jb22CGHNvdXJjZS5hbmRyb2lk
- Lmdvb2dsZS5jboIKdXJjaGluLmNvbYIKd3d3Lmdvby5nbIIIeW91dHUuYmWCC3lv
- dXR1YmUuY29tghR5b3V0dWJlZWR1Y2F0aW9uLmNvbYIFeXQuYmUwaAYIKwYBBQUH
- AQEEXDBaMCsGCCsGAQUFBzAChh9odHRwOi8vcGtpLmdvb2dsZS5jb20vR0lBRzIu
- Y3J0MCsGCCsGAQUFBzABhh9odHRwOi8vY2xpZW50czEuZ29vZ2xlLmNvbS9vY3Nw
- MB0GA1UdDgQWBBTx1iTr5UNSANLfAVHqIK9iWQpRZDAMBgNVHRMBAf8EAjAAMB8G
- A1UdIwQYMBaAFErdBhYbvPZotXb1gba7Yhq6WoEvMCEGA1UdIAQaMBgwDAYKKwYB
- BAHWeQIFATAIBgZngQwBAgIwMAYDVR0fBCkwJzAloCOgIYYfaHR0cDovL3BraS5n
- b29nbGUuY29tL0dJQUcyLmNybDANBgkqhkiG9w0BAQsFAAOCAQEAm99Ks51THmn2
- RWk3Ko176HN1LUZh+ubuzOCB8lnLQCIhAiM6ZoOlX/7Jw6RYGYI8oK9iJ1qwKnkj
- PdfMdFOtnd8iMkDSzmo/mPotDFPf8JuD01jxgADjZuGN9N/q8Qnwb0EEhsq3jFTg
- FDjen0uMlRVdaeG0sEoixNaBaKq6HrO7V8NST9PMRiCzPb9z7YuXSma0H0qmkPKh
- Aw7cdBb4sLItn9/Kpb7SsAo4obawGuCN0B2AWcj0Dqmuwurv3oL2gWAKWFnp1ui+
- ueNOy2b03yp1z9SB0P96BokW9ctGj1HzeAeeXxDnGHtct+SnykwrDZchtDjRj+Mi
- onYXp3PmWA==
- -----END CERTIFICATE-----
- -----BEGIN CERTIFICATE-----
- MIIEKDCCAxCgAwIBAgIQAQAhJYiw+lmnd+8Fe2Yn3zANBgkqhkiG9w0BAQsFADBC
- MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEbMBkGA1UEAxMS
- R2VvVHJ1c3QgR2xvYmFsIENBMB4XDTE3MDUyMjExMzIzN1oXDTE4MTIzMTIzNTk1
- OVowSTELMAkGA1UEBhMCVVMxEzARBgNVBAoTCkdvb2dsZSBJbmMxJTAjBgNVBAMT
- HEdvb2dsZSBJbnRlcm5ldCBBdXRob3JpdHkgRzIwggEiMA0GCSqGSIb3DQEBAQUA
- A4IBDwAwggEKAoIBAQCcKgR3XNhQkToGo4Lg2FBIvIk/8RlwGohGfuCPxfGJziHu
- Wv5hDbcyRImgdAtTT1WkzoJile7rWV/G4QWAEsRelD+8W0g49FP3JOb7kekVxM/0
- Uw30SvyfVN59vqBrb4fA0FAfKDADQNoIc1Fsf/86PKc3Bo69SxEE630k3ub5/DFx
- +5TVYPMuSq9C0svqxGoassxT3RVLix/IGWEfzZ2oPmMrhDVpZYTIGcVGIvhTlb7j
- gEoQxirsupcgEcc5mRAEoPBhepUljE5SdeK27QjKFPzOImqzTs9GA5eXA37Asd57
- r0Uzz7o+cbfe9CUlwg01iZ2d+w4ReYkeN8WvjnJpAgMBAAGjggERMIIBDTAfBgNV
- HSMEGDAWgBTAephojYn7qwVkDBF9qn1luMrMTjAdBgNVHQ4EFgQUSt0GFhu89mi1
- dvWBtrtiGrpagS8wDgYDVR0PAQH/BAQDAgEGMC4GCCsGAQUFBwEBBCIwIDAeBggr
- BgEFBQcwAYYSaHR0cDovL2cuc3ltY2QuY29tMBIGA1UdEwEB/wQIMAYBAf8CAQAw
- NQYDVR0fBC4wLDAqoCigJoYkaHR0cDovL2cuc3ltY2IuY29tL2NybHMvZ3RnbG9i
- YWwuY3JsMCEGA1UdIAQaMBgwDAYKKwYBBAHWeQIFATAIBgZngQwBAgIwHQYDVR0l
- BBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMA0GCSqGSIb3DQEBCwUAA4IBAQDKSeWs
- 12Rkd1u+cfrP9B4jx5ppY1Rf60zWGSgjZGaOHMeHgGRfBIsmr5jfCnC8vBk97nsz
- qX+99AXUcLsFJnnqmseYuQcZZTTMPOk/xQH6bwx+23pwXEz+LQDwyr4tjrSogPsB
- E4jLnD/lu3fKOmc2887VJwJyQ6C9bgLxRwVxPgFZ6RGeGvOED4Cmong1L7bHon8X
- fOGLVq7uZ4hRJzBgpWJSwzfVO+qFKgE4h6LPcK2kesnE58rF2rwjMvL+GMJ74N87
- L9TQEOaWTPtEtyFkDbkAlDASJodYmDkFOA/MgkgMCkdm7r+0X8T/cKjhf4t5K7hl
- MqO5tzHpCvX2HzLc
- -----END CERTIFICATE-----
- -----BEGIN CERTIFICATE-----
- MIIDfTCCAuagAwIBAgIDErvmMA0GCSqGSIb3DQEBBQUAME4xCzAJBgNVBAYTAlVT
- MRAwDgYDVQQKEwdFcXVpZmF4MS0wKwYDVQQLEyRFcXVpZmF4IFNlY3VyZSBDZXJ0
- aWZpY2F0ZSBBdXRob3JpdHkwHhcNMDIwNTIxMDQwMDAwWhcNMTgwODIxMDQwMDAw
- WjBCMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEbMBkGA1UE
- AxMSR2VvVHJ1c3QgR2xvYmFsIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
- CgKCAQEA2swYYzD99BcjGlZ+W988bDjkcbd4kdS8odhM+KhDtgPpTSEHCIjaWC9m
- OSm9BXiLnTjoBbdqfnGk5sRgprDvgOSJKA+eJdbtg/OtppHHmMlCGDUUna2YRpIu
