Advertisement
Guest User

Anonymous JTSEC Anonymous vicieux world ology

a guest
Oct 27th, 2017
1,377
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 67.10 KB | None | 0 0
  1. ######################################################################################################################################
  2. Hostname anonvicieux.wordpress.com ISP Automattic, Inc (AS2635)
  3. Continent North America Flag
  4. US
  5. Country United States Country Code US (USA)
  6. Region CA Local time 27 Oct 2017 21:22 PDT
  7. Metropolis* San Francisco-Oakland-San Jose Postal Code 94110
  8. City San Francisco Latitude 37.748
  9. IP Address 192.0.78.12 Longitude -122.416
  10. #######################################################################################################################################
  11. IP information 192.0.78.12
  12.  
  13. IP address 192.0.78.12
  14. Location San Francisco, California, United States (US) flag
  15. Registry arin
  16. Network information
  17.  
  18. IP address 192.0.78.12
  19. Reverse DNS (PTR record) not available
  20. DNS server (NS record) ns2.automattic.com (198.181.117.5)
  21. ns3.automattic.com (192.0.74.5)
  22. ns1.automattic.com (198.181.116.5)
  23. ASN number 2635
  24. ASN name (ISP) Automattic, Inc
  25. IP-range/subnet 192.0.78.0/24
  26. 192.0.78.0 - 192.0.78.255
  27. Network tools
  28. Ping 192.0.78.12
  29. Tracert 192.0.78.12
  30. Hosting information
  31.  
  32. Summary of domains, mail servers and name servers currently hosted on this IP address.
  33.  
  34. Number of domains hosted 1,757
  35. Number of mail servers hosted 74
  36. Number of name servers hosted 103
  37. Hosting history
  38.  
  39. Summary of domains, mail servers and name servers hosted in the past on this IP address.
  40.  
  41. Number of domains hosted 1,695
  42. Number of mail servers hosted 174
  43. Number of name servers hosted 136
  44. SPAM database lookup
  45.  
  46. DROP/EDROP list Spamhaus not listed good
  47. dnsbl-1.uceprotect.net not listed good
  48. Number of SPAM hosts on 192.0.78.0/24 0
  49. SPAM tools
  50. DNSBL 192.0.78.12
  51. Blocklist lookup
  52.  
  53. Adult hosting
  54. At least one domain hosted on this IP address is marked as containing adult content. more info listed error
  55. Hackers, Spyware, Botnets etc. listed error
  56. Open proxy not listed good
  57. Open TCP/UDP ports
  58.  
  59. Status well known TCP and UDP ports. Note: we do not perform any port scan but use data of the ZMap project.
  60.  
  61. Description Protocol/Port Status
  62. HTTP tcp80 Closed closed port
  63. HTTPS tcp443 Closed closed port
  64. DNS udp53 Closed closed port
  65. Network Time Protocol (NTP) udp123 Closed closed port
  66. NetBIOS Name Service udp137 Closed closed port
  67. Session Initiation Protocol (SIP) udp5060 Closed closed port
  68. Advertisements
  69. HideMyAss.com
  70. Domains on 192.0.78.12
  71.  
  72. Domain Tools
  73. pricingidiot.com
  74. Whois+
  75. acruw.com
  76. Whois+
  77. atscaleconference.com
  78. Whois+
  79. edspencer.net
  80. Whois+
  81. wmfa.org
  82. Whois+
  83. kdtriglav.com
  84. Whois+
  85. alphion.com
  86. Whois+
  87. feathercast.org
  88. Whois+
  89. golfweek.com
  90. Whois+
  91. columbia-adaircounty.com
  92. Whois+
  93. Reverse IP for 192.0.78.12
  94. Domains around 192.0.78.12
  95.  
  96. IP address #domains
  97. 192.0.78.2 2
  98. 192.0.78.8 1
  99. 192.0.78.9 54
  100. 192.0.78.12 1757
  101. 192.0.78.13 1633
  102. 192.0.78.14 3
  103. 192.0.78.16 6
  104. 192.0.78.17 56
  105. 192.0.78.22 1
  106. 192.0.78.24 1133156
  107. external websiteSee more items
  108. Mail servers on 192.0.78.12
  109.  
  110. Overview of mail servers hosted on this IP address. You can use the Reverse MX tool to find domains using a mail server. Use the MX History tool to find domains using a mail server in the past.
  111.  
  112. Mail server Tools
  113. advancetrain.net
  114. Reverse MX
  115. MX History
  116. viktoriajean.wordpress.com
  117. Reverse MX
  118. MX History
  119. mail.gouriekablo.de
  120. Reverse MX
  121. MX History
  122. adamchatman.wordpress.com
  123. Reverse MX
  124. MX History
  125. ceppug.wordpress.com
  126. Reverse MX
  127. MX History
  128. mail.wordpress.com
  129. Reverse MX
  130. MX History
  131. mx01.wordpress.com
  132. Reverse MX
  133. MX History
  134. mxns1.wordpress.com
  135. Reverse MX
  136. MX History
  137. mxns2.wordpress.com
  138. Reverse MX
  139. MX History
  140. grethebyrise.wordpress.com
  141. Reverse MX
  142. MX History
  143. Note: maximum of 10 mail servers are shown.
  144. Tip: You can use the MX Neighbors tool with IP input to view all domains using this IP address as mail server.
  145. Reverse MX for 192.0.78.12
  146. Name servers on 192.0.78.12
  147.  
  148. Overview of name servers hosted on this IP address. You can use the NS Neighbors tool to find domains using a name server.
  149.  
  150. Name server Tools
  151. ns2.icemanmedia.com
  152. Reverse NS
  153. ns.1.wordpress.com
  154. Reverse NS
  155. ns1.icemanmedia.com
  156. Reverse NS
  157. ns.dns3.wordpress.com
  158. Reverse NS
  159. peka.borlangeroddklubb.wordpress.com
  160. Reverse NS
  161. traveltechnews.wordpress.com
  162. Reverse NS
  163. abdya.wordpress.com
  164. Reverse NS
  165. julietrell.wordpress.com
  166. Reverse NS
  167. dinudey.wordpress.com
  168. Reverse NS
  169. janitaskapsalon.wordpress.com
  170. Reverse NS
  171. Note: maximum of 10 name servers are shown.
  172. Tip: You can use the NS Neighbors tool with IP input to view all domains using this IP address as name server.
  173. Reverse NS for 192.0.78.12
  174. Whois information
  175.  
  176. #
  177. # ARIN WHOIS data and services are subject to the Terms of Use
  178. # available at: https://www.arin.net/whois_tou.html
  179. #
  180. # If you see inaccuracies in the results, please report at
  181. # https://www.arin.net/public/whoisinaccuracy/index.xhtml
  182. #
  183.  
  184.  
  185. #
  186. # The following results may also be obtained via:
  187. # https://whois.arin.net/rest/nets;q=192.0.76.3?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2
  188. #
  189.  
  190. NetRange: 192.0.64.0 - 192.0.127.255
  191. CIDR: 192.0.64.0/18
  192. NetName: AUTOMATTIC
  193. NetHandle: NET-192-0-64-0-1
  194. Parent: NET192 (NET-192-0-0-0-0)
  195. NetType: Direct Assignment
  196. OriginAS: AS2635
  197. Organization: Automattic, Inc (AUTOM-93)
  198. RegDate: 2012-11-20
  199. Updated: 2012-11-20
  200. Ref: https://whois.arin.net/rest/net/NET-192-0-64-0-1
  201.  
  202.  
