WE ARE ANOYMOUS WE ARE LEGION WE DO NOT FORGET WE DO NOT FORGIVE EXPECT US   WE OWN THE MATRIX. ---------/ RISE OF THE HACKTIVIST. ---------/ Greeting Beautiful World ' #OpNSA March 6 -- 2015.     https://www.nsa.gov/     domain. -- www.nsa.gov m.nsa.gov www2.nsa.gov nsa.gov ------------/   IP Address      104.68.136.96 <<< A104-68-136-96.DEPLOY.STATIC.AKAMAITECHNOLOGIES. << Location: United States)   scan report for a104-68-136-96.deploy.static.akamaitechnologies.com (104.68.136.96) PORT     STATE    SERVICE 80/tcp   open     http 443/tcp  open     https --- Name Server          IP   nsa.gov         63.239.65.41  << scan report for dsdn-gh1-uea06.nsa.gov (63.239.65.41) << Location: Glen Burnie,United States ) -/ PORT     STATE    SERVICE 22/tcp   open     ssh 25/tcp   open     smtp 53/tcp   open     domain 80/tcp   open     http 443/tcp  open     https ---/ Name Server          IP   nsa.gov        63.239.67.11 << scan report for dsdn-gh1-uea05.nsa.gov (63.239.67.11) << Location: Fort George Meade,United States ) -/ PORT     STATE    SERVICE 22/tcp   open     ssh 25/tcp   open     smtp 53/tcp   open     domain 80/tcp   open     http 443/tcp  open     https ----/ CNAME www.nsa.gov www.nsa.gov.edgekey.net CNAME www.nsa.gov.edgekey.net e6655.dscna.akamaiedge.net A e6655.dscna.akamaiedge.net 23.6.187.216 CNAME www.nsa.gov www.nsa.gov.edgekey.net CNAME www.nsa.gov.edgekey.net e6655.dscna.akamaiedge.net AAAA e6655.dscna.akamaiedge.net 2600:1406:3:180::19ff AAAA e6655.dscna.akamaiedge.net 2600:1406:3:183::19ff ----/   A e6655.dscna.akamaiedge.net 23.6.187.216  <<< a23-6-187-216.deploy.static.akamaitechnologies.com (23.6.187.216) << Location: Cambridge,United States) -/ PORT     STATE    SERVICE 80/tcp   open     http 443/tcp  open     https ---               104.68.128.0/19 104.68.128.0/20 Akamai Technologies AKAMAI ---/ Server Type     AkamaiGHost   ======================/ www.nsa.gov (23.203.229.169) << scan report for a23-203-229-169.deploy.static.akamaitechnologies.com (23.203.229.169) << Location: Cambridge,United States) --- Server:Microsoft-IIS/7.5 IP Address:23.203.229.169 Port:443 Hostname:www.nsa.gov ---/ PORT     STATE    SERVICE 80/tcp   open     http 443/tcp  open     https <<< ssl Cert. ----/   The remote network has an active filter ---/ The remote Web server sent a strange HTTP reason message: "The HTTP server returned a redirect error that would lead to an infinite loop. The last 30x error message was: Moved Temporarily" manual inspection is advised ---/ The server header for the remote web server is: "AkamaiGHost" GET https://www.nsa.gov/ HTTP/1.1 Host: www.nsa.gov Cookie: JSESSIONID=208F452EA686AABADAF4BB1D5EA26107.cfusion ---/ The remote web server sent the HTTP header: "Mime-Version" with value: "1.0". OPTIONS https://www.nsa.gov/ HTTP/1.1 Host: www.nsa.gov ---/ The URL "https://www.nsa.gov/" has the following allowed methods: *, BASELINE_CONTROL, CHECKIN, CHECKOUT, CONNECT, DEBUG, GET, HEAD, INDEX, INVALID, INVOKE, LABEL, LINK, MERGE, MKACTIVITY, MKDIR, MKWORKSPACE, NOTIFY, PIN, POLL, POST, REPLY, RMDIR, SEARCH, SHOWMETHOD, SPACEJUMP, SUBSCRIBE, SUBSCRIPTIONS, TEXTSEARCH, TRACK, UNCHECKOUT, UNLINK, UNSUBSCRIBE, VERSION_CONTROL. ---/ The URL: "http://www.nsa.gov" has an "object" tag.     ---/ The contents of https://23.6.187.216 differ from the contents of https://www.nsa.gov GET https://23.6.187.216 HTTP/1.1 Host: 23.6.187.216 ---/ The URL: "https://www.nsa.gov/blah-whatever-badfile.jsp" sent the cookie: "JSESSIONID=1A7D5E8516C5A564BB946DE8E57BE127.cfusion; Path=/; Secure; HttpOnly" GET https://www.nsa.gov/blah-whatever-badfile.jsp HTTP/1.1 Host: www.nsa.gov ---/ A cookie matching the cookie fingerprint DB has been found when requesting "https://www.nsa.gov/blah-whatever-badfile.jsp" . The remote platform is: "Jakarta Tomcat / Apache" GET https://www.nsa.gov/blah-whatever-badfile.jsp HTTP/1.1 Host: www.nsa.gov --/   EXPLOITS:   The whole target has no protection (X-Frame-Options header) against ClickJacking attack   Sessions may be vulnerable to BEAST attack Attackers may be able to decrypt the encrypted SSL traffic   Server has not enabled HTTP Strict-Transport-Security Users may be exposed to man-in-the-middle attacks   Server configuration contains weak cipher suites Cipher suites with known weaknesses should be disabled   Site is using certificate from CA that doesn’t support IPv6 IPv6-only users may experience errors when visiting your site.   