- T8rxh0PBFpVXLVDviS2Aelet8u5fa9IAjbkU+BQVNdnARqN7csiRv8lVK83Qlz6c
- JmTM386DGXHKTubU1XupGc1V3sjs0l44U+VcT4wt/lAjNvxm5suOpDkZALeVAjmR
- Cw7+OC7RHQWa9k0+bw8HHa8sHo9gOeL6NlMTOdReJivbPagUvTLrGAMoUgRx5asz
- PeE4uwc2hGKceeoWMPRfwCvocWvk+QIDAQABo4HwMIHtMB8GA1UdIwQYMBaAFEjm
- aPkr0rKV10fYIyAQTzOYkJ/UMB0GA1UdDgQWBBTAephojYn7qwVkDBF9qn1luMrM
- TjAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjA6BgNVHR8EMzAxMC+g
- LaArhilodHRwOi8vY3JsLmdlb3RydXN0LmNvbS9jcmxzL3NlY3VyZWNhLmNybDBO
- BgNVHSAERzBFMEMGBFUdIAAwOzA5BggrBgEFBQcCARYtaHR0cHM6Ly93d3cuZ2Vv
- dHJ1c3QuY29tL3Jlc291cmNlcy9yZXBvc2l0b3J5MA0GCSqGSIb3DQEBBQUAA4GB
- AHbhEm5OSxYShjAGsoEIz/AIx8dxfmbuwu3UOx//8PDITtZDOLC5MH0Y0FWDomrL
- NhGc6Ehmo21/uBPUR/6LWlxz/K7ZGzIZOKuXNBSqltLroxwUCEm2u+WR74M26x1W
- b8ravHNjkOR/ez4iyz0H7V84dJzjA1BOoa+Y7mHyhD8S
- -----END CERTIFICATE-----
- t=961712 [st=102] -SSL_CONNECT
- --> net_error = -208 (ERR_CERT_WEAK_SIGNATURE_ALGORITHM)
- t=961713 [st=103] -SOCKET_IN_USE
- t=961713 [st=103] -SOCKET_IN_USE
- t=961713 [st=103] -SOCKET_ALIVE
- {Nov/15 02:41 PM} [10536] root@andromena.local
- [0.22] /behemoth/ # c=$(printf "%s\n" "$(echo ' -----BEGIN CERTIFICATE-----
- MIIEqDCCA5CgAwIBAgIIWPdFUeU2Tn0wDQYJKoZIhvcNAQELBQAwVDELMAkGA1UE
- BhMCVVMxHjAcBgNVBAoTFUdvb2dsZSBUcnVzdCBTZXJ2aWNlczElMCMGA1UEAxMc
- R29vZ2xlIEludGVybmV0IEF1dGhvcml0eSBHMzAeFw0xNzExMDExNDI4NThaFw0x
- ODAxMjQxMzMyMDBaMGIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlh
- MRYwFAYDVQQHDA1Nb3VudGFpbiBWaWV3MRMwEQYDVQQKDApHb29nbGUgSW5jMREw
- DwYDVQQDDAhndnQzLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
- ALfss+eNnhZu3QkY+AXtqHO3zduTYnGuLZDQ9df05ZrNdU0Y9PePLZhxv+PXwZP/
- x1Efu7gBtVYDnJmy/Y0BowxGDpGGxgZHJCbrREcgUW4rAc+31w7L/FdL6IHQgL3O
- DBWQ5nd49jnxtfMPOt4Qq7R/i1UpWhTnXuf6tY1yreoR8vrd+fVv8VzvUY5MxDQH
- Nobit6JIKef0Ce+knBmcBR0FJPr2/YwX6rX96Jcbc+c61wtmQbT1eGStsMrBPDXj
- v1XRiiF8YJz51Hdi6OKiSSDHa+Bwc4f9sqBoqgVdqF5M2HEEO9mgxx76K60bU4cK
- 3s3U3Jz1dICCKyWJRmzPdpECAwEAAaOCAW4wggFqMBMGA1UdJQQMMAoGCCsGAQUF
- BwMBMEUGA1UdEQQ+MDyCCGd2dDMuY29tgg4qLmdjcC5ndnQyLmNvbYIKKi5ndnQy
- LmNvbYIKKi5ndnQzLmNvbYIIZ3Z0Mi5jb20waAYIKwYBBQUHAQEEXDBaMC0GCCsG
- AQUFBzAChiFodHRwOi8vcGtpLmdvb2cvZ3NyMi9HVFNHSUFHMy5jcnQwKQYIKwYB
- BQUHMAGGHWh0dHA6Ly9vY3NwLnBraS5nb29nL0dUU0dJQUczMB0GA1UdDgQWBBSw
- 2YrR8XbQ4T8LgpSAiSEUFrTv2TAMBgNVHRMBAf8EAjAAMB8GA1UdIwQYMBaAFHfC
- uFCaZ3Z2sS3ChtCDoH6mfrpLMCEGA1UdIAQaMBgwDAYKKwYBBAHWeQIFAzAIBgZn
- gQwBAgIwMQYDVR0fBCowKDAmoCSgIoYgaHR0cDovL2NybC5wa2kuZ29vZy9HVFNH
- SUFHMy5jcmwwDQYJKoZIhvcNAQELBQADggEBABw3tXEFH2OPI9JcZ4tdiNkF8494
- zFYBaOGOWW4GwlKZGuBuj59Ln/gqksyuCkN0bh0SYy03ZSJrtYYr9Mo8tQwb004f
- fftZwY2Pj8uzVRs3Ek91kHsMVbptxZr7QNCSnAVhggokGg1uX6urdPnL0cSu07sl
- sB80V0Xye4QnWAmiHd+E5iU+lGvjHGMSGD3FrpvbvRATvRtNTUEiTPlewjexHzs4
- MhmfozSFS18euYY3NI9zUoUe+TpMwUh5zCEfsqRrup+yQy2aUKel2et6MoMX7Bvg
- kPJ4GNBCJeOyo4AakCbi5I5ZJRFo5zd9yap4gDKWtRJAfVlPegJCauptQXo=
- -----END CERTIFICATE-----' |tr -s ' '|sed -e 's/^ //g')")
- {Nov/15 02:41 PM} [10537] root@andromena.local
- [0.16] /behemoth/ # echo -e "stdin\n$(printf "%s\n" "${c}^D")" | openssl_cert_info
- Are you going from stdin or from a file (stdin|file)?