  203. OrgName: Automattic, Inc
  204. OrgId: AUTOM-93
  205. Address: 60 29th Street #343
  206. City: San Francisco
  207. StateProv: CA
  208. PostalCode: 94110
  209. Country: US
  210. RegDate: 2011-10-05
  211. Updated: 2013-11-01
  212. Ref: https://whois.arin.net/rest/org/AUTOM-93
  213.  
  214.  
  215. OrgTechHandle: NOC12276-ARIN
  216. OrgTechName: NOC
  217. OrgTechPhone: +1-877-273-8550
  218. OrgTechEmail: ipadmin@automattic.com
  219. OrgTechRef: https://whois.arin.net/rest/poc/NOC12276-ARIN
  220.  
  221. OrgNOCHandle: NOC12276-ARIN
  222. OrgNOCName: NOC
  223. OrgNOCPhone: +1-877-273-8550
  224. OrgNOCEmail: ipadmin@automattic.com
  225. OrgNOCRef: https://whois.arin.net/rest/poc/NOC12276-ARIN
  226.  
  227. OrgAbuseHandle: ABUSE3970-ARIN
  228. OrgAbuseName: Abuse
  229. OrgAbusePhone: +1-877-273-8550
  230. OrgAbuseEmail: abuse@automattic.com
  231. OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE3970-ARIN
  232.  
  233.  
  234. #
  235. # ARIN WHOIS data and services are subject to the Terms of Use
  236. # available at: https://www.arin.net/whois_tou.html
  237. #
  238. # If you see inaccuracies in the results, please report at
  239. # https://www.arin.net/public/whoisinaccuracy/index.xhtml
  240. #
  241. Geo information
  242.  
  243. Location San Francisco, California, United States (US) flag
  244. Latitude and Longitude 37.75, -122.42
  245. Geo location of IP address
  246. Country information (United States)
  247.  
  248. Capital Washington
  249. Continent NA
  250. Population 310,232,863
  251. Area 9,629,091 km²
  252. Currency USD
  253. Top Level Domain .us
  254. Geo location of IP address
  255. Update information
  256.  
  257. The information on this page is collected from many different sources on the internet. Below is the last update date given from each source.
  258.  
  259. AS number information 2017-10-22
  260. Port scan data Cached, max 2 weeks old
  261. PTR record and DNS servers Cached, max 1 week old
  262. SPAM and blocklist databases 2017-10-28
  263. Whois information 2017-10-06
  264. https://anonvicieux.wordpress.com/
  265. [i] Scanning Site: https://anonvicieux.wordpress.com
  266.  
  267.  
  268.  
  269. B A S I C I N F O
  270. ====================
  271.  
  272.  
  273. [+] Site Title: Vicieux – Les abus de la $cientologie c'est mal m'voyez ?
  274. [+] IP address: 192.0.78.12
  275. [+] Web Server: nginx
  276. [+] CMS: WordPress
  277. [+] Cloudflare: Not Detected
  278. [+] Robots File: Found
  279.  
  280. -------------[ contents ]----------------
  281. # If you are regularly crawling WordPress.com sites, please use our firehose to receive real-time push updates instead.
  282. # Please see https://developer.wordpress.com/docs/firehose/ for more details.
  283.  
  284. Sitemap: https://anonvicieux.wordpress.com/sitemap.xml
  285. Sitemap: https://anonvicieux.wordpress.com/news-sitemap.xml
  286.  
  287. User-agent: *
  288. Disallow: /wp-admin/
  289. Allow: /wp-admin/admin-ajax.php
  290. Disallow: /wp-login.php
  291. Disallow: /activate/ # har har
  292. Disallow: /cgi-bin/ # MT refugees
  293. Disallow: /mshots/v1/
  294. Disallow: /next/
  295. Disallow: /public.api/
  296.  
  297. User-agent: IRLbot
  298. Crawl-delay: 3600
  299.  
  300. # This file was generated on Tue, 17 Oct 2017 08:00:30 +0000
  301.  
  302. -----------[end of contents]-------------
  303.  
  304.  
  305.  
  306. W H O I S L O O K U P
  307. ========================
  308.  
  309. No match for "ANONVICIEUX.WORDPRESS.COM".
  310. >>> Last update of whois database: 2017-10-28T02:36:57Z <<<
  311.  
  312.  
  313.  
  314. The Registry database contains ONLY .COM, .NET, .EDU domains and
  315. Registrars.
  316.  
  317.  
  318.  
  319.  
  320. G E O I P L O O K U P
  321. =========================
  322.  
  323. [i] IP Address: 192.0.78.12
  324. [i] Country: US
  325. [i] State: California
  326. [i] City: San Francisco
  327. [i] Latitude: 37.748402
  328. [i] Longitude: -122.415604
  329.  
  330.  
  331.  
  332.  
  333. H T T P H E A D E R S
  334. =======================
  335.  
  336.  
  337. [i] HTTP/1.1 200 OK
  338. [i] Server: nginx
  339. [i] Date: Sat, 28 Oct 2017 02:37:19 GMT
  340. [i] Content-Type: text/html; charset=UTF-8
  341. [i] Connection: close
  342. [i] Vary: Accept-Encoding
  343. [i] Last-Modified: Sat, 28 Oct 2017 02:36:45 GMT
  344. [i] Cache-Control: max-age=266, must-revalidate
  345. [i] X-nananana: Batcache
  346. [i] Vary: Cookie
  347. [i] X-hacker: If you're reading this, you should visit automattic.com/jobs and apply to join the fun, mention this header.
  348. [i] Link: <https://wp.me/3KkAN>; rel=shortlink
  349. [i] X-ac: 1.ams _dfw
  350. [i] Strict-Transport-Security: max-age=15552000
  351.  
  352.  
  353.  
  354.  
  355. D N S L O O K U P
  356. ===================
  357.  
  358. anonvicieux.wordpress.com. 14387 IN CNAME lb.wordpress.com.
  359.  
  360.  
  361.  
  362.  
  363. S U B N E T C A L C U L A T I O N
  364. ====================================
  365.  
  366. Address = 192.0.78.13
  367. Network = 192.0.78.13 / 32
  368. Netmask = 255.255.255.255
  369. Broadcast = not needed on Point-to-Point links
  370. Wildcard Mask = 0.0.0.0
  371. Hosts Bits = 0
  372. Max. Hosts = 1 (2^0 - 0)
  373. Host Range = { 192.0.78.13 - 192.0.78.13 }
  374.  
  375.  
  376.  
  377. N M A P P O R T S C A N
  378. ============================
  379.  
  380.  
  381. Starting Nmap 7.01 ( https://nmap.org ) at 2017-10-28 02:37 UTC
  382. Nmap scan report for anonvicieux.wordpress.com (192.0.78.13)
  383. Host is up (0.0020s latency).
  384. Other addresses for anonvicieux.wordpress.com (not scanned): 192.0.78.12
  385. PORT STATE SERVICE VERSION
  386. 21/tcp filtered ftp
  387. 22/tcp filtered ssh
  388. 23/tcp filtered telnet
  389. 25/tcp filtered smtp
  390. 80/tcp open http nginx
  391. 110/tcp filtered pop3
  392. 143/tcp filtered imap
  393. 443/tcp open ssl/http nginx
  394. 445/tcp filtered microsoft-ds
  395. 3389/tcp filtered ms-wbt-server
  396.  
  397. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  398. Nmap done: 1 IP address (1 host up) scanned in 11.91 seconds
  399. [92m + -- ----------------------------=[Running Nslookup]=------------------------ -- +
  400. Server: 192.168.1.254
  401. Address: 192.168.1.254#53
  402.  