Server doesn’t prefer ciphers that enable forward secrecy. Encrypted communications captured today are at risk of being decrypted by an attacker in the future.   Server is using RC4-based ciphersuites which have known vulnerabilities Evaluate your client compatibility requirements to determine if you can disable RC4-based ciphersuites   Server has not yet upgraded to a Extended Validation certificate Increase customer confidence by offering visitors the highest level of assurance.   SSL 2.0 Disabled:Pass SSL 3.0 Disabled:Pass TLS 1.0 Enabled:Pass TLS 1.1 Enabled:Pass TLS 1.2 Enabled:Pass Weak ciphersuites disabled:Fail   <<<<<< Certificates configured correctly:Pass Secure renegotiation configured:Pass Session resumption configured:Pass BEAST Vulnerability:Fail  <<<<< OCSP Stapling:Fail <<<< PCI Compliant:Fail <<<< FIPS Compliant:Fail <<<< Forward Secrecy Supported:Fail <<<< Heartbleed Vulnerability:Pass   Strict Transport Security:Fail <<<< Mixed Content (HTTP and HTTPS):Pass Domain name resolves to IPv4 address:Pass Domain name resolves to IPv6 address:Pass ===========================================/   Testing SSL server 23.203.229.169 on port 443   Accepted  TLSv1  256 bits  AES256-SHA Accepted  TLSv1  168 bits  DES-CBC3-SHA Accepted  TLSv1  56 bits   DES-CBC-SHA Accepted  TLSv1  40 bits   EXP-DES-CBC-SHA Accepted  TLSv1  40 bits   EXP-RC2-CBC-MD5 Accepted  TLSv1  128 bits  RC4-SHA Accepted  TLSv1  128 bits  RC4-MD5 Accepted  TLSv1  40 bits   EXP-RC4-MD5    Prefered Server Cipher(s):     TLSv1  256 bits  AES256-SHA     SSL Certificate:     Version: 2     Serial Number: 963     Signature Algorithm: sha256WithRSAEncryption     Issuer: /C=US/O=GeoTrust Inc./CN=GeoTrust SSL CA - G4     Not valid before: Feb  5 05:37:02 2015 GMT     Not valid after: Feb  8 21:14:42 2016 GMT     Subject: /C=US/ST=Maryland/L=Fort George G Meade/O=National Security Agency/OU=Akamai SAN SSL OV/CN=www.nsa.gov     Public Key Algorithm: rsaEncryption     RSA Public Key: (2048 bit)       Modulus (2048 bit):           00:be:ea:12:8b:eb:8b:0a:da:f0:54:64:91:c4:4f:           34:a5:5a:77:91:f6:93:d3:22:a6:a3:5c:d8:bb:b6:           e3:5b:c0:d9:28:08:60:71:30:c7:25:32:1c:65:55:           4b:fd:75:32:23:5b:8e:4c:38:80:a4:6d:c7:f1:29:           76:c4:8b:a0:40:5e:42:51:9c:8a:65:e8:07:ef:d1:           61:27:88:78:8a:fb:c1:dd:0d:33:d5:ea:30:47:d2:           c6:11:14:66:9e:d2:d2:e1:0f:fd:e2:6b:24:3a:d0:           f2:cd:57:24:d8:ab:0e:58:f6:6b:a6:18:87:86:69:           fe:31:87:81:f3:ed:04:f0:73:18:d4:ac:19:00:d6:           be:3e:56:0a:3d:a0:7b:ac:e1:fd:32:fb:6f:f6:f1:           fa:cc:5f:5e:77:ce:13:f3:4b:48:16:7a:3c:56:ac:           79:63:63:ab:d1:99:01:5a:3c:bb:2e:cb:ef:bc:76:           7e:15:42:20:69:a1:98:67:82:71:30:e3:30:ee:2c:           d5:21:76:1a:23:fc:b3:00:88:84:f6:90:f0:4d:db:           0b:14:a3:9a:50:5b:86:46:44:c2:ec:f1:bb:15:74:           7f:80:cf:a0:86:19:15:4c:9a:12:93:1a:48:52:bf:           64:eb:5f:6e:d8:75:af:bb:db:56:e7:59:6d:8d:a6:           44:4f       Exponent: 65537 (0x10001)     X509v3 Extensions:       X509v3 Authority Key Identifier:         keyid:AC:32:ED:5A:C9:E0:DE:30:9C:90:58:55:26:63:F6:72:A6:54:5F:E3         Authority Information Access:         OCSP - URI:http://gw.symcd.com         CA Issuers - URI:http://gw.symcb.com/gw.crt         X509v3 Key Usage: critical         Digital Signature, Key Encipherment       X509v3 Extended Key Usage:         TLS Web Server Authentication, TLS Web Client Authentication       X509v3 Subject Alternative Name:         DNS:m.nsa.gov, DNS:www2.nsa.gov, DNS:www.nsa.gov, DNS:nsa.gov       X509v3 CRL Distribution Points:         URI:http://gw.symcb.com/gw.crl         X509v3 Basic Constraints: critical         CA:FALSE       X509v3 Certificate Policies:         Policy: 2.16.840.1.113733.1.7.54           CPS: https://www.geotrust.com/resources/repository/legal -------------------------------------/