last data update: 2011/10/18, 01:18
Website loading time
during the test: 1.02 s
cable connection (average): 1.15 s
DSL connection (average): 1.27 s
modem (average): 7.91 s
HTTP headers
HTTP/1.1 301 Moved Permanently
Server: nginx
Date: Tue, 18 Oct 2011 08:18:53 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Vary: Cookie
X-Pingback: http://www.attackvector.org/xmlrpc.php
Location: http://www.attackvector.org/
Content-Length: 0
HTTP/1.1 200 OK
Server: nginx
Date: Tue, 18 Oct 2011 08:18:53 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Last-Modified: Tue, 18 Oct 2011 07:16:57 GMT
ETag: "1cb88817-c0fd-4af8d823b0c40"
Accept-Ranges: bytes
Content-Length: 49405
Cache-Control: max-age=3, must-revalidate
Expires: Tue, 18 Oct 2011 08:18:56 GMT
Vary: Accept-Encoding,Cookie
Information about DNS servers
attackvector.org | A | 174.133.20.136 | IN | 3600 | |
attackvector.org | MX | 10 | mx9.webfaction.com | IN | 3600 |
attackvector.org | MX | 10 | mx7.webfaction.com | IN | 3600 |
attackvector.org | MX | 10 | mx8.webfaction.com | IN | 3600 |
attackvector.org | SOA | ns1.webfaction.com | hostmaster.attackvector.org | 1 | 10800 3600 604800 3600 IN 3600 |
attackvector.org | NS | ns4.webfaction.com | IN | 3600 | |
attackvector.org | NS | ns2.webfaction.com | IN | 3600 | |
attackvector.org | NS | ns3.webfaction.com | IN | 3600 | |
attackvector.org | NS | ns1.webfaction.com | IN | 3600 |
Received from the first DNS server
Request to the server "attackvector.org"
You used the following DNS server:
DNS Name: ns4.webfaction.com
DNS Server Address: 173.230.141.144#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 57478
flag: qr aa rd REQUEST: 1, ANSWER: 9, AUTHORITY: 0, ADDITIONAL: 7
REQUEST SECTION:
attackvector.org. IN ANY
ANSWER SECTION:
attackvector.org. 3600 IN NS ns4.webfaction.com.
attackvector.org. 3600 IN MX 10 mx8.webfaction.com.
attackvector.org. 3600 IN SOA ns1.webfaction.com. hostmaster.attackvector.org. 1 10800 3600 604800 3600
attackvector.org. 3600 IN MX 10 mx9.webfaction.com.
attackvector.org. 3600 IN MX 10 mx7.webfaction.com.
attackvector.org. 3600 IN NS ns2.webfaction.com.
attackvector.org. 3600 IN NS ns3.webfaction.com.
attackvector.org. 3600 IN NS ns1.webfaction.com.
attackvector.org. 3600 IN A 174.133.20.136
SECTION NOTES:
mx7.webfaction.com. 3600 IN A 174.133.156.178
ns3.webfaction.com. 3600 IN A 209.114.37.51
ns4.webfaction.com. 3600 IN A 173.230.141.144
ns1.webfaction.com. 3600 IN A 50.56.93.59
ns2.webfaction.com. 3600 IN A 178.79.142.142
mx8.webfaction.com. 3600 IN A 174.133.21.100
mx9.webfaction.com. 3600 IN A 67.228.154.2
Received 389 bytes from address 173.230.141.144#53 in 28 ms
Received from the second DNS server
Request to the server "attackvector.org"
You used the following DNS server:
DNS Name: ns2.webfaction.com
DNS Server Address: 178.79.142.142#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 46216
flag: qr aa rd REQUEST: 1, ANSWER: 9, AUTHORITY: 0, ADDITIONAL: 7
REQUEST SECTION:
attackvector.org. IN ANY
ANSWER SECTION:
attackvector.org. 3600 IN MX 10 mx7.webfaction.com.
attackvector.org. 3600 IN NS ns1.webfaction.com.
attackvector.org. 3600 IN MX 10 mx8.webfaction.com.
attackvector.org. 3600 IN NS ns4.webfaction.com.
attackvector.org. 3600 IN A 174.133.20.136
attackvector.org. 3600 IN NS ns3.webfaction.com.
attackvector.org. 3600 IN SOA ns1.webfaction.com. hostmaster.attackvector.org. 1 10800 3600 604800 3600
attackvector.org. 3600 IN MX 10 mx9.webfaction.com.
attackvector.org. 3600 IN NS ns2.webfaction.com.