- Paste the whole SSL cert followed by an EOF. (ctrl + d)
- Certificate:
- Data:
- Version: 3 (0x2)
- Serial Number: 6410668812625399421 (0x58f74551e5364e7d)
- Signature Algorithm: sha256WithRSAEncryption
- Issuer: C=US, O=Google Trust Services, CN=Google Internet Authority G3
- Validity
- Not Before: Nov 1 14:28:58 2017 GMT
- Not After : Jan 24 13:32:00 2018 GMT
- Subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=gvt3.com
- Subject Public Key Info:
- Public Key Algorithm: rsaEncryption
- Public-Key: (2048 bit)
- Modulus:
- 00:b7:ec:b3:e7:8d:9e:16:6e:dd:09:18:f8:05:ed:
- a8:73:b7:cd:db:93:62:71:ae:2d:90:d0:f5:d7:f4:
- e5:9a:cd:75:4d:18:f4:f7:8f:2d:98:71:bf:e3:d7:
- c1:93:ff:c7:51:1f:bb:b8:01:b5:56:03:9c:99:b2:
- fd:8d:01:a3:0c:46:0e:91:86:c6:06:47:24:26:eb:
- 44:47:20:51:6e:2b:01:cf:b7:d7:0e:cb:fc:57:4b:
- e8:81:d0:80:bd:ce:0c:15:90:e6:77:78:f6:39:f1:
- b5:f3:0f:3a:de:10:ab:b4:7f:8b:55:29:5a:14:e7:
- 5e:e7:fa:b5:8d:72:ad:ea:11:f2:fa:dd:f9:f5:6f:
- f1:5c:ef:51:8e:4c:c4:34:07:36:86:e2:b7:a2:48:
- 29:e7:f4:09:ef:a4:9c:19:9c:05:1d:05:24:fa:f6:
- fd:8c:17:ea:b5:fd:e8:97:1b:73:e7:3a:d7:0b:66:
- 41:b4:f5:78:64:ad:b0:ca:c1:3c:35:e3:bf:55:d1:
- 8a:21:7c:60:9c:f9:d4:77:62:e8:e2:a2:49:20:c7:
- 6b:e0:70:73:87:fd:b2:a0:68:aa:05:5d:a8:5e:4c:
- d8:71:04:3b:d9:a0:c7:1e:fa:2b:ad:1b:53:87:0a:
- de:cd:d4:dc:9c:f5:74:80:82:2b:25:89:46:6c:cf:
- 76:91
- Exponent: 65537 (0x10001)
- X509v3 extensions:
- X509v3 Extended Key Usage:
- TLS Web Server Authentication
- X509v3 Subject Alternative Name:
- DNS:gvt3.com, DNS:*.gcp.gvt2.com, DNS:*.gvt2.com, DNS:*.gvt3.com, DNS:gvt2.com
- Authority Information Access:
- CA Issuers - URI:http://pki.goog/gsr2/GTSGIAG3.crt
- OCSP - URI:http://ocsp.pki.goog/GTSGIAG3
- X509v3 Subject Key Identifier:
- B0:D9:8A:D1:F1:76:D0:E1:3F:0B:82:94:80:89:21:14:16:B4:EF:D9
- X509v3 Basic Constraints: critical
- CA:FALSE
- X509v3 Authority Key Identifier:
- keyid:77:C2:B8:50:9A:67:76:76:B1:2D:C2:86:D0:83:A0:7E:A6:7E:BA:4B
- X509v3 Certificate Policies:
- Policy: 1.3.6.1.4.1.11129.2.5.3
- Policy: 2.23.140.1.2.2
- X509v3 CRL Distribution Points:
- Full Name:
- URI:http://crl.pki.goog/GTSGIAG3.crl
- Signature Algorithm: sha256WithRSAEncryption
- 1c:37:b5:71:05:1f:63:8f:23:d2:5c:67:8b:5d:88:d9:05:f3:
- 8f:78:cc:56:01:68:e1:8e:59:6e:06:c2:52:99:1a:e0:6e:8f:
- 9f:4b:9f:f8:2a:92:cc:ae:0a:43:74:6e:1d:12:63:2d:37:65:
- 22:6b:b5:86:2b:f4:ca:3c:b5:0c:1b:d3:4e:1f:7d:fb:59:c1:
- 8d:8f:8f:cb:b3:55:1b:37:12:4f:75:90:7b:0c:55:ba:6d:c5:
- 9a:fb:40:d0:92:9c:05:61:82:0a:24:1a:0d:6e:5f:ab:ab:74:
- f9:cb:d1:c4:ae:d3:bb:25:b0:1f:34:57:45:f2:7b:84:27:58:
- 09:a2:1d:df:84:e6:25:3e:94:6b:e3:1c:63:12:18:3d:c5:ae:
- 9b:db:bd:10:13:bd:1b:4d:4d:41:22:4c:f9:5e:c2:37:b1:1f:
- 3b:38:32:19:9f:a3:34:85:4b:5f:1e:b9:86:37:34:8f:73:52:
- 85:1e:f9:3a:4c:c1:48:79:cc:21:1f:b2:a4:6b:ba:9f:b2:43:
- 2d:9a:50:a7:a5:d9:eb:7a:32:83:17:ec:1b:e0:90:f2:78:18:
- d0:42:25:e3:b2:a3:80:1a:90:26:e2:e4:8e:59:25:11:68:e7:
