leidecker.info Report : Visit Site


  • Ranking Alexa Global: # 10,595,745

    Server:Apache...

    The main IP address: 85.13.150.201,Your server Germany,Friedersdorf ISP:Neue Medien Muennich GmbH  TLD:info CountryCode:DE

    The description :home projects downloads advisories contact & links sqlninja released! feb 04 2013 this is great news. after joining the sqlninja team and putting lots of effort in, the new version of sqlninja has...

    This report updates in 13-Jun-2018

Created Date:2005-04-18

Technical data of the leidecker.info


Geo IP provides you such as latitude, longitude and ISP (Internet Service Provider) etc. informations. Our GeoIP service found where is host leidecker.info. Currently, hosted in Germany and its service provider is Neue Medien Muennich GmbH .

Latitude: 50.604919433594
Longitude: 11.03577041626
Country: Germany (DE)
City: Friedersdorf
Region: Thuringen
ISP: Neue Medien Muennich GmbH

the related websites

HTTP Header Analysis


HTTP Header information is a part of HTTP protocol that a user's browser sends to called Apache containing the details of what the browser wants and will accept back from the web server.

Content-Length:5344
Upgrade:h2,h2c
Content-Encoding:gzip
Accept-Ranges:bytes
Vary:Accept-Encoding
Keep-Alive:timeout=2, max=1000
Server:Apache
Connection:Upgrade, Keep-Alive
Date:Tue, 12 Jun 2018 17:11:48 GMT
Content-Type:text/html

DNS

soa:ns.hosteurope.com. hostmaster.leidecker.info. 2009050703 86400 3600 1209600 300
ns:ns2.hosteurope.com.
ns.hosteurope.com.
ipv4:IP:85.13.150.201
ASN:34788
OWNER:NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE
Country:DE
mx:MX preference = 20, mail exchanger = w0113320.kasserver.com.
MX preference = 10, mail exchanger = w0113320.kasserver.com.