SECTION NOTES:
ns2.webfaction.com. 3600 IN A 178.79.142.142
mx9.webfaction.com. 3600 IN A 67.228.154.2
ns4.webfaction.com. 3600 IN A 173.230.141.144
mx8.webfaction.com. 3600 IN A 174.133.21.100
mx7.webfaction.com. 3600 IN A 174.133.156.178
ns3.webfaction.com. 3600 IN A 209.114.37.51
ns1.webfaction.com. 3600 IN A 50.56.93.59
Received 389 bytes from address 178.79.142.142#53 in 77 ms
Subdomains (the first 50)
Typos (misspells)
zttackvector.org sttackvector.org wttackvector.org qttackvector.org artackvector.org aftackvector.org agtackvector.org aytackvector.org a6tackvector.org a5tackvector.org atrackvector.org atfackvector.org atgackvector.org atyackvector.org at6ackvector.org at5ackvector.org attzckvector.org attsckvector.org attwckvector.org attqckvector.org attaxkvector.org attavkvector.org attafkvector.org attadkvector.org attacjvector.org attacmvector.org attaclvector.org attacovector.org attacivector.org attackcector.org attackbector.org attackgector.org | attackfector.org attackvwctor.org attackvsctor.org attackvdctor.org attackvrctor.org attackv4ctor.org attackv3ctor.org attackvextor.org attackvevtor.org attackveftor.org attackvedtor.org attackvecror.org attackvecfor.org attackvecgor.org attackvecyor.org attackvec6or.org attackvec5or.org attackvectir.org attackvectkr.org attackvectlr.org attackvectpr.org attackvect0r.org attackvect9r.org attackvectoe.org attackvectod.org attackvectof.org attackvectot.org attackvecto5.org attackvecto4.org ttackvector.org atackvector.org atackvector.org | attckvector.org attakvector.org attacvector.org attackector.org attackvctor.org attackvetor.org attackvecor.org attackvectr.org attackvecto.org tatackvector.org attackvector.org atatckvector.org attcakvector.org attakcvector.org attacvkector.org attackevctor.org attackvcetor.org attackvetcor.org attackvecotr.org attackvectro.org aattackvector.org atttackvector.org atttackvector.org attaackvector.org attacckvector.org attackkvector.org attackvvector.org attackveector.org attackvecctor.org attackvecttor.org attackvectoor.org attackvectorr.org |
Location
IP: 174.133.20.136
continent: NA, country: United States (USA), city: Houston
Website value
rank in the traffic statistics:
There is not enough data to estimate website value.
Basic information
website build using CSS
code weight: 48.25 KB
text per all code ratio: 23 %
title: Attack Vector - Information & Network Security
description: Attack Vector internet security & hacking blog. Covers techniques used to discover network information and how to use this information during penetration testing.
keywords: security, hacking, wireless, software, vulnerabilities, vulnerability, tools, hack, email, discovery, nmap, firewall, port, scanning, DoS, denial, service, buffer, overflow, 0day, exploit, ddos, password, backdoor, worm, virus, malware, spyware, root, rootkit, web, application, testing, web application security testing, sql, injection, network security appliance, network security scanning, scanning, ethical hacker, how to hack, sql injection, inurl:/view/index.shtml, /view/view.shtml axis, /app/idxas.html, identity theft, wifi, network security, encryption, trojan, privacy, social networking, facebook, linkedin, perl, code, network security audit, internet security, security audit, network monitoring, advisory, remote exploit, computer security, facebook privacy, firewall, intrustion detection system,
encoding: UTF-8
language: en-US
Website code analysis
one word phrases repeated minimum three times
two word phrases repeated minimum three times
three word phrases repeated minimum three times
B tags
U tags
I tags
images
file name | alternative text |
---|---|
av2-resized.png | |
coins.png | Amount |
link.png | Your website |
comment.png | Your linktext |
icon_biggrin.gif | :-D |
icon_smile.gif | :-) |
PTImbz*yODZhOTg1M2ZjYmI*ODQ5YjhhNGUwN2I3ZGJiN2I*ZCZvZj*w.gif | ;-) |
icon_wink.gif |
headers
H1
Attack Vector
H2
Recent donations
Donate and get linked!