  403. Non-authoritative answer:
  404. anonvicieux.wordpress.com canonical name = lb.wordpress.com.
  405. Name: lb.wordpress.com
  406. Address: 192.0.78.13
  407. Name: lb.wordpress.com
  408. Address: 192.0.78.12
  409.  
  410. anonvicieux.wordpress.com is an alias for lb.wordpress.com.
  411. lb.wordpress.com has address 192.0.78.12
  412. lb.wordpress.com has address 192.0.78.13
  413.  + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
  414.  
  415. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  416.  
  417. [+] Target is anonvicieux.wordpress.com
  418. [+] Loading modules.
  419. [+] Following modules are loaded:
  420. [x] [1] ping:icmp_ping - ICMP echo discovery module
  421. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  422. [x] [3] ping:udp_ping - UDP-based ping discovery module
  423. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  424. [x] [5] infogather:portscan - TCP and UDP PortScanner
  425. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  426. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  427. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  428. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  429. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  430. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  431. [x] [12] fingerprint:smb - SMB fingerprinting module
  432. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  433. [+] 13 modules registered
  434. [+] Initializing scan engine
  435. [+] Running scan engine
  436. [-] ping:tcp_ping module: no closed/open TCP ports known on 192.0.78.13. Module test failed
  437. [-] ping:udp_ping module: no closed/open UDP ports known on 192.0.78.13. Module test failed
  438. [-] No distance calculation. 192.0.78.13 appears to be dead or no ports known
  439. [+] Host: 192.0.78.13 is up (Guess probability: 50%)
  440. [+] Target: 192.0.78.13 is alive. Round-Trip Time: 0.51114 sec
  441. [+] Selected safe Round-Trip Time value is: 1.02228 sec
  442. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  443. [-] fingerprint:smb need either TCP port 139 or 445 to run
  444. [+] Primary guess:
  445. [+] Host 192.0.78.13 Running OS: pÎxuV (Guess probability: 100%)
  446. [+] Other guesses:
  447. [+] Host 192.0.78.13 Running OS: pÎxuV (Guess probability: 100%)
  448. [+] Host 192.0.78.13 Running OS: pÎxuV (Guess probability: 100%)
  449. [+] Host 192.0.78.13 Running OS: pÎxuV (Guess probability: 100%)
  450. [+] Host 192.0.78.13 Running OS: pÎxuV (Guess probability: 100%)
  451. [+] Host 192.0.78.13 Running OS: pÎxuV (Guess probability: 100%)
  452. [+] Host 192.0.78.13 Running OS: pÎxuV (Guess probability: 100%)
  453. [+] Host 192.0.78.13 Running OS: pÎxuV (Guess probability: 100%)
  454. [+] Host 192.0.78.13 Running OS: pÎxuV (Guess probability: 100%)
  455. [+] Host 192.0.78.13 Running OS: pÎxuV (Guess probability: 100%)
  456. [+] Cleaning up scan engine
  457. [+] Modules deinitialized
  458. [+] Execution completed.
  459.  + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
  460. No match for "ANONVICIEUX.WORDPRESS.COM".
  461. >>> Last update of whois database: 2017-10-28T02:38:13Z <<<
  462.  
  463. NOTICE: The expiration date displayed in this record is the date the
  464. registrar's sponsorship of the domain name registration in the registry is
  465. currently set to expire. This date does not necessarily reflect the expiration
  466. date of the domain name registrant's agreement with the sponsoring
  467. registrar. Users may consult the sponsoring registrar's Whois database to
  468. view the registrar's reported date of expiration for this registration.
  469.  
  470. TERMS OF USE: You are not authorized to access or query our Whois
  471. database through the use of electronic processes that are high-volume and
  472. automated except as reasonably necessary to register domain names or
  473. modify existing registrations; the Data in VeriSign Global Registry
  474. Services' ("VeriSign") Whois database is provided by VeriSign for
  475. information purposes only, and to assist persons in obtaining information
  476. about or related to a domain name registration record. VeriSign does not
  477. guarantee its accuracy. By submitting a Whois query, you agree to abide
  478. by the following terms of use: You agree that you may use this Data only
  479. for lawful purposes and that under no circumstances will you use this Data
  480. to: (1) allow, enable, or otherwise support the transmission of mass
  481. unsolicited, commercial advertising or solicitations via e-mail, telephone,
  482. or facsimile; or (2) enable high volume, automated, electronic processes
  483. that apply to VeriSign (or its computer systems). The compilation,
  484. repackaging, dissemination or other use of this Data is expressly
  485. prohibited without the prior written consent of VeriSign. You agree not to
  486. use electronic processes that are automated and high-volume to access or
  487. query the Whois database except as reasonably necessary to register
  488. domain names or modify existing registrations. VeriSign reserves the right
  489. to restrict your access to the Whois database in its sole discretion to ensure
  490. operational stability. VeriSign may restrict or terminate your access to the
  491. Whois database for failure to abide by these terms of use. VeriSign
  492. reserves the right to modify these terms at any time.
  493.  
  494. The Registry database contains ONLY .COM, .NET, .EDU domains and
  495. Registrars.
  496.  + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
  497.  
  498. *******************************************************************
  499. * *
  500. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  501. * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  502. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  503. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  504. * *
  505. * TheHarvester Ver. 2.7 *
  506. * Coded by Christian Martorella *
  507. * Edge-Security Research *
  508. * cmartorella@edge-security.com *
  509. *******************************************************************
  510.  
  511.  
  512. [-] Searching in Bing:
  513. Searching 50 results...
  514. Searching 100 results...
  515.  
  516.  
  517. [+] Emails found:
  518. ------------------
  519. No emails found
  520.  
  521. [+] Hosts found in search engines:
  522. ------------------------------------
  523. No hosts found
  524.  + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
  525.  
  526. ; <<>> DiG 9.10.3-P4-Debian <<>> -x anonvicieux.wordpress.com
  527. ;; global options: +cmd
  528. ;; Got answer:
  529. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65371
  530. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  531.  
  532. ;; OPT PSEUDOSECTION:
  533. ; EDNS: version: 0, flags:; udp: 4096
  534. ;; QUESTION SECTION:
  535. ;com.wordpress.anonvicieux.in-addr.arpa. IN PTR
  536.  
  537. ;; AUTHORITY SECTION:
  538. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017102403 1800 900 604800 3600
  539.  
  540. ;; Query time: 37 msec
  541. ;; SERVER: 192.168.1.254#53(192.168.1.254)
  542. ;; WHEN: Fri Oct 27 22:38:50 EDT 2017
  543. ;; MSG SIZE rcvd: 135
  544.  
  545. dnsenum VERSION:1.2.4
  546. 
  547. ----- anonvicieux.wordpress.com -----
  548. 
  549.  
  550. Host's addresses:
  551. __________________
  552.  
  553. lb.wordpress.com. 166 IN A 192.0.78.13
  554. lb.wordpress.com. 166 IN A 192.0.78.12
  555. 
  556.  
  557. Wildcard detection using: gjhrxeyuzvdg
  558. _______________________________________
  559.  
  560. gjhrxeyuzvdg.anonvicieux.wordpress.com. 14400 IN CNAME lb.wordpress.com.
  561. lb.wordpress.com. 166 IN A 192.0.78.12
  562. lb.wordpress.com. 166 IN A 192.0.78.13
  563. 
  564.  
