last data update: 2011/10/17, 19:49

Website loading time

during the test: 2.3 s

cable connection (average): 2.74 s

DSL connection (average): 3.18 s

modem (average): 26.39 s

HTTP headers

Information about DNS servers

pickegg.comA67.228.214.210IN43200
pickegg.comSOAns1.168dns.comroot.ns1.168dns.com201006199910800 3600 604800 86400 IN 43200
pickegg.comMX10aspmx2.l.google.comIN43200
pickegg.comMX1aspmx.l.google.comIN43200
pickegg.comNSns2.168dns.comIN43200
pickegg.comNSns1.168dns.comIN43200
k-mo-h.comA31.24.224.6IN14400
k-mo-h.comSOAns23.920022033.comsupport.1net.net.sa201105290086400 7200 3600000 86400 IN 43200
k-mo-h.comMX01602572020.pamx1.hotmail.comIN14400
k-mo-h.comTXTv=spf1 ip4:31.24.224.6 ip4:69.65.43.209 ip4:69.162.120.250 a mx ~allArrayIN14400
k-mo-h.comNSns23.920022033.comIN43200
k-mo-h.comNSns24.920022033.comIN43200
treasurerealty.comSOAns0.dnsmadeeasy.comdns.dnsmadeeasy.com200301016243200 3600 1209600 180 IN 43200
treasurerealty.comTXTv=spf1 mx ptr ~allArrayIN1800
treasurerealty.comMX30mx2.dnsmadeeasy.comIN1800
treasurerealty.comMX40mx3.dnsmadeeasy.comIN1800
treasurerealty.comMX10mailgate.vrmgr.comIN1800
treasurerealty.comMX15d7628a.ess.barracudanetworks.comIN1800
treasurerealty.comMX15d7628b.ess.barracudanetworks.comIN1800
treasurerealty.comMX20mx1.dnsmadeeasy.comIN1800
treasurerealty.comA208.94.146.71IN3600
treasurerealty.comA208.94.146.80IN3600
treasurerealty.comA208.94.146.81IN3600
treasurerealty.comA208.94.146.70IN3600
treasurerealty.comNSns3.dnsmadeeasy.comIN43200
treasurerealty.comNSns0.dnsmadeeasy.comIN43200
treasurerealty.comNSns2.dnsmadeeasy.comIN43200
treasurerealty.comNSns4.dnsmadeeasy.comIN43200
treasurerealty.comNSns1.dnsmadeeasy.comIN43200
safetica.czA178.238.37.251IN1800
safetica.czSOAns.onebit.czhostmaster.onebit.cz201107260143200 7200 2678400 3600 IN 3600
safetica.czMX10mx4.onebit.orgIN1800
safetica.czMX0mail4.onebit.czIN1800
safetica.czNSns.onebit.orgIN3600
safetica.czNSns.onebit.czIN3600
vanpeople.comMX50aspmx3.googlemail.comIN1800
vanpeople.comMX10aspmx.l.google.comIN1800
vanpeople.comMX20alt1.aspmx.l.google.comIN1800
vanpeople.comMX30alt2.aspmx.l.google.comIN1800
vanpeople.comMX40aspmx2.googlemail.comIN1800
vanpeople.comSOAns10.dnsmadeeasy.comdns.dnsmadeeasy.com200901036243200 3600 1209600 180 IN 43200
vanpeople.comA72.51.40.13IN1800
vanpeople.comNSns11.dnsmadeeasy.comIN43200
vanpeople.comNSns10.dnsmadeeasy.comIN43200
vanpeople.comNSns12.dnsmadeeasy.comIN43200
vanpeople.comNSns15.dnsmadeeasy.comIN43200
vanpeople.comNSns14.dnsmadeeasy.comIN43200
vanpeople.comNSns13.dnsmadeeasy.comIN43200
buchhaltung-ruegen.deSOAns1.domainname.atdnsmaster.ns1.domainname.at201110110310800 3600 604800 86400 IN 43200
buchhaltung-ruegen.deA74.55.102.30IN43200
buchhaltung-ruegen.deNSns2.redirectdom.comIN43200
buchhaltung-ruegen.deNSns1.redirectdom.comIN43200
maitre-asimov.frTXTv=spf1 include:mx.ovh.com ~allArrayIN600
maitre-asimov.frA213.186.33.24IN43200
maitre-asimov.frMX1mx1.ovh.netIN43200
maitre-asimov.frMX5mx2.ovh.netIN43200
maitre-asimov.frSOAdns15.ovh.nettech.ovh.net200907160086400 3600 3600000 86400 IN 43200
maitre-asimov.frNSns15.ovh.netIN43200
maitre-asimov.frNSdns15.ovh.netIN43200
boomrang.frA213.186.33.4IN43200
boomrang.frMX5mx4.ovh.netIN43200
boomrang.frMX100mxb.ovh.netIN43200
boomrang.frMX1mx3.ovh.netIN43200
boomrang.frSOAdns.ovh.nettech.ovh.net200605180386400 3600 3600000 86400 IN 43200
boomrang.frNSdns.ovh.netIN43200
boomrang.frNSns.ovh.netIN43200
hotelsdecharme.nlA87.253.139.38IN43200
hotelsdecharme.nlSOAns1.hotelsdecharme.nlchristianclerx.gmail.com127919135610800 3600 604800 10800 IN 43200
hotelsdecharme.nlMX10mail.hotelsdecharme.nlIN43200
hotelsdecharme.nlMX20mail2.hotelsdecharme.nlIN43200
hotelsdecharme.nlNSns2.hotelsdecharme.nlIN43200
hotelsdecharme.nlNSns1.hotelsdecharme.nlIN43200
theprohack.comMX30aspmx4.googlemail.comIN3600
theprohack.comMX30aspmx5.googlemail.comIN3600
theprohack.comMX10aspmx.l.google.comIN3600
theprohack.comMX20alt1.aspmx.l.google.comIN3600
theprohack.comMX20alt2.aspmx.l.google.comIN3600
theprohack.comMX30aspmx2.googlemail.comIN3600
theprohack.comMX30aspmx3.googlemail.comIN3600
theprohack.comA216.239.38.21IN3600
theprohack.comA216.239.32.21IN3600
theprohack.comA216.239.34.21IN3600
theprohack.comA216.239.36.21IN3600
theprohack.comSOAns25.domaincontrol.comdns.jomax.net201104110028800 7200 604800 86400 IN 43200
theprohack.comNSns26.domaincontrol.comIN3600
theprohack.comNSns25.domaincontrol.comIN3600

