kitsune.online Report : Visit Site


  • Server:Apache/2.4.33 (codei...
    X-Powered-By:PHP/7.2.6

    The main IP address: 185.76.145.185,Your server Russian Federation,Saint Petersburg ISP:CJSC Regional Network Information Center  TLD:online CountryCode:RU

    The description :all about not secure it from black fox...

    This report updates in 17-Jul-2018

Technical data of the kitsune.online


Geo IP provides you such as latitude, longitude and ISP (Internet Service Provider) etc. informations. Our GeoIP service found where is host kitsune.online. Currently, hosted in Russian Federation and its service provider is CJSC Regional Network Information Center .

Latitude: 59.894439697266
Longitude: 30.264169692993
Country: Russian Federation (RU)
City: Saint Petersburg
Region: Saint Petersburg City
ISP: CJSC Regional Network Information Center

the related websites

    link.springer.com nmcakes.co.uk pkmn.net deezer.com nfws.org.uk believemusic.com cigue.net coggles.com idatenudon.com.sg 

HTTP Header Analysis


HTTP Header information is a part of HTTP protocol that a user's browser sends to called Apache/2.4.33 (codeit) mpm-itk/2.4.7-04 OpenSSL/1.1.0h PHP/7.2.6 mod_perl/2.0.10 Perl/v5.16.3 containing the details of what the browser wants and will accept back from the web server.

X-Powered-By:PHP/7.2.6
Transfer-Encoding:chunked
Set-Cookie:PHPSESSID=ee6cac9e93b18c6bd118e4e92e152542; path=/; HttpOnly, dle_user_id=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/; HttpOnly, dle_password=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/; HttpOnly, dle_hash=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/; HttpOnly
Expires:Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive:timeout=5, max=100
Server:Apache/2.4.33 (codeit) mpm-itk/2.4.7-04 OpenSSL/1.1.0h PHP/7.2.6 mod_perl/2.0.10 Perl/v5.16.3
Connection:Keep-Alive
Pragma:no-cache
Cache-Control:no-store, no-cache, must-revalidate
Date:Tue, 17 Jul 2018 05:09:22 GMT
Content-Type:text/html; charset=windows-1251

DNS

soa:ns3-l2.nic.ru. dns.nic.ru. 2016030336 144 360 2592000 60
txt:"v=spf1 redirect=nicmail.ru"
ns:ns8-l2.nic.ru.
ns4-cloud.nic.ru.
ns8-cloud.nic.ru.
ns3-l2.nic.ru.
ns4-l2.nic.ru.
ipv4:IP:185.76.145.185
ASN:48287
OWNER:RU-SERVICE-AS, RU
Country:RU
mx:MX preference = 5, mail exchanger = mx02.nicmail.ru.
MX preference = 10, mail exchanger = mx01.nicmail.ru.
MX preference = 20, mail exchanger = mx03.nicmail.ru.