  565. !!!!!!!!!!!!!!!!!!!!!!!!!!!!
  566.  
  567. Wildcards detected, all subdomains will point to the same IP address
  568. Omitting results containing 192.0.78.12, 192.0.78.13.
  569. Maybe you are using OpenDNS servers.
  570.  
  571. !!!!!!!!!!!!!!!!!!!!!!!!!!!!
  572. 
  573.  
  574. Name Servers:
  575. ______________
  576.  
  577.  + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
  578. 
  579. ____ _ _ _ _ _____
  580. / ___| _ _| |__ | (_)___| |_|___ / _ __
  581. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  582. ___) | |_| | |_) | | \__ \ |_ ___) | |
  583. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  584.  
  585. # Coded By Ahmed Aboul-Ela - @aboul3la
  586.  
  587. [-] Enumerating subdomains now for anonvicieux.wordpress.com
  588. [-] verbosity is enabled, will show the subdomains results in realtime
  589. [-] Searching now in Baidu..
  590. [-] Searching now in Yahoo..
  591. [-] Searching now in Google..
  592. [-] Searching now in Bing..
  593. [-] Searching now in Ask..
  594. [-] Searching now in Netcraft..
  595. [-] Searching now in DNSdumpster..
  596. [-] Searching now in Virustotal..
  597. [-] Searching now in ThreatCrowd..
  598. [-] Searching now in SSL Certificates..
  599. [-] Searching now in PassiveDNS..
  600.  
  601.  ╔═╗╩═╗╔╩╗╔═╗╩ ╩
  602.  ║ ╠╩╝ ║ ╚═╗╠═╣
  603.  ╚═╝╩╚═ ╩o╚═╝╩ ╩
  604.  + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
  605. 
  606.  [+] Domains saved to: /usr/share/sniper/loot/domains/domains-anonvicieux.wordpress.com-full.txt
  607. 
  608.  + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
  609.  + -- ----------------------------=[Checking Email Security]=----------------- -- +
  610.  
  611.  + -- ----------------------------=[Pinging host]=---------------------------- -- +
  612. PING lb.wordpress.com (192.0.78.13) 56(84) bytes of data.
  613. 64 bytes from 192.0.78.13 (192.0.78.13): icmp_seq=1 ttl=58 time=117 ms
  614.  
  615. --- lb.wordpress.com ping statistics ---
  616. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  617. rtt min/avg/max/mdev = 117.865/117.865/117.865/0.000 ms
  618.  
  619.  + -- ----------------------------=[Running TCP port scan]=------------------- -- +
  620.  
  621. Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-27 22:39 EDT
  622. Nmap scan report for anonvicieux.wordpress.com (192.0.78.12)
  623. Host is up (0.12s latency).
  624. Other addresses for anonvicieux.wordpress.com (not scanned): 192.0.78.13
  625. Not shown: 47 filtered ports
  626. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  627. PORT STATE SERVICE
  628. 80/tcp open http
  629. 443/tcp open https
  630.  
  631. Nmap done: 1 IP address (1 host up) scanned in 4.64 seconds
  632.  
  633.  + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
  634.  + -- --=[Port 21 closed... skipping.
  635.  + -- --=[Port 22 closed... skipping.
  636.  + -- --=[Port 23 closed... skipping.
  637.  + -- --=[Port 25 closed... skipping.
  638.  + -- --=[Port 53 closed... skipping.
  639.  + -- --=[Port 79 closed... skipping.
  640.  + -- --=[Port 80 opened... running tests...
  641.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  642.  
  643. ^ ^
  644. _ __ _ ____ _ __ _ _ ____
  645. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  646. | V V // o // _/ | V V // 0 // 0 // _/
  647. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  648. <
  649. ...'
  650.  
  651. WAFW00F - Web Application Firewall Detection Tool
  652.  
  653. By Sandro Gauci && Wendel G. Henrique
  654.  
  655. Checking http://anonvicieux.wordpress.com
  656. Generic Detection results:
  657. No WAF detected by the generic detection
  658. Number of requests: 13
  659.  
  660.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  661. http://anonvicieux.wordpress.com [301 Moved Permanently] Country[UNITED STATES][US], HTTPServer[nginx], IP[192.0.78.12], RedirectLocation[https://anonvicieux.wordpress.com/], Title[301 Moved Permanently], UncommonHeaders[x-ac], nginx
  662. https://anonvicieux.wordpress.com/ [200 OK] Country[UNITED STATES][US], Frame, Google-Analytics[UA-52447-2], HTML5, HTTPServer[nginx], IP[192.0.78.12], JQuery, MetaGenerator[WordPress.com], Open-Graph-Protocol[website][249643311490], OpenID, OpenSearch[https://anonvicieux.wordpress.com/osd.xml,https://s1.wp.com/opensearch.xml], Script[text/javascript], Strict-Transport-Security[max-age=15552000], Title[Vicieux &#8211; Les abus de la $cientologie c&#039;est mal m&#039;voyez ?], UncommonHeaders[x-nananana,x-hacker,link,x-ac], WordPress, YouTube, nginx, x-hacker[If you're reading this, you should visit automattic.com/jobs and apply to join the fun, mention this header.]
  663.  
  664.  __ ______ _____ 
  665.  \ \/ / ___|_ _|
  666.  \ /\___ \ | | 
  667.  / \ ___) || | 
  668.  /_/\_|____/ |_| 
  669.  
  670. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  671. + -- --=[Target: anonvicieux.wordpress.com:80
  672. + -- --=[Site not vulnerable to Cross-Site Tracing!
  673. + -- --=[Site not vulnerable to Host Header Injection!
  674. + -- --=[Site vulnerable to Cross-Frame Scripting!
  675. + -- --=[Site vulnerable to Clickjacking!
  676.  
  677. HTTP/1.1 405 Not Allowed
  678. Server: nginx
  679. Date: Sat, 28 Oct 2017 02:39:35 GMT
  680. Content-Type: text/html
  681. Content-Length: 166
  682. Connection: close
  683. X-ac: 1.ams
  684.  
  685. <html>
  686. <head><title>405 Not Allowed</title></head>
  687. <body bgcolor="white">
  688. <center><h1>405 Not Allowed</h1></center>
  689. <hr><center>nginx</center>
  690. </body>
  691. </html>
  692. 
  693. HTTP/1.1 301 Moved Permanently
  694. Server: nginx
  695. Date: Sat, 28 Oct 2017 02:39:36 GMT
  696. Content-Type: text/html
  697. Content-Length: 178
  698. Connection: keep-alive
  699. Location: https://anonvicieux.wordpress.com/
  700. X-ac: 1.ams _dfw
  701.  
  702. <html>
  703. <head><title>301 Moved Permanently</title></head>
  704. <body bgcolor="white">
  705. <center><h1>301 Moved Permanently</h1></center>
  706. <hr><center>nginx</center>
  707. </body>
  708. </html>
  709. 
  710.  
  711.  
  712.  
  713.  + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
  714. + -- --=[Checking if X-Content options are enabled on anonvicieux.wordpress.com... 
  715.  
  716. + -- --=[Checking if X-Frame options are enabled on anonvicieux.wordpress.com... 
  717.  
  718. + -- --=[Checking if X-XSS-Protection header is enabled on anonvicieux.wordpress.com... 
  719.  
  720. + -- --=[Checking HTTP methods on anonvicieux.wordpress.com... 
  721.  
  722. + -- --=[Checking if TRACE method is enabled on anonvicieux.wordpress.com... 
  723.  
  724. + -- --=[Checking for META tags on anonvicieux.wordpress.com... 
