What’s My IP: 22.214.171.124
(page loaded) date and time: Monday, 23-Nov-2020 06:29:51 GMT
browser & OS: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36
Disabled (higher security)
|No black magic tricks here just basic information obtained with Server Side Includes. Basically the web routes data from one location to another using an IP address. To make things easier to understand an IP address might have a machine name or domain name related to your ISP. However doing reverse DNS lookup using of an IP address might not give accurate results, because a proxy might be in use.|
Too often it seems so called experts on FOX and other infotainment network outlets stereotype hackers and sensationalize hacking, so my goal with this part of my site is to put the risks into prospective and show people a few simple tricks of the trade.
First off a hacker is someone who plays with technology for enjoyment but the term has become synonymous with cracker, a person that performs an illegal act. So ya ask should ya be are worried about crackers? Well Id say if you use windows ya have a greater chance of being a target. To find out how secure or unsecure you are, perform an internet connection security analysis (of commonly probed ports). If ya want a computer without spyware and virus (or virii, as some would prefer) BS common with windows and just plain works get a Mac and hack proof it!
BTW if ya have a question then read my Hacking FAQ’s else try the graffiti wall to post a question or share a comment about stuff like hacking WiFi. PS if ya want to know the big secret of hacking, its RTFM!
|Domain Lookup||Enter a domain (for example COM or CH which is short Switzerland), and you can get the name of the country for which that domain is associated.|
|eMail Dossie||Validate and investigate eMail addresses (for example USER@HOSTNAME).|
|Finger||If you can pull a Finger, (for example USER@HOSTNAME) this will tell you various information about that account.|
|IP Location||IP Address Locator Tool (for example 126.96.36.199), will return a map dynamically generated using the U.S. Census Bureau’s TIGER Mapping Service.|
|IP Targeting||Target the IP host in Latitude/Longitude (for example Micro$oft.COM), will return Lat, Lon: (47.675, -122.117), useful if you want to nuke the evil empire.|
|MAC Address||MAC address Short for Media Access Control address, a hardware address that uniquely identifies each node of a network (for example “apple” or “allied” or “00:A0:40″ or ” 00:80:C7″).|
|man||man formats and displays the on-line (UNIX) manual pages. If you specify section, man only looks in that section of the manual.|
|NMAP||NMAP is a utility for port scanning large networks (for example APPLE.COM).|
|NSLookup||If the domain name has been activated (for example APPLE.COM), it will return a numerical value such as 188.8.131.52.|
|PING||The ping utility sends a packet to the specified host (for example APPLE.COM) and waits for a reply. The host address and round-trip times for each pair of packets are displayed.|
|Profile||Using Quantcast its possible to profile what kind of audience a website attracts, just enter a website (for example APPLE.COM) to check out demograpic info.|
|Port Number||The Internet Storm Center gathers more than 3,000,000 intrusion detection log entries every day and providing authoritative data on the types of attacks that are being mounted against computer ports (for example 80 or 19).|
|Reverse DNS||Type in an IP address (for example 184.108.40.206) to find out the DNS or the Domain Name Server.|
|Traceroute||Traceroute tracks the path taken by packets as they travel from source (the default is the San Diego Super Computer Center) to destination (for example APPLE.COM).|
|Traffic Rank||The traffic rank (for example APPLE.COM) is based on aggregated historical traffic data from millions of Alexa Toolbar users and is a combined measure of page views and users (reach.)|
|Uptime||Report a sites (for example APPLE.COM) operating system, web server, and netblock owner together with, if available, a graphical view of the time since last reboot for each of the computers serving the site.|
|Whois||Whois, can determine whether the domain name you desire is already in use (for example APPLE.COM); in addition you can learn who administers a particular site; and you can view a list of a sites name servers.|
IP Calculator takes an IP address and netmask and calculates the resulting broadcast, network, Cisco wildcard mask, and host range. PHP Subnet Calculator – to install, just move PHP Subnet Calculator SubnetCalc.php into the webroot of a php capable webserver.
Use IP & CIDR Netmask: 10.0.0.1/22 Or IP & Netmask: 10.0.0.1 255.255.252.0 Or IP & Wildcard Mask: 10.0.0.1 0.0.3.255
At Toorcon 2003 (Information Security Conference) a talk was given on utilities people in the know seem to find most useful. So FYI here a rough list of the top 20 hacking tools. FYI insecure.org has a list of top 75 Security Tools.
|Nessus||The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.|
|Ethereal||Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.|
|Snort||Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.|
|Netcat||Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol|
|TCPdump||TCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications.|
|Hping||Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the ping program (but with a lot of extensions).|
|DNSiff||DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).|
|GFI LANguard||GFI LANguard Network Security Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil’s advocate alerting you to security vulnerabilities.|
|Ettercap||Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.|
|Nikto||Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.|
|John the Ripper||John the Ripper is a fast password cracker, currently available for many flavors of Unix.|
|OpenSSH||OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.|
|TripWire||Tripwire is a tool that can be used for data and program integrity assurance.|
|Kismet||Kismet is an 802.11 wireless network sniffer – this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area.|
|NetFilter||NetFilter and iptables are the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packetmangling.|
|IP Filter||IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services.|
|pf||OpenBSD Packet Filter|
|fport||fport identifys all open TCP/IP and UDP ports and maps them to the owning application.|
|SAINT||SAINT network vulnerability assessment scanner detects vulnerabilities in your network’s security before they can be exploited.|
|OpenPGP||OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann.|
Internet Storm Center Status by DShield.org is an attempt to collect data about cracker activity from all over the internet. The data is cataloged and summarized, which enables trends to be discovered. The site also postes a Survival Time, which is the average time between attacks on various networks.
HackerWatch – World Internet Traffic Map lets you report and share information that helps identify, combat, and prevent the spread of Internet threats and unwanted network traffic.
Akamai monitors global Internet conditions around the clock. With this real-time data it is possible to identify the global regions with the greatest attack traffic, cities with the slowest Web connections (latency), and geographic areas with the most Web traffic (traffic density).
A Proxy is an application that breaks the connection between sender and receiver, thus protecting your internet privacy (to some degree) while you are surfing. Enjoy the proxy gateway list(1) and list(2). If youre curious, try Test Page for Web Anonymzing Services to test the various proxies yourself. Note as of 11/19/2001 those suffering from corporate oppression and Muslims in Saudi Arabia, UAE, etc. looking for porn better have alternative plans, because Safeweb turns off free service.
The University of Toronto’s Internet Censorship Explorer permits anyone with a Web browser to test the limits of certain national and organizational Internet-blocking schemes. Users simply enter a target URL and a country into a search field on the Censorship Explorer’s website. The software then scans the ports of available servers in that country, looking for open ones.
If youre interested in anonymous surfing (i.e. the phaster proxy gateway), and wondering is someone watching your every move, then you may also know eMail is not private (it is like sending a postcard that leaves a trail). So here is a list of free eMail services, some of which include a measure of security. B.T.W. if you have any browser privacy issues, I have Netscape Navigator secrets and tips on how to secure Internet Explorer (concepts presented here apply to all browsers).
Phaster computer security resources search includes: exploits/bugs, internet security tools, guides to ethical hacking, encryption, network security documentation, hacks, cracks, phreaking stuff, etc.
Serials 2000 and serials & keys are clearinghouses of serial numbers for thousands of commercial and shareware programs that allows a user to check out disabled features of demo programs and reinstall software you may have misplaced the keys for…