MENU
last data update: 2011/10/14, 03:23
Website loading time
during the test: 0.44 s
cable connection (average): 0.51 s
DSL connection (average): 0.58 s
modem (average): 4.38 s
HTTP headers
HTTP/1.1 200 OK
Date: Fri, 14 Oct 2011 08:12:40 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny4 with Suhosin-Patch mod_python/3.3.1 Python/2.5.2 mod_perl/2.0.4 Perl/v5.10.0
X-Powered-By: PHP/5.2.6-1+lenny4
Set-Cookie: PHPSESSID=58903a15fd1974ba0cf598c4f57b6f8a; expires=Sun, 06 Nov 2011 11:46:01 GMT; path=/
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Fri, 14 Oct 2011 08:12:41 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Information about DNS servers
offensivecomputing.net | MX | 40 | ASPMX3.GOOGLEMAIL.com | IN | 3600 |
offensivecomputing.net | MX | 0 | ASPMX.L.GOOGLE.com | IN | 3600 |
offensivecomputing.net | MX | 10 | ALT1.ASPMX.L.GOOGLE.com | IN | 3600 |
offensivecomputing.net | MX | 20 | ALT2.ASPMX.L.GOOGLE.com | IN | 3600 |
offensivecomputing.net | MX | 30 | ASPMX2.GOOGLEMAIL.com | IN | 3600 |
offensivecomputing.net | A | 207.66.0.10 | IN | 3600 | |
offensivecomputing.net | SOA | ns63.domaincontrol.com | dns.jomax.net | 2011031705 | 28800 7200 604800 86400 IN 43200 |
offensivecomputing.net | NS | ns63.domaincontrol.com | IN | 3600 | |
offensivecomputing.net | NS | ns64.domaincontrol.com | IN | 3600 |
Received from the first DNS server
Request to the server "offensivecomputing.net"
You used the following DNS server:
DNS Name: ns63.domaincontrol.com
DNS Server Address: 216.69.185.42#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 29251
flag: qr aa REQUEST: 1, ANSWER: 9, AUTHORITY: 0, ADDITIONAL: 0
REQUEST SECTION:
offensivecomputing.net. IN ANY
ANSWER SECTION:
offensivecomputing.net. 86400 IN SOA ns63.domaincontrol.com. dns.jomax.net. 2011031705 28800 7200 604800 86400
offensivecomputing.net. 3600 IN MX 0 ASPMX.L.GOOGLE.COM.
offensivecomputing.net. 3600 IN A 207.66.0.10
offensivecomputing.net. 3600 IN NS ns63.domaincontrol.COM.
offensivecomputing.net. 3600 IN NS ns64.domaincontrol.COM.
offensivecomputing.net. 3600 IN MX 10 ALT1.ASPMX.L.GOOGLE.COM.
offensivecomputing.net. 3600 IN MX 20 ALT2.ASPMX.L.GOOGLE.COM.
offensivecomputing.net. 3600 IN MX 30 ASPMX2.GOOGLEMAIL.COM.
offensivecomputing.net. 3600 IN MX 40 ASPMX3.GOOGLEMAIL.COM.
Received 309 bytes from address 216.69.185.42#53 in 13 ms
Received from the second DNS server
Request to the server "offensivecomputing.net"
You used the following DNS server:
DNS Name: ns64.domaincontrol.com
DNS Server Address: 208.109.255.42#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 48119
flag: qr aa REQUEST: 1, ANSWER: 9, AUTHORITY: 0, ADDITIONAL: 0
REQUEST SECTION:
offensivecomputing.net. IN ANY
ANSWER SECTION:
offensivecomputing.net. 86400 IN SOA ns63.domaincontrol.com. dns.jomax.net. 2011031705 28800 7200 604800 86400
offensivecomputing.net. 3600 IN MX 0 ASPMX.L.GOOGLE.COM.
offensivecomputing.net. 3600 IN A 207.66.0.10
offensivecomputing.net. 3600 IN NS ns63.domaincontrol.COM.
offensivecomputing.net. 3600 IN NS ns64.domaincontrol.COM.
offensivecomputing.net. 3600 IN MX 10 ALT1.ASPMX.L.GOOGLE.COM.
offensivecomputing.net. 3600 IN MX 20 ALT2.ASPMX.L.GOOGLE.COM.
offensivecomputing.net. 3600 IN MX 30 ASPMX2.GOOGLEMAIL.COM.
offensivecomputing.net. 3600 IN MX 40 ASPMX3.GOOGLEMAIL.COM.