HtmlToText

home projects downloads advisories contact & links sqlninja released! feb 04 2013 this is great news. after joining the sqlninja team and putting lots of effort in, the new version of sqlninja has finally been released. the sql injection and take-over tool now supports data extraction, a fancy new file upload method and various other useful bits and bobs. for instance, sqlninja now lets you store your progress in a session file. download it here , give it a try and let us know what you think! sap netweaver remote code execution april 29 2012 a bug in sap netweavers's saphostcontrol allows remote code execution. sap have released a patch which can be obtained from here . the vulnerability arises from copying user input of variable size into a static buffer. the full advisory with additional information can be found here . ms11-066: microsoft .net chart control august 09 2011 the actual finding of this vulnerabilities already lies quite some time back. but microsoft have finally released the security bulletin on this one (check out: ms11-066 ). the .net chart control plots graphs, by default stores them as image files on the web server and then serves those files on request. a typical request for example would be: /chartimg.axd?i=chart_0_3.png . before reading and returning the file it does some validation to determine whether the requested file is in the allowed directory or not. however, that validation process is flawed and effectively allows traversing directories and reading arbitrary files on the system. furthermore, there's a "hidden" trace parameter ( /chartimg.axd?trace=1 ) that discloses somewhat interesting debug information. find more information here . icmp shell in sqlmap may 06 2011 after a big refurbishment the new version of sqlmap is finally out, supporting multiple techniques to exploit sql injection in various database management systems. a lot of new features have been added including spawning shells using icmp shell. certainly worth checking it out! have a look here . sqlninja coming up... aug 18 2010 good news. there'll actually be some practical use for the reverse icmp shell that i uploaded just the other day. it's now made its way into sqlninja and will be included in the next release. at the moment it's available in the svn repository. reverse icmp shell jun 04 2010 due to a recent requirement, i put this reverse icmp shell together. it's comes with a win32 slave and *nix c or perl master. the slave is based on windows library functions which should be on any system from windows 2000 on. the advantage of using those is that it does not require high privileges to send out icmp requests as opposed to raw sockets. the slave is about 22k and can even be uploaded via sql injection in reasonable time. have a play . mission accomplished! aug 02 2009 ... well, kind of. i happily announce the first alpha release of heyoka to be downloaded from here . the alpha version however is somewhat limited and you might find one or the other bug. as for now, it has been tested on windows 2008 only and null or cname queries are not supported yet. those and a lot of other features and improvements will be implemented shortly. anyway, i'm sure you'll have a lot of fun playing with what is there. so, have a go and leave us some feedback. :) confidence 2009 - recapitulation may 22 2009 i must say it has been a great event. the venue, the people and the talks were all brilliant at confidence this year. there are a few talks that i want to highlight: rich smith presented his work on how to automate attacks against systems running vnc. he showed how he can send key strokes to the remote vnc server and thus upload files or execute commands. the talk was well done and the demo rocked! secondly, there was shannon conheady who gave a witty and well entertaining talk about social engineering, her experiences and helpful tips and tricks. and then of course, there was michael kemp and his feisty talk about rootkits sold as data loss prevention (dlp) tools by well-known anti virus vendors. in the end, that very controversial talk sparked a big argument between him, supporters and the present av vendors. alltogether a conference worth attending. and i, for sure, will do my best to be there again in 2010... the heyoka slides can be found soon on either the conference site or our sourceforge pages . witam w krakowie - welcome to krakow! may 05 2009 this is going to be the second gig for heyoka. after a successful first performance at the source conference in boston we'll present our work at confidence in krakow. since boston we improved our dns tunneling technics and came up with a few new ideas to make the tunnel even stealthier. if you happen to be at confidence then join us on the 15th of may at 4pm. it'll fun, it'll be worth it... cracking made simple: p|d 1.2.2 (aka. phrasen|drescher) march 30 2009 it's been quite a while since the last release. i've extended the api, fixed some bugs in the core and plugin codes and added another plugin that allows cracking the symmetric keys of encrypted files. the plugin is based on the pgp made simple library (gpgme) and therefore supports all ciphers that are supported by gnupg. have a look at the project page ... heyoka is born! march 24 2009 heyoka had its first performance in public. we presented our research and showed a demo of the tool at source boston 2009 two weeks ago. since then, we got some really nice and helpful feedback which left us inspired and motivated to keep on working on heyoka. if you're interested, the slides are available on the sourceforge page ... source boston was a great conference with many high level talks and a nice atmosphere. there's going to be source barcelona this year in september. i recommend that you don't miss it :) coming up: source boston february 26 2009 i'll have the pleasure to talk together with alberto revelli a.k.a icesurfer ( sqlninja ) at source boston about a new tool that we have been developing in the past few month. heyoka is a tuned up dns tunneling tool that is build for speed, throughput as well as stealth. we make use of some flexibility in the dns protocol that has been described in the related rfcs and is implemented in the most common dns servers. additionally, we split the communication channels between slave and master to make the tunnel difficult to detect. heyoka will not be released to public very soon. but if you happen to be in boston in mid of march and if you are interested then don't hesitate to attend the talk and come for a beer with us afterwards... phrasen|drescher in third release june 23 2008 this is the third release of phrasen|drescher (now version 1.1.1) and it comes with a lot more features and improvements. p|d is now multi processing and supports plugins for different purposes such as cracking rsa and dsa key pass phrases, ms sql password hashes, ssh accounts on remote hosts as well as cracking web application accounts via http based logins. p|d offers a simple and easy to understand api for further plugin development. read more cisco unified call manager sql injection february 21 2008 the cisco unified call manager (versions prior to 6.1(1a) and 5.1(3a)) is prone to multiple sql injections. this requires the attacker to have access to an account within the application. he might then be able to retrieve other users passwords and other sensitive information. read more phrasen|drescher first release january 24 2008 the first release of phrasen|drescher, a tool that cracks rsa and dsa key passphrases as they would be used by ssh, can be found in the projects section. it performs wordlist and rule based attacks against one or multiple keys at a time and is known to run under freebsd, netbsd, openbsd, macos x and linux. read more greensql advisory october 12 2007 greensql is an open source database firewall which acts as proxy server and is used to protect databases from sql injection attacks. there's a format string vulnerability in the applications logging facility. exploiting this vulnerabilty might allow attackers to exectue arbitrary code within the context of the greensql proxy server. read more papoo cms advisory - second try june 24 2007 the papoo content management system, once again, has security flaws. that's an sql injection ( read more ) and a quite interesting access restriction bypass ( read more ) that may allow attackers to retrieve all usernames and password hashes. having fun with postgresql june 16 2007 postgresql has serious security issues with its configuration. those could allow an attacker to escalade privileges, execute shell commands or upload (binary) files. these vulnerabilities mainly originate from a mistakes in the configuration of which some are the default configuration in the postgresql installation. from an administrator point of view risks can easily be mitigated. please read the paper to find more information about the vulnerabilities. read more © 2009 all rights reserved.

