last data update: 2011/10/18, 02:42

Website loading time

during the test: 0.12 s

cable connection (average): 0.12 s

DSL connection (average): 0.12 s

modem (average): 0.12 s

HTTP headers

Information about DNS servers

ckers.orgMX0mx01.ckers.orgIN3600
ckers.orgMX10mail02.fthe.netIN3600
ckers.orgA72.250.204.200IN3600
ckers.orgSOAns09.domaincontrol.comdns.jomax.net201108110028800 7200 604800 86400 IN 43200
ckers.orgNSns09.domaincontrol.comIN3600
ckers.orgNSns10.domaincontrol.comIN3600

Received from the first DNS server

Request to the server "ckers.org"
You used the following DNS server:
DNS Name: ns09.domaincontrol.com
DNS Server Address: 216.69.185.5#53
DNS server aliases:

HEADER opcode: REQUEST, status: NOERROR, id: 39097
flag: qr aa REQUEST: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1

REQUEST SECTION:
ckers.org. IN ANY

ANSWER SECTION:
ckers.org. 86400 IN SOA ns09.domaincontrol.com. dns.jomax.net. 2011081100 28800 7200 604800 86400
ckers.org. 3600 IN MX 0 mx01.ckers.org.
ckers.org. 3600 IN A 72.250.204.200
ckers.org. 3600 IN NS ns09.domaincontrol.com.
ckers.org. 3600 IN NS ns10.domaincontrol.com.
ckers.org. 3600 IN MX 10 mail02.fthe.net.

SECTION NOTES:
mx01.ckers.org. 3600 IN A 71.41.152.18

Received 234 bytes from address 216.69.185.5#53 in 13 ms

Received from the second DNS server

Request to the server "ckers.org"
You used the following DNS server:
DNS Name: ns10.domaincontrol.com
DNS Server Address: 208.109.255.5#53
DNS server aliases:

HEADER opcode: REQUEST, status: NOERROR, id: 56743
flag: qr aa REQUEST: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1

REQUEST SECTION:
ckers.org. IN ANY

ANSWER SECTION:
ckers.org. 86400 IN SOA ns09.domaincontrol.com. dns.jomax.net. 2011081100 28800 7200 604800 86400
ckers.org. 3600 IN MX 0 mx01.ckers.org.
ckers.org. 3600 IN A 72.250.204.200
ckers.org. 3600 IN NS ns09.domaincontrol.com.
ckers.org. 3600 IN NS ns10.domaincontrol.com.
ckers.org. 3600 IN MX 10 mail02.fthe.net.

SECTION NOTES:
mx01.ckers.org. 3600 IN A 71.41.152.18

Received 234 bytes from address 208.109.255.5#53 in 13 ms

Subdomains (the first 50)

Typos (misspells)

xkers.org
vkers.org
fkers.org
dkers.org
cjers.org
cmers.org
clers.org
coers.org
ciers.org
ckwrs.org
cksrs.org
ckdrs.org
ckrrs.org
ck4rs.org
ck3rs.org
ckees.org
ckeds.org
ckefs.org
ckets.org
cke5s.org
cke4s.org
ckera.org
ckerz.org
ckerx.org
ckerd.org
ckere.org
ckerw.org
kers.org
cers.org
ckrs.org
ckes.org
cker.org
kcers.org
cekrs.org
ckres.org
ckesr.org
cckers.org
ckkers.org
ckeers.org
ckerrs.org
ckerss.org

Location

IP: 72.250.204.200

continent: NA, country: United States (USA), city: Houston

Website value

rank in the traffic statistics:

There is not enough data to estimate website value.

Basic information

website build using CSS

code weight: 0 KB

text per all code ratio: 0 %

title: ha.ckers.org web application security lab

description: web application security blog

keywords: security, hacking, RSnake, SEO, blog, web applications, detecting malice, SecTheory, XSS

encoding: ISO-8859-1

language: en

Website code analysis

one word phrases repeated minimum three times

two word phrases repeated minimum three times

three word phrases repeated minimum three times

B tags

Q: Are you planning on keeping ha.ckers.org up for reference at least?

Q: Are you going to keep comments open on the blog?

Q: Are you planning on keeping sla.ckers.org up?