  725.  
  726. + -- --=[Checking for open proxy on anonvicieux.wordpress.com... 
  727.  
  728. + -- --=[Enumerating software on anonvicieux.wordpress.com... 
  729. Server: nginx
  730.  
  731. + -- --=[Checking if Strict-Transport-Security is enabled on anonvicieux.wordpress.com... 
  732.  
  733. + -- --=[Checking for Flash cross-domain policy on anonvicieux.wordpress.com... 
  734. <html>
  735. <head><title>301 Moved Permanently</title></head>
  736. <body bgcolor="white">
  737. <center><h1>301 Moved Permanently</h1></center>
  738. <hr><center>nginx</center>
  739. </body>
  740. </html>
  741.  
  742. + -- --=[Checking for Silverlight cross-domain policy on anonvicieux.wordpress.com... 
  743. <html>
  744. <head><title>301 Moved Permanently</title></head>
  745. <body bgcolor="white">
  746. <center><h1>301 Moved Permanently</h1></center>
  747. <hr><center>nginx</center>
  748. </body>
  749. </html>
  750.  
  751. + -- --=[Checking for HTML5 cross-origin resource sharing on anonvicieux.wordpress.com... 
  752.  
  753. + -- --=[Retrieving robots.txt on anonvicieux.wordpress.com... 
  754. <html>
  755. <head><title>301 Moved Permanently</title></head>
  756. <body bgcolor="white">
  757. <center><h1>301 Moved Permanently</h1></center>
  758. <hr><center>nginx</center>
  759. </body>
  760. </html>
  761.  
  762. + -- --=[Retrieving sitemap.xml on anonvicieux.wordpress.com... 
  763. <html>
  764. <head><title>301 Moved Permanently</title></head>
  765. <body bgcolor="white">
  766. <center><h1>301 Moved Permanently</h1></center>
  767. <hr><center>nginx</center>
  768. </body>
  769. </html>
  770.  
  771. + -- --=[Checking cookie attributes on anonvicieux.wordpress.com... 
  772.  
  773. + -- --=[Checking for ASP.NET Detailed Errors on anonvicieux.wordpress.com... 
  774. <body class="error404 custom-background mp6 customizer-styles-applied highlander-enabled highlander-light">
  775. <article id="post-0" class="post error404 not-found">
  776. </article><!-- #post-0 .post .error404 .not-found -->
  777.  
  778. 
  779.  + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
  780. - Nikto v2.1.6
  781. ---------------------------------------------------------------------------
  782. + Target IP: 192.0.78.13
  783. + Target Hostname: anonvicieux.wordpress.com
  784. + Target Port: 80
  785. + Start Time: 2017-10-27 22:39:48 (GMT-4)
  786. ---------------------------------------------------------------------------
  787. + Server: nginx
  788. + The anti-clickjacking X-Frame-Options header is not present.
  789. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  790. + Uncommon header 'x-ac' found, with contents: 1.ams _dfw
  791. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  792. + Root page / redirects to: https://anonvicieux.wordpress.com/
  793. + No CGI Directories found (use '-C all' to force check all possible dirs)
  794. + Server leaks inodes via ETags, header found with file /, fields: 0x57d0c722 0x4d1
  795. + 7499 requests: 0 error(s) and 5 item(s) reported on remote host
  796. + End Time: 2017-10-27 23:14:26 (GMT-4) (2078 seconds)
  797. ---------------------------------------------------------------------------
  798. + 1 host(s) tested
  799.  + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
  800. [+] Screenshot saved to /usr/share/sniper/loot/screenshots/anonvicieux.wordpress.com-port80.jpg
  801.  + -- ----------------------------=[Running Google Hacking Queries]=--------------------- -- +
  802.  + -- ----------------------------=[Running InUrlBR OSINT Queries]=---------- -- +
  803.  
  804.  _____  .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
  805.  (_____) 01 01N. C 01 C 01 .01. 01  01 Yb 01 .01.
  806.  (() ()) 01 C YCb C 01 C 01 ,C9 01  01 dP 01 ,C9
  807.  \ /  01 C .CN. C 01 C 0101dC9 01  01'''bg. 0101dC9
  808.  \ /  01 C .01.C 01 C 01 YC. 01 ,  01 .Y 01 YC.
  809.  /=\  01 C Y01 YC. ,C 01 .Cb. 01 ,C  01 ,9 01 .Cb.
  810.  [___]  .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
  811.  
  812. __[ ! ] Neither war between hackers, nor peace for the system.
  813. __[ ! ] http://blog.inurl.com.br
  814. __[ ! ] http://fb.com/InurlBrasil
  815. __[ ! ] http://twitter.com/@googleinurl
  816. __[ ! ] http://github.com/googleinurl
  817. __[ ! ] Current PHP version::[ 7.0.22-3 ]
  818. __[ ! ] Current script owner::[ root ]
  819. __[ ! ] Current uname::[ Linux Kali 4.13.0-kali1-amd64 #1 SMP Debian 4.13.4-2kali1 (2017-10-16) x86_64 ]
  820. __[ ! ] Current pwd::[ /usr/share/sniper ]
  821. __[ ! ] Help: php inurlbr.php --help
  822. ------------------------------------------------------------------------------------------------------------------------
  823.  
  824. [ ! ] Starting SCANNER INURLBR 2.1 at [27-10-2017 23:16:34]
  825. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  826. It is the end user's responsibility to obey all applicable local, state and federal laws.
  827. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  828.  
  829. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-anonvicieux.wordpress.com.txt ]
  830. [ INFO ][ DORK ]::[ site:anonvicieux.wordpress.com ]
  831. [ INFO ][ SEARCHING ]:: {
  832. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.cc ]
  833.  
  834. [ INFO ][ SEARCHING ]:: 
  835. -[:::]
  836. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  837.  
  838. [ INFO ][ SEARCHING ]:: 
  839. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  840. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.et ID: 006748068166572874491:55ez0c3j3ey ]
  841.  
  842. [ INFO ][ SEARCHING ]:: 
  843. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  844.  
  845. [ INFO ][ TOTAL FOUND VALUES ]:: [ 0 ]
  846. [ INFO ] Not a satisfactory result was found!
  847.  
  848.  
  849. [ INFO ] [ Shutting down ]
  850. [ INFO ] [ End of process INURLBR at [27-10-2017 23:16:44]
  851. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  852. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-anonvicieux.wordpress.com.txt ]
  853. |_________________________________________________________________________________________
  854.  
  855. \_________________________________________________________________________________________/
  856.  
  857.  + -- --=[Port 110 closed... skipping.
  858.  + -- --=[Port 111 closed... skipping.
  859.  + -- --=[Port 135 closed... skipping.
  860.  + -- --=[Port 139 closed... skipping.
  861.  + -- --=[Port 161 closed... skipping.
  862.  + -- --=[Port 162 closed... skipping.
  863.  + -- --=[Port 389 closed... skipping.
  864.  + -- --=[Port 443 opened... running tests...
  865.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  866.  
  867. ^ ^
  868. _ __ _ ____ _ __ _ _ ____
  869. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  870. | V V // o // _/ | V V // 0 // 0 // _/
  871. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  872. <
  873. ...'
  874.  
  875. WAFW00F - Web Application Firewall Detection Tool
  876.  
  877. By Sandro Gauci && Wendel G. Henrique
  878.  
  879. Checking https://anonvicieux.wordpress.com
  880.  