- 37:7d:c9:aa:78:80:32:96:b5:12:40:7d:59:4f:7a:02:42:6a:
- ea:6d:41:7a
- Modulus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
- {Nov/15 02:41 PM} [10538] root@andromena.local
- [0.15] /behemoth/ # export c=$(ce |tr -s ' ' |sed -e 's/^ //g')
- bash: ce: command not found
- {Nov/15 02:45 PM} [10539] root@andromena.local
- [0.51] /behemoth/ # function ce () { export ce=$1 ; printf "%s\n" "${ce}" ; }
- {Nov/15 02:46 PM} [10540] root@andromena.local
- [0.32] /behemoth/ # ce '-----BEGIN CERTIFICATE-----
- > MIIEKDCCAxCgAwIBAgIQAQAhJYiw+lmnd+8Fe2Yn3zANBgkqhkiG9w0BAQsFADBC
- > MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEbMBkGA1UEAxMS
- > R2VvVHJ1c3QgR2xvYmFsIENBMB4XDTE3MDUyMjExMzIzN1oXDTE4MTIzMTIzNTk1
- > OVowSTELMAkGA1UEBhMCVVMxEzARBgNVBAoTCkdvb2dsZSBJbmMxJTAjBgNVBAMT
- > HEdvb2dsZSBJbnRlcm5ldCBBdXRob3JpdHkgRzIwggEiMA0GCSqGSIb3DQEBAQUA
- > A4IBDwAwggEKAoIBAQCcKgR3XNhQkToGo4Lg2FBIvIk/8RlwGohGfuCPxfGJziHu
- > Wv5hDbcyRImgdAtTT1WkzoJile7rWV/G4QWAEsRelD+8W0g49FP3JOb7kekVxM/0
- > Uw30SvyfVN59vqBrb4fA0FAfKDADQNoIc1Fsf/86PKc3Bo69SxEE630k3ub5/DFx
- > +5TVYPMuSq9C0svqxGoassxT3RVLix/IGWEfzZ2oPmMrhDVpZYTIGcVGIvhTlb7j
- > gEoQxirsupcgEcc5mRAEoPBhepUljE5SdeK27QjKFPzOImqzTs9GA5eXA37Asd57
- > r0Uzz7o+cbfe9CUlwg01iZ2d+w4ReYkeN8WvjnJpAgMBAAGjggERMIIBDTAfBgNV
- > HSMEGDAWgBTAephojYn7qwVkDBF9qn1luMrMTjAdBgNVHQ4EFgQUSt0GFhu89mi1
- > dvWBtrtiGrpagS8wDgYDVR0PAQH/BAQDAgEGMC4GCCsGAQUFBwEBBCIwIDAeBggr
- > BgEFBQcwAYYSaHR0cDovL2cuc3ltY2QuY29tMBIGA1UdEwEB/wQIMAYBAf8CAQAw
- > NQYDVR0fBC4wLDAqoCigJoYkaHR0cDovL2cuc3ltY2IuY29tL2NybHMvZ3RnbG9i
- > YWwuY3JsMCEGA1UdIAQaMBgwDAYKKwYBBAHWeQIFATAIBgZngQwBAgIwHQYDVR0l
- > BBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMA0GCSqGSIb3DQEBCwUAA4IBAQDKSeWs
- > 12Rkd1u+cfrP9B4jx5ppY1Rf60zWGSgjZGaOHMeHgGRfBIsmr5jfCnC8vBk97nsz
- > qX+99AXUcLsFJnnqmseYuQcZZTTMPOk/xQH6bwx+23pwXEz+LQDwyr4tjrSogPsB
- > E4jLnD/lu3fKOmc2887VJwJyQ6C9bgLxRwVxPgFZ6RGeGvOED4Cmong1L7bHon8X
- > fOGLVq7uZ4hRJzBgpWJSwzfVO+qFKgE4h6LPcK2kesnE58rF2rwjMvL+GMJ74N87
- > L9TQEOaWTPtEtyFkDbkAlDASJodYmDkFOA/MgkgMCkdm7r+0X8T/cKjhf4t5K7hl
- > MqO5tzHpCvX2HzLc
- > -----END CERTIFICATE-----'
- -----BEGIN CERTIFICATE-----
- MIIEKDCCAxCgAwIBAgIQAQAhJYiw+lmnd+8Fe2Yn3zANBgkqhkiG9w0BAQsFADBC
- MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEbMBkGA1UEAxMS
- R2VvVHJ1c3QgR2xvYmFsIENBMB4XDTE3MDUyMjExMzIzN1oXDTE4MTIzMTIzNTk1
- OVowSTELMAkGA1UEBhMCVVMxEzARBgNVBAoTCkdvb2dsZSBJbmMxJTAjBgNVBAMT
- HEdvb2dsZSBJbnRlcm5ldCBBdXRob3JpdHkgRzIwggEiMA0GCSqGSIb3DQEBAQUA
- A4IBDwAwggEKAoIBAQCcKgR3XNhQkToGo4Lg2FBIvIk/8RlwGohGfuCPxfGJziHu
- Wv5hDbcyRImgdAtTT1WkzoJile7rWV/G4QWAEsRelD+8W0g49FP3JOb7kekVxM/0
- Uw30SvyfVN59vqBrb4fA0FAfKDADQNoIc1Fsf/86PKc3Bo69SxEE630k3ub5/DFx
- +5TVYPMuSq9C0svqxGoassxT3RVLix/IGWEfzZ2oPmMrhDVpZYTIGcVGIvhTlb7j
- gEoQxirsupcgEcc5mRAEoPBhepUljE5SdeK27QjKFPzOImqzTs9GA5eXA37Asd57
- r0Uzz7o+cbfe9CUlwg01iZ2d+w4ReYkeN8WvjnJpAgMBAAGjggERMIIBDTAfBgNV