Q: I still want to read what you’re writing, are you posting anywhere else?

Q: Why 1,000 posts and not 10,000 or 100,000 posts?

Q: Someone mentioned to me something about a “Dread Pirate RSnake”. What is that?

Q: Will you continue to be part of security?

Q: What about any other vulns you find?

U tags

I tags

Update: sla.ckers.org and ha.ckers.org both suffered a massive RAID and simultaneous backup failure on December 17th 2010 related in part to an exhaust system failure in our redundant cooling system. So some dates are messed up on comments over the last few months of posts, some files and directories (like hashmaster) are gone, and sla.ckers.org suffered some loss of posts because we had to go back to an old backup. Sorry about that. It’s hard to predict so many failures at once.

images

file namealternative text
Cenzic 232 Patent
web application security lab
:)
winning way too many tickets
;)
Loss Prevention Handbook
SecTheory Internet Security Consulting

headers

H1

H2

And Beyond…

FAQ

What’s Left?

Mod_Security and Slowloris

Minimalistic UI Decisions in Browsers

Cheating Part 2

Cheating Part 1

FireSheep

Detecting Malice With ModSecurity

Performance Primitives

Pages

Categories

Books I'm Reading

Forum & Writing

Pictures

Recent Papers

RSnake's Security Stuffs/Hacks

Shame... For shame

H3

And Beyond…

FAQ

What’s Left?

Mod_Security and Slowloris

Minimalistic UI Decisions in Browsers

Cheating Part 2

Cheating Part 1

FireSheep

Detecting Malice With ModSecurity

Performance Primitives

Pages

Categories

Books I'm Reading

Forum & Writing

Pictures

Recent Papers

RSnake's Security Stuffs/Hacks

Shame... For shame

H4

H5

H6

internal links

addressanchor text
web application security lab
And Beyond…
General News
135 Comments
here
FAQ
General News
No Comments
here
What’s Left?
Webappsec
No Comments
here
Mod_Security and Slowloris
Webappsec
No Comments
here
Minimalistic UI Decisions in Browsers
a bunch of screen shots
Webappsec
9 Comments
here
Cheating Part 2
Webappsec
9 Comments
here
Cheating Part 1
winning way too many tickets
Random Security
2 Comments
here
FireSheep
Webappsec
7 Comments
here
Detecting Malice With ModSecurity
Webappsec
3 Comments
here
Performance Primitives
Webappsec
1 Comment
here
About Us
Anti-Virus
Books
BSD and *NIX
CAPTCHA
comics
General News
Phishing
Random Security
Security Video
SEO/SEM
spam
Webappsec
Wireless Security
XSS
sla.ckers.org/forum/
DefCon 10
DefCon 13
DefCon 14
DefCon 15
DefCon 9
AcuTrust Entropy Attacks
Death By 1000 Cutts Case Study (hacking Matt Cutts)
Improving Firefox
PGP MITM
Proxying over SSH
Search engine LUMP
Trillian encryption tunnel
XSS Worm Analysis And Defense
clipboard stealing program
Fierce domain scanner
Imagecrash (may crash you)
Mailto: Crash (may crash you)
Mailto: popup
MSIE 6.0 SP1 OS/app tester
Security Bookmarklets
Security Links
Server Environmental Variables in JavaScript
Vulnerability Lab
Vulnerable Charsets
webbug in .doc files
XSS Cheat Sheet
DSL Rant
Wall of shame
Entries (RSS)
Comments (RSS)

external links

addressanchor text
Cenzic 232 Patent
Detecting Malice
O2
latest changes in mod_security
FireSheep
one which had a scorecard
Detecting Malice with ModSecurity
Bluehat
Loss Prevention Handbook
Cross Site Scripting Attacks: XSS Exploits and Defense
Flash 8 ActionScript Bible
Hacking Exposed Web Applications
Network Security Assessment
Phishing Exposed
Professional Search Engine Optimization
Secure Coding
Silence On The Wire
SecureSEO
Electronic Notaries
HTaccess Hardening
Impacts of IPv4 to IPv6 Conversions
Intranet Hacking Using Web Interfaces
Investing 2.0
The Internet's Original Sin
SecTheory Internet Security Consulting
SecTheory Internet Security Consultants