  881.  + -- ----------------------------=[Checking Cloudflare]=--------------------- -- +
  882. ____ _ _ _____ _ _
  883. / ___| | ___ _ _ __| | ___|_ _(_) |
  884. | | | |/ _ \| | | |/ _` | |_ / _` | | |
  885. | |___| | (_) | |_| | (_| | _| (_| | | |
  886. \____|_|\___/ \__,_|\__,_|_| \__,_|_|_|
  887. v1.0.1 by m0rtem
  888.  
  889.  
  890. [23:16:59] Initializing CloudFail - the date is: 27/10/2017
  891. [23:16:59] Fetching initial information from: anonvicieux.wordpress.com...
  892. [23:16:59] Server IP: 192.0.78.12
  893. [23:16:59] Testing if anonvicieux.wordpress.com is on the Cloudflare network...
  894. [23:16:59] anonvicieux.wordpress.com is not part of the Cloudflare network, quitting...
  895.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  896. https://anonvicieux.wordpress.com [200 OK] Country[UNITED STATES][US], Frame, Google-Analytics[UA-52447-2], HTML5, HTTPServer[nginx], IP[192.0.78.13], JQuery, MetaGenerator[WordPress.com], Open-Graph-Protocol[website][249643311490], OpenID, OpenSearch[https://anonvicieux.wordpress.com/osd.xml,https://s1.wp.com/opensearch.xml], Script[text/javascript], Strict-Transport-Security[max-age=15552000], Title[Vicieux &#8211; Les abus de la $cientologie c&#039;est mal m&#039;voyez ?], UncommonHeaders[x-nananana,x-hacker,link,x-ac], WordPress, YouTube, nginx, x-hacker[If you're reading this, you should visit automattic.com/jobs and apply to join the fun, mention this header.]
  897.  
  898.  + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
  899.  
  900.  
  901.  
  902. AVAILABLE PLUGINS
  903. -----------------
  904.  
  905. PluginChromeSha1Deprecation
  906. PluginOpenSSLCipherSuites
  907. PluginSessionRenegotiation
  908. PluginHSTS
  909. PluginHeartbleed
  910. PluginCompression
  911. PluginCertInfo
  912. PluginSessionResumption
  913.  
  914.  
  915.  
  916. CHECKING HOST(S) AVAILABILITY
  917. -----------------------------
  918.  
  919. anonvicieux.wordpress.com => WARNING: Could not connect (timeout); discarding corresponding tasks.
  920.  
  921.  
  922.  
  923. SCAN COMPLETED IN 10.06 S
  924. -------------------------
  925. Version: 1.11.10-static
  926. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  927. 
  928. Testing SSL server anonvicieux.wordpress.com on port 443 using SNI name anonvicieux.wordpress.com
  929.  
  930. TLS Fallback SCSV:
  931. Server does not support TLS Fallback SCSV
  932.  
  933. TLS renegotiation:
  934. Session renegotiation not supported
  935.  
  936. TLS Compression:
  937. Compression disabled
  938.  
  939. Heartbleed:
  940. TLS 1.2 not vulnerable to heartbleed
  941. TLS 1.1 not vulnerable to heartbleed
  942. TLS 1.0 not vulnerable to heartbleed
  943.  
  944. Supported Server Cipher(s):
  945. Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256  Curve P-256 DHE 256
  946. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384  Curve P-256 DHE 256
  947. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  948. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  949. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  950. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  951. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  952. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  953. Accepted TLSv1.2 128 bits AES128-SHA256
  954. Accepted TLSv1.2 128 bits AES128-SHA
  955. Accepted TLSv1.2 256 bits AES256-SHA256
  956. Accepted TLSv1.2 256 bits AES256-SHA
  957. Accepted TLSv1.2 112 bits DES-CBC3-SHA 
  958. Accepted TLSv1.2 256 bits CAMELLIA256-SHA
  959. Accepted TLSv1.2 128 bits CAMELLIA128-SHA
  960. Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  961. Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  962. Accepted TLSv1.1 128 bits AES128-SHA
  963. Accepted TLSv1.1 256 bits AES256-SHA
  964. Accepted TLSv1.1 112 bits DES-CBC3-SHA 
  965. Accepted TLSv1.1 256 bits CAMELLIA256-SHA
  966. Accepted TLSv1.1 128 bits CAMELLIA128-SHA
  967. Preferred TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  968. Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  969. Accepted TLSv1.0 128 bits AES128-SHA
  970. Accepted TLSv1.0 256 bits AES256-SHA
  971. Accepted TLSv1.0 112 bits DES-CBC3-SHA 
  972. Accepted TLSv1.0 256 bits CAMELLIA256-SHA
  973. Accepted TLSv1.0 128 bits CAMELLIA128-SHA
  974.  
  975. SSL Certificate:
  976. Signature Algorithm: sha256WithRSAEncryption
  977. RSA Key Strength: 2048
  978.  
  979. Subject: *.wordpress.com
  980. Altnames: DNS:*.wordpress.com, DNS:wordpress.com
  981. Issuer: Go Daddy Secure Certificate Authority - G2
  982.  
  983. Not valid before: Sep 6 16:52:41 2015 GMT
  984. Not valid after: Oct 14 11:29:26 2018 GMT
  985. 
  986. ###########################################################
  987. testssl 2.9dev from https://testssl.sh/dev/
  988. 
  989. This program is free software. Distribution and
  990. modification under GPLv2 permitted.
  991. USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
  992.  
  993. Please file bugs @ https://testssl.sh/bugs/
  994. 
  995. ###########################################################
  996.  
  997. Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
  998. on Kali:/usr/share/sniper/plugins/testssl.sh/bin/openssl.Linux.x86_64
  999. (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64")
  1000.  
  1001.  
  1002. Testing all IPv4 addresses (port 443): 192.0.78.13 192.0.78.12
  1003. -----------------------------------------------------
  1004.  Start 2017-10-27 23:18:54 -->> 192.0.78.13:443 (anonvicieux.wordpress.com) <<--
  1005.  
  1006. further IP addresses: 192.0.78.12
  1007. rDNS (192.0.78.13): --
  1008. Service detected: HTTP
  1009.  
  1010.  
  1011.  Testing protocols via sockets except SPDY+HTTP2 
  1012.  
  1013.  SSLv2 not offered (OK)
  1014.  SSLv3 not offered (OK)
  1015.  TLS 1 offered
  1016.  TLS 1.1 offered
  1017.  TLS 1.2 offered (OK)
  1018.  SPDY/NPN h2, http/1.1 (advertised)
  1019.  HTTP2/ALPN h2, http/1.1 (offered)
  1020.  
  1021.  Testing ~standard cipher categories 
  1022.  
  1023.  NULL ciphers (no encryption) not offered (OK)
  1024.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  1025.  Export ciphers (w/o ADH+NULL) not offered (OK)
  1026.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  1027.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
  1028.  Triple DES Ciphers (Medium) offered
  1029.  High encryption (AES+Camellia, no AEAD) offered (OK)
  1030.  Strong encryption (AEAD ciphers) offered (OK)
  1031.  
  1032.  
  1033.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  1034.  
  1035.  PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384
  1036. ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA
  1037. ECDHE-RSA-AES128-GCM-SHA256
  1038. ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA
  1039.  Elliptic curves offered: sect283k1 sect283r1 sect409k1 sect409r1 sect571k1
  1040. sect571r1 secp256k1 prime256v1 secp384r1
  1041. secp521r1 brainpoolP256r1 brainpoolP384r1
  1042. brainpoolP512r1
  1043.  
  1044.  
  1045.  Testing server preferences 
  1046.  