- HSMEGDAWgBTAephojYn7qwVkDBF9qn1luMrMTjAdBgNVHQ4EFgQUSt0GFhu89mi1
- dvWBtrtiGrpagS8wDgYDVR0PAQH/BAQDAgEGMC4GCCsGAQUFBwEBBCIwIDAeBggr
- BgEFBQcwAYYSaHR0cDovL2cuc3ltY2QuY29tMBIGA1UdEwEB/wQIMAYBAf8CAQAw
- NQYDVR0fBC4wLDAqoCigJoYkaHR0cDovL2cuc3ltY2IuY29tL2NybHMvZ3RnbG9i
- YWwuY3JsMCEGA1UdIAQaMBgwDAYKKwYBBAHWeQIFATAIBgZngQwBAgIwHQYDVR0l
- BBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMA0GCSqGSIb3DQEBCwUAA4IBAQDKSeWs
- 12Rkd1u+cfrP9B4jx5ppY1Rf60zWGSgjZGaOHMeHgGRfBIsmr5jfCnC8vBk97nsz
- qX+99AXUcLsFJnnqmseYuQcZZTTMPOk/xQH6bwx+23pwXEz+LQDwyr4tjrSogPsB
- E4jLnD/lu3fKOmc2887VJwJyQ6C9bgLxRwVxPgFZ6RGeGvOED4Cmong1L7bHon8X
- fOGLVq7uZ4hRJzBgpWJSwzfVO+qFKgE4h6LPcK2kesnE58rF2rwjMvL+GMJ74N87
- L9TQEOaWTPtEtyFkDbkAlDASJodYmDkFOA/MgkgMCkdm7r+0X8T/cKjhf4t5K7hl
- MqO5tzHpCvX2HzLc
- -----END CERTIFICATE-----
- {Nov/15 02:46 PM} [10541] root@andromena.local
- [0.31] /behemoth/ # echo -e "${ce}"
- -----BEGIN CERTIFICATE-----
- MIIEKDCCAxCgAwIBAgIQAQAhJYiw+lmnd+8Fe2Yn3zANBgkqhkiG9w0BAQsFADBC
- MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEbMBkGA1UEAxMS
- R2VvVHJ1c3QgR2xvYmFsIENBMB4XDTE3MDUyMjExMzIzN1oXDTE4MTIzMTIzNTk1
- OVowSTELMAkGA1UEBhMCVVMxEzARBgNVBAoTCkdvb2dsZSBJbmMxJTAjBgNVBAMT
- HEdvb2dsZSBJbnRlcm5ldCBBdXRob3JpdHkgRzIwggEiMA0GCSqGSIb3DQEBAQUA
- A4IBDwAwggEKAoIBAQCcKgR3XNhQkToGo4Lg2FBIvIk/8RlwGohGfuCPxfGJziHu
- Wv5hDbcyRImgdAtTT1WkzoJile7rWV/G4QWAEsRelD+8W0g49FP3JOb7kekVxM/0
- Uw30SvyfVN59vqBrb4fA0FAfKDADQNoIc1Fsf/86PKc3Bo69SxEE630k3ub5/DFx
- +5TVYPMuSq9C0svqxGoassxT3RVLix/IGWEfzZ2oPmMrhDVpZYTIGcVGIvhTlb7j
- gEoQxirsupcgEcc5mRAEoPBhepUljE5SdeK27QjKFPzOImqzTs9GA5eXA37Asd57
- r0Uzz7o+cbfe9CUlwg01iZ2d+w4ReYkeN8WvjnJpAgMBAAGjggERMIIBDTAfBgNV
- HSMEGDAWgBTAephojYn7qwVkDBF9qn1luMrMTjAdBgNVHQ4EFgQUSt0GFhu89mi1
- dvWBtrtiGrpagS8wDgYDVR0PAQH/BAQDAgEGMC4GCCsGAQUFBwEBBCIwIDAeBggr
- BgEFBQcwAYYSaHR0cDovL2cuc3ltY2QuY29tMBIGA1UdEwEB/wQIMAYBAf8CAQAw
- NQYDVR0fBC4wLDAqoCigJoYkaHR0cDovL2cuc3ltY2IuY29tL2NybHMvZ3RnbG9i
- YWwuY3JsMCEGA1UdIAQaMBgwDAYKKwYBBAHWeQIFATAIBgZngQwBAgIwHQYDVR0l
- BBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMA0GCSqGSIb3DQEBCwUAA4IBAQDKSeWs
- 12Rkd1u+cfrP9B4jx5ppY1Rf60zWGSgjZGaOHMeHgGRfBIsmr5jfCnC8vBk97nsz
- qX+99AXUcLsFJnnqmseYuQcZZTTMPOk/xQH6bwx+23pwXEz+LQDwyr4tjrSogPsB
- E4jLnD/lu3fKOmc2887VJwJyQ6C9bgLxRwVxPgFZ6RGeGvOED4Cmong1L7bHon8X
- fOGLVq7uZ4hRJzBgpWJSwzfVO+qFKgE4h6LPcK2kesnE58rF2rwjMvL+GMJ74N87
- L9TQEOaWTPtEtyFkDbkAlDASJodYmDkFOA/MgkgMCkdm7r+0X8T/cKjhf4t5K7hl
- MqO5tzHpCvX2HzLc
- -----END CERTIFICATE-----
- {Nov/15 02:46 PM} [10542] root@andromena.local
- [0.47] /behemoth/ # function ce () { if [[ -z $ce ]] ; then export ce=$1 ;fi; printf "%s\n" "${ce}" ; }
- {Nov/15 02:48 PM} [10543] root@andromena.local
- [0.33] /behemoth/ # export c=$(ce |tr -s ' ' |sed -e 's/^ //g')
- {Nov/15 02:48 PM} [10544] root@andromena.local
- [0.28] /behemoth/ # echo -e "stdin\n$(printf "%s\n" "${c}^D")" | openssl_cert_info
- Are you going from stdin or from a file (stdin|file)?
