raz0r.name Report : Visit Site


  • Ranking Alexa Global: # 1,200,513,Alexa Ranking in Russia is # 137,589

    Server:nginx...
    X-Powered-By:PHP/5.6.36

    The main IP address: 37.140.192.245,Your server Russian Federation,Moscow ISP:Reg.Ru Hosting  TLD:name CountryCode:RU

    The description :блог об информационной безопасности и уязвимостях веб-интерфейсов...

    This report updates in 03-Jul-2018

Technical data of the raz0r.name


Geo IP provides you such as latitude, longitude and ISP (Internet Service Provider) etc. informations. Our GeoIP service found where is host raz0r.name. Currently, hosted in Russian Federation and its service provider is Reg.Ru Hosting .

Latitude: 55.752220153809
Longitude: 37.615558624268
Country: Russian Federation (RU)
City: Moscow
Region: Moscow City
ISP: Reg.Ru Hosting

HTTP Header Analysis


HTTP Header information is a part of HTTP protocol that a user's browser sends to called nginx containing the details of what the browser wants and will accept back from the web server.

X-XSS-Protection:1; mode=block
X-Content-Type-Options:nosniff
X-Powered-By:PHP/5.6.36
Transfer-Encoding:chunked
Set-Cookie:bb2_screener_=1530606780+45.33.85.57+45.33.85.57; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=-1530606779; path=/
Strict-Transport-Security:max-age=31536000; includeSubDomains
Vary:Accept-Encoding
Server:nginx
Connection:keep-alive
Link:; rel="https://api.w.org/", ; rel=shortlink
Date:Tue, 03 Jul 2018 08:33:01 GMT
X-Frame-Options:SAMEORIGIN
Content-Type:text/html; charset=UTF-8
Content-Encoding:gzip

DNS

soa:server42.hosting.reg.ru. support.reg.ru. 2018041801 10800 3600 604800 86400
txt:"v=spf1 include:_spf.google.com ~all"
ns:ns2.hosting.reg.ru.
ns1.hosting.reg.ru.
ipv4:IP:37.140.192.245
ASN:197695
OWNER:AS-REG, RU
Country:RU
mx:MX preference = 10, mail exchanger = ALT3.ASPMX.L.GOOGLE.COM.
MX preference = 10, mail exchanger = ALT4.ASPMX.L.GOOGLE.COM.
MX preference = 5, mail exchanger = ALT1.ASPMX.L.GOOGLE.COM.
MX preference = 1, mail exchanger = ASPMX.L.GOOGLE.COM.
MX preference = 5, mail exchanger = ALT2.ASPMX.L.GOOGLE.COM.

HtmlToText

<? raz0r.name — web application security blog predicting random numbers in ethereum smart contracts 1 february 2018 talks raz0r 0 comments blockchain , ethereum , security , smart contracts slides from my appsec california 2018 talk “predicting random numbers in ethereum smart contracts” detailed blog post: https://blog.positive.com/predicting-random-numbers-in-ethereum-smart-contracts-e5358c6b8620 -- looting graphql endpoints for fun and profit 8 june 2017 articles raz0r 3 comments graphql , javascript , rpc , security in one of the previous posts about the state of modern web applications security i mentioned graphql – a new technology for building apis developed by facebook. graphql is rapidly gaining popularity, more and more services switch to this technology, both web and mobile applications. some of the graphql users are: github, shopify, pintereset, hackerone and many more . you can find many posts about graphql benefits and advantages over classic rest api on the internet, however there is not so much information about graphql security considerations. in this post i would like to elaborate on graphql: how it works, what the weak points are, how an attacker can abuse them, and which tools can be used. more » -- arbitrary file reading in next.js < 2.4.1 2 june 2017 vulnerabilities raz0r 0 comments javascript , nextjs , react next.js is a quite popular (>13k stars on github) framework for server-rendered react applications. it includes a nodejs server which allows to render html pages dynamically. while digging into server’s code, a list of internal routes drew my attention: defineroutes () { const routes = { /* ... */ '/_next/:path+': async (req, res, params) => { const p = join(__dirname, '..', 'client', ...(params.path || [])) await this.servestatic(req, res, p) }, '/static/:path+': async (req, res, params) => { const p = join(this.dir, 'static', ...(params.path || [])) await this.servestatic(req, res, p) } /* ... */ } as you can see you can pass arbitrary path into servestatic() function via /_next/ and /static/ endpoints: export function servestatic (req, res, path) { return new promise((resolve, reject) => { send(req, path) .on('directory', () => { // we don't allow directories to be read. const err = new error('no directory access') err.code = 'enoent' reject(err) }) .on('error', reject) .pipe(res) .on('finish', resolve) }) } this function just pipes the contents of files into the output without any validation or restrictions. so, we can try to perform a path traversal: get /_next/../../../../../../../../../etc/passwd http/1.1 and it works! however, nodejs application servers are usually deployed behind nginx. due to path normalization in nginx we cannot just use forward slashes and dots, nginx will return a bad request error code. luckily, nodejs server transforms backslashes into forward slashes, so we can bypass nginx validation. get /_next\..\..\..\..\..\..\..\..\..\etc\passwd http/1.1 zeit, the company which develops next.js, was very quick to respond and roll out the patch . be sure to update to the latest version. -- database firewall from scratch 25 may 2017 talks raz0r 1 comment mysql , phdays , sql-injection , waf , безопасность slides from our talk with denis kolegov at phdays 7 “database firewall from scratch” (+ bonus). database firewall from scratch from denis kolegov -- postmessage security in chrome extensions 4 april 2017 talks raz0r 0 comments chrome , javascript , owasp , rce , xss slides from my talk at owasp london meetup on the 30th of march, 2017. video crx postmessage scanner source code -- universal (isomorphic) web applications security 1 february 2017 articles raz0r 3 comments javascript , react , redux , безопасность nowadays you do not write things in jquery. you use node.js, webpack, react, redux, websockets, babel and a ton of other packages to help you create a basic todo web application. with frontend technologies developing rapidly, isomorphic (or to be correct universal ) web applications are a big thing now. in a nutshell, it means that you can write the code in javascript which can be run both on server and client side with reusable components, validators and shared state. lovely, isn’t it? as a frontend developer you would say that it definitely is. a security guy would argue since the approach is extremely unsafe for your data. more » -- waf.js: how to protect web applications using javascript 25 may 2016 talks raz0r 0 comments burp , csrf , dom , javascript , phdays , waf , xss , безопасность waf.js: how to protect web applications using javascript from denis kolegov -- обзор атак на клиента с помощью css 1 september 2015 articles raz0r 1 comment css , firefox , ie , rpo , xss css (cascading style sheets) – язык разметки для оформления внешнего вида веб-страниц, отделяющий визуальное представление от содержания. первая спецификация формата была опубликована организацией w3c в 1996 году. тогда css позволял делать самые простые вещи: покрасить блок текста цветом, оформить текст курсивом, выравнять абзац, сделать рамку. сегодня css стал настолько сложным, что для него создают фреймворки (bootstrap, jquery ui) и метаязыки (sass, scss, less), которые позволяют упростить написание стилей с помощью увеличения уровня абстракции css. бурное развитие css привлекло внимание исследователей безопасности, что вылилось в ряд техник, позволяющих проводить атаки на клиента с целью украсть его персональные данные: csrf-токены, историю посещений сайтов, списки email-контактов и т.д. начнем обзор с классических векторов, которые еще не потеряли свою актуальность. more » -- вебинар по распознаванию ботов с помощью машинного обучения 26 july 2015 news raz0r 0 comments в записи нет меток. в среду в 19:00 с моим коллегой андреем завгородним проводим вебинар “распознавание активности ботов с помощью алгоритмов машинного обучения” . ждем всех, кто интересуется машинным обучением и не только. и да, мы все еще ищем специалистов по веб-безопасности, хакеров и тех, кому интересно не только ломать, но и защищать для исследовательской работы в проекте pt application firewall . пишите на мою почту: [email protected] -- компания positive technologies срочно ищет веб-хакеров разной квалификации 23 january 2014 news raz0r 4 comments в записи нет меток. в первую очередь нам интересен ваш практический опыт в данном направлении, а не количество строчек в резюме. приветствуется наличие статей в блогах и на форумах, в журнале хакер, участие в ctf или bug-bounty программах. пожелания с технической стороны: наличие навыков практической компрометации и защиты веб-приложений; желателен опыт программирования на любом из языков: java, c#/vb (asp, asp.net), php, python, ruby (наиболее востребованы: java, c#/vb), sql; наличие собственных разработок и исследований, в том числе и опубликованных на тематических форумах и в блогах; наличие опубликованных данных об уязвимостях, обнаруженных вами. задачи, которые предлагаем: анализ защищенности веб-приложений и систем дбо ведущих российских и зарубежных компаний; проведение тестов на проникновение, участие в исследовательской деятельности отдела, посещение и участие в российских и международных конференциях; участие в организации конференции positive hack days; возможность вести собственные исследования в области иб; работа в команде признанных экспертов в иб. условия: «белая» заработная плата; дмс; 6 недель оплачиваемого отпуска. мы можем предложить работу в московском и питерском офисе компании, а так же удаленно. резюме/вопросы пишите на [email protected] -- next page »  tags smf xml opera cms xpath malware perl mssql dom lol clickjacking chrome unserialize tinymce owasp joomla osvdb blockchain ethereum google fuzzing security rce winbinder блоггинг hpp nextjs dezend react redux spring mvc rpo confidence graphql анонимность перевод phpbb python sqlbruter microsoft hash length extension ][akep криптография feedburner phdays zeronights css phpbugscanner defcon ssrf svn jsp expr

URL analysis for raz0r.name


http://raz0r.name/wp-content/uploads/2015/07/687474703a2f2f75706c6f61642e77696b696d656469612e6f72672f77696b6970656469612f656e2f7468756d622f612f61362f42656e6465725f526f6472696775657a2e706e672f32323070782d42656e6465725f526f6472696775657a2e706e67.png
https://raz0r.name/articles/universal-isomorphic-web-applications-security/#more-706
https://raz0r.name/tag/malware/
https://raz0r.name/2009/01/
https://raz0r.name/tag/smart-contracts/
https://raz0r.name/obzory/top-10-luchshix-onlajn-servisov-po-rasshifrovke-xeshej/#comment-229857
https://raz0r.name/tag/ssrf/
https://raz0r.name/2009/02/
https://raz0r.name/category/talks/
https://raz0r.name/articles/looting-graphql-endpoints-for-fun-and-profit/
https://raz0r.name/tag/fuzzing/
https://raz0r.name/2009/05/
https://raz0r.name/tag/phpbb/
https://raz0r.name/tag/burp/
https://raz0r.name/tag/zeronights/

Whois Information


Whois is a protocol that is access to registering information. You can reach when the website was registered, when it will be expire, what is contact details of the site with the following informations. In a nutshell, it includes these informations;


Disclaimer: VeriSign, Inc. makes every effort to maintain the
completeness and accuracy of the Whois data, but cannot guarantee
that the results are error-free. Therefore, any data provided
through the Whois service are on an as is basis without any
warranties.
BY USING THE WHOIS SERVICE AND THE DATA CONTAINED
HEREIN OR IN ANY REPORT GENERATED WITH RESPECT THERETO, IT IS
ACCEPTED THAT VERISIGN, INC. IS NOT LIABLE FOR
ANY DAMAGES OF ANY KIND ARISING OUT OF, OR IN CONNECTION WITH, THE
REPORT OR THE INFORMATION PROVIDED BY THE WHOIS SERVICE, NOR
OMISSIONS OR MISSING INFORMATION. THE RESULTS OF ANY WHOIS REPORT OR
INFORMATION PROVIDED BY THE WHOIS SERVICE CANNOT BE RELIED UPON IN
CONTEMPLATION OF LEGAL PROCEEDINGS WITHOUT FURTHER VERIFICATION, NOR
DO SUCH RESULTS CONSTITUTE A LEGAL OPINION. Acceptance of the
results of the Whois constitutes acceptance of these terms,
conditions and limitations. Whois data may be requested only for
lawful purposes, in particular, to protect legal rights and
obligations. Illegitimate uses of Whois data include, but are not
limited to, unsolicited email, data mining, direct marketing or any
other improper purpose. Any request made for Whois data will be
documented by VeriSign, Inc. but will not be used for any commercial purpose whatsoever.

****

Registry Domain ID: 3527984_DOMAIN_NAME-VRSN
Domain Name: RAZ0R.NAME
Registrar: REGISTRAR OF DOMAIN NAMES REG.RU LLC
Registrar IANA ID: 1606
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited

>>> Last update of whois database: 2018-02-08T18:21:24Z <<<

For more information on Whois status codes, please visit https://icann.org/epp


  REFERRER http://www.nic.name/

  REGISTRAR Global Name Registry

SERVERS

  SERVER name.whois-servers.net

  ARGS raz0r.name

  PORT 43

  TYPE domain

DOMAIN

  HANDLE 3527984_DOMAIN_NAME-VRSN

  NAME raz0r.name

STATUS
clientTransferProhibited https://icann.org/epp#clientTransferProhibited

NSERVER

  NS1.HOSTING.REG.RU 31.31.196.34

  NS2.HOSTING.REG.RU 31.31.194.3

  REGISTERED yes

Go to top

Mistakes


The following list shows you to spelling mistakes possible of the internet users for the website searched .

  • www.uraz0r.com
  • www.7raz0r.com
  • www.hraz0r.com
  • www.kraz0r.com
  • www.jraz0r.com
  • www.iraz0r.com
  • www.8raz0r.com
  • www.yraz0r.com
  • www.raz0rebc.com
  • www.raz0rebc.com
  • www.raz0r3bc.com
  • www.raz0rwbc.com
  • www.raz0rsbc.com
  • www.raz0r#bc.com
  • www.raz0rdbc.com
  • www.raz0rfbc.com
  • www.raz0r&bc.com
  • www.raz0rrbc.com
  • www.urlw4ebc.com
  • www.raz0r4bc.com
  • www.raz0rc.com
  • www.raz0rbc.com
  • www.raz0rvc.com
  • www.raz0rvbc.com
  • www.raz0rvc.com
  • www.raz0r c.com
  • www.raz0r bc.com
  • www.raz0r c.com
  • www.raz0rgc.com
  • www.raz0rgbc.com
  • www.raz0rgc.com
  • www.raz0rjc.com
  • www.raz0rjbc.com
  • www.raz0rjc.com
  • www.raz0rnc.com
  • www.raz0rnbc.com
  • www.raz0rnc.com
  • www.raz0rhc.com
  • www.raz0rhbc.com
  • www.raz0rhc.com
  • www.raz0r.com
  • www.raz0rc.com
  • www.raz0rx.com
  • www.raz0rxc.com
  • www.raz0rx.com
  • www.raz0rf.com
  • www.raz0rfc.com
  • www.raz0rf.com
  • www.raz0rv.com
  • www.raz0rvc.com
  • www.raz0rv.com
  • www.raz0rd.com
  • www.raz0rdc.com
  • www.raz0rd.com
  • www.raz0rcb.com
  • www.raz0rcom
  • www.raz0r..com
  • www.raz0r/com
  • www.raz0r/.com
  • www.raz0r./com
  • www.raz0rncom
  • www.raz0rn.com
  • www.raz0r.ncom
  • www.raz0r;com
  • www.raz0r;.com
  • www.raz0r.;com
  • www.raz0rlcom
  • www.raz0rl.com
  • www.raz0r.lcom
  • www.raz0r com
  • www.raz0r .com
  • www.raz0r. com
  • www.raz0r,com
  • www.raz0r,.com
  • www.raz0r.,com
  • www.raz0rmcom
  • www.raz0rm.com
  • www.raz0r.mcom
  • www.raz0r.ccom
  • www.raz0r.om
  • www.raz0r.ccom
  • www.raz0r.xom
  • www.raz0r.xcom
  • www.raz0r.cxom
  • www.raz0r.fom
  • www.raz0r.fcom
  • www.raz0r.cfom
  • www.raz0r.vom
  • www.raz0r.vcom
  • www.raz0r.cvom
  • www.raz0r.dom
  • www.raz0r.dcom
  • www.raz0r.cdom
  • www.raz0rc.om
  • www.raz0r.cm
  • www.raz0r.coom
  • www.raz0r.cpm
  • www.raz0r.cpom
  • www.raz0r.copm
  • www.raz0r.cim
  • www.raz0r.ciom
  • www.raz0r.coim
  • www.raz0r.ckm
  • www.raz0r.ckom
  • www.raz0r.cokm
  • www.raz0r.clm
  • www.raz0r.clom
  • www.raz0r.colm
  • www.raz0r.c0m
  • www.raz0r.c0om
  • www.raz0r.co0m
  • www.raz0r.c:m
  • www.raz0r.c:om
  • www.raz0r.co:m
  • www.raz0r.c9m
  • www.raz0r.c9om
  • www.raz0r.co9m
  • www.raz0r.ocm
  • www.raz0r.co
  • raz0r.namem
  • www.raz0r.con
  • www.raz0r.conm
  • raz0r.namen
  • www.raz0r.col
  • www.raz0r.colm
  • raz0r.namel
  • www.raz0r.co
  • www.raz0r.co m
  • raz0r.name
  • www.raz0r.cok
  • www.raz0r.cokm
  • raz0r.namek
  • www.raz0r.co,
  • www.raz0r.co,m
  • raz0r.name,
  • www.raz0r.coj
  • www.raz0r.cojm
  • raz0r.namej
  • www.raz0r.cmo
Show All Mistakes Hide All Mistakes