Received from the first DNS server

Received from the second DNS server

Request to the server "theprohack.com"
You used the following DNS server:
DNS Name: ns1.168dns.com
DNS Server Address: 61.152.237.197#53
DNS server aliases:

HEADER opcode: REQUEST, status: NOERROR, id: 16819
flag: qr rd ra REQUEST: 1, ANSWER: 14, AUTHORITY: 2, ADDITIONAL: 0

REQUEST SECTION:
theprohack.com. IN ANY

ANSWER SECTION:
theprohack.com. 3600 IN MX 10 aspmx.l.google.com.
theprohack.com. 3600 IN MX 20 alt1.aspmx.l.google.com.
theprohack.com. 3600 IN MX 20 alt2.aspmx.l.google.com.
theprohack.com. 3600 IN MX 30 aspmx2.googlemail.com.
theprohack.com. 3600 IN MX 30 aspmx3.googlemail.com.
theprohack.com. 3600 IN MX 30 aspmx4.googlemail.com.
theprohack.com. 3600 IN MX 30 aspmx5.googlemail.com.
theprohack.com. 3600 IN A 216.239.36.21
theprohack.com. 3600 IN A 216.239.38.21
theprohack.com. 3600 IN A 216.239.32.21
theprohack.com. 3600 IN A 216.239.34.21
theprohack.com. 86400 IN SOA ns25.domaincontrol.com. dns.jomax.net. 2011041100 28800 7200 604800 86400
theprohack.com. 3600 IN NS ns26.domaincontrol.com.
theprohack.com. 3600 IN NS ns25.domaincontrol.com.