- Paste the whole SSL cert followed by an EOF. (ctrl + d)
- Certificate:
- Data:
- Version: 3 (0x2)
- Serial Number:
- 01:00:21:25:88:b0:fa:59:a7:77:ef:05:7b:66:27:df
- Signature Algorithm: sha256WithRSAEncryption
- Issuer: C=US, O=GeoTrust Inc., CN=GeoTrust Global CA
- Validity
- Not Before: May 22 11:32:37 2017 GMT
- Not After : Dec 31 23:59:59 2018 GMT
- Subject: C=US, O=Google Inc, CN=Google Internet Authority G2
- Subject Public Key Info:
- Public Key Algorithm: rsaEncryption
- Public-Key: (2048 bit)
- Modulus:
- 00:9c:2a:04:77:5c:d8:50:91:3a:06:a3:82:e0:d8:
- 50:48:bc:89:3f:f1:19:70:1a:88:46:7e:e0:8f:c5:
- f1:89:ce:21:ee:5a:fe:61:0d:b7:32:44:89:a0:74:
- 0b:53:4f:55:a4:ce:82:62:95:ee:eb:59:5f:c6:e1:
- 05:80:12:c4:5e:94:3f:bc:5b:48:38:f4:53:f7:24:
- e6:fb:91:e9:15:c4:cf:f4:53:0d:f4:4a:fc:9f:54:
- de:7d:be:a0:6b:6f:87:c0:d0:50:1f:28:30:03:40:
- da:08:73:51:6c:7f:ff:3a:3c:a7:37:06:8e:bd:4b:
- 11:04:eb:7d:24:de:e6:f9:fc:31:71:fb:94:d5:60:
- f3:2e:4a:af:42:d2:cb:ea:c4:6a:1a:b2:cc:53:dd:
- 15:4b:8b:1f:c8:19:61:1f:cd:9d:a8:3e:63:2b:84:
- 35:69:65:84:c8:19:c5:46:22:f8:53:95:be:e3:80:
- 4a:10:c6:2a:ec:ba:97:20:11:c7:39:99:10:04:a0:
- f0:61:7a:95:25:8c:4e:52:75:e2:b6:ed:08:ca:14:
- fc:ce:22:6a:b3:4e:cf:46:03:97:97:03:7e:c0:b1:
- de:7b:af:45:33:cf:ba:3e:71:b7:de:f4:25:25:c2:
- 0d:35:89:9d:9d:fb:0e:11:79:89:1e:37:c5:af:8e:
- 72:69
- Exponent: 65537 (0x10001)
- X509v3 extensions:
- X509v3 Authority Key Identifier:
- keyid:C0:7A:98:68:8D:89:FB:AB:05:64:0C:11:7D:AA:7D:65:B8:CA:CC:4E
- X509v3 Subject Key Identifier:
- 4A:DD:06:16:1B:BC:F6:68:B5:76:F5:81:B6:BB:62:1A:BA:5A:81:2F
- X509v3 Key Usage: critical
- Certificate Sign, CRL Sign
- Authority Information Access:
- OCSP - URI:http://g.symcd.com
- X509v3 Basic Constraints: critical
- CA:TRUE, pathlen:0
- X509v3 CRL Distribution Points:
- Full Name:
- URI:http://g.symcb.com/crls/gtglobal.crl
- X509v3 Certificate Policies:
- Policy: 1.3.6.1.4.1.11129.2.5.1
- Policy: 2.23.140.1.2.2
- X509v3 Extended Key Usage:
- TLS Web Server Authentication, TLS Web Client Authentication
- Signature Algorithm: sha256WithRSAEncryption
- ca:49:e5:ac:d7:64:64:77:5b:be:71:fa:cf:f4:1e:23:c7:9a:
- 69:63:54:5f:eb:4c:d6:19:28:23:64:66:8e:1c:c7:87:80:64:
- 5f:04:8b:26:af:98:df:0a:70:bc:bc:19:3d:ee:7b:33:a9:7f:
- bd:f4:05:d4:70:bb:05:26:79:ea:9a:c7:98:b9:07:19:65:34:
- cc:3c:e9:3f:c5:01:fa:6f:0c:7e:db:7a:70:5c:4c:fe:2d:00:
- f0:ca:be:2d:8e:b4:a8:80:fb:01:13:88:cb:9c:3f:e5:bb:77:
- ca:3a:67:36:f3:ce:d5:27:02:72:43:a0:bd:6e:02:f1:47:05:
- 71:3e:01:59:e9:11:9e:1a:f3:84:0f:80:a6:a2:78:35:2f:b6:
- c7:a2:7f:17:7c:e1:8b:56:ae:ee:67:88:51:27:30:60:a5:62:
- 52:c3:37:d5:3b:ea:85:2a:01:38:87:a2:cf:70:ad:a4:7a:c9:
- c4:e7:ca:c5:da:bc:23:32:f2:fe:18:c2:7b:e0:df:3b:2f:d4:
- d0:10:e6:96:4c:fb:44:b7:21:64:0d:b9:00:94:30:12:26:87:
- 58:98:39:05:38:0f:cc:82:48:0c:0a:47:66:ee:bf:b4:5f:c4:
- ff:70:a8:e1:7f:8b:79:2b:b8:65:32:a3:b9:b7:31:e9:0a:f5:
- f6:1f:32:dc
- Modulus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
- {Nov/15 02:48 PM} [10545] root@andromena.local
- [0.19] /behemoth/ # ce=' -----BEGIN CERTIFICATE-----
- > MIIDfTCCAuagAwIBAgIDErvmMA0GCSqGSIb3DQEBBQUAME4xCzAJBgNVBAYTAlVT
- > MRAwDgYDVQQKEwdFcXVpZmF4MS0wKwYDVQQLEyRFcXVpZmF4IFNlY3VyZSBDZXJ0
- > aWZpY2F0ZSBBdXRob3JpdHkwHhcNMDIwNTIxMDQwMDAwWhcNMTgwODIxMDQwMDAw
- > WjBCMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEbMBkGA1UE
- > AxMSR2VvVHJ1c3QgR2xvYmFsIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
- > CgKCAQEA2swYYzD99BcjGlZ+W988bDjkcbd4kdS8odhM+KhDtgPpTSEHCIjaWC9m
- > OSm9BXiLnTjoBbdqfnGk5sRgprDvgOSJKA+eJdbtg/OtppHHmMlCGDUUna2YRpIu
- > T8rxh0PBFpVXLVDviS2Aelet8u5fa9IAjbkU+BQVNdnARqN7csiRv8lVK83Qlz6c
- > JmTM386DGXHKTubU1XupGc1V3sjs0l44U+VcT4wt/lAjNvxm5suOpDkZALeVAjmR
- > Cw7+OC7RHQWa9k0+bw8HHa8sHo9gOeL6NlMTOdReJivbPagUvTLrGAMoUgRx5asz
- > PeE4uwc2hGKceeoWMPRfwCvocWvk+QIDAQABo4HwMIHtMB8GA1UdIwQYMBaAFEjm
- > aPkr0rKV10fYIyAQTzOYkJ/UMB0GA1UdDgQWBBTAephojYn7qwVkDBF9qn1luMrM
- > TjAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjA6BgNVHR8EMzAxMC+g
- > LaArhilodHRwOi8vY3JsLmdlb3RydXN0LmNvbS9jcmxzL3NlY3VyZWNhLmNybDBO
- > BgNVHSAERzBFMEMGBFUdIAAwOzA5BggrBgEFBQcCARYtaHR0cHM6Ly93d3cuZ2Vv
- > dHJ1c3QuY29tL3Jlc291cmNlcy9yZXBvc2l0b3J5MA0GCSqGSIb3DQEBBQUAA4GB
- > AHbhEm5OSxYShjAGsoEIz/AIx8dxfmbuwu3UOx//8PDITtZDOLC5MH0Y0FWDomrL
- > NhGc6Ehmo21/uBPUR/6LWlxz/K7ZGzIZOKuXNBSqltLroxwUCEm2u+WR74M26x1W
- > b8ravHNjkOR/ez4iyz0H7V84dJzjA1BOoa+Y7mHyhD8S
- > -----END CERTIFICATE-----'
- {Nov/15 02:49 PM} [10546] root@andromena.local
- [0.41] /behemoth/ # export c=$(ce |tr -s ' ' |sed -e 's/^ //g')
- {Nov/15 02:49 PM} [10547] root@andromena.local
- [0.38] /behemoth/ # echo -e "stdin\n$(printf "%s\n" "${c}^D")" | openssl_cert_info
- Are you going from stdin or from a file (stdin|file)?