Received 309 bytes from address 208.109.255.42#53 in 13 ms
Subdomains (the first 50)
Typos (misspells)
iffensivecomputing.net kffensivecomputing.net lffensivecomputing.net pffensivecomputing.net 0ffensivecomputing.net 9ffensivecomputing.net odfensivecomputing.net ocfensivecomputing.net ovfensivecomputing.net ogfensivecomputing.net otfensivecomputing.net orfensivecomputing.net ofdensivecomputing.net ofcensivecomputing.net ofvensivecomputing.net ofgensivecomputing.net oftensivecomputing.net ofrensivecomputing.net offwnsivecomputing.net offsnsivecomputing.net offdnsivecomputing.net offrnsivecomputing.net off4nsivecomputing.net off3nsivecomputing.net offebsivecomputing.net offemsivecomputing.net offejsivecomputing.net offehsivecomputing.net offenaivecomputing.net offenzivecomputing.net offenxivecomputing.net offendivecomputing.net offeneivecomputing.net offenwivecomputing.net offensuvecomputing.net offensjvecomputing.net offenskvecomputing.net offensovecomputing.net offens9vecomputing.net offens8vecomputing.net offensicecomputing.net offensibecomputing.net offensigecomputing.net offensifecomputing.net offensivwcomputing.net offensivscomputing.net offensivdcomputing.net offensivrcomputing.net offensiv4computing.net offensiv3computing.net | offensivexomputing.net offensivevomputing.net offensivefomputing.net offensivedomputing.net offensivecimputing.net offensiveckmputing.net offensiveclmputing.net offensivecpmputing.net offensivec0mputing.net offensivec9mputing.net offensiveconputing.net offensivecokputing.net offensivecojputing.net offensivecomouting.net offensivecomluting.net offensivecom-uting.net offensivecom0uting.net offensivecompyting.net offensivecomphting.net offensivecompjting.net offensivecompiting.net offensivecomp8ting.net offensivecomp7ting.net offensivecompuring.net offensivecompufing.net offensivecompuging.net offensivecompuying.net offensivecompu6ing.net offensivecompu5ing.net offensivecomputung.net offensivecomputjng.net offensivecomputkng.net offensivecomputong.net offensivecomput9ng.net offensivecomput8ng.net offensivecomputibg.net offensivecomputimg.net offensivecomputijg.net offensivecomputihg.net offensivecomputinf.net offensivecomputinv.net offensivecomputinb.net offensivecomputinh.net offensivecomputiny.net offensivecomputint.net ffensivecomputing.net ofensivecomputing.net ofensivecomputing.net offnsivecomputing.net offesivecomputing.net | offenivecomputing.net offensvecomputing.net offensiecomputing.net offensivcomputing.net offensiveomputing.net offensivecmputing.net offensivecoputing.net offensivecomuting.net offensivecompting.net offensivecompuing.net offensivecomputng.net offensivecomputig.net offensivecomputin.net fofensivecomputing.net offensivecomputing.net ofefnsivecomputing.net offnesivecomputing.net offesnivecomputing.net offenisvecomputing.net offensviecomputing.net offensievcomputing.net offensivceomputing.net offensiveocmputing.net offensivecmoputing.net offensivecopmuting.net offensivecomupting.net offensivecomptuing.net offensivecompuitng.net offensivecomputnig.net offensivecomputign.net ooffensivecomputing.net offfensivecomputing.net offfensivecomputing.net offeensivecomputing.net offennsivecomputing.net offenssivecomputing.net offensiivecomputing.net offensivvecomputing.net offensiveecomputing.net offensiveccomputing.net offensivecoomputing.net offensivecommputing.net offensivecompputing.net offensivecompuuting.net offensivecomputting.net offensivecomputiing.net offensivecomputinng.net offensivecomputingg.net |
Location
IP: 207.66.0.10
continent: NA, country: United States (USA), city: Albuquerque
Website value
rank in the traffic statistics: 734 681
There is not enough data to estimate website value.
