Fase 01 Parte 2(DNS / DNS Reverso)

Publicado por Igor Matsunaga em

Fala galera, para este post utilizarei o site hack.me para realizar os testes e evitar ferir qualquer lei. Este post está sendo distribuído apenas como fonte de estudos. Invasão de dados é crime!!!

DNS

DNS é uma sigla para “Domain Name System”, ou “Sistema de Nomes de Domínios”. Trata-se, de forma bastante resumida, de servidores que armazenam listagens de domínios e seus respectivos endereços IPs.

DNSRecon

Essa ferramenta basicamente verifica todos os servidores de nomes, registros MX, registros SOA, registros A e AAAA. Ele executa a varredura de domínio de nível superior, bem como o subdomínio de força bruta e até suporta uma lista de palavras.

Sintaxe

Para ver os opções disponíveis use o comando:

# dnsrecon -h
[email protected]:~# proxychains dnsrecon -h
ProxyChains-3.1 (http://proxychains.sf.net)
usage: dnsrecon.py [-h] [-d DOMAIN] [-n NS_SERVER] [-r RANGE] [-D DICTIONARY]
                   [-f] [-t TYPE] [-a] [-s] [-g] [-b] [-k] [-w] [-z]
                   [--threads THREADS] [--lifetime LIFETIME] [--tcp] [--db DB]
                   [-x XML] [-c CSV] [-j JSON] [--iw] [-v]

optional arguments:
  -h, --help            show this help message and exit
  -d DOMAIN, --domain DOMAIN
                        Target domain.
  -n NS_SERVER, --name_server NS_SERVER
                        Domain server to use. If none is given, the SOA of the
                        target will be used.
  -r RANGE, --range RANGE
                        IP range for reverse lookup brute force in formats
                        (first-last) or in (range/bitmask).
  -D DICTIONARY, --dictionary DICTIONARY
                        Dictionary file of subdomain and hostnames to use for
                        brute force. Filter out of brute force domain lookup,
                        records that resolve to the wildcard defined IP
                        address when saving records.
  -f                    Filter out of brute force domain lookup, records that
                        resolve to the wildcard defined IP address when saving
                        records.
  -t TYPE, --type TYPE  Type of enumeration to perform.
  -a                    Perform AXFR with standard enumeration.
  -s                    Perform a reverse lookup of IPv4 ranges in the SPF
                        record with standard enumeration.
  -g                    Perform Google enumeration with standard enumeration.
  -b                    Perform Bing enumeration with standard enumeration.
  -k                    Perform crt.sh enumeration with standard enumeration.
  -w                    Perform deep whois record analysis and reverse lookup
                        of IP ranges found through Whois when doing a standard
                        enumeration.
  -z                    Performs a DNSSEC zone walk with standard enumeration.
  --threads THREADS     Number of threads to use in reverse lookups, forward
                        lookups, brute force and SRV record enumeration.
  --lifetime LIFETIME   Time to wait for a server to response to a query.
  --tcp                 Use TCP protocol to make queries.
  --db DB               SQLite 3 file to save found records.
  -x XML, --xml XML     XML file to save found records.
  -c CSV, --csv CSV     Comma separated value file.
  -j JSON, --json JSON  JSON file.
  --iw                  Continue brute forcing a domain even if a wildcard
                        records are discovered.
  -v                    Enable verbose

Para verificar um server:

# dnsrecon -d hack.me --lifetime 10
[email protected]:~# proxychains dnsrecon -d hack.me --lifetime 10
ProxyChains-3.1 (http://proxychains.sf.net)
[*] Performing General Enumeration of Domain: hack.me
[-] DNSSEC is not configured for hack.me
[*] 	 SOA ns4.hack.me 74.50.111.244
[*] 	 NS ns7.dnsmadeeasy.com 208.80.126.13
[*] 	 Bind Version for 208.80.126.13 DNS Made Easy Anycast
[*] 	 NS ns7.dnsmadeeasy.com 2600:1802:7::1
[*] 	 NS ns6.dnsmadeeasy.com 208.80.124.13
[*] 	 Bind Version for 208.80.124.13 DNS Made Easy Anycast
[*] 	 NS ns6.dnsmadeeasy.com 2600:1801:6::1
[*] 	 NS ns4.hack.me 74.50.111.244
[*] 	 Bind Version for 74.50.111.244 Microsoft DNS 6.1.7601 (1DB15EC5)
[*] 	 NS ns5.dnsmadeeasy.com 208.94.148.13
[*] 	 Bind Version for 208.94.148.13 DNS Made Easy Anycast
[*] 	 NS ns5.dnsmadeeasy.com 2600:1800:5::1
[*] 	 MX alt1.aspmx.l.google.com 74.125.206.27
[*] 	 MX alt4.aspmx.l.google.com 74.125.200.26
[*] 	 MX alt3.aspmx.l.google.com 108.177.14.27
[*] 	 MX alt2.aspmx.l.google.com 108.177.96.27
[*] 	 MX aspmx.l.google.com 64.233.190.26
[*] 	 A hack.me 74.50.111.244
[*] 	 TXT hack.me v=spf1 ip4:208.95.134.195 include:_spf.google.com include:amazonses.com -all
[*] Enumerating SRV Records
[-] No SRV Records Found for hack.me
[+] 0 Records Found

DNStracer

Essa ferramenta basicamente determina de onde um determinado DNS obtém suas informações. Isso é usado para rastrear uma cadeia de servidores DNS de volta à resposta autoritativa.

Você pode realizar uma consulta com o comando:

# dnstracer -r 3 -v hack.me
[email protected]:~# dnstracer -r -v hack.me
Strange amount of retries, setting to default
Tracing to hack.me[a] via 192.168.1.1, maximum of 3 retries
192.168.1.1 (192.168.1.1) 
 |\___ ns7.dnsmadeeasy.com [hack.me] (208.80.126.13) Got authoritative answer 
 |\___ ns7.dnsmadeeasy.com [hack.me] (2600:1802:0007:0000:0000:0000:0000:0001) * * * 
 |\___ ns5.dnsmadeeasy.com [hack.me] (208.94.148.13) Got authoritative answer 
 |\___ ns5.dnsmadeeasy.com [hack.me] (2600:1800:0005:0000:0000:0000:0000:0001) * * * 
 |\___ ns6.dnsmadeeasy.com [hack.me] (208.80.124.13) Got authoritative answer 
 |\___ ns6.dnsmadeeasy.com [hack.me] (2600:1801:0006:0000:0000:0000:0000:0001) * * * 
  \___ ns4.hack.me [hack.me] (74.50.111.244) Got authoritative answer 

DNSWalk

O DNSwalk é um depurador DNS simples que executa varredura de transferência de zona para domínios específicos. Ele verifica o banco de dados e encontra todo o endereço IP e hosts presentes.

Opções:

-r     Recursively descend sub-domains of the specified domain.
-a     Turn on warning of duplicate A records.
-d     Print debugging and 'status' information to stderr.  (Use only if redirecting stdout).
-m     Perform checks only if the zone has been modified since the previous run.
-F     Perform  "fascist"  checking.  When checking an A record, compare the PTR name for each IP address with the forward name and report mismatches.
-i     Suppress check for invalid characters in a domain name.
-l     Perform  "lame  delegation"  checking.   For every NS record, check to see that the listed host is  indeed returning authoritative answers for this domain.

Consulta:

[email protected]:~# dnswalk -r -d hack.me.
Checking hack.me.
Getting zone transfer of hack.me. from ns4.hack.me...failed
FAIL: Zone transfer of hack.me. from ns4.hack.me failed: REFUSED
!Getting zone transfer of hack.me. from ns5.dnsmadeeasy.com...failed
FAIL: Zone transfer of hack.me. from ns5.dnsmadeeasy.com failed: REFUSED
!Getting zone transfer of hack.me. from ns7.dnsmadeeasy.com...
failed
FAIL: Zone transfer of hack.me. from ns7.dnsmadeeasy.com failed: REFUSED
!Getting zone transfer of hack.me. from ns6.dnsmadeeasy.com...failed
FAIL: Zone transfer of hack.me. from ns6.dnsmadeeasy.com failed: REFUSED
!BAD: All zone transfer attempts of hack.me. failed!
!4 failures, 0 warnings, 1 errors.

Fierce

É basicamente uma ferramenta de reconhecimento da AIO. É um script em Perl que analisá rapidamente o domínio usando várias táticas.