AUTHORITY SECTION:
theprohack.com. 3600 IN NS ns26.domaincontrol.com.
theprohack.com. 3600 IN NS ns25.domaincontrol.com.

Received 401 bytes from address 61.152.237.197#53 in 934 ms

Subdomains (the first 50)

Typos (misspells)

rheprohack.com
fheprohack.com
gheprohack.com
yheprohack.com
6heprohack.com
5heprohack.com
tgeprohack.com
tbeprohack.com
tneprohack.com
tjeprohack.com
tueprohack.com
tyeprohack.com
thwprohack.com
thsprohack.com
thdprohack.com
thrprohack.com
th4prohack.com
th3prohack.com
theorohack.com
thelrohack.com
the-rohack.com
the0rohack.com
thepeohack.com
thepdohack.com
thepfohack.com
theptohack.com
thep5ohack.com
thep4ohack.com
theprihack.com
theprkhack.com
theprlhack.com
theprphack.com
thepr0hack.com
thepr9hack.com
theprogack.com
theproback.com
thepronack.com
theprojack.com
theprouack.com
theproyack.com
theprohzck.com
theprohsck.com
theprohwck.com
theprohqck.com
theprohaxk.com
theprohavk.com
theprohafk.com
theprohadk.com
theprohacj.com
theprohacm.com
theprohacl.com
theprohaco.com
theprohaci.com
heprohack.com
teprohack.com
thprohack.com
therohack.com
thepohack.com
theprhack.com
theproack.com
theprohck.com
theprohak.com
theprohac.com
hteprohack.com
tehprohack.com
thperohack.com
therpohack.com
theporhack.com
theprhoack.com
theproahck.com
theprohcak.com
theprohakc.com
ttheprohack.com
thheprohack.com
theeprohack.com
thepprohack.com
theprrohack.com
theproohack.com
theprohhack.com
theprohaack.com
theprohacck.com
theprohackk.com

Location

IP: 216.239.36.21, 216.239.38.21, 216.239.32.21, 216.239.34.21

continent: NA, country: United States (USA), city: San Francisco

Website value

rank in the traffic statistics:

There is not enough data to estimate website value.

Basic information

website build using CSS

code weight: 168.61 KB

text per all code ratio: 24 %

title: Pro Hack

description:

keywords:

encoding: UTF-8

language: en

Website code analysis

one word phrases repeated minimum three times

PhraseQuantity
and8
to6
of6
that4
my3
on3
it3
you3
login3
in3
which3
Windows3

two word phrases repeated minimum three times

three word phrases repeated minimum three times

B tags

Tools | Linux | Windows | Emulators | Tutorials | v3.1

Subject : Queries for Indian Hans team from a Security Enthusiastic

Subject : reply to an abuse mail

Subject  - Re: reply to an abuse mail

Amarjit Singh

Tulip Telecom ,

Unified Threat Management Systems Explained

Unified Threat Management Systems - Single User vs Multi User

Comparison of Unified Threat Management Products

Slideshare 

GNS 3 Tutorial – Basic Router password Configuration

Router R3

Router R4

Router R5

Router 3

Router R4 

Router 5

Warning : 

I am not responsible for getting your router trashed, getting wings and trying to kill you. try on your own risk, I am not responsible for your stupidity.

Observation 1 #  

Observation 2# -

Observation 3# -

Observation 4# (most important)

Download

here

CISSP/CISA/CEH/ECSA-LPT/BULLSHIT

Infosec has no chances at doing well at corporate

Worse, once you get in,be prepared to lie, a lot.

you can never be the security guy by researching, practicing and making your bones in the Infosec jungle. You can be one by getting certified.

CISSP/CISA

NOTHING REMOTELY RELATED TO HANDSON SECURITY and collect the easiest pay cheque on earth

that guy creates bar graphs of security framework and audit infra of the MNC

double your salary package

Bottomline : 

Dear Corporate Infosec, your minions are rotting you, and its not long when someone will pwn your ass like SONY because you hired some douche'bag who had a cert but was a skid.