URL analysis for leidecker.info


http://www.leidecker.info/projects/phrasendrescher/index.shtml
http://www.leidecker.info/downloads/index.shtml#shells
http://www.leidecker.info/projects/index.shtml
http://www.leidecker.info/advisories/2012-04-29-sap-netweaver-bof.shtml
http://www.leidecker.info/projects/phrasendrescher/index.shtml
http://www.leidecker.info/advisories/2008-02-21-cisco_ucm_sql.shtml
http://www.leidecker.info/downloads/having_fun_with_postgresql.txt
http://www.leidecker.info/advisories/2007-06-24-papoo_sql_injection.shtml
http://www.leidecker.info/links.shtml
http://www.leidecker.info/advisories/2011-08-11-ms-chart-control.shtml
http://www.leidecker.info/../advisories/2007-06-24-papoo_access_restriction_bypass.shtml
http://www.leidecker.info/advisories/index.shtml
http://www.leidecker.info/index.shtml
http://www.leidecker.info/downloads/index.shtml
http://www.leidecker.info/advisories/2007-10-12-greensql.shtml

Whois Information


Whois is a protocol that is access to registering information. You can reach when the website was registered, when it will be expire, what is contact details of the site with the following informations. In a nutshell, it includes these informations;

Domain Name: LEIDECKER.INFO
Registry Domain ID: D10071119-LRMS
Registrar WHOIS Server:
Registrar URL: www.domainmonster.com
Updated Date: 2014-06-16T20:45:11Z
Creation Date: 2005-04-18T16:31:05Z
Registry Expiry Date: 2018-04-18T16:31:05Z
Registrar Registration Expiration Date:
Registrar: Mesh Digital Limited
Registrar IANA ID: 1390
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone:
Reseller:
Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Registry Registrant ID: C151732575-LRMS
Registrant Name: Identity Protection Service
Registrant Organization: Identity Protect Limited
Registrant Street: PO Box 795
Registrant City: Godalming
Registrant State/Province: Surrey
Registrant Postal Code: GU7 9GA
Registrant Country: GB
Registrant Phone: +44.1483307527
Registrant Phone Ext:
Registrant Fax: +44.1483304031
Registrant Fax Ext:
Registrant Email: [email protected]
Registry Admin ID: C151732575-LRMS
Admin Name: Identity Protection Service
Admin Organization: Identity Protect Limited
Admin Street: PO Box 795
Admin City: Godalming
Admin State/Province: Surrey
Admin Postal Code: GU7 9GA
Admin Country: GB
Admin Phone: +44.1483307527
Admin Phone Ext:
Admin Fax: +44.1483304031
Admin Fax Ext:
Admin Email: [email protected]
Registry Tech ID: C151732575-LRMS
Tech Name: Identity Protection Service
Tech Organization: Identity Protect Limited
Tech Street: PO Box 795
Tech City: Godalming
Tech State/Province: Surrey
Tech Postal Code: GU7 9GA
Tech Country: GB
Tech Phone: +44.1483307527
Tech Phone Ext:
Tech Fax: +44.1483304031
Tech Fax Ext:
Tech Email: [email protected]
Registry Billing ID: C151732575-LRMS
Billing Name: Identity Protection Service
Billing Organization: Identity Protect Limited
Billing Street: PO Box 795
Billing City: Godalming
Billing State/Province: Surrey
Billing Postal Code: GU7 9GA
Billing Country: GB
Billing Phone: +44.1483307527
Billing Phone Ext:
Billing Fax: +44.1483304031
Billing Fax Ext:
Billing Email: [email protected]
Name Server: NS.123-REG.CO.UK
Name Server: NS2.123-REG.CO.UK
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of WHOIS database: 2017-07-22T15:06:47Z <<<

