lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue Nov 15 19:50:39 2005
From: epic at roothack.org (Epic)
Subject: How to discover customers of hosting company
	for	n3td3v.com

Carolyn Meinel wrote:

> That silly post about n3td3v.com led to fun playtimes with the
> Scottsdale, AZ web farm that hosts it.
>
> Name:    n3td3v.com
> Address:  64.202.167.129
>
> Nslookup of 64.202.167.129 gives:
> Name:    pwdynamic-v02.prod.mesa1.secureserver.net
> Address:  64.202.167.120
>
> A traceroute of 64.202.167.129 gives its IP address
> as  ip-64-202-167-129.secureserver.net.
>
> Want to know all the fun customers using websites on related
> secureserver.net servers? Insert numbers per examples:
> http://documents.secureserver.net/show/document.aspx?plvid=1&name=stats_eula 
>
> (GoDaddy.com)
> http://documents.secureserver.net/show/document.aspx?plvid=2&name=stats_eula 
>
> ...
> http://documents.secureserver.net/show/document.aspx?plvid=111702&name=stats_eula 
>
> etc.
>
> How does one develop the procedure for uncovering all these users as
> noted above? That is left as an exercise for the student. Hint: it is 
> trivial.
>
> Carolyn Meinel
> http://techbroker.com
> http://happyhacker.org
> 505-281-9675
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Whoa.....     Absolutely stunning.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