Basic information
website build using CSS
code weight: 27.58 KB
text per all code ratio: 43 %
title: Offensive Computing | Community Malicious code research and analysis
description:
keywords:
encoding: utf-8
language: en
Website code analysis
one word phrases repeated minimum three times
Phrase | Quantity |
---|---|
for | 6 |
and | 6 |
the | 5 |
Malware | 5 |
CSI:Internet | 5 |
malware | 4 |
of | 4 |
you | 4 |
new | 3 |
Computing | 3 |
to | 3 |
Offensive | 3 |
series | 3 |
samples | 3 |
two word phrases repeated minimum three times
Phrase | Quantity |
---|---|
CSI:Internet series | 3 |
Offensive Computing | 3 |
three word phrases repeated minimum three times
B tags
Search for sum or name
MALWARE UPLOAD:
Upload an unknown or suspicious file here for analysis. All files uploaded here will be imported into the Offensive Computing Malware database. By using this service, you certify that you are not uploading any copyrighted software and you consent to unconditional dissemination.
U tags
I tags
images
file name | alternative text |
---|---|
logo.png | Home |
headers
H1
CSI:Internet series - Spyeye detection with Volatility v2 and kernel debugging the TDL4 rootkit
Stealthy Profiling and Debugging of Malware
Three Million Samples
MeMMon - A Light Weight Process Memory Scanner
Releasing PDF X-RAY
PoC XMPP Bot C&C using Google Talk (video)
Reversing TDSS: The x64 Dollar Question
YARA 1.5 released
ShmooCon 2011: Visual Malware Reversing
Paper: Hunting rootkits with Windbg
H2
H3
H4
H5
H6
internal links
address | anchor text |
---|---|
#content | Skip navigation |
/ | Home |
/ | Offensive Computing |
/?q=user/register | Create new account |
/?q=user/password | Request new password |
/?q=node/1479 | Publications |
/?q=node/2 | About Us |
/?q=node/475 | Frequently Asked Questions |
/?q=node/242 | Consulting Services |
/?q=node/205 | Getting Started |
/?q=node/1 | Contact |
/?q=node/301 | Major Contributors |
/?q=taxonomy/term/1 | Malware |
/?q=taxonomy/term/12 | Research |
/?q=taxonomy/term/6 | Tools |
/?q=taxonomy/term/9 | Press |
/?q=node/1816 | need ZeuS new variant sample (with p2p capabilities) |
/?q=node/1759 | Problem Unpacking Netsky-Q FSG 1.0 |
/?q=node/1815 | need malware samples that target flash version 10.x |
/?q=node/1137 | Looking for malware samples which bypass UAC |
/?q=node/1814 | Anti VM malware needed |
/?q=forum | more |
/?q=node/1812 | CSI:Internet series - Spyeye detection with Volatility v2 and kernel debugging the TDL4 rootkit |
/?q=node/1804 | Stealthy Profiling and Debugging of Malware |
/?q=node/1803 | Three Million Samples |
/?q=node/1797 | MeMMon - A Light Weight Process Memory Scanner |
/?q=node/1795 | Releasing PDF X-RAY |
/?q=node/1793 | PoC XMPP Bot C&C using Google Talk (video) |
/?q=node/1777 | Need help to simulate malware attack for SCADA system |
/?q=node/1765 | Reversing TDSS: The x64 Dollar Question |
/?q=node/1757 | Looking for Files Secure Rogue Sample |
/?q=node/1737 | YARA 1.5 released |
/?q=blog | more |
/?q=blog | blogs |
/?q=forum | forums |
/?q=poll | polls |
/?q=node/1812 | CSI:Internet series - Spyeye detection with Volatility v2 and kernel debugging the TDL4 rootkit |
/?q=taxonomy/term/1 | Malware |
/?q=blog/2588 | frank_boldewin's blog |
/?q=user/login&destination=node/1812%23comment_form | login |
/?q=user/register&destination=node/1812%23comment_form | register |
/?q=node/1804 | Stealthy Profiling and Debugging of Malware |