Archives
Recent Posts
Blogroll
ZeuS source code, anyone?
Lets see if I still remember how to do this…
No, I’m not dead.
Geolocation Using BSSID
Really, Adobe?
Anti-US Hacker Takes Credit For “Here you have” Worm
0day “Here you have” Worm – Prevention at the Gateway
Vendor Response to Backdoor in Accton Switches Post
H3
Recent donations
Donate and get linked!
Archives
Recent Posts
Blogroll
ZeuS source code, anyone?
Lets see if I still remember how to do this…
No, I’m not dead.
Geolocation Using BSSID
Really, Adobe?
Anti-US Hacker Takes Credit For “Here you have” Worm
0day “Here you have” Worm – Prevention at the Gateway
Vendor Response to Backdoor in Accton Switches Post
H4
Social Connections
Blog Roll
Admin
H5
matt@attackvector.org
H6
internal links
address | anchor text |
---|---|
http://www.attackvector.org/ | Home |
http://www.attackvector.org/about/ | About |
http://www.attackvector.org/attack-vector-store/ | AV Bookshelf |
http://www.attackvector.org/advertise-av/ | Advertise @ AV |
http://www.attackvector.org/the-mac-immunity-theory/ | The Mac Immunity Theory |
http://www.attackvector.org/ | img |
http://www.attackvector.org/ | Attack Vector |
http://www.attackvector.org?dc_popup=show | How does it work? |
http://www.attackvector.org/2011/05/ | May 2011 |
http://www.attackvector.org/2011/03/ | March 2011 |
http://www.attackvector.org/2010/11/ | November 2010 |
http://www.attackvector.org/2010/09/ | September 2010 |
http://www.attackvector.org/2010/08/ | August 2010 |
http://www.attackvector.org/2010/07/ | July 2010 |
http://www.attackvector.org/2010/06/ | June 2010 |
http://www.attackvector.org/2010/05/ | May 2010 |
http://www.attackvector.org/2010/04/ | April 2010 |
http://www.attackvector.org/2010/03/ | March 2010 |
http://www.attackvector.org/zeus-source-code-anyone/ | ZeuS source code, anyone? |
http://www.attackvector.org/lets-see-if-i-still-remember-how-to-do-this/ | Lets see if I still remember how to do this… |
http://www.attackvector.org/no-im-not-dead/ | No, I’m not dead. |
http://www.attackvector.org/geolocation-using-bssid/ | Geolocation Using BSSID |
http://www.attackvector.org/really-adobe/ | Really, Adobe? |
http://www.attackvector.org/anti-us-hacker-takes-credit-for-here-you-have-worm/ | Anti-US Hacker Takes Credit For “Here you have” Worm |
http://www.attackvector.org/0day-here-you-have-worm-prevention-at-the-gateway/ | 0day “Here you have” Worm – Prevention at the Gateway |
http://www.attackvector.org/vendor-response-to-backdoor-in-accton-switches-post/ | Vendor Response to Backdoor in Accton Switches Post |
mailto:matt@attackvector.org | matt@attackvector.org |
http://www.attackvector.org/zeus-source-code-anyone/ | ZeuS source code, anyone? |
http://www.attackvector.org/category/code/ | code |
http://www.attackvector.org/tag/botnet/ | botnet |
http://www.attackvector.org/tag/code/ | code |
http://www.attackvector.org/tag/download/ | download |
http://www.attackvector.org/tag/example/ | example |
http://www.attackvector.org/tag/leak/ | leak |
http://www.attackvector.org/tag/zeus/ | ZeuS |
http://www.attackvector.org/zeus-source-code-anyone/#comments | 5 |
http://www.attackvector.org/files/ZeuS.tar.bz2 | ZeuS 2.0.8.9 |
http://www.attackvector.org/lets-see-if-i-still-remember-how-to-do-this/ | Lets see if I still remember how to do this… |