  1047.  Has server cipher order? yes (OK)
  1048.  Negotiated protocol TLSv1.2
  1049.  Negotiated cipher ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1050.  Cipher order
  1051. TLSv1: ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA AES128-SHA AES256-SHA
  1052. DES-CBC3-SHA CAMELLIA256-SHA CAMELLIA128-SHA
  1053. TLSv1.1: ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA AES128-SHA AES256-SHA
  1054. DES-CBC3-SHA CAMELLIA256-SHA CAMELLIA128-SHA
  1055. TLSv1.2: ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384
  1056. ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA
  1057. ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA AES128-GCM-SHA256
  1058. AES256-GCM-SHA384 AES128-SHA256 AES128-SHA AES256-SHA256
  1059. AES256-SHA DES-CBC3-SHA CAMELLIA256-SHA CAMELLIA128-SHA
  1060.  
  1061.  
  1062.  Testing server defaults (Server Hello) 
  1063.  
  1064.  TLS extensions (standard) "server name/#0" "renegotiation info/#65281"
  1065. "EC point formats/#11" "session ticket/#35"
  1066. "status request/#5" "heartbeat/#15"
  1067. "next protocol/#13172"
  1068. "application layer protocol negotiation/#16"
  1069.  Session Ticket RFC 5077 hint 21600 seconds, session tickets keys seems to be rotated < daily
  1070.  SSL Session ID support yes
  1071.  Session Resumption Tickets: yes, ID: yes
  1072.  TLS clock skew Random values, no fingerprinting possible
  1073.  Signature Algorithm SHA256 with RSA
  1074.  Server key size RSA 2048 bits
  1075.  Fingerprint / Serial SHA1 54E089DF28538300105DD43764FDE7D0F5ED5BC0 / 01FBBD00172D9F64
  1076. SHA256 E52189F9148266E011534D0392D8050D6D9317F089699C10FB59EB62278A8199
  1077.  Common Name (CN) *.wordpress.com
  1078.  subjectAltName (SAN) *.wordpress.com wordpress.com 
  1079.  Issuer Go Daddy Secure Certificate Authority - G2 (GoDaddy.com, Inc. from US)
  1080.  Trust (hostname) Ok via SAN wildcard and CN wildcard (same w/o SNI)
  1081.  Chain of trust Ok 
  1082.  EV cert (experimental) no
  1083.  Certificate Expiration 351 >= 60 days (2015-09-06 12:52 --> 2018-10-14 07:29 -0400)
  1084.  # of certificates provided 3
  1085.  Certificate Revocation List http://crl.godaddy.com/gdig2s1-119.crl
  1086.  OCSP URI http://ocsp.godaddy.com/
  1087.  OCSP stapling offered
  1088.  OCSP must staple no
  1089.  DNS CAA RR (experimental) --
  1090.  Certificate Transparency no
  1091.  
  1092.  
  1093.  Testing HTTP header response @ "/" 
  1094.  
  1095.  HTTP Status Code  200 OK
  1096.  HTTP clock skew +1 (± 1.5) sec from localtime
  1097.  Strict Transport Security 180 days=15552000 s, just this domain
  1098.  Public Key Pinning --
  1099.  Server banner nginx
  1100.  Application banner --
  1101.  Cookie(s) (none issued at "/")
  1102.  Security headers --
  1103.  Reverse Proxy banner --
  1104.  
  1105.  
  1106.  Testing vulnerabilities 
  1107.  
  1108.  Heartbleed (CVE-2014-0160) not vulnerable (OK)
  1109.  CCS (CVE-2014-0224) not vulnerable (OK)
  1110.  Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK)
  1111.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  1112.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  1113.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
  1114.  BREACH (CVE-2013-3587) potentially NOT ok, uses gzip HTTP compression. - only supplied "/" tested
  1115. Can be ignored for static pages or if no secrets in the page
  1116.  POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
  1117.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
  1118.  SWEET32 (CVE-2016-2183, CVE-2016-6329) VULNERABLE, uses 64 bit block ciphers
  1119.  FREAK (CVE-2015-0204) not vulnerable (OK)
  1120.  DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
  1121. make sure you don't use this certificate elsewhere with SSLv2 enabled services
  1122. https://censys.io/ipv4?q=E52189F9148266E011534D0392D8050D6D9317F089699C10FB59EB62278A8199 could help you to find out
  1123.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  1124.  BEAST (CVE-2011-3389) TLS1: ECDHE-RSA-AES128-SHA
  1125. ECDHE-RSA-AES256-SHA
  1126. AES128-SHA AES256-SHA
  1127. DES-CBC3-SHA CAMELLIA256-SHA
  1128. CAMELLIA128-SHA 
  1129. VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
  1130.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  1131.  RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
  1132.  
  1133.  
  1134.  Testing 364 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  1135.  
  1136. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  1137. -----------------------------------------------------------------------------------------------------------------------------
  1138. xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  1139. xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  1140. xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  1141. x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
  1142. x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
  1143. x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
  1144. x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
  1145. xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  1146. xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
  1147. xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  1148. x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
  1149. x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
  1150. x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
  1151. x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
  1152. x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA
  1153.  
  1154.  
  1155.  Running client simulations via sockets 
  1156.  
  1157. Android 2.3.7 TLSv1.0 AES128-SHA
  1158. Android 4.1.1 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1159. Android 4.3 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1160. Android 4.4.2 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1161. Android 5.0.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1162. Android 6.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1163. Android 7.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1164. Chrome 51 Win 7 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1165. Chrome 57 Win 7 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1166. Firefox 49 Win 7 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1167. Firefox 53 Win 7 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1168. IE 6 XP No connection
  1169. IE 7 Vista TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1170. IE 8 XP TLSv1.0 DES-CBC3-SHA
  1171. IE 8 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1172. IE 11 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  1173. IE 11 Win 8.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  1174. IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  1175. IE 11 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1176. Edge 13 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1177. Edge 13 Win Phone 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1178. Opera 17 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  1179. Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1180. Safari 7 iOS 7.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  1181. Safari 9 OS X 10.11 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1182. Safari 10 OS X 10.12 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1183. Apple ATS 9 iOS 9 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1184. Tor 17.0.9 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1185. Java 6u45 TLSv1.0 AES128-SHA
  1186. Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1187. Java 8u31 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1188. OpenSSL 1.0.1l TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1189. OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1190.  
  1191.  Done 2017-10-27 23:23:22 [ 270s] -->> 192.0.78.13:443 (anonvicieux.wordpress.com) <<--
  1192.  
  1193. -----------------------------------------------------
  1194.  Start 2017-10-27 23:23:22 -->> 192.0.78.12:443 (anonvicieux.wordpress.com) <<--
  1195.  
  1196. further IP addresses: 192.0.78.13
  1197. rDNS (192.0.78.12): --
  1198. Service detected: HTTP
  1199.  
  1200.  
  1201.  Testing protocols via sockets except SPDY+HTTP2 
  1202.  
  1203.  SSLv2 not offered (OK)
  1204.  SSLv3 not offered (OK)
  1205.  TLS 1 offered
  1206.  TLS 1.1 offered
  1207.  TLS 1.2 offered (OK)
  1208.  SPDY/NPN h2, http/1.1 (advertised)
  1209.  HTTP2/ALPN h2, http/1.1 (offered)
  1210.  
  1211.  Testing ~standard cipher categories 
  1212.  
