What's My IP: 180.244.208.88
(page loaded) date and time: Thursday, 09-Jun-2011 03:23:05 GMT
browser & OS: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13
JavaScript status: ENABLED (lower security - CLICK HERE to find out stuff JavaScript knows about you)
(page loaded) date and time: Thursday, 09-Jun-2011 03:23:05 GMT
browser & OS: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13
JavaScript status: ENABLED (lower security - CLICK HERE to find out stuff JavaScript knows about you)
No black magic tricks here just basic information obtained with Server Side Includes. Basically the web routes data from one location to another using an IP address. To make things easier to understand an IP address might have a machine name or domain name related to your ISP. However doing reverse DNS lookup using <!--#echo var="REMOTE_HOST" --> of an “IP address” might not give accurate results, because a proxy might be in use. |
Too often it seems so called experts on FOX and other infotainment network outlets stereotype “hackers” and sensationalize “hacking,” so my goal with this part of my site is to put the risks into prospective and show people a few simple tricks of the trade.
First off a “hacker” is someone who plays with technology for enjoyment but the term has become synonymous with “cracker,” a person that performs an illegal act. So ya ask should ya be are worried about crackers? Well I’d say if you use windows ya have a greater chance of being a target. To find out how secure or unsecure you are, perform an internet connection security analysis (of commonly probed ports). If ya want a computer without spyware and virus (or virii, as some would prefer) BS common with windows and just plain works get a Mac and hack proof it!
BTW if ya have a question then read my Hacking FAQ's else try the graffiti wall to post a question or share a comment about stuff like hacking WiFi. PS if ya want to know the big secret of hacking, it’s RTFM!
IP Calculator takes an IP address and netmask and calculates the resulting broadcast, network, Cisco wildcard mask, and host range. PHP Subnet Calculator - to install, just move PHP Subnet Calculator SubnetCalc.php into the webroot of a php capable webserver.
Use IP & CIDR Netmask: 10.0.0.1/22 Or IP & Netmask: 10.0.0.1 255.255.252.0 Or IP & Wildcard Mask: 10.0.0.1 0.0.3.255
At Toorcon 2003 (Information Security Conference) a talk was given on utilities people in the know seem to find most useful. So FYI here a rough list of the top 20 hacking tools. FYI insecure.org has a list of top 75 Security Tools.
Nessus | The "Nessus" Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix. |
Ethereal | Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. |
Snort | Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. |
Netcat | Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol |
TCPdump | TCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications. |
Hping | Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions). |
DNSiff | DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). |
GFI LANguard | GFI LANguard Network Security Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil's advocate alerting you to security vulnerabilities. |
Ettercap | Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis. |
Nikto | Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers. |
John the Ripper | John the Ripper is a fast password cracker, currently available for many flavors of Unix. |
OpenSSH | OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks. |
TripWire | Tripwire is a tool that can be used for data and program integrity assurance. |
Kismet | Kismet is an 802.11 wireless network sniffer - this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area. |
NetFilter | NetFilter and iptables are the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packetmangling. |
IP Filter | IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services. |
pf | OpenBSD Packet Filter |
fport | fport identifys all open TCP/IP and UDP ports and maps them to the owning application. |
SAINT | SAINT network vulnerability assessment scanner detects vulnerabilities in your network's security before they can be exploited. |
OpenPGP | OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann. |
Internet Storm Center Status by DShield.org is an attempt to collect data about cracker activity from all over the internet. The data is cataloged and summarized, which enables trends to be discovered. The site also postes a Survival Time, which is the average time between attacks on various networks.
HackerWatch - World Internet Traffic Map lets you report and share information that helps identify, combat, and prevent the spread of Internet threats and unwanted network traffic.
Akamai monitors global Internet conditions around the clock. With this real-time data it is possible to identify the global regions with the greatest attack traffic, cities with the slowest Web connections (latency), and geographic areas with the most Web traffic (traffic density).
A “Proxy” is an application that breaks the connection between sender and receiver, thus protecting your internet privacy (to some degree) while you are surfing. Enjoy the proxy gateway list(1) and list(2). If you’re curious, try Test Page for Web Anonymzing Services to test the various proxies yourself. Note as of 11/19/2001 those suffering from corporate oppression and Muslims in Saudi Arabia, UAE, etc. looking for porn better have alternative plans, because Safeweb turns off free service.
The University of Toronto's Internet Censorship Explorer permits anyone with a Web browser to test the limits of certain national and organizational Internet-blocking schemes. Users simply enter a target URL and a country into a search field on the Censorship Explorer's website. The software then scans the ports of available servers in that country, looking for open ones.
If you’re interested in anonymous surfing (i.e. the phaster proxy gateway), and wondering is someone watching your every move, then you may also know eMail is not private (it is like sending a postcard that leaves a trail). So here is a list of free eMail services, some of which include a measure of security. B.T.W. if you have any browser privacy issues, I have Netscape Navigator secrets and tips on how to secure Internet Explorer (concepts presented here apply to all browsers).
Phaster computer security resources search includes: exploits/bugs, internet security tools, guides to ethical hacking, encryption, network security documentation, hacks, cracks, phreaking stuff, etc.
Since this “Hacked” page seems to have international appeal, try these computer-based translation systems (it might be good for a laugh or two).
Since you have read this far, do ya think terrorism will end when rm -fr /bin/laden/? You can use the graffiti wall to post your own opinion on that question or use it to share your own bytes of hacking knowledge with others.