http://www.attackvector.org/category/security/ | security |
http://www.attackvector.org/tag/acl/ | ACL |
http://www.attackvector.org/tag/botnet/ | botnet |
http://www.attackvector.org/tag/chrome/ | Chrome |
http://www.attackvector.org/tag/crime/ | crime |
http://www.attackvector.org/tag/information/ | information |
http://www.attackvector.org/tag/java/ | Java |
http://www.attackvector.org/tag/krebs/ | Krebs |
http://www.attackvector.org/tag/network/ | network |
http://www.attackvector.org/tag/squid/ | squid |
http://www.attackvector.org/tag/worm/ | worm |
http://www.attackvector.org/tag/zeus/ | ZeuS |
http://www.attackvector.org/tag/zeustracker/ | ZeusTracker |
http://www.attackvector.org/lets-see-if-i-still-remember-how-to-do-this/#comments | 19 |
http://www.attackvector.org/lets-see-if-i-still-remember-how-to-do-this/#more-633 | Read the rest of this entry |
http://www.attackvector.org/no-im-not-dead/ | No, I’m not dead. |
http://www.attackvector.org/category/news/ | news |
http://www.attackvector.org/no-im-not-dead/#comments | 11 |
http://www.attackvector.org/geolocation-using-bssid/ | Geolocation Using BSSID |
http://www.attackvector.org/category/code/ | code |
http://www.attackvector.org/category/hacks/ | hacks |
http://www.attackvector.org/category/news/ | news |
http://www.attackvector.org/category/security/ | security |
http://www.attackvector.org/tag/attack/ | attack |
http://www.attackvector.org/tag/bssid/ | BSSID |
http://www.attackvector.org/tag/defcon/ | DefCon |
http://www.attackvector.org/tag/demo/ | demo |
http://www.attackvector.org/tag/geolocation/ | Geolocation |
http://www.attackvector.org/tag/gps/ | GPS |
http://www.attackvector.org/tag/mac/ | mac |
http://www.attackvector.org/tag/skyhook/ | Skyhook |
http://www.attackvector.org/tag/ssid/ | SSID |
http://www.attackvector.org/tag/war/ | war |
http://www.attackvector.org/tag/wifi/ | WiFi |
http://www.attackvector.org/geolocation-using-bssid/#comments | 16 |
http://www.attackvector.org/geolocation-using-bssid/#more-613 | Read the rest of this entry |
http://www.attackvector.org/really-adobe/ | Really, Adobe? |
http://www.attackvector.org/category/code/ | code |
http://www.attackvector.org/category/hacks/ | hacks |
http://www.attackvector.org/category/news/ | news |
http://www.attackvector.org/category/security/ | security |
http://www.attackvector.org/tag/0day/ | 0day |
http://www.attackvector.org/tag/acrobat/ | Acrobat |
http://www.attackvector.org/tag/adobe/ | Adobe |
http://www.attackvector.org/tag/cooltype/ | cooltype |
http://www.attackvector.org/tag/corporate/ | corporate |
http://www.attackvector.org/tag/dll/ | dll |
http://www.attackvector.org/tag/exploitation/ | exploitation |
http://www.attackvector.org/tag/information/ | information |
http://www.attackvector.org/tag/own/ | own |
http://www.attackvector.org/tag/pdf/ | |
http://www.attackvector.org/tag/penetration/ | penetration |
http://www.attackvector.org/tag/sing/ | SING |
http://www.attackvector.org/tag/software/ | software |
http://www.attackvector.org/tag/strncat/ | strncat |
http://www.attackvector.org/tag/sumatrapdf/ | SumatraPDF |
http://www.attackvector.org/tag/vulnerability/ | vulnerability |
http://www.attackvector.org/tag/xpdf/ | Xpdf |
http://www.attackvector.org/really-adobe/#comments | 9 |
http://www.attackvector.org/really-adobe/#more-605 | Read the rest of this entry |
http://www.attackvector.org/anti-us-hacker-takes-credit-for-here-you-have-worm/ | Anti-US Hacker Takes Credit For “Here you have” Worm |
http://www.attackvector.org/category/news/ | news |
http://www.attackvector.org/tag/anna-kournikova/ | Anna Kournikova |
http://www.attackvector.org/tag/hacker/ | hacker |
http://www.attackvector.org/tag/here-you-have/ | here you have |
http://www.attackvector.org/tag/joe-stewart/ | Joe Stewart |
http://www.attackvector.org/tag/malware/ | malware |
http://www.attackvector.org/tag/robert-mcmillan/ | Robert McMillan |
http://www.attackvector.org/tag/terry-jones/ | Terry Jones |
http://www.attackvector.org/anti-us-hacker-takes-credit-for-here-you-have-worm/#respond | 0 |
http://www.attackvector.org/anti-us-hacker-takes-credit-for-here-you-have-worm/#more-603 | Read the rest of this entry |
http://www.attackvector.org/0day-here-you-have-worm-prevention-at-the-gateway/ | 0day “Here you have” Worm – Prevention at the Gateway |
http://www.attackvector.org/category/code/ | code |
http://www.attackvector.org/category/hacks/ | hacks |
http://www.attackvector.org/category/news/ | news |
http://www.attackvector.org/category/security/ | security |
http://www.attackvector.org/tag/gateway/ | gateway |
http://www.attackvector.org/tag/infect/ | infect |
http://www.attackvector.org/tag/inputmsg/ | INPUTMSG |
http://www.attackvector.org/tag/mimedefang/ | mimedefang |
http://www.attackvector.org/tag/perl/ | perl |
http://www.attackvector.org/tag/prevention/ | Prevention |
http://www.attackvector.org/tag/protect/ | protect |
http://www.attackvector.org/tag/rule/ | rule |
http://www.attackvector.org/tag/rules/ | rules |
http://www.attackvector.org/tag/script/ | script |
http://www.attackvector.org/tag/sendmail/ | sendmail |
http://www.attackvector.org/tag/spam/ | spam |
http://www.attackvector.org/tag/virus/ | virus |
http://www.attackvector.org/tag/worm/ | worm |
http://www.attackvector.org/0day-here-you-have-worm-prevention-at-the-gateway/#comments | 6 |
http://www.attackvector.org/0day-here-you-have-worm-prevention-at-the-gateway/#more-587 | Read the rest of this entry |
http://www.attackvector.org/vendor-response-to-backdoor-in-accton-switches-post/ | Vendor Response to Backdoor in Accton Switches Post |
http://www.attackvector.org/category/news/ | news |
http://www.attackvector.org/category/security/ | security |
http://www.attackvector.org/tag/accton/ | Accton |
http://www.attackvector.org/tag/accton-based/ | Accton-based |
http://www.attackvector.org/tag/attack/ | attack |
http://www.attackvector.org/tag/backdoor/ | backdoor |
http://www.attackvector.org/tag/fix/ | fix |
http://www.attackvector.org/tag/hack/ | hack |
http://www.attackvector.org/tag/hacked/ | hacked |
http://www.attackvector.org/tag/lan/ | lan |
http://www.attackvector.org/tag/network/ | network |
http://www.attackvector.org/tag/owned/ | owned |
http://www.attackvector.org/tag/password/ | password |
http://www.attackvector.org/tag/passwords/ | passwords |
http://www.attackvector.org/tag/risk/ | risk |
http://www.attackvector.org/tag/secure/ | secure |
http://www.attackvector.org/tag/security/ | security |
http://www.attackvector.org/tag/snmp/ | SNMP |
http://www.attackvector.org/tag/vlan/ | vlan |
http://www.attackvector.org/tag/vulnerable/ | vulnerable |
http://www.attackvector.org/tag/workaround/ | workaround |
http://www.attackvector.org/vendor-response-to-backdoor-in-accton-switches-post/#comments | 3 |
http://www.attackvector.org/backdoor-password-in-accton-based-switches/ | here |
http://www.attackvector.org/vendor-response-to-backdoor-in-accton-switches-post/#more-583 | Read the rest of this entry |
http://www.attackvector.org/page/2/ | Older Entries |
http://www.attackvector.org/wp-login.php | Log in |
http://www.attackvector.org/feed/ | Entries RSS |
http://www.attackvector.org/comments/feed/ | Comments RSS |
http://www.attackvector.org/ | Home |
http://www.attackvector.org/about/ | About |
http://www.attackvector.org/attack-vector-store/ | AV Bookshelf |
http://www.attackvector.org/advertise-av/ | Advertise @ AV |
http://www.attackvector.org/the-mac-immunity-theory/ | The Mac Immunity Theory |
http://www.attackvector.org/comments/feed/ | Comments RSS |
external links
address | anchor text |
---|---|
http://feeds.feedburner.com/attackvector | rss |
http://feedburner.google.com/fb/a/mailverify?uri=attackvector&loc=en_US | |
http://www.zirona.com/software/ | Donations Cloud |
http://www.packetstormsecurity.org/ | .:[ packet storm ]:. |
http://www.hak5.org/category/episodes | Hak5 Podcast |
http://infolookup.securegossip.com/ | InfoLookup |
http://insecure.org/ | insecure.org |
http://www.metasploit.com/ | metasploit |
http://pauldotcom.com/security-weekly/ | PaulDotCom Podcast |
http://risky.biz/netcasts/risky-business | Risky Business Podcast |
http://www.social-engineer.org/framework/Podcast | Social Engineer Podcast |
http://www.social-engineer.org/ | Social Engineering – Exploiting Human Vulnerabilities |
http://synjunkie.blogspot.com/ | synjunkie's blog |
http://www22.verizon.com/residential/highspeedinternet | fast internet services |
http://krebsonsecurity.com/2011/03/spyeye-zeus-users-target-tracker-sites/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+KrebsOnSecurity+%28Krebs+on+Security%29 | Krebs |
https://zeustracker.abuse.ch/ | ZeusTracker |
http://samy.pl/talks/2010-defcon.ppt | Sammy Kamkar |
http://samy.pl/mapxss/ | His version |
https://www.rafzar.com/ | Ramz Afzar |
https://www.rafzar.com/node/22 | unofficial patch |
http://www.computerworld.com/s/article/9184818/Anti_US_hacker_takes_credit_for_Here_you_have_worm?taxonomyId=17&pageNumber=1 | Computer World |
http://www.youtube.com/profile?user=iqziad#p/u/0/IkMifFGqt78 | Iraq Resistance posted a video echoing these sentiments |
http://www.sterling-adventures.co.uk/blog/ | Sterling Adventures |
http://www.twitter.com/attackvector | |
http://www.packetstormsecurity.org/ | .:[ packet storm ]:. |
http://www.hak5.org/category/episodes | Hak5 Podcast |
http://infolookup.securegossip.com/ | InfoLookup |
http://insecure.org/ | insecure.org |
http://www.metasploit.com/ | metasploit |
http://pauldotcom.com/security-weekly/ | PaulDotCom Podcast |
http://risky.biz/netcasts/risky-business | Risky Business Podcast |
http://www.social-engineer.org/framework/Podcast | Social Engineer Podcast |
http://www.social-engineer.org/ | Social Engineering – Exploiting Human Vulnerabilities |
http://synjunkie.blogspot.com/ | synjunkie's blog |
http://wordpress.org/ | WordPress.org |
http://feeds.feedburner.com/attackvector | Posts RSS |
http://www.theforge.co.za/ | The Forge Web Creations |
http://wordpress.org/ | WordPress |