Opções:

[email protected]:~# fierce -h
fierce.pl (C) Copywrite 2006,2007 - By RSnake at http://ha.ckers.org/fierce/

    Usage: perl fierce.pl [-dns example.com] [OPTIONS]

Overview:
    Fierce is a semi-lightweight scanner that helps locate non-contiguous
    IP space and hostnames against specified domains.  It's really meant
    as a pre-cursor to nmap, unicornscan, nessus, nikto, etc, since all
    of those require that you already know what IP space you are looking
    for.  This does not perform exploitation and does not scan the whole
    internet indiscriminately.  It is meant specifically to locate likely
    targets both inside and outside a corporate network.  Because it uses
    DNS primarily you will often find mis-configured networks that leak
    internal address space. That's especially useful in targeted malware.

Options:
    -connect    Attempt to make http connections to any non RFC1918
        (public) addresses.  This will output the return headers but
        be warned, this could take a long time against a company with
        many targets, depending on network/machine lag.  I wouldn't
        recommend doing this unless it's a small company or you have a
        lot of free time on your hands (could take hours-days).
        Inside the file specified the text "Host:\n" will be replaced
        by the host specified. Usage:

    perl fierce.pl -dns example.com -connect headers.txt

    -delay      The number of seconds to wait between lookups.
    -dns        The domain you would like scanned.
    -dnsfile    Use DNS servers provided by a file (one per line) for
                reverse lookups (brute force).
    -dnsserver  Use a particular DNS server for reverse lookups
        (probably should be the DNS server of the target).  Fierce
        uses your DNS server for the initial SOA query and then uses
        the target's DNS server for all additional queries by default.
    -file       A file you would like to output to be logged to.
    -fulloutput When combined with -connect this will output everything
        the webserver sends back, not just the HTTP headers.
    -help       This screen.
    -nopattern  Don't use a search pattern when looking for nearby
        hosts.  Instead dump everything.  This is really noisy but
        is useful for finding other domains that spammers might be
        using.  It will also give you lots of false positives,
        especially on large domains.
    -range      Scan an internal IP range (must be combined with
        -dnsserver).  Note, that this does not support a pattern
        and will simply output anything it finds.  Usage:

    perl fierce.pl -range 111.222.333.0-255 -dnsserver ns1.example.co

    -search     Search list.  When fierce attempts to traverse up and
        down ipspace it may encounter other servers within other
        domains that may belong to the same company.  If you supply a
        comma delimited list to fierce it will report anything found.
        This is especially useful if the corporate servers are named
        different from the public facing website.  Usage:

    perl fierce.pl -dns examplecompany.com -search corpcompany,blahcompany

        Note that using search could also greatly expand the number of
        hosts found, as it will continue to traverse once it locates
        servers that you specified in your search list.  The more the
        better.
    -suppress   Suppress all TTY output (when combined with -file).
    -tcptimeout Specify a different timeout (default 10 seconds).  You
        may want to increase this if the DNS server you are querying
        is slow or has a lot of network lag.
    -threads  Specify how many threads to use while scanning (default
      is single threaded).
    -traverse   Specify a number of IPs above and below whatever IP you
        have found to look for nearby IPs.  Default is 5 above and
        below.  Traverse will not move into other C blocks.
    -version    Output the version number.
    -wide       Scan the entire class C after finding any matching
        hostnames in that class C.  This generates a lot more traffic
        but can uncover a lot more information.
    -wordlist   Use a seperate wordlist (one word per line).  Usage:

    perl fierce.pl -dns examplecompany.com -wordlist dictionary.txt

Consulta:

[email protected]:~# fierce -dns hack.me
DNS Servers for hack.me:
	ns4.hack.me
	ns5.dnsmadeeasy.com
	ns7.dnsmadeeasy.com
	ns6.dnsmadeeasy.com

Trying zone transfer first...
	Testing ns4.hack.me
		Request timed out or transfer not allowed.
	Testing ns5.dnsmadeeasy.com
		Request timed out or transfer not allowed.
	Testing ns7.dnsmadeeasy.com
		Request timed out or transfer not allowed.
	Testing ns6.dnsmadeeasy.com
		Request timed out or transfer not allowed.

Unsuccessful in zone transfer (it was worth a shot)
Okay, trying the good old fashioned way... brute force

Checking for wildcard DNS...
Nope. Good.
Now performing 2280 test(s)...

logoNSW

DNSmap

Esta ferramenta é usada principalmente para subdomínios forçados brutos de um determinado nome de domínio. Esta ferramenta foi lançada em 2006.

dnsmap – Ferramenta de forçar brute de nome de domínio DNS
[email protected]: ~ # dnsmap 
dnsmap 0.30 - Mapeador de rede DNS por pagvac (gnucitizen.org) 

uso: dnsmap <domínio-de-destino> [opções] 
opções: 
-w <arquivo de lista de palavras> 
-r <arquivo de resultados-regulares> 
- c <csv-results-file> 
-d <delay-millisecs> 
-i <ips-to-ignore> (útil se você está obtendo falsos positivos), 

por exemplo: 
dnsmap target-domain.foo 
dnsmap target-domain.foo -w yourwordlist.txt -r /tmp/domainbf_results.txt 
dnsmap target-fomain.foo -r / tmp / -d 3000 
dnsmap target-fomain.foo -r ./domainbf_results.txt
dnsmap-bulk.sh – Ferramenta de forçar brute de nome de domínio DNS
[email protected]: ~ # dnsmap-bulk.sh 
uso: dnsmap-bulk.sh <domínios-arquivo> [resultados-caminho] 
exemplo: 
dnsmap-bulk.sh domains.txt 
dnsmap-bulk.sh domains.txt / tmp /

Exemplo de uso do dnsmapDigitalize example.com usando uma lista de palavras (-w /usr/share/wordlists/dnsmap.txt) :

[email protected]: ~ # dnsmap example.com -w /usr/share/wordlists/dnsmap.txt 
dnsmap 0.30 - Mapeador de rede DNS por pagvac (gnucitizen.org) 
[+] procurando (sub) domínios por example.com usando / usr /share/wordlists/dnsmap.txt 
[+] usando um atraso aleatório máximo de 10 milissegundos entre solicitações

Exemplo de uso do dnsmap-bulk

Crie um arquivo contendo nomes de domínio para escanear (domains.txt) e passe-o para dnsmap-bulk.sh:

[email protected]: ~ # echo "example.com" >> 
root do domains.txt @ kali: ~ # echo "example.org" >> 
root do domains.txt @ kali: ~ # dnsmap-bulk.sh domains.txt 
dnsmap 0.30 - DNS Network Mapper por pagvac (gnucitizen.org) 
[+] procurando (sub) domínios por example.com usando a lista de palavras 
[+] incorporada usando um atraso aleatório máximo de 10 milissegundos entre os pedidos


DNSENUM

Outro script Perl para enumerar informações de DNS para um domínio específico e descobrir detalhes como servidores de nomes e blocos IP não contíguos.

Opções:

[email protected]:~# dnsenum -h
dnsenum VERSION:1.2.4
Usage: dnsenum [Options] <domain> 
[Options]:
Note: the brute force -f switch is obligatory.
GENERAL OPTIONS:
  --dnsserver   <server>
            Use this DNS server for A, NS and MX queries.
  --enum        Shortcut option equivalent to --threads 5 -s 15 -w.
  -h, --help        Print this help message.
  --noreverse       Skip the reverse lookup operations.
  --nocolor     Disable ANSIColor output.
  --private     Show and save private ips at the end of the file domain_ips.txt.
  --subfile <file>  Write all valid subdomains to this file.
  -t, --timeout <value> The tcp and udp timeout values in seconds (default: 10s).
  --threads <value> The number of threads that will perform different queries.
  -v, --verbose     Be verbose: show all the progress and all the error messages.
GOOGLE SCRAPING OPTIONS:
  -p, --pages <value>   The number of google search pages to process when scraping names, 
            the default is 5 pages, the -s switch must be specified.
  -s, --scrap <value>   The maximum number of subdomains that will be scraped from Google (default 15).
BRUTE FORCE OPTIONS:
  -f, --file <file> Read subdomains from this file to perform brute force.
  -u, --update  <a|g|r|z>
            Update the file specified with the -f switch with valid subdomains.
    a (all)     Update using all results.
    g       Update using only google scraping results.
    r       Update using only reverse lookup results.
    z       Update using only zonetransfer results.
  -r, --recursion   Recursion on subdomains, brute force all discovred subdomains that have an NS record.
WHOIS NETRANGE OPTIONS:
  -d, --delay <value>   The maximum value of seconds to wait between whois queries, the value is defined randomly, default: 3s.
  -w, --whois       Perform the whois queries on c class network ranges.
             **Warning**: this can generate very large netranges and it will take lot of time to performe reverse lookups.
REVERSE LOOKUP OPTIONS:
  -e, --exclude <regexp>
            Exclude PTR records that match the regexp expression from reverse lookup results, useful on invalid hostnames.
OUTPUT OPTIONS:
  -o --output <file>    Output in XML format. Can be imported in MagicTree (www.gremwell.com)

Exemplo:

Não faça uma pesquisa inversa (–noreverse) e salve a saída em um arquivo (-o teste.xml) para o domínio hack.me:

[email protected]:~# dnsenum --noreverse -o teste.xml hack.me
Smartmatch is experimental at /usr/bin/dnsenum line 698.
Smartmatch is experimental at /usr/bin/dnsenum line 698.
dnsenum VERSION:1.2.4

-----   hack.me   -----


Host's addresses:
__________________

hack.me.                                 722      IN    A        74.50.111.244


Name Servers:
______________

ns4.hack.me.                             742      IN    A        74.50.111.244
ns5.dnsmadeeasy.com.                     31313    IN    A        208.94.148.13
ns7.dnsmadeeasy.com.                     69922    IN    A        208.80.126.13
ns6.dnsmadeeasy.com.                     43590    IN    A        208.80.124.13


Mail (MX) Servers:
___________________

alt1.aspmx.l.google.com.                 293      IN    A        74.125.206.27
alt4.aspmx.l.google.com.                 293      IN    A        74.125.200.27
alt3.aspmx.l.google.com.                 293      IN    A        108.177.14.27
alt2.aspmx.l.google.com.                 293      IN    A        108.177.96.27
aspmx.l.google.com.                      293      IN    A        172.217.192.27


Trying Zone Transfers and getting Bind Versions:
_________________________________________________


Trying Zone Transfer for hack.me on ns5.dnsmadeeasy.com ... 
AXFR record query failed: REFUSED

Trying Zone Transfer for hack.me on ns6.dnsmadeeasy.com ... 
AXFR record query failed: REFUSED

Trying Zone Transfer for hack.me on ns7.dnsmadeeasy.com ... 
AXFR record query failed: REFUSED

Trying Zone Transfer for hack.me on ns4.hack.me ... 
AXFR record query failed: REFUSED

brute force file not specified, bay.

Theharvester

theHarvester é uma ferramenta para reunir contas de e-mail, nomes de subdomínios, hosts virtuais, portas / banners abertos e nomes de funcionários de diferentes fontes públicas (mecanismos de pesquisa, servidores de chave pgp).

É uma ferramenta muito simples, mas muito eficaz para os estágios iniciais de um teste de penetração ou apenas para conhecer a visibilidade de sua empresa na Internet.

As fontes são:
Passiva:

-google: mecanismo de pesquisa do Google – www.google.com.brwww . google . com

-googleCSE: mecanismo de pesquisa personalizado do Google

-google-profiles: mecanismo de pesquisa do Google, pesquisa específica para perfis do Google

-bing: motor de busca da microsoft – www.bing.comwww . bing . com

-bingapi: motor de busca da Microsoft, através da API (você precisa adicionar sua chave no arquivo discovery / bingsearch.py)

-dogpile: motor de busca Dogpile – www.dogpile.comwww . dogpile . com

-pgp: servidor de chaves pgp – mit.edu

-linkedin: motor de busca do google, pesquisa específica para usuários do Linkedin

-vhost: pesquisa de hosts virtuais do Bing

-twitter: contas do Twitter relacionadas a um domínio específico (usa a pesquisa do google)

-googleplus: usuários que trabalham na empresa-alvo (usa a pesquisa do google)

-yahoo: motor de busca do Yahoo

-baidu: motor de busca Baidu

-shodan: Shodan Computer search engine, irá procurar por portas e banner dos hosts descobertos ( http://www.shodanhq.com/ )

Ativo:

Força bruta de -DNS: este plugin irá executar uma enumeração de força bruta de dicionário

-DNS reverse lookup: pesquisa inversa de ip´s descobertos para encontrar nomes de host

-DNS expansão TDL: enumeração de força bruta do dicionário TLD

Módulos que precisam de chaves de API para funcionar:

-googleCSE: você precisa criar um mecanismo de pesquisa personalizado do Google (CSE) e adicionar sua chave de API do Google e seu ID de CSE no plug-in (discovery / googleCSE.py)

-shodan: Você precisa fornecer sua chave de API em discovery / shodansearch.py

Exemplo de pesquisa com todas as opções para um determinado domínio:

[email protected]:~# theharvester -d hack.me -l 200 -b all -f harvested


*******************************************************************
*                                                                 *
* | |_| |__   ___    /\  /\__ _ _ ____   _____  ___| |_ ___ _ __  *
* | __| '_ \ / _ \  / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
* | |_| | | |  __/ / __  / (_| | |   \ V /  __/\__ \ ||  __/ |    *
*  \__|_| |_|\___| \/ /_/ \__,_|_|    \_/ \___||___/\__\___|_|    *
*                                                                 *
* theHarvester Ver. 3.0.6                                         *
* Coded by Christian Martorella                                   *
* Edge-Security Research                                          *
* [email protected]                                   *
*******************************************************************


found supported engines
[-] Starting harvesting process for domain: hack.me

Full harvest on hack.me
[-] Searching in Google..
	Searching 0 results...
	Searching 100 results...
	Searching 200 results...
[-] Searching in PGP Key server..
	Searching PGP results...
[-] Searching in Netcraft server..
	Searching Netcraft results..
[-] Searching in ThreatCrowd server..
	Searching Threatcrowd results..
[-] Searching in CRTSH server..
		Searching https://crt.sh?id=739181434
		Searching https://crt.sh?id=717644905
		Searching https://crt.sh?id=25133023
		Searching https://crt.sh?id=5001313
		Searching https://crt.sh?id=93708
	Searching CRT.sh results..
[-] Searching in Virustotal server..
	Searching Virustotal results..
[-] Searching in Bing..
	Searching 50 results...
	Searching 100 results...
	Searching 150 results...
	Searching 200 results...
[-] Searching in Hunter:
You need an API key in order to use the Hunter search engine. You can get one here: https://hunter.io

DMitry

O DMitry (Deepmagic Information Gathering Tool) é uma aplicação Open Source de linha de comandos que nos permite coletar diversos tipos de informações sobre um host em uma rede. A ferramenta, que é codificada em linguagem C, é capaz de coletar dados sobre subdomínios, endereços de e-mail, efetuar escaneamento de portas TCP (port scan), lookups whois e mais algumas funções.

Opções do DMitry:

-o arquivo Salvar a saída do comando no arquivo especificado
-i Realizar um lookup whois com o endereço IP de um host
-w Realizar um lookup whois com o nome de domínio de um host
-n Recuperar informações do Netcraft.com sobre um host
-s Realizar uma busca por subdomínios possíveis
-e Realizar uma busca por possíveis endereços de e-mail
-p Efetuar um port scan TCP em um host
-f Efetuar um port scan TCP em um host mostrando um relatório na saída sobre as portas filtradas
-b Ler o banner recebido da porta escaneada
-t 0-9 Configurar o TTL em segundos ao escanear uma porta TCP (O padrão é 2)
*Requer que a opção -p seja utilizada

Consulta lookup whois no host hack.me

[email protected]:~# dmitry -w hack.me
Deepmagic Information Gathering Tool
"There be some deep magic going on"

HostIP:74.50.111.244
HostName:hack.me

Gathered Inic-whois information for hack.me
---------------------------------
Domain Name: HACK.ME
Registry Domain ID: D108500000000003559-AGRS
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2018-04-30T15:06:34Z
Creation Date: 2008-04-29T18:00:32Z
Registry Expiry Date: 2021-04-29T18:00:32Z
Registrar Registration Expiration Date:
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: [email protected]
Registrar Abuse Contact Phone: +1.4806242505
Reseller:
Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Registrant Organization: Domains By Proxy, LLC
Registrant State/Province: Arizona
Registrant Country: US
Name Server: NS5.DNSMADEEASY.COM
Name Server: NS6.DNSMADEEASY.COM
Name Server: NS7.DNSMADEEASY.COM
Name Server: NS4.HACK.ME
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form  https://www.icann.org/wicf/)
>>> Last update of WHOIS database: 2019-02-09T03:00:55Z <<<

For more information on Whois status codes, please visit https://icann.org/epp

Access to WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the registr��K?$�y database. The `���data in thi���s record is provi%[email protected] bNSMADEEASY.COM
Name Server: NS4.HACK.ME
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form  https://www.icann.org/wicf/)
>>> Last update of WHOIS database: 2019-02-09T03:00:55Z <<<

For more information on Whois status codes, please visit https://icann.org/epp

Access to WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the registry database. The data in this record is provided by The Registry Operator for iy The Regist+ry Opera��K?$�tor for ����iy ���The Regist���+ry Opera`�����,@K?$�tor for ����iyme.whois-servers.net �����
              [email protected] �@Regist���+ry Operhack.mea`�����,@K?$�tor for ����iyme.whois-servers.net �����
                   [email protected] �@Regist���+ry Operhack.mea`�����,@K?$�---------------------------------
tor for ����iyme.whois-servers.net �����
                                        [email protected] �@Regist���+ry Operhack.mea`���`����脔�K?$�@���,���K?$�----�@-----`���--p���--74.50.111.244-------------------hack.me-
tor for ����iyme.whois-servers.net �����
                                        [email protected] �@Regist���+ry Operhack.mea`���`����脔�K?$�@���,���K?e registr��K?$�y database. The `���data in thi���s record is provi%[email protected] bNSMADEEASY.COM
Name Server: NS4.HACK.ME
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form  https://www.icann.org/wicf/)
>>> Last update of WHOIS database: 2019-02-09T03:00:55Z <<<

For more information on Whois status codes, please visit https://icann.org/epp

Access to WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the registry database. The data in this record is provided by The Registry Operator for iy The Regist+ry Opera��K?$�tor for ����iy ���The Regist���+ry Opera`�����,@K?$�tor for ����iyme.whois-servers.net �����
              [email protected] �@Regist���+ry Operhack.mea`�����,@K?$�tor for ����iyme.whois-servers.net �����
                   [email protected] �@Regist���+ry Operhack.mea`�����,@K?$�---------------------------------
tor for ����iyme.whois-servers.net �����
                                        [email protected] �@Regist���+ry Operhack.mea`���`����脔�K?$�@���,���K?$�----�@-----`���--p���--74.50.111.244-------------------hack.me-$�----�@-----`���--p���--74.50.111.244-------------------hack.me-$�----�@-----`���--p���--74.50.111.244---------------��K?$�PE��S----hack.m�[email protected]$�-<@---�@���-----`���--p�����}�S--74.50.���11.244---�@------------�S}�zJɐ<@��K?$����PE��S----hack.m��S���2o�S�[email protected]$�-<@---�@���-----`���--p�����}�S--74.50.���11.<@244--���-�@[email protected]����--�S}�zJ��<@�������K?�����$���������PE��S�����-�����--�����-h�����ac�����k.�����m�������S�������������������2o
�����S0����A�����K����nna����[email protected]�����e-�����$������-<�����@�����--����-�C����@]�����u�����������-�����--�����--�����`�������������������--.����p�K������S������b�����}s�����S����������--�����74�����.5!����0.c�����������������11.<@2!44--ï¿½Ü ï¿½ï¿½ï¿½ï¿½-�@---���[email protected]����--�S}�zdJ��<@������@�@K?�����$�8��������PE��	S�����-�����P��S-�����-h�����a	c�����<@k.���
                                     ��m�������S��
����2o                                            �������������
Falha de segmentação

Que a segurança esteja com você!!!

[products limit=”16″ columns=”4″ orderby=”rating”]

Igor Matsunaga

Diretor Técnico da NSWorld, entusiasta da área hacking a mais de 6 anos, hacker ético, formado em Segurança da Informação.

0 comentário

Deixe uma resposta

O seu endereço de e-mail não será publicado. Campos obrigatórios são marcados com *