  1213.  NULL ciphers (no encryption) not offered (OK)
  1214.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  1215.  Export ciphers (w/o ADH+NULL) not offered (OK)
  1216.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  1217.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
  1218.  Triple DES Ciphers (Medium) offered
  1219.  High encryption (AES+Camellia, no AEAD) offered (OK)
  1220.  Strong encryption (AEAD ciphers) offered (OK)
  1221.  
  1222.  
  1223.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  1224.  
  1225.  PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384
  1226. ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA
  1227. ECDHE-RSA-AES128-GCM-SHA256
  1228. ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA
  1229.  Elliptic curves offered: sect283k1 sect283r1 sect409k1 sect409r1 sect571k1
  1230. sect571r1 secp256k1 prime256v1 secp384r1
  1231. secp521r1 brainpoolP256r1 brainpoolP384r1
  1232. brainpoolP512r1
  1233.  
  1234.  
  1235.  Testing server preferences 
  1236.  
  1237.  Has server cipher order? yes (OK)
  1238.  Negotiated protocol TLSv1.2
  1239.  Negotiated cipher ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1240.  Cipher order
  1241. TLSv1: ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA AES128-SHA AES256-SHA
  1242. DES-CBC3-SHA CAMELLIA256-SHA CAMELLIA128-SHA
  1243. TLSv1.1: ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA AES128-SHA AES256-SHA
  1244. DES-CBC3-SHA CAMELLIA256-SHA CAMELLIA128-SHA
  1245. TLSv1.2: ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384
  1246. ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA
  1247. ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA AES128-GCM-SHA256
  1248. AES256-GCM-SHA384 AES128-SHA256 AES128-SHA AES256-SHA256
  1249. AES256-SHA DES-CBC3-SHA CAMELLIA256-SHA CAMELLIA128-SHA
  1250.  
  1251.  
  1252.  Testing server defaults (Server Hello) 
  1253.  
  1254.  TLS extensions (standard) "server name/#0" "renegotiation info/#65281"
  1255. "EC point formats/#11" "session ticket/#35"
  1256. "status request/#5" "heartbeat/#15"
  1257. "next protocol/#13172"
  1258. "application layer protocol negotiation/#16"
  1259.  Session Ticket RFC 5077 hint 21600 seconds, session tickets keys seems to be rotated < daily
  1260.  SSL Session ID support yes
  1261.  Session Resumption Tickets: yes, ID: yes
  1262.  TLS clock skew Random values, no fingerprinting possible
  1263.  Signature Algorithm SHA256 with RSA
  1264.  Server key size RSA 2048 bits
  1265.  Fingerprint / Serial SHA1 54E089DF28538300105DD43764FDE7D0F5ED5BC0 / 01FBBD00172D9F64
  1266. SHA256 E52189F9148266E011534D0392D8050D6D9317F089699C10FB59EB62278A8199
  1267.  Common Name (CN) *.wordpress.com
  1268.  subjectAltName (SAN) *.wordpress.com wordpress.com 
  1269.  Issuer Go Daddy Secure Certificate Authority - G2 (GoDaddy.com, Inc. from US)
  1270.  Trust (hostname) Ok via SAN wildcard and CN wildcard (same w/o SNI)
  1271.  Chain of trust Ok 
  1272.  EV cert (experimental) no
  1273.  Certificate Expiration 351 >= 60 days (2015-09-06 12:52 --> 2018-10-14 07:29 -0400)
  1274.  # of certificates provided 3
  1275.  Certificate Revocation List http://crl.godaddy.com/gdig2s1-119.crl
  1276.  OCSP URI http://ocsp.godaddy.com/
  1277.  OCSP stapling offered
  1278.  OCSP must staple no
  1279.  DNS CAA RR (experimental) --
  1280.  Certificate Transparency no
  1281.  
  1282.  
  1283.  Testing HTTP header response @ "/" 
  1284.  
  1285.  HTTP Status Code  200 OK
  1286.  HTTP clock skew +1 (± 1.5) sec from localtime
  1287.  Strict Transport Security 180 days=15552000 s, just this domain
  1288.  Public Key Pinning --
  1289.  Server banner nginx
  1290.  Application banner --
  1291.  Cookie(s) (none issued at "/")
  1292.  Security headers --
  1293.  Reverse Proxy banner --
  1294.  
  1295.  
  1296.  Testing vulnerabilities 
  1297.  
  1298.  Heartbleed (CVE-2014-0160) not vulnerable (OK)
  1299.  CCS (CVE-2014-0224) not vulnerable (OK)
  1300.  Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK)
  1301.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  1302.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  1303.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
  1304.  BREACH (CVE-2013-3587) potentially NOT ok, uses gzip HTTP compression. - only supplied "/" tested
  1305. Can be ignored for static pages or if no secrets in the page
  1306.  POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
  1307.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
  1308.  SWEET32 (CVE-2016-2183, CVE-2016-6329) VULNERABLE, uses 64 bit block ciphers
  1309.  FREAK (CVE-2015-0204) not vulnerable (OK)
  1310.  DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
  1311. make sure you don't use this certificate elsewhere with SSLv2 enabled services
  1312. https://censys.io/ipv4?q=E52189F9148266E011534D0392D8050D6D9317F089699C10FB59EB62278A8199 could help you to find out
  1313.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  1314.  BEAST (CVE-2011-3389) TLS1: ECDHE-RSA-AES128-SHA
  1315. ECDHE-RSA-AES256-SHA
  1316. AES128-SHA AES256-SHA
  1317. DES-CBC3-SHA CAMELLIA256-SHA
  1318. CAMELLIA128-SHA 
  1319. VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
  1320.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  1321.  RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
  1322.  
  1323.  
  1324.  Testing 364 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  1325.  
  1326. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  1327. -----------------------------------------------------------------------------------------------------------------------------
  1328. xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  1329. xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  1330. xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  1331. x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
  1332. x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
  1333. x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
  1334. x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
  1335. xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  1336. xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
  1337. xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  1338. x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
  1339. x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
  1340. x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
  1341. x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
  1342. x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA
  1343.  
  1344.  
  1345.  Running client simulations via sockets 
  1346.  
  1347. Android 2.3.7 TLSv1.0 AES128-SHA
  1348. Android 4.1.1 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1349. Android 4.3 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1350. Android 4.4.2 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1351. Android 5.0.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1352. Android 6.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1353. Android 7.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1354. Chrome 51 Win 7 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1355. Chrome 57 Win 7 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1356. Firefox 49 Win 7 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1357. Firefox 53 Win 7 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1358. IE 6 XP No connection
  1359. IE 7 Vista TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1360. IE 8 XP TLSv1.0 DES-CBC3-SHA
  1361. IE 8 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1362. IE 11 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  1363. IE 11 Win 8.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  1364. IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  1365. IE 11 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1366. Edge 13 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1367. Edge 13 Win Phone 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1368. Opera 17 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  1369. Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1370. Safari 7 iOS 7.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256)
  1371. Safari 9 OS X 10.11 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1372. Safari 10 OS X 10.12 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1373. Apple ATS 9 iOS 9 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1374. Tor 17.0.9 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1375. Java 6u45 TLSv1.0 AES128-SHA
  1376. Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  1377. Java 8u31 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1378. OpenSSL 1.0.1l TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1379. OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  1380.  
  1381.  Done 2017-10-27 23:27:47 [ 535s] -->> 192.0.78.12:443 (anonvicieux.wordpress.com) <<--
  1382.  
  1383. -----------------------------------------------------
  1384. Done testing now all IP addresses (on port 443): 192.0.78.13 192.0.78.12
  1385.  
  1386. #######################################################################################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement