MENU
last data update: 2011/10/20, 05:41
Website loading time
during the test: 1.44 s
cable connection (average): 1.71 s
DSL connection (average): 1.97 s
modem (average): 16.1 s
HTTP headers
HTTP/1.1 301 Moved Permanently
Date: Thu, 20 Oct 2011 12:41:09 GMT
Server: Apache/2.2.20
Location: http://blog.cj2s.de/
Content-Length: 292
Connection: close
Content-Type: text/html; charset=iso-8859-1
HTTP/1.1 200 OK
Date: Thu, 20 Oct 2011 12:41:09 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Status: 200 OK
Set-Cookie: s9y_200580e79de84d15fbe3ba15e0fb2ac5=94i1n5ceb2phopgp3orqdv4hh1; path=/
Expires: 0
Cache-Control: private, pre-check=0, post-check=0, max-age=0
Pragma: no-cache
Set-Cookie: s9y_200580e79de84d15fbe3ba15e0fb2ac5=1gp7prio5keagb35dgv1jbs460; path=/
X-Session-Reinit: true
X-Blog: Serendipity
Connection: close
Content-Type: text/html; charset=UTF-8
Information about DNS servers
cj2s.de | A | 80.67.28.202 | IN | 3600 | |
cj2s.de | AAAA | 2a00:1158::300:7f92:0:0:1 | IN | 3600 | |
cj2s.de | MX | 100 | mxlb.ispgateway.de | IN | 3600 |
cj2s.de | SOA | ns.namespace4you.de | hostmaster.cj2s.de | 1319408199 | 16384 2048 1048576 2560 IN 2560 |
cj2s.de | NS | ns.namespace4you.de | IN | 3600 | |
cj2s.de | NS | ns2.namespace4you.de | IN | 3600 |
Received from the first DNS server
Request to the server "cj2s.de"
You used the following DNS server:
DNS Name: ns.namespace4you.de
DNS Server Address: 80.67.16.124#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 57417
flag: qr aa rd REQUEST: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 3
REQUEST SECTION:
cj2s.de. IN ANY
ANSWER SECTION:
cj2s.de. 2560 IN SOA ns.namespace4you.de. hostmaster.cj2s.de. 1319408199 16384 2048 1048576 2560
cj2s.de. 3600 IN NS ns.namespace4you.de.
cj2s.de. 3600 IN NS ns2.namespace4you.de.
cj2s.de. 3600 IN MX 100 mxlb.ispgateway.de.
cj2s.de. 3600 IN AAAA 2a00:1158:0:300:7f92::1
cj2s.de. 3600 IN A 80.67.28.202
SECTION NOTES:
ns.namespace4you.de. 3600 IN A 80.67.16.124
ns2.namespace4you.de. 3600 IN A 193.223.77.3
mxlb.ispgateway.de. 60 IN A 80.67.18.126
Received 245 bytes from address 80.67.16.124#53 in 96 ms
Received from the second DNS server
Request to the server "cj2s.de"
You used the following DNS server:
DNS Name: ns2.namespace4you.de
DNS Server Address: 193.223.77.3#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 31304
flag: qr aa rd REQUEST: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 3
REQUEST SECTION:
cj2s.de. IN ANY
ANSWER SECTION:
cj2s.de. 2560 IN SOA ns.namespace4you.de. hostmaster.cj2s.de. 1319408199 16384 2048 1048576 2560
cj2s.de. 3600 IN NS ns.namespace4you.de.
cj2s.de. 3600 IN NS ns2.namespace4you.de.
cj2s.de. 3600 IN MX 100 mxlb.ispgateway.de.
cj2s.de. 3600 IN AAAA 2a00:1158:0:300:7f92::1
cj2s.de. 3600 IN A 80.67.28.202
SECTION NOTES:
ns.namespace4you.de. 3600 IN A 80.67.16.124
ns2.namespace4you.de. 3600 IN A 193.223.77.3
mxlb.ispgateway.de. 60 IN A 80.67.18.126
Received 245 bytes from address 193.223.77.3#53 in 90 ms
Subdomains (the first 50)
Typos (misspells)
xj2s.de vj2s.de fj2s.de dj2s.de ch2s.de cn2s.de cm2s.de ck2s.de ci2s.de cu2s.de cj1s.de | cjqs.de cjws.de cj3s.de cj2a.de cj2z.de cj2x.de cj2d.de cj2e.de cj2w.de j2s.de c2s.de | cjs.de cj2.de jc2s.de c2js.de cjs2.de ccj2s.de cjj2s.de cj22s.de cj2ss.de |
Location
IP: 80.67.28.202
continent: EU, country: Germany (DEU), city:
Website value
rank in the traffic statistics:
There is not enough data to estimate website value.
Basic information
website build using CSS
code weight: 102.62 KB
text per all code ratio: 12 %
title: blueblog - by Christian J. Dietrich
description:
keywords:
encoding: UTF-8
language: en
Website code analysis
one word phrases repeated minimum three times
Phrase | Quantity |
---|---|
the | 67 |
to | 38 |
is | 32 |
in | 29 |
of | 26 |
DNS | 25 |
and | 22 |
on | 16 |
for | 15 |
that | 15 |
as | 13 |
one | 10 |
C&C | 10 |
type | 10 |
by | 10 |
none | 9 |
(rw,bind) | 9 |
key | 9 |
// | 9 |
be | 9 |
botnet | 8 |
DNSSEC | 8 |
The | 8 |
with | 7 |
you | 7 |
we | 7 |
Christian | 6 |
used | 6 |
or | 6 |
from | 6 |
not | 6 |
are | 6 |
this | 6 |
have | 6 |
In | 6 |
carrier | 6 |
root | 5 |
at | 5 |
command | 5 |
using | 5 |
which | 5 |
will | 5 |
message | 5 |
Dietrich | 5 |
Feederbot | 5 |
BIND | 5 |
its | 5 |
J. | 5 |
control | 4 |
/etc/named.conf | 4 |
;; | 4 |
DLV | 4 |
there | 4 |
RC4 | 4 |
bot | 4 |
2011 | 4 |
an | 4 |
decryption | 4 |
domain | 4 |
chroot | 4 |
Skip | 4 |
server | 4 |
name | 4 |
has | 4 |
TXT | 3 |
bug | 3 |
/etc/named.rfc1912.zones | 3 |
uses | 3 |
more | 3 |
traffic. | 3 |
dig | 3 |
some | 3 |
value | 3 |
named.conf | 3 |
/var/named | 3 |
also | 3 |
/etc/rndc.key | 3 |
chrooted | 3 |
/usr/lib/bind | 3 |
Botnets | 3 |
Since | 3 |
what | 3 |
been | 3 |
ISC's | 3 |
seems | 3 |
part | 3 |
Internet | 3 |
IP | 3 |
/etc/rndc.conf | 3 |
order | 3 |
yes; | 3 |
Thus, | 3 |
two word phrases repeated minimum three times
Phrase | Quantity |
---|---|
of the | 10 |
in the | 10 |
none (rw,bind) | 9 |
type none | 9 |
DNS as | 7 |
carrier for | 6 |
as carrier | 6 |
command and | 5 |
by Christian | 5 |
to be | 5 |
J. Dietrich | 5 |
Christian J. | 5 |
for its | 4 |
and control | 4 |
that is | 4 |
to the | 4 |
Skip to | 4 |
for botnet | 3 |
seems to | 3 |
part of | 3 |
is used | 3 |
used to | 3 |
root DNSSEC | 3 |
for the | 3 |
In order | 3 |
order to | 3 |
there is | 3 |
ISC's DLV | 3 |
which is | 3 |
DNSSEC key | 3 |
using DNS | 3 |
the chroot | 3 |
three word phrases repeated minimum three times
Phrase | Quantity |
---|---|
type none (rw,bind) | 9 |
as carrier for | 6 |
DNS as carrier | 6 |
by Christian J. | 5 |
Christian J. Dietrich | 5 |
command and control | 4 |
seems to be | 3 |
root DNSSEC key | 3 |
carrier for botnet | 3 |
In order to | 3 |
carrier for its | 3 |
using DNS as | 3 |
B tags
U tags
I tags
images
file name | alternative text |
---|---|
feederbot-message-chunks.png | Feederbot DNS message chunk |
rc4init.assembler.png | RC4 initialization routine |
beefdead.png | |
ec2nd.png | Christian J. Dietrich, SAT.1 interview |
2011-02-christian-j.-dietrich.sat1.serendipityThumb.png | Richard Paul Lohse Generator |
richard-paul-lohse-4-2-0.serendipityThumb.jpg | Christian J. Dietrich |
christian-j.-dietrich.jpg | XML |
xml.gif | ATOM/XML |
bulletproof_button.png | Based on the s9y Bulletproof template framework |
headers
H1
blueblog - by Christian J. Dietrich
H2
on malware, botnets and the like by Christian J. Dietrich
H3
on malware, botnets and the like by Christian J. Dietrich
H4
Feederbot - a bot using DNS as carrier for its C&C
DNS as carrier for botnet C&C
Best practice: chrooted BIND on CentOS 5.6+ with DNSSEC aware resolution
Delegating IN-ADDR.ARPA domains for reverse DNS resolution (PTR: IP to hostname)
Kryptotag - Transport Layer Security with RSA-PSK
TLS-RSA-PSK Cipher Suites for OpenSSL
Expert Comments on Possible Web Fraud
LaTeX Editing on Windows
Compiling Gnuplot 4.4.2 on CentOS 5.5
neuer Personalausweis (nPA) - analysis of remaining risks
Can keyloggers reveal secret PIN of the new German ID card "neuer Personalausweis" (nPA)?
Compiling libsvm with OpenMP support on CentOS 5.5
Lohse yourself updated
Published my Master Thesis: eID Online Authentication mit dem neuen elektronischen Personalausweis nPA
Protecting from SSH Bruteforce Attacks
H5
H6
internal links
address | anchor text |
---|---|
#content | Skip to blog entries |
http://blog.cj2s.de/archives | Skip to archive page |
#serendipityLeftSideBar | Skip to left sidebar |
#serendipityRightSideBar | Skip to right sidebar |
http://blog.cj2s.de/ | blueblog - by Christian J. Dietrich |
http://blog.cj2s.de/ | on malware, botnets and the like by Christian J. Dietrich |
/archives/28-Feederbot-a-bot-using-DNS-as-carrier-for-its-CC.html | Feederbot - a bot using DNS as carrier for its C&C |
/archives/27-DNS-as-carrier-for-botnet-CC.html | work on covert communication of botnet command and control channels |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/1-Botnets | Botnets |
/archives/28-Feederbot-a-bot-using-DNS-as-carrier-for-its-CC.html | 18:05 |
/archives/27-DNS-as-carrier-for-botnet-CC.html | DNS as carrier for botnet C&C |
http://www.cj2s.de/On-Botnets-that-use-DNS-for-Command-and-Control.pdf | DNS as carrier for botnet command and control channels |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/1-Botnets | Botnets |
/archives/27-DNS-as-carrier-for-botnet-CC.html | 17:49 |
/archives/25-Best-practice-chrooted-BIND-on-CentOS-5.6+-with-DNSSEC-aware-resolution.html | Best practice: chrooted BIND on CentOS 5.6+ with DNSSEC aware resolution |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/4-Securing-Linux | Securing Linux |
/archives/25-Best-practice-chrooted-BIND-on-CentOS-5.6+-with-DNSSEC-aware-resolution.html | 21:50 |
/archives/24-Delegating-IN-ADDR.ARPA-domains-for-reverse-DNS-resolution-PTR-IP-to-hostname.html | Delegating IN-ADDR.ARPA domains for reverse DNS resolution (PTR: IP to hostname) |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/7-Linux-Hints | Linux Hints |
/archives/24-Delegating-IN-ADDR.ARPA-domains-for-reverse-DNS-resolution-PTR-IP-to-hostname.html | 19:03 |
/archives/23-Kryptotag-Transport-Layer-Security-with-RSA-PSK.html | Kryptotag - Transport Layer Security with RSA-PSK |
http://www.cj2s.de/2011-11-21%20CJD%20-%20TLS-RSA-PSK.pdf | here |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/5-German-ID-card-nPA | German ID card / nPA |
/archives/23-Kryptotag-Transport-Layer-Security-with-RSA-PSK.html | 21:35 |
/archives/21-TLS-RSA-PSK-Cipher-Suites-for-OpenSSL.html | TLS-RSA-PSK Cipher Suites for OpenSSL |
/openssl-1.0.0c.tls-rsa-psk.tar | TLS-RSA-PSK cipher suites as a patch |
/server.RSAPSK.log | server log |
/client.RSAPSK.log | client log |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/5-German-ID-card-nPA | German ID card / nPA |
/archives/21-TLS-RSA-PSK-Cipher-Suites-for-OpenSSL.html | 19:38 |
/archives/22-Expert-Comments-on-Possible-Web-Fraud.html | Expert Comments on Possible Web Fraud |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/2-TV | TV |
/archives/22-Expert-Comments-on-Possible-Web-Fraud.html | 16:19 |
/archives/20-LaTeX-Editing-on-Windows.html | LaTeX Editing on Windows |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
/archives/20-LaTeX-Editing-on-Windows.html | 15:09 |
/archives/19-Compiling-Gnuplot-4.4.2-on-CentOS-5.5.html | Compiling Gnuplot 4.4.2 on CentOS 5.5 |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/7-Linux-Hints | Linux Hints |
/archives/19-Compiling-Gnuplot-4.4.2-on-CentOS-5.5.html | 19:25 |
/archives/18-neuer-Personalausweis-nPA-analysis-of-remaining-risks.html | neuer Personalausweis (nPA) - analysis of remaining risks |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/5-German-ID-card-nPA | German ID card / nPA |
/archives/18-neuer-Personalausweis-nPA-analysis-of-remaining-risks.html | 22:22 |
/archives/17-Can-keyloggers-reveal-secret-PIN-of-the-new-German-ID-card-neuer-Personalausweis-nPA.html | Can keyloggers reveal secret PIN of the new German ID card "neuer Personalausweis" (nPA)? |
/categories/5-German-ID-card-nPA | blog category |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/5-German-ID-card-nPA | German ID card / nPA |
/archives/17-Can-keyloggers-reveal-secret-PIN-of-the-new-German-ID-card-neuer-Personalausweis-nPA.html | 09:50 |
/archives/16-Compiling-libsvm-with-OpenMP-support-on-CentOS-5.5.html | Compiling libsvm with OpenMP support on CentOS 5.5 |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
/archives/16-Compiling-libsvm-with-OpenMP-support-on-CentOS-5.5.html | 11:13 |
/archives/15-Lohse-yourself-updated.html | Lohse yourself updated |
http://www.cj2s.de/lose-yourself/ | http://www.cj2s.de/lose-yourself/ |
/lose-yourself/christian%20j.%20dietrich%20-%20junge%20nacht%202009%20-%20farbflaechenbilder%20-%20richard%20paul%20lohse.pdf | thesis titled 'farbflaechenbilder' |
http://www.cj2s.de/lose-yourself/ | Lohse-Yourself App |
/uploads/richard-paul-lohse-4-2-0.jpg | Richard Paul Lohse Generator |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/6-Arts | Arts |
/archives/15-Lohse-yourself-updated.html | 13:46 |
/archives/14-Published-my-Master-Thesis-eID-Online-Authentication-mit-dem-neuen-elektronischen-Personalausweis-nPA.html | Published my Master Thesis: eID Online Authentication mit dem neuen elektronischen Personalausweis nPA |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/5-German-ID-card-nPA | German ID card / nPA |
/archives/14-Published-my-Master-Thesis-eID-Online-Authentication-mit-dem-neuen-elektronischen-Personalausweis-nPA.html | 13:53 |
/archives/13-Protecting-from-SSH-Bruteforce-Attacks.html | Protecting from SSH Bruteforce Attacks |
http://blog.cj2s.de/authors/1-Christian-J-Dietrich | Christian J. Dietrich |
http://blog.cj2s.de/categories/4-Securing-Linux | Securing Linux |
/archives/13-Protecting-from-SSH-Bruteforce-Attacks.html | 15:59 |
http://blog.cj2s.de/archives/P2.html | next page |
/uploads/2009-11-26-wdr-lokalzeit-christian-dietrich.jpg | Christian J. Dietrich |
/index.php | Frontpage |
/pages/publications.html | Publications |
/feeds/categories/6-Arts.rss | XML |
/categories/6-Arts | Arts |
/feeds/categories/1-Botnets.rss | XML |
/categories/1-Botnets | Botnets |
/feeds/categories/5-German-ID-card-nPA.rss | XML |
/categories/5-German-ID-card-nPA | German ID card / nPA |
/feeds/categories/7-Linux-Hints.rss | XML |
/categories/7-Linux-Hints | Linux Hints |
/feeds/categories/3-PostgreSQL.rss | XML |
/categories/3-PostgreSQL | PostgreSQL |
/feeds/categories/4-Securing-Linux.rss | XML |
/categories/4-Securing-Linux | Securing Linux |
/feeds/categories/2-TV.rss | XML |
/categories/2-TV | TV |
/index.php?frontpage | All categories |
/feeds/index.rss2 | XML |
/feeds/index.rss2 | RSS 2.0 feed |
/feeds/atom10.xml | ATOM/XML |
/feeds/atom10.xml | ATOM 1.0 feed |
external links
address | anchor text |
---|---|
http://www.symantec.com/connect/blogs/morto-worm-sets-dns-record | Morto |
http://www.christian-rossow.de | Christian Rossow |
http://2011.ec2nd.org/program/ | |
http://2011.ec2nd.org/program/ | this year's EC2ND conference |
http://www.cymru.com/Documents/secure-bind-template.html | named.conf template by Rob Thomas of Team Cymru |
http://www.isc.org/community/blog/201007/using-root-dnssec-key-bind-9-resolvers | verifiable path to validate ISC's DLV root key |
https://bugzilla.redhat.com/show_bug.cgi?id=719855 | a bug in the init script of bind97 |
http://tools.ietf.org/html/rfc2317 | RFC 2317 |
http://www1.hgi.rub.de/kryptotag/ | Kryptotag |
http://www1.hgi.rub.de/spring/ | SPRING |
http://www.hgi.rub.de/ | HGI |
https://www.bsi.bund.de/cln_165/ContentBSI/Publikationen/TechnischeRichtlinien/tr03110/index_htm.html | Technical Guideline TR-03110 |
http://tools.ietf.org/pdf/rfc5246.pdf | TLS |
http://tools.ietf.org/pdf/rfc5246.pdf | Transport Layer Security, RFC 5246 |
http://tools.ietf.org/pdf/rfc4279.pdf | TLS-RSA-PSK and defined in RFC 4279 |
http://www.openssl.org | openssl-1.0.0c |
http://www.sat1nrw.de/Archiv/Illegales-Gluecksspiel/441d2794/ | http://www.sat1nrw.de/Archiv/Illegales-Gluecksspiel/441d2794/ |
http://www.sat1nrw.de/Archiv/Illegales-Gluecksspiel/441d2794/ | Christian J. Dietrich, SAT.1 interview |
http://www.miktex.org/ | MiKTEX |
http://www.xm1math.net/texmaker/ | Texmaker |
http://www.bmi.bund.de/cln_174/SharedDocs/Pressemitteilungen/DE/2010/mitMarginalspalte/10/npa.html | German Federal Ministry of the Interior (Bundesinnenministerium) |
http://www.internet-sicherheit.de/fileadmin/docs/elektronischer-personalausweis/Studie-Restrisiken%20eID-Funktion%20nPA%20AusweisApp.2010.pdf | the summary of our study |
http://www.internet-sicherheit.de/aktuelles/mitteilungen/nachricht/nachricht-detail/restrisiken-der-eid-funktion-des-neuen-personalaus/ | key findings of the remaining risks (in German) |
http://www.internet-sicherheit.de/fileadmin/docs/elektronischer-personalausweis/Studie-Restrisiken%20eID-Funktion%20nPA%20AusweisApp.2010.pdf | summary |
http://www.ccepa.de/public/kartenleser.htm | list of certified card readers |
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03119/BSI-TR-03119_V1_pdf.pdf?__blob=publicationFile | BSI TR 03119 |
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03119/BSI-TR-03119_V1_pdf.pdf?__blob=publicationFile | BSI TR 03119 |
https://www.internet-sicherheit.de | https://www.internet-sicherheit.de |
http://www.csie.ntu.edu.tw/~cjlin/libsvm/ | libsvm |
http://www.csie.ntu.edu.tw/~cjlin/libsvm/faq.html#f432 | its FAQ |
http://www.jungenacht.de | Junge Nacht |
http://www.internet-sicherheit.de/forschung/publikationen/dokumente-2010/dokument-detail/online-authentisierung-mit-dem-elektronischen-personalausweis-epanpa/ | 'eID Online Authentisierung mit dem neuen elektronischen Personalausweis nPA' |
http://www.bmi.bund.de | German Ministry of the Interior |
http://www.internet-sicherheit.de/service/glossar/eintrag/eintrag-detail/extended-access-control/ | EAC |
http://www.internet-sicherheit.de/service/glossar/eintrag/eintrag-detail/elektronischer-personalausweis/ | elektronischen Ausweisdokument |
http://www.internet-sicherheit.de/service/glossar/eintrag/eintrag-detail/buergerclient/ | Bürgerclient |
http://www.internet-sicherheit.de/service/glossar/eintrag/eintrag-detail/password-authenticated-connection-establishment-pace/ | Password Authenticated Connection Establishment (PACE) |
http://www.internet-sicherheit.de/service/glossar/eintrag/eintrag-detail/terminal-authentication/ | Terminal Authentication |
http://www.internet-sicherheit.de/service/glossar/eintrag/eintrag-detail/chip-authentication/ | Chip Authentication |
http://www.internet-sicherheit.de/forschung/publikationen/dokumente-2010/dokument-detail/online-authentisierung-mit-dem-elektronischen-personalausweis-epanpa/ | full thesis |
http://www.fail2ban.org/wiki/index.php/Main_Page | fail2ban |
http://www.internet-sicherheit.de/wir-ueber-uns/team/mitarbeiter/mitarbeiter-detail/Dietrich/ | My profile at Institute for Internet Security |
http://www.christian-rossow.de/ | Christian Rossow's blog |
http://s9y-bulletproof.com | Based on the s9y Bulletproof template framework |
http://www.s9y.org | s9y |
http://s9y-bulletproof.com | Bulletproof development team |