Jugaad se Ukhaad challange

110.235.1.130

Rishabh Dangwal & Amarjit Singh

U tags

be prepared to lie

I tags

Original research

ORIGINAL technical advisories/papers

Tools that you wrote

Code that you released

Configurations of exotic software

Exploits and modules

0day/0hour vulnerabilities

Vulnerabilities what you found

Cases of complexity that were solved

CVE

Documentation of exploits 

Original findings

1)      Our motive is to fill the gap between the cyber victims and the security experts, as many times we felt that in spite of  availability to many security experts in market still victims are not able to get there answers.

2)      Yes, we are consultants/Knowledge Sharers as we guide the common measures to cyber victims and government bodies [maharasthra/Punjab police]such that they can overcome a cyber crime rate.

 I actually expected that HANS shall justify itself as a for-profit/not-for-profit organisation and why it requires money to join it when the elite organisations for example Null is a self sustained, free and aimed at the very thing HANS intends to achieve. helping naive people ? Ofcourse..thats why a lot of organisations has been growing like mushrooms (kaizen ?) and making money from it by joining it.  The core thing is that i am 100% sure that volunteers / infosec reserachers wont learn anything new and will waste their time here.

3)      I have written 2 International Papers :

·In response to Google Hacking

·Future Email Security

 

And 2 national papers:

·Mobile Security and upcoming challenges

·Acknowledgement based System for Mobile Security.

Great..i disregard them as recycled content, already checked it.

4)      I have not written any security tool/configurations yet But, I write other Business applications for Accenture as an Associate Software Engineer.

that was fine with me. 

5)      We have solved numerous cases  which deals with daily cyber problems including ATM cloning case [chandigarh], Source code theft case [Pune], Abuse email, fake profiles, email threatening and other hundreds.  www.youtube.com/theindianhans

Again, they have solved a lot of cases and hundreds , i would regard it as weasel terms. no journal on how they were solved, the method, instrumental techniques, research employed, tools/techniquies deployed, the collaboration, nothing covered, nothing said, just distorted videos at youtube. Again..no references to it.

6)      Ya, you are right 90% of our Organization members have managerial skills, because we strongly believe that having only technical knowledge is not enough to cease the cyber crime rate, because solving a cyber crime is thinking out of the box process.

7)      Joining a HANS, shows your commitment towards our society, that you have a zeal to help others with your knowledge and skills.

I also wish to bring to your notice without hurting your ego and sentiments that,We are not competitors of any private owned body who work only for money. Many times we get such mails which prove that really HANS is doing a greats job. These kinds of mails show our Power of being united and our influence on other private organization. It is my humble requests kindly don’t compare our NGO with other private organizations as our motto is different. we don’t believe in writing the viruses, exploits, tools and other stuff because these things wont help a common man who is not IT literate, to overcome a cyber problem. I wont ask you same the questions as I have nothing to do with same.  I hope I have given your answers without hurting you and your team members feelings. I highly apologize if I did so.

Amarjit Singh

Tulip Telecom

PS: I have kept the passwords simple for the sake of simplicity, don't try this habit in an actual scenario

Router R3

Router R4

Router R5

Router 3

Router R4 

by giving it a track id

here R4 and R5

which is "1" btw

and thats why we gave both routers IP's from same lan

R4 in this case and R5 as Backup

higher is important, default is 100, 200 to R4, default to R5

Router 5

Broadcom to be specific, BCM6338 stands for Broadcom router firmware version 96338, deployed in US robotics ones and some other popular routers

trashed due to burnt ram

screencaps of android may be a bit distorted as shootme app was not working properly over nightly #120

use your creativity

I was not able to determine the file permissions as the version of busybox doesn’t has ls or stat

small screen keyboard and android research limitation -> frustration

once I get a PC

i didnt covered it as its not my domain, some better guys can do it

Blogger Draft

nd next time I am going to test apps and changes on temporary blog first. Point jotted and duly taken