- Paste the whole SSL cert followed by an EOF. (ctrl + d)
- Certificate:
- Data:
- Version: 3 (0x2)
- Serial Number: 1227750 (0x12bbe6)
- Signature Algorithm: sha1WithRSAEncryption
- Issuer: C=US, O=Equifax, OU=Equifax Secure Certificate Authority
- Validity
- Not Before: May 21 04:00:00 2002 GMT
- Not After : Aug 21 04:00:00 2018 GMT
- Subject: C=US, O=GeoTrust Inc., CN=GeoTrust Global CA
- Subject Public Key Info:
- Public Key Algorithm: rsaEncryption
- Public-Key: (2048 bit)
- Modulus:
- 00:da:cc:18:63:30:fd:f4:17:23:1a:56:7e:5b:df:
- 3c:6c:38:e4:71:b7:78:91:d4:bc:a1:d8:4c:f8:a8:
- 43:b6:03:e9:4d:21:07:08:88:da:58:2f:66:39:29:
- bd:05:78:8b:9d:38:e8:05:b7:6a:7e:71:a4:e6:c4:
- 60:a6:b0:ef:80:e4:89:28:0f:9e:25:d6:ed:83:f3:
- ad:a6:91:c7:98:c9:42:18:35:14:9d:ad:98:46:92:
- 2e:4f:ca:f1:87:43:c1:16:95:57:2d:50:ef:89:2d:
- 80:7a:57:ad:f2:ee:5f:6b:d2:00:8d:b9:14:f8:14:
- 15:35:d9:c0:46:a3:7b:72:c8:91:bf:c9:55:2b:cd:
- d0:97:3e:9c:26:64:cc:df:ce:83:19:71:ca:4e:e6:
- d4:d5:7b:a9:19:cd:55:de:c8:ec:d2:5e:38:53:e5:
- 5c:4f:8c:2d:fe:50:23:36:fc:66:e6:cb:8e:a4:39:
- 19:00:b7:95:02:39:91:0b:0e:fe:38:2e:d1:1d:05:
- 9a:f6:4d:3e:6f:0f:07:1d:af:2c:1e:8f:60:39:e2:
- fa:36:53:13:39:d4:5e:26:2b:db:3d:a8:14:bd:32:
- eb:18:03:28:52:04:71:e5:ab:33:3d:e1:38:bb:07:
- 36:84:62:9c:79:ea:16:30:f4:5f:c0:2b:e8:71:6b:
- e4:f9
- Exponent: 65537 (0x10001)
- X509v3 extensions:
- X509v3 Authority Key Identifier:
- keyid:48:E6:68:F9:2B:D2:B2:95:D7:47:D8:23:20:10:4F:33:98:90:9F:D4
- X509v3 Subject Key Identifier:
- C0:7A:98:68:8D:89:FB:AB:05:64:0C:11:7D:AA:7D:65:B8:CA:CC:4E
- X509v3 Basic Constraints: critical
- CA:TRUE
- X509v3 Key Usage: critical
- Certificate Sign, CRL Sign
- X509v3 CRL Distribution Points:
- Full Name:
- URI:http://crl.geotrust.com/crls/secureca.crl
- X509v3 Certificate Policies:
- Policy: X509v3 Any Policy
- CPS: https://www.geotrust.com/resources/repository
- Signature Algorithm: sha1WithRSAEncryption
- 76:e1:12:6e:4e:4b:16:12:86:30:06:b2:81:08:cf:f0:08:c7:
- c7:71:7e:66:ee:c2:ed:d4:3b:1f:ff:f0:f0:c8:4e:d6:43:38:
- b0:b9:30:7d:18:d0:55:83:a2:6a:cb:36:11:9c:e8:48:66:a3:
- 6d:7f:b8:13:d4:47:fe:8b:5a:5c:73:fc:ae:d9:1b:32:19:38:
- ab:97:34:14:aa:96:d2:eb:a3:1c:14:08:49:b6:bb:e5:91:ef:
- 83:36:eb:1d:56:6f:ca:da:bc:73:63:90:e4:7f:7b:3e:22:cb:
- 3d:07:ed:5f:38:74:9c:e3:03:50:4e:a1:af:98:ee:61:f2:84:
- 3f:12
- Modulus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
- {Nov/15 02:49 PM} [10548] root@andromena.local
- [0.35] /behemoth/ # ^C
- {Nov/15 02:50 PM} [10548] root@andromena.local
- [0.33] /behemoth/ # type ssl_key_verifier
- ssl_key_verifier is a function
- ssl_key_verifier ()
- {
- printf 'Are you going from stdin or from a file (stdin|file)?\n';
- read -e QUESTION;
- case $QUESTION in
- stdin)
- printf 'Paste the entire certificate followed by an EOF ( ctrl + d ).\n';
- CERT=`cat - | hexdump -C |\grep '|' | cut -d" " -f2-19 | sed -e 's/^.//g' -e 's/[0-9,a-f][0-9,a-f]/\\\\x&/g' -e 's/ //g' | sed -e ":a" -e "$ s/\n//gp;N;b a" | head -1`;
- openssl x509 -noout -modulus -in <(printf "${CERT}") | openssl md5 && printf 'Paste the entire keyfile followed by an EOF (ctrl + d) \n';
- KEY=`cat - | hexdump -C |\grep '|' | cut -d" " -f2-19 | sed -e 's/^.//g' -e 's/[0-9,a-f][0-9,a-f]/\\\\x&/g' -e 's/ //g' | sed -e ":a" -e "$ s/\n//gp;N;b a" | head -1`;
- openssl rsa -noout -modulus -in <(printf "${KEY}") | openssl md5
- ;;
- file)
- printf 'Enter the path to the certificate\n';
- read -e CERT;
- openssl x509 -noout -modulus -in $CERT | openssl md5 && printf 'Enter the path to the keyfile\n';
- read -e KEY;
- openssl rsa -noout -modulus -in $KEY | openssl md5
- ;;
- esac
- }
- {Nov/15 02:50 PM} [10549] root@andromena.local
- [0.18] /behemoth/ # echo -e "stdin\n$(printf "%s\n" "${c}^D")" | ssl_key_verifier
- Are you going from stdin or from a file (stdin|file)?