HtmlToText

: ? search home security stream -- porjects books soft video pics links contacts ^_^ eip kitsune are believed to possess superior intelligence, long life, and magical powers. 0x41414141 the only thing in life achieved without effort is failure ticks.. being a woman is a terribly difficult task since it consists principally in dealing with men crypto protocol beta 1.0 is out 03/02/2018 12:56 current status: beta version release: https://github.com/oxfemale/cryptone_web/releases/ - done add ping command to server - done client/server data exchange - done add subclients registration for username - done users registration - done rsa key exchange on fly - done aes-256 strong encryption channel inflate/deflate - compression of transmitted data - done shorthand masking of transmitted data - done encapsulation of data in any data transfer protocol - done cryptone protocol sources: https://github.com/oxfemale/cryptone_web cryptone sublibs: https://github.com/oxfemale/cryptone_lib/ presentation about cryptoprotocol from 2600 moscow: https://github.com/oxfemale/cryptone_web/raw/master/crypt.potx cryptoprotocol user registration client/server handshake and decryption of cryptography and keys exchange scheme on russian: https://github.com/oxfemale/cryptone_web/raw/master/cryptone.doc projects 100 1 2 3 4 5 alisa 6 3 122 10/11/2016 13:40 2600 moscow: " " p.s. - projects 100 1 2 3 4 5 alisa 2 866 malware virtualization by cpython bytecode 23/09/2016 18:35 moscow 2600 malware virtualization by cpython bytecode http://kitsune.online/projects/pyinstaller/virt_and_python.pdf pdf file : malware virtualization by cpython bytecode projects 100 1 2 3 4 5 alisa 5 845 some crappy asm code / 16bit call bios func 27/08/2016 14:05 ;this code is placed somewhere after 10000h 1. i assume you have set up long mode properly 2. your kernel is _not_ in the first 64k, so you have to alter cs for real mode. this example code use 1000h, but change it to your needs (kinda homework). 3. the original ivt is untouched projects 80 1 2 3 4 5 alisa 1 697 uac, load untrusted code to signed/trusted code and level up to system on fly 06/08/2016 12:02 uac, load untrusted code to signed/trusted code and level up to system on fly - http://kitsune.online/src/uac.potx any windows backdooring;) - http://kitsune.online/src/add-regbackdoor.ps1 fuckuac/fucksystem - http://kitsune.online/src/invoke-uac-me.ps1 windows shim db add our malware - http://kitsune.online/src/shim.cpp russian/english add u ass to system -http://kitsune.online/src/uac.potx methodic ^(o-o)^~~ leo davidson method ^(o-o)^~~ application compatibility shim redirect method, from winnt/gootkit ^(o-o)^~~ isecurityeditor winnt/simda method, used to turn off uac ^(o-o)^~~ wusa method used by win32/carberp ^(o-o)^~~ appinfo.dll way of whitelisting autoelevated applications and knowndlls cache changes ^(o-o)^~~ memory patching from ms "fix it" patch shim (and as side effect arbitrary dll injection) ^(o-o)^~~ windows 10 sysprep method, abusing different dll dependency added in windows 10 ^(o-o)^~~ microsoft management console and eventviewer missing dependency ^(o-o)^~~ winnt/sirefef method, abusing appinfo.dll way of whitelisting oobe.exe ^(o-o)^~~ win32/addrop method, also used in metasploit uacbypass module ^(o-o)^~~ microsoft gwx backdoor ^(o-o)^~~ appinfo whitelist/logic/api choice&usage; ^(o-o)^~~ microsoft management console and incorrect dll loading scheme ^(o-o)^~~ sxs dotlocal and targeting consent to gain system privileges ^(o-o)^~~ package manager and dism securitystream 0 1 2 3 4 5 alisa 0 1 206 assembler tutorial and documention 25/03/2016 15:23 assembler tutorial and documention: asm/nasm/wasm/tasm download full archive books 0 1 2 3 4 5 alisa 2 1 145 software and hardware exploitation documentation 25/03/2016 15:05 this is a catalog of links to articles on computer security software and hardware analysis and vulnerability exploitation, shellcode development and security mitigations, including computer security research, and malware stuff. link to: software and hardware exploitation documentation links 0 1 2 3 4 5 alisa 4 767 art of exploiting 25/03/2016 14:54 art of exploiting books "art of exploiting": part-1-stack-based-overflows.pdf writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2.pdf seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b.pdf writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh.pdf exploit-to-metasploit-the-basics.pdf how-debugger-modules-plugins-can-speed-up-basic-exploit-development.pdf bypassing-stack-cookies-safeseh-hw-dep-and-aslr.pdf unicode-from-0x00410041-to-calc.pdf win32-egg-hunting.pdf introduction-to-win32-shellcoding.pdf chaining-dep-with-rop-the-rubikstm-cube.pdf heap-spraying-demystified.pdf hack-notes-ropping-eggs-for-breakfast.pdf win32-eggs-to-omelet.pdf wow64-egghunter.pdf quickzip-stack-bof-0day-a-box-of-chocolates.pdf books 0 1 2 3 4 5 alisa 2 962 stoned bootkit framework 25/03/2016 14:31 stoned bootkit framework what is stoned bootkit? stoned bootkit framework.zip a bootkit is a boot virus that is able to hook and patch windows to get load into the windows kernel, and thus getting unrestricted access to the entire computer. it is even able to bypass full volume encryption, because the master boot record (where stoned is stored) is not encrypted. the master boot record contains the decryption software which asks for a password and decrypts the drive. this is the weak point, the master boot record, which will be used to pwn your whole system. no ones secure! attacks windows xp, sever 2003, windows vista, windows 7 with one single master boot record attacks truecrypt full volume encryption has integrated fat and ntfs drivers has an integrated structure for plugins and boot applications (for future development) soft 0 1 2 3 4 5 alisa 0 740 crypto loader in to process example (asm/fasm) 25/03/2016 14:25 asm example: loader exe in to a process - av bypass and generate fake hided gui - generate key by time and user activity - decrypt section and write into dll in disk - bypass proactive av and inject dll into explorer.exe - execute dll loader.asm projects 0 1 2 3 4 5 alisa 3 1 737 1 2 3 ... ... ... « 2018 » 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 2018 (1) 2016 (1) 2016 (1) 2016 (2) 2016 (20) -- antivirus api arcanus asm av borland bypass c chaning cloud cpp crypto-puzzle debug dll doc downgrade exploit explorer gcc generate hook hooker ida idapro injection linux loader login msvc ollydbg pdf ppt ps1 release revers software time-lock traffic winapi wow default green red threezine iblog-106 test1 test2 -- home security stream porjects books soft video pics links contacts copyright 2016 :: fox ^_^ .