Always outnumbered, never outgunned :P

with some powerful references

the management and HR

dedicated guys who care about their network and do their best to save your assess

by cramming notes,taking mocktests, bribing, praying and God knows what else

Buying an Android was one of the most amazing decisions I ever made, buying and HTC android (a333, 2.2.1 modded to 2.3.4

for eg and inverted "U" will input "goodnight tc :) " to those late night sms and conversations which you want to end since the next morning you have to catch up for office..sigh.

if available

tiger arcade works super slow

PS: you can always install shark over your GF's phone :P

who like to be pesked for technicalities

i am looking at you : prateek singla, rahul sasi, prashant uniyal, chin tu/faku chand,raghu sharma and those who know I cant mention their names here :P

wrote bit.che for my college project, interested may see a demo at my college

including 2 way authentication using timed key generation

images

file namealternative text
Page Ranking Tool
Top Technology blogs
TopOfBlogs

headers

H1

H2

Like our Page

Popular Posts

Recent Articles

Labels

Blog Archive

Followers

Directories

Blogroll

H3

Like our Page

Popular Posts

Recent Articles

Labels

Blog Archive

Followers

Directories

Blogroll

H4

H5

H6

internal links

addressanchor text
Tools
Linux
Windows
Emulators
Tutorials
Home
About
Advertise
Hacking
Tutorials
Tools
Gaming
Security
Linux
Windows
Mobile Hax
I too Intended to join a Security NGO (period) and I was proved wrong.
4
Training on Unified Threat Management and Corporate Security
Unified Threat Management Systems Explained
Unified Threat Management Systems - Single User vs Multi User
Comparison of Unified Threat Management Products
0
GNS 3 Tutorial - configuring Static VRRP over Cisco router and testing it
GNS 3 Tutorial – Basic Router password Configuration
2
BSNL router hacking and possibility of running custom code over it
15
winAUTOPWN v2.7 Released - Vulnerability Testing on Windows
3
Sorry for Blog downtime - Stupid Android experiments lead to it
0
Angry Hacker Rant version 2.0 - Dear Corporate Infosec, You are getting Pathetic Day by Day!
4
Jugaad Se Ukhaad : The Hacking Challange 2011 Results
0
Why Android rocks and why I like android ...
4
Modern Warfare 3 trailer
World War 3 with Call of Duty
0
Older Posts
Posts (Atom)
Root HTC wildfire 2.2.1 and install Android 2.3 over it
Ankit Fadia's seminar is pure bullshit - Read the full review
Learn about Top Hackers of India
Using 3D analyser to play games without Graphics card
Noobs guide to reverse engineering Winrar
Loading...
Adsense
Android
Blog Update
Cellphones and Mobile
Conferences
Consumer
contact
Downloads
Emulators
Gaming
Google
Hacking
hacking tools
Linux
Microsoft
Mozilla Firefox
programming
Reviews
security
Tips and tricks
Top Articles
Tutorials
Windows tricks
2011
September
August
July
June
May
April
March
February
January
2010
December
November
October
September
July
June
May
April
March
February
January
2009
December
November
October
September
August
July
June
May
April
March
February
January
2008
December
November
October
September
August
July
June
May
April
March

external links

addressanchor text
Contact
Tweet
Tweet
Amarjit Singh
Tulip Telecom
Corporate Security Issues and countering them using Unified Threat Management Systems and SSL VPN
Slideshare
Scribd
Tweet
img
Tweet
img
img
img
img
img
img
img
img
img
img
img
img
img
img
img
img
http://people.debian.org/~debacle/cross/
img
Tweet
img
Download
here
Tweet
img
Tweet
img
Infosec Island
Tweet
img
Jugaad se Ukhaad challange
Tweet
img
Tweet
Buzz
Twitter
Facebook
RSS
Email
blogspot hit counter
Top Technology blogs
SEO Tips
TopOfBlogs
I Tech7
Techpavan
HITBSecNews
ChillGeeks
Learn Ethical Hacking
Go Hacking
SecurityXploded
Megapanzer
Jaswinder Kaur