For more information on Whois status codes, please visit https://icann.org/epp

Access to AFILIAS WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Afilias registry database. The data in this record is provided by Afilias Limited for informational purposes only, and Afilias does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to(a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Afilias reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.

  REFERRER http://whois.afilias.info

  REGISTRAR Afilias Global Registry Services

SERVERS

  SERVER info.whois-servers.net

  ARGS leidecker.info

  PORT 43

  TYPE domain

DOMAIN

  NAME leidecker.info

  HANDLE D10071119-LRMS

  CREATED 2005-04-18

STATUS
clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
clientTransferProhibited https://icann.org/epp#clientTransferProhibited
clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited

NSERVER

  NS.123-REG.CO.UK 212.67.202.2

  NS2.123-REG.CO.UK 62.138.132.21

OWNER

  HANDLE C151732575-LRMS

  NAME Identity Protection Service

  ORGANIZATION Identity Protect Limited

ADDRESS

STREET
PO Box 795

  CITY Godalming

  STATE Surrey

  PCODE GU7 9GA

  COUNTRY GB

  PHONE +44.1483307527

  EMAIL [email protected]

ADMIN

  HANDLE C151732575-LRMS

  NAME Identity Protection Service

  ORGANIZATION Identity Protect Limited

ADDRESS

STREET
PO Box 795

  CITY Godalming

  STATE Surrey

  PCODE GU7 9GA

  COUNTRY GB

  PHONE +44.1483307527

  EMAIL [email protected]

TECH

  HANDLE C151732575-LRMS

  NAME Identity Protection Service

  ORGANIZATION Identity Protect Limited

ADDRESS

STREET
PO Box 795

  CITY Godalming

  STATE Surrey

  PCODE GU7 9GA

  COUNTRY GB

  PHONE +44.1483307527

  EMAIL [email protected]

BILLING

  HANDLE C151732575-LRMS

  NAME Identity Protection Service

  ORGANIZATION Identity Protect Limited

ADDRESS

STREET
PO Box 795

  CITY Godalming

  STATE Surrey

  PCODE GU7 9GA

  COUNTRY GB

  PHONE +44.1483307527

  FAX +44.1483304031

  EMAIL [email protected]

  REGISTERED yes

Go to top

Mistakes


The following list shows you to spelling mistakes possible of the internet users for the website searched .

  • www.uleidecker.com
  • www.7leidecker.com
  • www.hleidecker.com
  • www.kleidecker.com
  • www.jleidecker.com
  • www.ileidecker.com
  • www.8leidecker.com
  • www.yleidecker.com
  • www.leideckerebc.com
  • www.leideckerebc.com
  • www.leidecker3bc.com
  • www.leideckerwbc.com
  • www.leideckersbc.com
  • www.leidecker#bc.com
  • www.leideckerdbc.com
  • www.leideckerfbc.com
  • www.leidecker&bc.com
  • www.leideckerrbc.com
  • www.urlw4ebc.com
  • www.leidecker4bc.com
  • www.leideckerc.com
  • www.leideckerbc.com
  • www.leideckervc.com
  • www.leideckervbc.com
  • www.leideckervc.com
  • www.leidecker c.com
  • www.leidecker bc.com
  • www.leidecker c.com
  • www.leideckergc.com
  • www.leideckergbc.com
  • www.leideckergc.com
  • www.leideckerjc.com
  • www.leideckerjbc.com
  • www.leideckerjc.com
  • www.leideckernc.com
  • www.leideckernbc.com
  • www.leideckernc.com
  • www.leideckerhc.com
  • www.leideckerhbc.com
  • www.leideckerhc.com
  • www.leidecker.com
  • www.leideckerc.com
  • www.leideckerx.com
  • www.leideckerxc.com
  • www.leideckerx.com
  • www.leideckerf.com
  • www.leideckerfc.com
  • www.leideckerf.com
  • www.leideckerv.com
  • www.leideckervc.com
  • www.leideckerv.com
  • www.leideckerd.com
  • www.leideckerdc.com
  • www.leideckerd.com
  • www.leideckercb.com
  • www.leideckercom
  • www.leidecker..com
  • www.leidecker/com
  • www.leidecker/.com
  • www.leidecker./com
  • www.leideckerncom
  • www.leideckern.com
  • www.leidecker.ncom
  • www.leidecker;com
  • www.leidecker;.com
  • www.leidecker.;com
  • www.leideckerlcom
  • www.leideckerl.com
  • www.leidecker.lcom
  • www.leidecker com
  • www.leidecker .com
  • www.leidecker. com
  • www.leidecker,com
  • www.leidecker,.com
  • www.leidecker.,com
  • www.leideckermcom
  • www.leideckerm.com
  • www.leidecker.mcom
  • www.leidecker.ccom
  • www.leidecker.om
  • www.leidecker.ccom
  • www.leidecker.xom
  • www.leidecker.xcom
  • www.leidecker.cxom
  • www.leidecker.fom
  • www.leidecker.fcom
  • www.leidecker.cfom
  • www.leidecker.vom
  • www.leidecker.vcom
  • www.leidecker.cvom
  • www.leidecker.dom
  • www.leidecker.dcom
  • www.leidecker.cdom
  • www.leideckerc.om
  • www.leidecker.cm
  • www.leidecker.coom
  • www.leidecker.cpm
  • www.leidecker.cpom
  • www.leidecker.copm
  • www.leidecker.cim
  • www.leidecker.ciom
  • www.leidecker.coim
  • www.leidecker.ckm
  • www.leidecker.ckom
  • www.leidecker.cokm
  • www.leidecker.clm
  • www.leidecker.clom
  • www.leidecker.colm
  • www.leidecker.c0m
  • www.leidecker.c0om
  • www.leidecker.co0m
  • www.leidecker.c:m
  • www.leidecker.c:om
  • www.leidecker.co:m
  • www.leidecker.c9m
  • www.leidecker.c9om
  • www.leidecker.co9m
  • www.leidecker.ocm
  • www.leidecker.co
  • leidecker.infom
  • www.leidecker.con
  • www.leidecker.conm
  • leidecker.infon
  • www.leidecker.col
  • www.leidecker.colm
  • leidecker.infol
  • www.leidecker.co
  • www.leidecker.co m
  • leidecker.info
  • www.leidecker.cok
  • www.leidecker.cokm
  • leidecker.infok
  • www.leidecker.co,
  • www.leidecker.co,m
  • leidecker.info,
  • www.leidecker.coj
  • www.leidecker.cojm
  • leidecker.infoj
  • www.leidecker.cmo
Show All Mistakes Hide All Mistakes