URL analysis for kitsune.online


https://www.kitsune.online/projectengine/
https://www.kitsune.online/#arch_list
https://www.kitsune.online/#carousel-main
https://www.kitsune.online/securitystream/
https://www.kitsune.online/index.php?do=feedback
https://www.kitsune.online/booking/
https://www.kitsune.online/#news_coms
https://www.kitsune.online/linking/
https://www.kitsune.online/videos/
https://www.kitsune.online/#news_top
https://www.kitsune.online/#arch_calendar
https://www.kitsune.online/pictures/
https://www.kitsune.online/software/

Whois Information


Whois is a protocol that is access to registering information. You can reach when the website was registered, when it will be expire, what is contact details of the site with the following informations. In a nutshell, it includes these informations;

WHOIS
function doSubmit(){bad = 0;dom = frmMain.txtDOMAIN.value;if (dom == undefined)bad = 1;else if (dom.length < 1)bad = 1;if (bad == 1)alert("You didn't enter a domain name. Please enter a domain name.");elsefrmMain.submit();}
INRS Whois Lookup
That Domain doesnt exist.or is invalid.
Enter a Domain Name tolook up:

The INRS WHOIS can be used to look up any domains that are registered in the Inclusive NamespaceRegistry System (INRS). This WHOIS is not linked to any ICANN-related database, therefore you cannotlook up any .COM, .NET or .ORG domains. Rate-limiting mechanisms are installed to prevent 'mining'or other inpermissible actions.

SERVERS

  SERVER http://www.adns.net/whois.php

  ARGS txtDOMAIN=kitsune.online.org.za

  PORT 80

  TYPE domain

DOMAIN

  NAME kitsune.online

NSERVER

  NS4-L2.NIC.RU 91.217.20.1

  NS8-L2.NIC.RU 91.217.21.1

  NS4-CLOUD.NIC.RU 185.119.138.10

  NS8-CLOUD.NIC.RU 185.119.136.12

  NS3-L2.NIC.RU 193.232.146.1

  REGISTERED yes

Go to top

Mistakes


The following list shows you to spelling mistakes possible of the internet users for the website searched .

  • www.ukitsune.com
  • www.7kitsune.com
  • www.hkitsune.com
  • www.kkitsune.com
  • www.jkitsune.com
  • www.ikitsune.com
  • www.8kitsune.com
  • www.ykitsune.com
  • www.kitsuneebc.com
  • www.kitsuneebc.com
  • www.kitsune3bc.com
  • www.kitsunewbc.com
  • www.kitsunesbc.com
  • www.kitsune#bc.com
  • www.kitsunedbc.com
  • www.kitsunefbc.com
  • www.kitsune&bc.com
  • www.kitsunerbc.com
  • www.urlw4ebc.com
  • www.kitsune4bc.com
  • www.kitsunec.com
  • www.kitsunebc.com
  • www.kitsunevc.com
  • www.kitsunevbc.com
  • www.kitsunevc.com
  • www.kitsune c.com
  • www.kitsune bc.com
  • www.kitsune c.com
  • www.kitsunegc.com
  • www.kitsunegbc.com
  • www.kitsunegc.com
  • www.kitsunejc.com
  • www.kitsunejbc.com
  • www.kitsunejc.com
  • www.kitsunenc.com
  • www.kitsunenbc.com
  • www.kitsunenc.com
  • www.kitsunehc.com
  • www.kitsunehbc.com
  • www.kitsunehc.com
  • www.kitsune.com
  • www.kitsunec.com
  • www.kitsunex.com
  • www.kitsunexc.com
  • www.kitsunex.com
  • www.kitsunef.com
  • www.kitsunefc.com
  • www.kitsunef.com
  • www.kitsunev.com
  • www.kitsunevc.com
  • www.kitsunev.com
  • www.kitsuned.com
  • www.kitsunedc.com
  • www.kitsuned.com
  • www.kitsunecb.com
  • www.kitsunecom
  • www.kitsune..com
  • www.kitsune/com
  • www.kitsune/.com
  • www.kitsune./com
  • www.kitsunencom
  • www.kitsunen.com
  • www.kitsune.ncom
  • www.kitsune;com
  • www.kitsune;.com
  • www.kitsune.;com
  • www.kitsunelcom
  • www.kitsunel.com
  • www.kitsune.lcom
  • www.kitsune com
  • www.kitsune .com
  • www.kitsune. com
  • www.kitsune,com
  • www.kitsune,.com
  • www.kitsune.,com
  • www.kitsunemcom
  • www.kitsunem.com
  • www.kitsune.mcom
  • www.kitsune.ccom
  • www.kitsune.om
  • www.kitsune.ccom
  • www.kitsune.xom
  • www.kitsune.xcom
  • www.kitsune.cxom
  • www.kitsune.fom
  • www.kitsune.fcom
  • www.kitsune.cfom
  • www.kitsune.vom
  • www.kitsune.vcom
  • www.kitsune.cvom
  • www.kitsune.dom
  • www.kitsune.dcom
  • www.kitsune.cdom
  • www.kitsunec.om
  • www.kitsune.cm
  • www.kitsune.coom
  • www.kitsune.cpm
  • www.kitsune.cpom
  • www.kitsune.copm
  • www.kitsune.cim
  • www.kitsune.ciom
  • www.kitsune.coim
  • www.kitsune.ckm
  • www.kitsune.ckom
  • www.kitsune.cokm
  • www.kitsune.clm
  • www.kitsune.clom
  • www.kitsune.colm
  • www.kitsune.c0m
  • www.kitsune.c0om
  • www.kitsune.co0m
  • www.kitsune.c:m
  • www.kitsune.c:om
  • www.kitsune.co:m
  • www.kitsune.c9m
  • www.kitsune.c9om
  • www.kitsune.co9m
  • www.kitsune.ocm
  • www.kitsune.co
  • kitsune.onlinem
  • www.kitsune.con
  • www.kitsune.conm
  • kitsune.onlinen
  • www.kitsune.col
  • www.kitsune.colm
  • kitsune.onlinel
  • www.kitsune.co
  • www.kitsune.co m
  • kitsune.online
  • www.kitsune.cok
  • www.kitsune.cokm
  • kitsune.onlinek
  • www.kitsune.co,
  • www.kitsune.co,m
  • kitsune.online,
  • www.kitsune.coj
  • www.kitsune.cojm
  • kitsune.onlinej
  • www.kitsune.cmo
Show All Mistakes Hide All Mistakes