/?q=taxonomy/term/6 | tools |
/?q=blog/36417 | jnraber's blog |
/?q=node/1804#comment | 7 comments |
/?q=node/1803 | Three Million Samples |
/?q=taxonomy/term/5 | Administrivia |
/?q=blog/4 | dannyquist's blog |
/?q=node/1803#comment | 3 comments |
/?q=node/1797 | MeMMon - A Light Weight Process Memory Scanner |
/?q=taxonomy/term/1 | Malware |
/?q=taxonomy/term/12 | Research |
/?q=taxonomy/term/13 | Scanner |
/?q=taxonomy/term/6 | tools |
/?q=blog/11094 | palaniyappan's blog |
/?q=node/1797#comment | 2 comments |
/?q=node/1795 | Releasing PDF X-RAY |
/?q=taxonomy/term/12 | Research |
/?q=taxonomy/term/13 | Scanner |
/?q=taxonomy/term/6 | tools |
/?q=node/1795 | read more |
/?q=blog/56084 | x0ner's blog |
/?q=user/login&destination=node/1795%23comment_form | login |
/?q=user/register&destination=node/1795%23comment_form | register |
/?q=node/1793 | PoC XMPP Bot C&C using Google Talk (video) |
/?q=blog/56084 | x0ner's blog |
/?q=user/login&destination=node/1793%23comment_form | login |
/?q=user/register&destination=node/1793%23comment_form | register |
/?q=node/1765 | Reversing TDSS: The x64 Dollar Question |
/?q=taxonomy/term/1 | Malware |
/?q=taxonomy/term/12 | Research |
/?q=taxonomy/term/11 | Reversing Challenges |
/?q=blog/3573 | jackk's blog |
/?q=user/login&destination=node/1765%23comment_form | login |
/?q=user/register&destination=node/1765%23comment_form | register |
/?q=node/1737 | YARA 1.5 released |
/?q=taxonomy/term/6 | tools |
/?q=blog/8194 | plusvic's blog |
/?q=node/1737#comment | 1 comment |
/?q=node/1713 | ShmooCon 2011: Visual Malware Reversing |
/shmoo2011/quist-shmoo2011.pdf | PDF of the Powerpoint Slides |
/vera/ | Download the new VERA code here |
/?q=blog/4 | dannyquist's blog |
/?q=node/1713#comment | 1 comment |
/?q=node/1706 | Paper: Hunting rootkits with Windbg |
/?q=taxonomy/term/12 | Research |
/?q=blog/2588 | frank_boldewin's blog |
/?q=node/1706#comment | 5 comments |
/?q=node&page=1 | 2 |
/?q=node&page=2 | 3 |
/?q=node&page=3 | 4 |
/?q=node&page=4 | 5 |
/?q=node&page=5 | 6 |
/?q=node&page=6 | 7 |
/?q=node&page=7 | 8 |
/?q=node&page=8 | 9 |
/?q=node&page=1 | next › |
/?q=node&page=56 | last » |
external links
address | anchor text |
---|---|
http://twitter.com/ocomputing | Twitter: @ocomputing |
http://www.packetanalytics.com/ | NetFlow Security |
http://www.cultdeadcow.com | Cult of the Dead Cow |
http://www.hakin9.org/en/index.php?id=CODE | Hakin9 |
http://dirtbags.net/ | Dirtbags |
http://www.zynamics.com/ | Halvar & co. |
http://www.websense.com/securitylabs/ | WebSense Security Labs |
http://www.openrce.org/ | Openrce |
http://www.honeynet.org/ | Honeynet Project |
http://www.packetstormsecurity.com/ | PacketStorm |
http://www.bugtraq.org/ | Bugtraq |
http://www.osvdb.org/ | Open Source Vulnerability Database |
http://www.f-secure.com/weblog/ | F-Secure Blog |
http://www.noxusfiles.com/ | noxusfiles |
http://www.reconstructer.org/ | Reconstructer |
http://blog.9bplus.com/new-age-cc-xmpp-bots-preview | http://blog.9bplus.com/new-age-cc-xmpp-bots-preview |
http://blog.9bplus.com/new-age-cc-xmpp-bots-preview | http://blog.9bplus.com/poc-xmpp-bot-cc-using-google-talk |
http://resources.infosecinstitute.com/tdss4-part-1 | Reverse Engineering Malware |
http://code.google.com/p/yara-project/ | YARA |
http://code.google.com/p/re2/ | RE2 |
http://www.shmoocon.org/ | ShmooCon 2011 |
http://www.youtube.com/watch?v=9nlWbDdxKjw | Video of the Talk |