Brute Force: Difference between revisions

From Vanishing Point Wiki
Jump to navigationJump to search
No edit summary
 
mNo edit summary
Line 8: Line 8:
*It might be worthwhile to check common known security flaws with IIS 6.0
*It might be worthwhile to check common known security flaws with IIS 6.0
*Does anybody know of a way to reverse lookup what domains use the PARK23.SECURESERVER.NET nameserver?
*Does anybody know of a way to reverse lookup what domains use the PARK23.SECURESERVER.NET nameserver?
*This might help [http://www.dnsstuff.com/tools/tracert.ch?ip=vanishingpointgame.com traceroute for vanishingpointgame.com]

Revision as of 03:53, 4 January 2007

The 6 ciphers mentioned have already been figured out, but chances are there is more on the site. Below is some additional data that may be useful in determining some brute force methods for data acquisition.

The domain was registered through a godaddy.com by a proxy domain service based in Arizona in order to hide the actual body that registered it, however some investigation has yeilded the following.

  • The site is hosted by company called Rackspace which is based in San Antonio. The actual server is actually located at their colocation datacenter in Nashua, NH.
  • The IP address of the site is 207.97.210.188.
  • The IP address of 42 Entertainment is 207.97.210.187, likely on the same server. Chances are, any related sites would be in Rackspace's IP range Whois for RackSpace IP. A little more effort might narrow that list down to NH only IPs.
  • It might be worthwhile to check common known security flaws with IIS 6.0
  • Does anybody know of a way to reverse lookup what domains use the PARK23.SECURESERVER.NET nameserver?
  • This might help traceroute for vanishingpointgame.com