- Paste the entire certificate followed by an EOF ( ctrl + d ).
- (stdin)= 9336db7115be1c8a0c557cb8f312233b
- Paste the entire keyfile followed by an EOF (ctrl + d)
- unable to load Private Key
- 3961948284560:error:0906D06C:PEM routines:PEM_read_bio:no start line:pem_lib.c:707:Expecting: ANY PRIVATE KEY
- (stdin)= d41d8cd98f00b204e9800998ecf8427e
- {Nov/15 02:51 PM} [10550] root@andromena.local
- [0.16] /behemoth/ # ^C
- {Nov/15 02:51 PM} [10550] root@andromena.local
- [0.14] /behemoth/ # locate *.pem ^C
- {Nov/15 02:51 PM} [10550] root@andromena.local
- [0.17] /behemoth/ # echo -e "stdin\n$(printf "%s\n" "${c}^D")" | file -s -
- /dev/stdin: data
- {Nov/15 02:52 PM} [10551] root@andromena.local
- [0.19] /behemoth/ # echo -e "$(printf "%s\n" "${c}")" | file -s -
- /dev/stdin: PEM certificate
- {Nov/15 02:52 PM} [10552] root@andromena.local
- [0.31] /behemoth/ # find /etc/ssl/ -type f -exec file -s {} \; | while read motherfuck ; do if [[ $motherfuck =~ PEM.cert ]] ; then export fuckingcert=$(echo $motherfuck | awk -F: '{print $1}') ; if [[ $(openssl x509 -noout -modulus -in $fuckingcert | openssl md5 |& grep -i 9336db7115be1c8a0c557cb8f312233b) ]] ; then echo found the fucking cert at $fuckingcert ; fi ; fi ; done
- unable to load certificate
- 3606424716944:error:0906D06C:PEM routines:PEM_read_bio:no start line:pem_lib.c:707:Expecting: TRUSTED CERTIFICATE
- {Nov/15 02:57 PM} [10553] root@andromena.local
- [0.41] /behemoth/ # find /etc/ssl/ -type f -exec file -s {} \; | while read motherfuck ; do if [[ $motherfuck =~ PEM.cert ]] ; then export fuckingcert=$(echo $motherfuck | awk -F: '{print $1}') ; if [[ $(openssl x509 -noout -modulus -in $fuckingcert |& openssl md5 |& grep -i 9336db7115be1c8a0c557cb8f312233b) ]] ; then echo found the fucking cert at $fuckingcert ; fi ; fi ; done
- {Nov/15 03:00 PM} [10557] root@andromena.local
- [0.52] /behemoth/ # find /etc/ssl/ -type f -exec file -s {} \; | while read motherfuck ; do if [[ $motherfuck =~ PEM.cert ]] ; then export fuckingcert=$(echo $motherfuck | awk -F: '{print $1}') ; echo $fuckingcert; if [[ $(openssl x509 -noout -modulus -in $fuckingcert |& openssl md5 |& grep -i 9336db7115be1c8a0c557cb8f312233b) ]] ; then echo found the fucking cert at $fuckingcert ; fi ; fi ; done
- /etc/ssl/certs/ca-certificates.crt
- /etc/ssl/certs/*.05d3d9ca1ab34a0181263f2f5a4dc461.plex.direct
- /etc/ssl/certs/*.05d3d9ca1ab34a0181263f2f5a4dc461.plex.direct.pem
- /etc/ssl/apache2/server.crt
- /etc/ssl/apache2/server.csr
- {Nov/15 03:02 PM} [10560] root@andromena.local
- [0.65] /behemoth/ # stdbuf -i0 -o0 locate .pem | while read certpath ; do stdbuf -i0 -o0 file -s ${certpath} 2>/dev/null ; done | while read motherfuck ; do if [[ $motherfuck =~ PEM.cert ]] ; then export fuckingcert=$(echo $motherfuck | awk -F: '{print $1}') ; if [[ $(openssl x509 -noout -modulus -in $fuckingcert |& openssl md5 |& grep -i 9336db7115be1c8a0c557cb8f312233b) ]] ; then echo found the fucking cert at $fuckingcert ; fi ; fi ; done
- found the fucking cert at /lost+found/1718377_382489/bundler/ssl_certs/GeoTrust_Global_CA.pem
- found the fucking cert at /opt/metasploit-4.4.0/ruby/lib/ruby/gems/1.9.1/gems/bundler-1.3.5/lib/bundler/ssl_certs/GeoTrust_Global_CA.pem
- found the fucking cert at /opt/metasploit-4.4.0/ruby/lib/ruby/site_ruby/1.9.1/rubygems/ssl_certs/GeoTrust_Global_CA.pem
- found the fucking cert at /usr/lib64/ruby/site_ruby/1.9.1/rubygems/ssl_certs/GeoTrustGlobalCA.pem
- found the fucking cert at /usr/lib64/ruby/site_ruby/2.1.0/rubygems/ssl_certs/GeoTrustGlobalCA.pem
- found the fucking cert at /usr/local/lib64/ruby/gems/1.9.1/gems/bundler-1.10.6/lib/bundler/ssl_certs/GeoTrustGlobalCA.pem
- found the fucking cert at /usr/local/lib64/ruby/gems/1.9.1/gems/bundler-1.7.6/lib/bundler/ssl_certs/GeoTrustGlobalCA.pem
- found the fucking cert at /usr/local/lib64/ruby/gems/1.9.1/gems/rubygems-update-2.4.8/lib/rubygems/ssl_certs/GeoTrustGlobalCA.pem
- {Nov/15 03:03 PM} [10561] root@andromena.local
- [1.05] /behemoth/ #
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement