A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Irongeek's Fed Watch Irongeek's Fed Watch

A quick report of the last 1000 web hits I recently got from hosts ending in .gov or .mil. To all of the United State Goverment folks that use my site: I'm honored you use my resources, please let me know if there are any training videos you would like for me to create. And send me a NSA/FBI/DHS hat or t-shirt. :)

HostnameIPOSBrowser AgentLocationPage ViewedDate/Time
*.uar.navy.mil205.56.*.*rv:24.0) Gecko/20100101 Firefox/24.0Mozilla/5.0 (Windows NT 5.1; rv:24.0) Gecko/20100101 Firefox/24.0 VIRGINIA BEACH VA USA Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP poisoning and other niceties. 2015-01-31 05:17:05
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USWorkout at the Gym2015-01-30 19:20:28
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USDiet2015-01-30 19:20:09
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USSupplements2015-01-30 19:18:40
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-30 19:17:35
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-30 19:17:10
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USUncloaking IP Addresses on IRC - Derek Callaway Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-30 19:15:48
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USChanging Your MAC Address In Window XP/Vista, Linux And Mac OS X (Sometimes known as MAC spoofing)2015-01-30 15:00:20
*.fdic.gov167.176.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36 Arlington VA USPractical Guide to Alternative Data Streams in NTFS2015-01-30 14:04:12
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA USPractical Guide to Alternative Data Streams in NTFS2015-01-30 14:01:26
*.net.nih.gov128.231.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36 Bethesda MD USManual Page - hexedit(1)2015-01-30 13:16:15
*.ssmcnet.noaa.gov205.156.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36 Silver Spring MD US2015-01-30 12:17:28
*.belvoir.army.mil160.147.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Fort Huachuca AZ USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-30 11:57:16
*.afnoc.af.mil132.3.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USTor or not Tor: How to tell if someone is coming from a Tor exit node, in PHP2015-01-30 11:51:17
*.afnoc.af.mil132.3.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USTor or not Tor: How to tell if someone is coming from a Tor exit node, in PHP2015-01-30 11:46:04
*.afnoc.af.mil132.3.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USTor or not Tor: How to tell if someone is coming from a Tor exit node, in PHP2015-01-30 11:46:03
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-30 11:45:30
*.amrdec.army.mil199.209.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36 Columbus OH US2015-01-30 11:45:25
*.afnoc.af.mil132.3.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USTor or not Tor: How to tell if someone is coming from a Tor exit node, in PHP2015-01-30 11:45:19
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USHumor2015-01-30 11:42:24
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USPractical Guide to Alternative Data Streams in NTFS2015-01-30 11:39:24
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USWorkout at the Gym2015-01-30 11:32:18
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA US2015-01-30 11:30:18
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) MAFB-Gunter Annex AL USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2015-01-30 11:11:57
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USPlug and Prey: Malicious USB Devices2015-01-30 11:05:40
*.nbc.gov137.227.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Reston VA USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-30 10:20:30
*.jsc.nasa.gov128.157.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 MSFC AL USIPv6 Attack tools - Scott Hogg (TakeDownCon Rocket City 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-30 09:23:08
*.atc.army.mil134.194.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Fort Huachuca AZ US2015-01-30 07:57:40
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA US2015-01-30 07:47:52
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USLocking down Windows Vista and Windows 7 against Malicious USB devices 2015-01-30 07:27:06
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Smyrna TN US2015-01-30 07:23:39
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USIntroduction to hacking with PowerShell - Scott Busby (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-30 06:56:15
*.srvs.usps.gov56.0.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; NISSC; rv:11.0) like Gecko Raleigh NC US2015-01-30 06:20:44
*.ct.gov159.247.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; rv:11.0) like Gecko East Hartford CT USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-30 05:49:04
*.ct.gov159.247.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; rv:11.0) like Gecko East Hartford CT USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-30 05:48:17
*.sandia.gov198.102.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Albuquerque NM US2015-01-30 05:46:03
*.osd.mil140.185.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-30 04:46:17
*.sd.spawar.navy.mil128.49.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36 VIRGINIA BEACH VA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-29 15:56:14
*.stj.spawar.navy.mil198.253.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; InfoPath.2; .NET4.0E) VIRGINIA BEACH VA USA Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP poisoning and other niceties. 2015-01-29 12:18:09
*.nrc.gov148.184.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E) Rockville MD USProgrammable HID USB Keystroke Dongle: Using the Teensy as a pen testing device2015-01-29 12:04:10
*.usdoj.gov149.101.*.*Mozilla/4.0 (compatible;) Potomac MD USIrongeek.com2015-01-29 11:34:23
*.usdoj.gov149.101.*.*Linux i686Mozilla/5.0 (X11; Linux i686; rv:26.0) Gecko/20100101 Firefox/26.0 Potomac MD US2015-01-29 11:34:18
*.atc.army.mil134.194.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-29 11:19:45
*.atc.army.mil134.194.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Fort Huachuca AZ USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-29 11:07:39
*.atc.army.mil134.194.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Fort Huachuca AZ US2015-01-29 11:06:47
*.inl.gov134.20.*.*Linux x86_64) AppleWebKit/537.36 (KHTML, like GeckMozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.120 Safari/537.36 Idaho Falls ID USManual Page - etterfilter(8)2015-01-29 10:20:04
*.virginia.gov166.67.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.91 Safari/537.36 Chester VA USHow To Burn An ISO Image To A Bootable CD (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-29 10:05:19
*.arl.army.mil158.12.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-29 09:56:35
*.arl.army.mil158.12.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-29 09:56:26
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USOSfuscate: Change your Windows OS TCP/IP Fingerprint to confuse P0f, NetworkMiner, Ettercap, Nmap and other OS detection tools 2015-01-29 09:54:18
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-29 09:49:40
*.sil.army.mil143.85.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Fort Huachuca AZ USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-29 09:39:44
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-29 09:10:59
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Fort Huachuca AZ USMan page of NASL2015-01-29 09:10:39
*.sandia.gov198.102.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Albuquerque NM USMan page of NPING2015-01-29 09:10:36
*.tic.va.gov152.131.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-29 09:05:17
*.virginia.gov166.67.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Chester VA USThumbscrew: Software USB Write Blocker2015-01-29 08:50:11
*.ri.gov158.123.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Providence RI USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-29 08:17:51
*.gor.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USBasic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-29 07:29:25
*.ssmcnet.noaa.gov205.156.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36 Silver Spring MD US2015-01-29 07:26:47
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-29 07:24:34
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-29 07:23:03
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) MAFB-Gunter Annex AL USExploiting Browsers Like A Boss w/ WhiteLightning! - Bryce Kunz Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-29 07:19:21
*.tic.va.gov152.131.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-29 07:07:52
*.sedgwick.gov205.172.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36 Wichita KS US2015-01-29 07:03:15
*.ih.navy.mil205.68.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA US2015-01-29 06:32:18
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Smyrna TN US2015-01-29 06:10:54
*.ncdoc.navy.mil205.57.*.*WOW64Mozilla/5.0 (Windows NT 6.2; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 VIRGINIA BEACH VA USNQSFW Free CISSP Study Guide (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-29 06:01:22
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USA Quick and Dirty Intro to Nessus (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-29 05:46:55
*.wiesbaden.army.mil139.139.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-29 04:46:20
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; MS-RTC LM 8; Tablet PC 2.0; MS-RTC LM MAFB-Gunter Annex AL USBasic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-29 04:00:54
*.usarec.army.mil199.123.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USA Crosswalk of the Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP) - John McLain Louisville InfoSec 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-29 03:40:05
*.usarec.army.mil199.123.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ US2015-01-29 03:39:41
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-29 00:27:24
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USMutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 102015-01-29 00:27:23
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USMobile Device Hacking: Turning your phone, PDA or internet tablet into a pen-testing platfor2015-01-29 00:24:37
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-29 00:23:42
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-29 00:22:57
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL US2015-01-29 00:22:20
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-29 00:22:20
*.les.mil205.77.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.104 Safari/537.36 VIRGINIA BEACH VA USLocking down Windows Vista and Windows 7 against Malicious USB devices 2015-01-28 23:33:35
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-28 22:17:03
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-28 19:27:20
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2015-01-28 18:17:10
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-28 14:52:05
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-28 14:30:03
*.fws.gov164.159.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Lakewood CO USUsing VMware Player to run Live CDs (Bootable ISOs) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-28 12:58:53
*.maricopa.gov156.42.*.*Android 4.4.2Mozilla/5.0 (Linux; Android 4.4.2; 7040T Build/KVT49L) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.89 Mobile Safari/537.36 Phoenix AZ USThumbscrew: Software USB Write Blocker2015-01-28 12:42:32
*.opm.gov205.131.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Web Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-28 12:09:09
*.159.153.26.4k.usda.gov199.159.*.*Intel Mac OS X 10.10Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Collins CO USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-28 11:59:09
*.fws.gov164.159.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Lakewood CO US2015-01-28 11:43:24
*.fws.gov164.159.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Lakewood CO US2015-01-28 11:35:53
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USGET A Grip on Your Hustle: Glassdoor Exfil Toolkit - Parker Schmitt - Kyle Stone (essobi) - Chris Hodges (g11tch) Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-28 11:16:48
*.apg.army.mil143.85.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USPineapple Abductions - Craig Young (Defcon Wireless Village 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-28 10:45:38
*.apg.army.mil143.85.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USPineapple Abductions - Craig Young (Defcon Wireless Village 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-28 10:43:18
*.20.225.19.pnnl.gov130.20.*.*Intel Mac OS X 10.10Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:35.0) Gecko/20100101 Firefox/35.0 Richland WA USA Basic Guide to Advanced Incident Response - Scott Roberts BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-28 10:34:53
*.pnl.gov192.35.*.*Mozilla/4.0 (compatible;) Richland WA USIrongeek.com2015-01-28 10:33:10
*.20.225.19.pnnl.gov130.20.*.*Intel Mac OS X 10.10Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:35.0) Gecko/20100101 Firefox/35.0 Richland WA US2015-01-28 10:32:08
*.dhs.gov216.81.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36 IE8Mercury Washington DC USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2015-01-28 08:53:28
*.dc3.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USIntroducing Intelligence Into Your Malware Analysis - Brian Baskin (BSides Delaware 2013) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-28 08:50:58
*.state.gov169.253.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-28 07:38:49
*.larc.nasa.gov192.94.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36 MSFC AL USWhat can you find out from an IP?2015-01-28 07:20:06
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USPlug and Prey: Malicious USB Devices2015-01-28 06:54:05
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-28 06:16:43
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-28 06:16:28
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-28 06:16:27
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-28 06:16:06
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-28 06:15:25
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-28 06:15:13
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-28 06:14:46
*.usarec.army.mil199.123.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ US2015-01-28 06:04:44
*.srvs.usps.gov56.0.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Raleigh NC US2015-01-28 06:03:46
*.disa.mil214.36.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.101 Safari/537.36 Columbus OH USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-28 05:39:18
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Smyrna TN US2015-01-28 05:25:19
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-28 05:16:32
*.disa.mil214.36.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.101 Safari/537.36 Columbus OH USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-28 04:37:04
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USManual Page - netcat(1)2015-01-28 04:14:25
*.mhsi.med.osd.mil214.2.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Columbus OH US2015-01-28 03:50:09
*.ncdoc.navy.mil205.57.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0) VIRGINIA BEACH VA US2015-01-27 23:16:00
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2015-01-27 17:47:47
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-27 17:38:02
*.wf.mt.gov161.7.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Helena MT USPractical Guide to Alternative Data Streams in NTFS2015-01-27 14:21:01
*.tn.gov170.141.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.91 Safari/537.36 Smyrna TN USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-27 13:35:06
*.usace.army.mil140.194.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 OPR/20.0.1387.82 Fort Huachuca AZ USBuilding an InfoSec lab, on the cheap2015-01-27 13:34:30
*.gsfc.nasa.gov198.119.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:35.0) Gecko/20100101 Firefox/35.0 2015-01-27 12:56:39
*.car.army.mil140.153.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36 Fort Huachuca AZ US2015-01-27 12:38:51
*.dhs.gov216.81.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; IE8Mercury) Washington DC USDeveloping a Open Source Threat Intelligence Program — Edward McCabe (Circle City Con 2014 Videos) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-27 12:31:25
*.dhs.gov216.81.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; IE8Mercury) Washington DC USDeveloping a Open Source Threat Intelligence Program — Edward McCabe (Circle City Con 2014 Videos) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-27 12:30:15
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 MAFB-Gunter Annex AL USOpenAppID - Open Source Next Gen Firewall with Snort — Adam Hogan (Circle City Con 2014 Videos) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-27 12:25:05
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 MAFB-Gunter Annex AL USMadMACs: MAC Address Spoofing and Host Name Randomizing App for Windows 7 (Should work in Windows Vista and Windows 8 too) 2015-01-27 12:00:02
*.tic.va.gov152.133.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USHacking 802.11 Basics - textile (Defcon Wireless Village 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-27 11:52:52
*.socso.southcom.mil130.22.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Columbus OH US2015-01-27 11:22:51
*.usaidallnet.gov12.14.*.*Mozilla/4.0 (compatible;) MIDDLETOWN NJ USIrongeek.com2015-01-25 21:04:21
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-25 18:56:20
*.afnoc.af.mil132.3.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36 MAFB-Gunter Annex AL USBasics of Arpspoofing/Arppoisoning 2015-01-25 13:42:13
*.bpa.gov170.160.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.91 Safari/537.36 Portland OR USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-25 02:41:41
*.nmci.usmc.mil138.163.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; QS 4.2.4.0; QS 5.3.0.4; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; QS 4.2 VIRGINIA BEACH VA US2015-01-24 17:52:37
*.tic.va.gov152.130.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko Washington DC USThumbscrew: Software USB Write Blocker2015-01-24 07:36:17
*.scott.disa.mil209.22.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Columbus OH USLinks for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking2015-01-24 04:04:00
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USAround the world in 80 Cons (A tale of perspectives) - Jayson E Street GrrCON 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 19:29:47
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USHack3rcon 5 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-23 18:32:33
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USBash Scripting for Penetration Testers - Lee Baird - Hack3rcon 5 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:32:13
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USUniversity Education In Security Panel - Bill Gardner (@oncee) - Ray Davidson - Adrian Crenshaw - Sam Liles - Rob Jorgensen Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:28:09
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:25:13
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-23 18:25:11
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USIGiGLE: Irongeek's WiGLE WiFi Database to Google Earth Client for Wardrive Mapping2015-01-23 18:25:10
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USDerbyCon 2014 Higher Education Panel for Hackers: Irongeek’s Thoughts 2015-01-23 18:25:09
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USHack3rcon 5 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-23 18:25:09
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USGrrCON 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:25:07
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USLouisville Infosec 2014 Videos2015-01-23 18:25:06
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USDerbycon 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:25:05
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USBSides Augusta 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:25:04
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USPasswordscon 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:25:02
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USTakeDownCon Rocket City 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:25:01
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USDefcon Wireless Village 2014 (Defcon 22) 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:24:59
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USBsides Las Vegas 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:24:56
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USBSides Cleveland 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:24:54
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USOISF 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:24:52
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USDerbycon 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:24:45
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USChicken of the APT: Understanding Targeted Attackers with Incubation! - Kyle Wilhoit Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:24:38
*.gtwy.uscourts.gov199.107.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 San Diego CA USDerbycon 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 18:24:21
*.dhs.lacounty.gov159.225.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.91 Safari/537.36 Los Angeles CA USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-23 17:09:12
*.bpa.gov170.160.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; MS-RTC LM 8; InfoPath.3) Portland OR USFinding Rogue SMB File Shares On Your Network 2015-01-23 15:35:18
*.doe.gov205.254.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Washington DC US2015-01-23 14:52:21
*.ssmcnet.noaa.gov205.156.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Silver Spring MD US2015-01-23 14:26:22
*.modot.mo.gov168.166.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; InfoPath.3; Tablet PC 2.0) Jefferson City MO US2015-01-23 13:53:13
*.afnoc.af.mil132.3.*.*rv:27.0) Gecko/20100101 Firefox/27.0Mozilla/5.0 (Windows NT 6.1; rv:27.0) Gecko/20100101 Firefox/27.0 MAFB-Gunter Annex AL USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 13:37:22
*.gsac.disa.mil214.4.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USWebGoat 1: SQL Injection Demonstration (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-23 11:47:13
*.pac.army.mil150.137.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-23 11:19:48
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-23 11:09:20
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH US2015-01-23 11:07:58
*.modot.mo.gov168.166.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 OPR/26.0.1656.60 Jefferson City MO US2015-01-23 10:55:58
*.virginia.gov166.67.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) Chester VA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-23 10:41:36
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA US2015-01-23 10:40:27
*.ncsc.mil214.4.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USIrongeek.com2015-01-23 10:17:59
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-23 10:17:53
*.ngb.army.mil132.79.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Fort Huachuca AZ USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-23 10:11:20
*.ngb.army.mil132.79.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Fort Huachuca AZ US2015-01-23 10:10:55
*.ncdoc.navy.mil205.57.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0) VIRGINIA BEACH VA USBuilding a Web Application Vulnerability Management Program - Jason Pubal Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 10:08:58
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-23 10:04:58
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 10:00:53
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USInurl:robots.txt-What are YOU hiding? - David Young BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 09:39:12
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USOWASP Mobile Top Ten - Why They Matter and What We Can Do - Ricky Rickard BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 09:34:05
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USUser Behavior Analysis - Matt Bianco BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 09:08:42
*.usarec.army.mil199.123.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-23 08:15:11
*.usarec.army.mil199.123.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ US2015-01-23 08:14:37
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Smyrna TN US2015-01-23 08:08:20
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USBreaking Bad - Jayson Street BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-23 08:06:22
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA US2015-01-23 08:06:02
*.nmci.navy.mil138.162.*.*Mozilla/4.0 (compatible;) VIRGINIA BEACH VA USIrongeek.com2015-01-23 08:06:01
*.tic.va.gov152.131.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-23 06:55:46
*.nmic.navy.mil205.68.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) VIRGINIA BEACH VA USMetasploit Class Videos  (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-23 06:49:11
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; MS-RTC LM 8) MAFB-Gunter Annex AL US2015-01-23 06:39:34
*.navsoc.socom.mil199.208.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Columbus OH USOSInt, Cyberstalking, Footprinting and Recon: Getting to know you (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-23 06:27:30
*.159.140.77.4k.usda.gov199.159.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Collins CO USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-23 06:19:45
*.socom.mil214.10.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E) Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-23 06:15:34
*.ssmcnet.noaa.gov205.156.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Silver Spring MD USBuilding an InfoSec lab, on the cheap2015-01-23 05:45:45
*.nmci.navy.mil138.163.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/6.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA US2015-01-23 05:33:00
*.nmci.usmc.mil138.162.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA US2015-01-23 05:18:39
*.azab.afcent.af.mil153.29.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Windows 7: Copy A Modified User Profile Over The Default Profile 2015-01-23 00:45:30
*.occ.gov199.83.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2015-01-22 18:52:31
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2015-01-22 16:59:55
*.dhs.ca.gov158.96.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Rancho Cordova CA USLocking down Windows Vista and Windows 7 against Malicious USB devices 2015-01-22 15:26:31
*.doe.gov205.254.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Washington DC US2015-01-22 14:32:31
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-22 13:49:39
*.in.gov108.59.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Indianapolis IN USIrongeek.com2015-01-22 13:17:05
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; .NET CLR 3.5.21022; InfoPath.2; SLCC1 MAFB-Gunter Annex AL USIntro to DD-WRT: Mod your wireless router to do more (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-22 12:40:25
*.occ.gov199.83.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2015-01-22 12:13:33
*.occ.gov199.83.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC US2015-01-22 12:12:38
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 12:09:06
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-22 11:59:42
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USMutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 102015-01-22 11:59:41
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USMutillidae 1: Setup (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-22 11:59:32
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USPractical Guide to Alternative Data Streams in NTFS2015-01-22 11:38:10
*.sd.spawar.navy.mil128.49.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 VIRGINIA BEACH VA USHow To Trace Fake or Anonymous E-mails2015-01-22 11:35:58
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-22 11:26:34
*.ngb.army.mil132.79.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C) Fort Huachuca AZ USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-22 10:58:00
*.ngb.army.mil132.79.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C) Fort Huachuca AZ USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-22 10:57:36
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 MAFB-Gunter Annex AL USWhat can you find out from an IP?2015-01-22 10:49:49
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USSniffing VoIP Using Cain (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-22 10:46:26
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Arlington VA USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 10:29:30
*.bnl.gov130.199.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:35.0) Gecko/20100101 Firefox/35.0 Upton NY USCorporate Wide SSL Interception and Inspection - Frank Shaw BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 10:01:47
*.bnl.gov130.199.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:35.0) Gecko/20100101 Firefox/35.0 Upton NY USSnort Beyond IDS: Open Source Application and File Control - Adam Hogan BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 10:01:12
*.bnl.gov130.199.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:35.0) Gecko/20100101 Firefox/35.0 Upton NY USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 10:00:38
*.bnl.gov130.199.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:35.0) Gecko/20100101 Firefox/35.0 Upton NY USUser Behavior Analysis - Matt Bianco BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 09:56:51
*.bnl.gov130.199.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:35.0) Gecko/20100101 Firefox/35.0 Upton NY USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 09:56:35
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-22 09:50:30
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-22 09:49:15
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USMutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 102015-01-22 09:49:12
*.gor.army.mil140.153.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Fort Huachuca AZ US2015-01-22 09:10:32
*.gor.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-22 09:10:14
*.gor.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USRaspberry Pi Recipes2015-01-22 08:09:36
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Smyrna TN US2015-01-22 08:07:53
*.dcma.mil144.183.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Columbus OH USLiving Off the Land: A Minimalist’s Guide to Windows Post-Exploitation - Christopher Campbell, Matthew Graeber Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 08:04:04
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-22 08:01:25
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) MAFB-Gunter Annex AL US2015-01-22 07:59:28
*.dhs.gov216.81.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-22 07:55:00
*.state.gov169.253.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.104 Safari/537.36 Washington DC USRibbonthulhu: The Con Funk Awareness Ribbon Cthulhu fUNK-tagn2015-01-22 07:34:46
*.ptr.hqda.pentagon.mil141.116.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-22 07:16:15
*.ustranscom.mil214.3.*.*Mozilla/4.0 (compatible;) Columbus OH USIrongeek.com2015-01-22 07:13:37
*.brg.army.mil143.85.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-22 07:12:51
*.brg.army.mil143.85.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Fort Huachuca AZ USIrongeek.com2015-01-22 07:12:50
*.brg.army.mil143.85.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Fort Huachuca AZ US2015-01-22 07:11:46
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-22 07:09:46
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL US2015-01-22 07:03:55
*.nioc-norfolk.navy.mil205.68.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 VIRGINIA BEACH VA USGot software? Need a security test plan? Got you covered. - Bill Sempf BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 06:28:33
*.nioc-norfolk.navy.mil205.68.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 VIRGINIA BEACH VA USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 06:28:19
*.net.nih.gov137.187.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Bethesda MD US2015-01-22 06:27:13
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-22 06:21:30
*.dhs.gov216.81.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-22 06:02:53
*.ilga.gov12.43.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.91 Safari/537.36 Snort Beyond IDS: Open Source Application and File Control - Adam Hogan BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 06:02:18
*.ilga.gov12.43.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.91 Safari/537.36 2015-01-22 06:01:30
*.ustranscom.mil214.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USSecurity Training and Research Cloud (STRC) - Jimmy Murphy Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 05:46:56
*.gor.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USGeneral Network Security2015-01-22 05:35:13
*.gor.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ US2015-01-22 05:34:20
*.ens.ornl.gov128.219.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Oak Ridge TN USAround the world in 80 Cons (A tale of perspectives) - Jayson E Street GrrCON 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 04:31:07
*.ens.ornl.gov128.219.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Oak Ridge TN USUser Behavior Analysis - Matt Bianco BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 04:27:04
*.ustranscom.mil214.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USSecurity Training and Research Cloud (STRC) - Jimmy Murphy Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 04:14:47
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-22 04:08:45
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-22 04:01:17
*.redstone.army.mil136.205.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USBSides Huntsville 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 03:55:06
*.csd.disa.mil131.64.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-22 03:54:13
*.ssa.gov137.200.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko Baltimore MD USBuilding an InfoSec lab, on the cheap2015-01-22 01:18:00
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USPractical Guide to Alternative Data Streams in NTFS2015-01-22 00:01:07
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USBreaking Bad - Jayson Street BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 23:33:48
*.state.gov169.253.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; .NET4.0C; .NET4.0E) Washington DC USDerbycon 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 22:24:45
*.korea.army.mil144.59.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-21 21:56:55
*.korea.army.mil143.138.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Fort Huachuca AZ USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 19:55:39
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-21 19:10:58
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-21 19:09:28
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-21 18:45:42
*.korea.army.mil143.138.*.*rv:34.0) Gecko/20100101 Firefox/34.0Mozilla/5.0 (Windows NT 6.1; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 18:43:07
*.korea.army.mil144.59.*.*rv:34.0) Gecko/20100101 Firefox/34.0Mozilla/5.0 (Windows NT 6.1; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 18:23:58
*.korea.army.mil144.59.*.*rv:34.0) Gecko/20100101 Firefox/34.0Mozilla/5.0 (Windows NT 6.1; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 17:52:56
*.house.gov143.231.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-21 17:45:52
*.nmci.usmc.mil138.163.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; QS 4.2.4.0; QS 5.3.0.4; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0E; InfoPath.3; .NET4.0C; QS 4.2 VIRGINIA BEACH VA USPractical Guide to Alternative Data Streams in NTFS2015-01-21 17:42:54
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 17:29:04
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 16:24:08
*.20.79.123.pnnl.gov130.20.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Richland WA USDeliberately Insecure Web Applications For Learning Web App Security (WebGoat, BadStore, Hacme, SecuriBench, WebMaven)2015-01-21 16:16:10
*.ssmcnet.noaa.gov205.156.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Silver Spring MD US2015-01-21 16:08:22
*.nslcpac.navy.mil199.10.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 VIRGINIA BEACH VA USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-21 15:35:17
*.ngb.army.mil132.79.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Fort Huachuca AZ USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 14:11:37
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Smyrna TN USA Basic Guide to Advanced Incident Response - Scott Roberts BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 13:54:40
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Smyrna TN USDo We Still Need Pen Testing? - Jeff Man BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 13:53:07
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Smyrna TN USBreaking Bad - Jayson Street BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 13:52:27
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Smyrna TN USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 13:52:19
*.tic.va.gov152.132.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Washington DC USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-21 13:51:38
*.jsc.nasa.gov128.157.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MSFC AL US2015-01-21 13:34:41
*.darpa.mil192.5.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.73.11 (KHTMMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.73.11 (KHTML, like Gecko) Version/6.1.1 Safari/537.73.11 Columbus OH USMcCorkle & Rios 100 bugs in 100 days: An analysis of ICS (SCADA) software Derbycon 2011 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 13:06:26
*.ngb.army.mil132.79.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-21 13:04:50
*.ngb.army.mil132.79.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Fort Huachuca AZ US2015-01-21 13:04:35
*.eur.disa.mil215.65.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) Columbus OH USSecurity and Software Defined Networking: Practical Possibilities and Potential Pitfalls2015-01-21 12:52:07
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-21 12:48:05
*.arl.army.mil131.218.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ USOWASP Mobile Top Ten - Why They Matter and What We Can Do - Ricky Rickard BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 12:34:34
*.ens.ornl.gov128.219.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Oak Ridge TN USHow to Rapidly Prototype Machine Learning Solutions to Solve Security Problems - Jason Montgomery BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 12:26:10
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-21 12:05:47
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-21 12:04:11
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 12:02:20
*.tic.va.gov152.132.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USThumbscrew: Software USB Write Blocker2015-01-21 12:01:10
*.tic.va.gov152.132.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USLocking down Windows Vista and Windows 7 against Malicious USB devices 2015-01-21 12:00:57
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 12:00:20
*.ens.ornl.gov128.219.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Oak Ridge TN USBreaking Bad - Jayson Street BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 11:41:32
*.ens.ornl.gov128.219.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Oak Ridge TN US2015-01-21 11:41:24
*.nist.gov129.6.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Gaithersburg MD USDo We Still Need Pen Testing? - Jeff Man BSides Columbus Ohio 2015  (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 11:34:33
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-21 11:15:10
*.irs.gov152.216.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:35.0) Gecko/20100101 Firefox/35.0 Washington DC USBSides Nashville 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 10:59:56
*.jiatfw.pacom.mil214.25.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-21 10:45:39
*.gor.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USBasic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 10:43:29
*.bel.army.mil143.85.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Fort Huachuca AZ USBuilding an InfoSec lab, on the cheap2015-01-21 10:34:00
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USUsing Metasploit to create a reverse Meterpreter payload EXE (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 10:30:18
*.in.gov108.59.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Indianapolis IN USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 10:19:04
*.in.gov108.59.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Indianapolis IN USBSides Columbus 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 10:18:49
*.lanl.gov192.12.*.*Intel Mac OS X 10_10_1) AppleWebKit/537.36 (KHTML,Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Los Alamos NM USEvery Unicode Character2015-01-21 10:05:55
*.ptr.hqda.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USUsing Cain to sniff RDP/Remote Desktop/Terminal Server traffic via "Man in the Middle" (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 09:51:49
*.modot.mo.gov168.166.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; Tablet PC 2.0; .NET4.0C; InfoPath.3) Jefferson City MO USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-21 09:47:15
*.sd.spawar.navy.mil128.49.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) VIRGINIA BEACH VA USLocking down Windows Vista and Windows 7 against Malicious USB devices 2015-01-21 09:39:03
*.wff.nasa.gov128.154.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 MSFC AL USWhat can you find out from an IP?2015-01-21 09:37:46
*.afnoc.af.mil132.3.*.*rv:35.0) Gecko/20100101 Firefox/35.0Mozilla/5.0 (Windows NT 6.1; rv:35.0) Gecko/20100101 Firefox/35.0 MAFB-Gunter Annex AL USAttacks and Countermeasures: Advanced Network Traffic Manipulation - Matt Kelly and Ryan Reynolds Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 09:36:46
*.sd.spawar.navy.mil128.49.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) VIRGINIA BEACH VA USLocking down Windows Vista and Windows 7 against Malicious USB devices 2015-01-21 09:28:49
*.wf.mt.gov161.7.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; rv:11.0) like Gecko Helena MT USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-21 09:09:37
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USInterceptor: A PowerShell SSL MITM Script - Casey Smith Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 08:45:14
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USShattering the Glass: Crafting Post Exploitation Tools with PowerShell - Matt Johnson Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 08:44:35
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USIntroduction to hacking with PowerShell - Scott Busby (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 08:43:48
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-21 08:37:14
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USBSides Huntsville 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 08:36:46
*.grc.nasa.gov128.156.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:31.0) Gecko/20100101 Firefox/31.0 MSFC AL USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-21 08:36:05
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Smyrna TN US2015-01-21 08:07:31
*.samhouston.army.mil139.161.*.*rv:34.0) Gecko/20100101 Firefox/34.0Mozilla/5.0 (Windows NT 6.1; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-21 08:05:08
*.grc.nasa.gov128.156.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:31.0) Gecko/20100101 Firefox/31.0 MSFC AL USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-21 07:36:09
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA US2015-01-21 07:23:02
*.grc.nasa.gov128.156.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:31.0) Gecko/20100101 Firefox/31.0 MSFC AL USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-21 07:16:33
*.grc.nasa.gov128.156.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:31.0) Gecko/20100101 Firefox/31.0 MSFC AL USMutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 102015-01-21 07:16:31
*.net.nih.gov137.187.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Bethesda MD USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2015-01-21 07:16:22
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 MAFB-Gunter Annex AL USMutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 102015-01-21 07:01:55
*.ngb.army.mil132.79.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C) Fort Huachuca AZ USPacketFountain: Network Sniffing Screensaver2015-01-21 06:55:10
*.ngb.army.mil132.79.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C) Fort Huachuca AZ USBuilding an InfoSec lab, on the cheap2015-01-21 06:54:54
*.ngb.army.mil132.79.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C) Fort Huachuca AZ USRaspberry Pi Recipes2015-01-21 06:53:57
*.ngb.army.mil132.79.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C) Fort Huachuca AZ US2015-01-21 06:53:11
*.ngb.army.mil132.79.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C) Fort Huachuca AZ US2015-01-21 06:52:53
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-21 06:36:39
*.wiesbaden.army.mil139.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-21 06:13:46
*.brg.army.mil143.85.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:26.0) Gecko/20100101 Firefox/26.0 Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-21 06:11:12
*.gordon.army.mil155.8.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 5.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Fort Huachuca AZ USPractical Guide to Alternative Data Streams in NTFS2015-01-21 06:06:49
*.ncsc.mil214.4.*.*rv:31.0) Gecko/20100101 Firefox/31.0Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USIrongeek.com2015-01-21 05:15:18
*.mda.mil140.32.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH US2015-01-21 05:08:25
*.ncsc.mil214.4.*.*rv:31.0) Gecko/20100101 Firefox/31.0Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USIrongeek.com2015-01-21 04:54:40
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-21 04:54:21
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USMutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 102015-01-21 04:54:19
*.ncsc.mil214.4.*.*rv:31.0) Gecko/20100101 Firefox/31.0Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USIrongeek.com2015-01-21 04:15:04
*.y12.doe.gov134.167.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Oak Ridge TN US2015-01-21 03:18:52
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-21 03:18:37
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-21 02:33:58
*.wiesbaden.army.mil139.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-21 01:36:12
*.wiesbaden.army.mil139.139.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Fort Huachuca AZ USDerbycon 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-21 01:35:29
*.marines.usmc.mil204.223.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) QUANTICO VA USCracking Cached Domain/Active Directory Passwords on Windows XP/2000/2003 2015-01-20 19:47:02
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-20 18:26:17
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USXmas scan with Nmap (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-20 16:59:17
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2015-01-20 16:49:35
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) MAFB-Gunter Annex AL USUsing Metasploit to create a reverse Meterpreter payload EXE (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-20 15:21:29
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) MAFB-Gunter Annex AL USUsing Metasploit to create a reverse Meterpreter payload EXE (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-20 15:19:48
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-20 15:00:37
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-20 14:29:48
*.afnoc.af.mil132.3.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36 MAFB-Gunter Annex AL US2015-01-20 14:29:12
*.dhs.gov216.81.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Washington DC USManual Page - netcat(1)2015-01-20 12:30:04
*.afnoc.af.mil132.3.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MAFB-Gunter Annex AL US2015-01-20 11:04:34
*.dhs.gov216.81.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; IE8Mercury; rv:11.0) like Gecko Washington DC USThumbscrew: Software USB Write Blocker2015-01-20 10:49:19
*.afnoc.af.mil132.3.*.*rv:35.0) Gecko/20100101 Firefox/35.0Mozilla/5.0 (Windows NT 6.1; rv:35.0) Gecko/20100101 Firefox/35.0 MAFB-Gunter Annex AL USIntro to DD-WRT: Mod your wireless router to do more (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-20 10:28:11
*.usdoj.gov149.101.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; MAMIJS; rv:11.0) like Gecko Potomac MD USDarknets and hidden servers: Identifying the true IP/network identity of I2P service hosts2015-01-20 09:49:10
*.lewis.army.mil150.192.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) 2015-01-20 09:35:30
*.virginia.gov166.67.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Chester VA USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-20 09:11:05
*.nmci.navy.mil138.163.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) VIRGINIA BEACH VA US2015-01-20 09:02:06
*.scott.disa.mil209.22.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Columbus OH USBuilding an InfoSec lab, on the cheap2015-01-20 08:55:00
*.ncsc.mil214.4.*.*rv:31.0) Gecko/20100101 Firefox/31.0Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USIrongeek.com2015-01-20 08:47:27
*.ncsc.mil214.4.*.*rv:31.0) Gecko/20100101 Firefox/31.0Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USIrongeek.com2015-01-20 08:47:07
*.virginia.gov166.67.*.*Mozilla/4.0 (compatible;) Chester VA USIrongeek.com2015-01-20 08:38:28
*.ncsc.mil214.4.*.*rv:31.0) Gecko/20100101 Firefox/31.0Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USIrongeek.com2015-01-20 08:29:05
*.ncsc.mil214.4.*.*rv:31.0) Gecko/20100101 Firefox/31.0Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USIrongeek.com2015-01-20 08:26:54
*.disa.mil214.36.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.101 Safari/537.36 Columbus OH USDeliberately Insecure Web Applications For Learning Web App Security (WebGoat, BadStore, Hacme, SecuriBench, WebMaven)2015-01-20 08:17:42
*.disa.mil214.36.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.101 Safari/537.36 Columbus OH USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-20 08:12:27
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Smyrna TN US2015-01-20 08:07:10
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-20 07:24:15
*.larc.nasa.gov192.94.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MSFC AL US2015-01-20 07:11:43
*.net.nih.gov128.231.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Bethesda MD USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2015-01-20 07:01:30
*.dhs.gov216.81.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; IE8Mercury) Washington DC USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-20 07:01:21
*.disa.mil214.36.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; .NET4.0C; .NET4.0E) Columbus OH USGeneral Network Security2015-01-20 06:53:41
*.disa.mil214.36.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; .NET4.0C; .NET4.0E) Columbus OH USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-20 06:53:12
*.usdoj.gov149.101.*.*Mozilla/4.0 (compatible;) Potomac MD USIrongeek.com2015-01-20 06:49:47
*.usdoj.gov149.101.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; MAMIJS; rv:11.0) like Gecko Potomac MD USHacking Illustrated: Computer security videos2015-01-20 06:49:36
*.usdoj.gov149.101.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; MAMIJS; rv:11.0) like Gecko Potomac MD US2015-01-20 06:48:51
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-20 06:45:52
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USMutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 102015-01-20 06:45:50
*.sd.spawar.navy.mil128.49.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-20 06:23:39
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USGone in 60 minutes _ Practical Approach to Hacking an Enterprise with Yasuo - Saurabh Harit, Stephen Hall Hack3rcon 5 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-20 05:15:08
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA US2015-01-20 05:12:07
*.mda.mil140.32.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH US2015-01-20 05:09:37
*.gtwy.uscourts.gov199.107.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 San Diego CA USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-20 05:07:01
*.virginia.gov166.67.*.*Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML,Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/7.1.2 Safari/537.85.11 Chester VA USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-20 04:48:59
*.alexandriava.gov63.88.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Finding Rogue SMB File Shares On Your Network 2015-01-20 03:53:44
*.osd.mil130.16.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-20 02:42:52
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-20 00:09:56
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-19 17:41:44
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2015-01-19 17:41:30
*.20.185.115.pnnl.gov130.20.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Iceweasel/31.3.0 Richland WA USPlug and Prey: Malicious USB Devices2015-01-19 13:40:49
*.sandia.gov198.102.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36 Albuquerque NM USBasics of Arpspoofing/Arppoisoning 2015-01-19 13:14:05
*.virginia.gov166.67.*.*Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML,Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML, like Gecko) Chester VA USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-19 11:37:37
*.virginia.gov166.67.*.*Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML,Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/7.1.2 Safari/537.85.11 Chester VA USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-19 11:37:32
*.afghan.swa.army.mil214.27.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USThumbscrew: Software USB Write Blocker2015-01-19 09:53:37
*.virginia.gov166.67.*.*Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML,Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/7.1.2 Safari/537.85.11 Chester VA USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-19 06:50:56
*.inl.gov134.20.*.*Linux x86_64) AppleWebKit/537.36 (KHTML, like GeckMozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36 Idaho Falls ID USFlameout - Burnout Supernova - Dan Ward (Ally Miller) (BSides Las Vegas 2013) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-19 06:46:23
*.virginia.gov166.67.*.*Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML,Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/7.1.2 Safari/537.85.11 Chester VA USShmooCon Firetalks 2014 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-19 06:39:18
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-19 02:05:55
*.scott.disa.mil209.22.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Columbus OH USShmooCon Firetalks 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-18 22:55:23
*.scott.disa.mil209.22.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Columbus OH US2015-01-18 22:55:17
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-18 10:12:12
*.bel.army.mil143.85.*.*rv:31.0) Gecko/20100101 Firefox/31.0Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Firefox/31.0 Fort Huachuca AZ USTeaching Hacking at College by Sam Bowne(Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-18 09:46:55
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-18 07:41:55
*.dhs.gov216.81.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Win64; x64; Trident/4.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; .NET4.0C; .NET4.0E; Tablet PC 2.0) Washington DC USAntivirus Evasion: Lessons Learned – thelightcosine Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-17 17:12:39
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-17 16:17:54
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-17 13:34:06
*.tac.army.mil143.85.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-17 11:39:25
*.tic.va.gov152.133.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC US2015-01-17 11:26:52
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; Tablet PC 2.0) MAFB-Gunter Annex AL USPractical Guide to Alternative Data Streams in NTFS2015-01-17 07:47:51
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-17 07:47:45
*.dsid224.usmc.mil214.15.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Columbus OH USMobile Device Hacking: Turning your phone, PDA or internet tablet into a pen-testing platfor2015-01-17 07:37:33
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-17 04:17:24
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-17 03:25:54
*.in.gov108.59.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Indianapolis IN USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-16 19:07:11
*.in.gov108.59.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 Indianapolis IN USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-16 18:57:28
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-16 16:41:54
*.brg.army.mil143.85.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Fort Huachuca AZ USChanging Your MAC Address In Window XP/Vista, Linux And Mac OS X (Sometimes known as MAC spoofing)2015-01-16 16:29:46
*.brg.army.mil143.85.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Fort Huachuca AZ USChanging Your MAC Address In Window XP/Vista, Linux And Mac OS X (Sometimes known as MAC spoofing)2015-01-16 16:18:57
*.opic.gov192.236.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3) WASHINGTON DC USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-16 13:01:02
*.citykankakee-il.gov198.173.*.*WOW64Mozilla/5.0 (Windows NT 6.2; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Greenwood Village CO US2015-01-16 12:14:51
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2015-01-16 11:32:44
*.in.gov108.59.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Indianapolis IN USHP Printer Display Hack2015-01-16 10:44:46
*.stratcom.mil143.250.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH US2015-01-16 10:39:02
*.tic.va.gov152.132.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-16 10:18:10
*.stratcom.mil143.250.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; USSTRATCOM msie8.0) Columbus OH USA Crosswalk of the Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP) - John McLain Louisville InfoSec 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-16 09:51:05
*.arl.army.mil158.12.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ USManual Page - netcat(1)2015-01-16 09:43:53
*.nro.mil214.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USThe Future of RE: Dynamic Binary Visualization Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-16 08:56:47
*.tic.va.gov152.132.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Washington DC US2015-01-16 08:53:51
*.gsfc.nasa.gov128.154.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MSFC AL USPractical Guide to Alternative Data Streams in NTFS2015-01-16 08:50:21
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USNcat Tutorial: A modern Netcat from the Nmap team (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-16 08:41:44
*.dhs.gov216.81.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko Washington DC USHacking Mainframes; Vulnerabilities in applications exposed over TN3270 - Dominic White Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-16 08:39:33
*.swa.army.mil143.81.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ USPractical Guide to Alternative Data Streams in NTFS2015-01-16 08:22:49
*.dodiis.mil214.3.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko Columbus OH USRunning an I2P Svartkast on the Raspberry Pi: Even more cheap hardware to leave on someone else's network2015-01-16 07:56:14
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-16 07:41:53
*.connect.gpo.gov162.140.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Washington DC USManual Page - hexedit(1)2015-01-16 07:35:13
*.wamc.amedd.army.mil160.151.*.*rv:31.0) Gecko/20100101 Firefox/31.0Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Firefox/31.0 Fort Huachuca AZ USIGiGLE: Irongeek's WiGLE WiFi Database to Google Earth Client for Wardrive Mapping2015-01-16 07:18:26
*.ftd.army.mil143.85.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Fort Huachuca AZ US2015-01-16 07:17:04
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-16 07:11:54
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) MAFB-Gunter Annex AL USBuilding an InfoSec lab, on the cheap2015-01-16 07:06:17
*.nmci.navy.mil138.162.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 VIRGINIA BEACH VA USIntro to Darknets: Tor and I2P Workshop (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-16 07:04:34
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA US2015-01-16 06:52:35
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Smyrna TN US2015-01-16 06:18:31
*.tic.va.gov152.130.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC US2015-01-16 04:29:05
*.tic.va.gov152.131.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC US2015-01-16 04:07:13
*.bel.army.mil143.85.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USTracking users, malware and data leaks via the USB serial numbers on flash drives, smart phones and MP3 players2015-01-16 03:27:52
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-16 00:09:53
*.lrmc.amedd.army.mil192.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-15 22:05:55
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-15 20:28:37
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-15 17:53:53
*.redwood.mil214.38.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USHow to create an attack path threat model — Wolfgang Goerlich (Circle City Con 2014 Videos) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-15 16:23:05
*.redwood.mil214.38.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH US2015-01-15 16:13:39
*.redwood.mil214.38.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USGrrCON 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-15 16:13:35
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-15 15:43:05
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-15 15:33:53
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; Tablet PC 2.0) MAFB-Gunter Annex AL USUsing Metasploit to create a reverse Meterpreter payload EXE (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-15 13:32:18
*.dc3.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USLinks for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking2015-01-15 13:01:19
*.lea.army.mil143.85.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USA Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP poisoning and other niceties. 2015-01-15 12:55:09
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-15 12:37:53
*.publicdebt.treas.gov166.123.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Washington DC USPractical Guide to Alternative Data Streams in NTFS2015-01-15 12:21:02
*.ustranscom.mil214.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH US2015-01-15 12:03:27
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 MAFB-Gunter Annex AL USWebGoat 1: SQL Injection Demonstration (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-15 11:54:32
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USManual Page - urlsnarf(8)2015-01-15 11:47:26
*.inl.gov134.20.*.*Linux x86_64) AppleWebKit/537.36 (KHTML, like GeckMozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.120 Safari/537.36 Idaho Falls ID USFun with Ettercap Filters2015-01-15 11:21:27
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-15 11:19:55
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USManual Page - arpspoof(8)2015-01-15 11:15:31
*.state.gov169.253.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Washington DC USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-15 10:56:08
*.wf.mt.gov161.7.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Helena MT US2015-01-15 10:49:23
*.20.225.19.pnnl.gov130.20.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:34.0) Gecko/20100101 Firefox/34.0 Richland WA USAutonomous Remote Hacking Drones - Dr. Phil Polstra GrrCON 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-15 10:27:38
*.20.225.19.pnnl.gov130.20.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:34.0) Gecko/20100101 Firefox/34.0 Richland WA USReducing Your Organization’s Social Engineering Attack Surface - Jen Fox GrrCON 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-15 10:26:12
*.20.225.19.pnnl.gov130.20.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:34.0) Gecko/20100101 Firefox/34.0 Richland WA USIntroducing Network-Scout: Defending The Soft Center of Your Network - Hack3rcon 5 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-15 10:24:36
*.20.225.19.pnnl.gov130.20.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:34.0) Gecko/20100101 Firefox/34.0 Richland WA US2015-01-15 10:23:56
*.socom.mil209.22.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 Columbus OH USCracking Cached Domain/Active Directory Passwords on Windows XP/2000/2003 2015-01-15 10:22:54
*.ftmeade.army.mil150.177.*.*rv:29.0) Gecko/20100101 Firefox/29.0Mozilla/5.0 (Windows NT 6.1; rv:29.0) Gecko/20100101 Firefox/29.0 Forensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-15 10:20:22
*.etf.wi.gov165.189.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko Madison WI US2015-01-15 10:19:45
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Using Metasploit to create a reverse Meterpreter payload EXE (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-15 09:31:29
*.disa.mil214.36.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.101 Safari/537.36 Columbus OH USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-15 09:10:15
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-15 08:13:52
*.20.14.170.pnnl.gov130.20.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Richland WA USProtecting The Seams:Military Doctrine Applied To Application And Network Security - Paul Vencill (ShowMeCon 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-15 07:42:50
*.20.14.170.pnnl.gov130.20.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Richland WA USStart With The BPT Then Worry About The APT! - Kevin Cardwel (ShowMeCon 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-15 07:42:47
*.20.14.170.pnnl.gov130.20.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Richland WA USTerminal Cornucopia: Demystifying The Mullet - Evan Booth (ShowMeCon 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-15 07:42:44
*.20.14.170.pnnl.gov130.20.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Richland WA USThinking Outside The (Sand)Box - Kyle Adams (ShowMeCon 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-15 07:42:43
*.20.14.170.pnnl.gov130.20.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Richland WA US2015-01-15 07:42:38
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-15 07:34:31
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USA Brief Intro To Cryptographic Hashes/MD5 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-15 07:06:32
*.ssmcnet.noaa.gov205.156.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Silver Spring MD US2015-01-15 06:54:40
*.gtwy.uscourts.gov199.107.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 San Diego CA USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-15 06:26:09
*.disa.mil214.36.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.101 Safari/537.36 Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-15 06:21:57
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Smyrna TN US2015-01-15 06:17:51
*.ksc.nasa.gov128.159.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 MSFC AL USThumbscrew: Software USB Write Blocker2015-01-15 05:42:38
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USManual Page - airdecap-ng(1)2015-01-15 05:14:45
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-15 04:33:52
*.irs.gov152.216.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; MS-RTC LM 8; IPH 1.1.21.4019; InfoPath.3) Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-15 04:11:14
*.hqda-aoc.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Fort Huachuca AZ USHackers Are People Too — Amanda Berlin (Circle City Con 2014 Videos) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-15 02:53:17
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-15 01:29:52
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-14 22:57:52
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-14 20:49:55
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-14 19:17:18
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-14 19:01:52
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-14 17:33:52
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-14 16:17:54
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-14 15:13:52
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA US2015-01-14 15:05:42
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-14 14:21:52
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USHardware Key Logging Part 1: An Overview Of USB Hardware Keyloggers, And A Review Of The KeyCarbon USB Home Mini2015-01-14 13:53:51
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USSSH Dynamic Port Forwarding (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-14 13:39:54
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USFun with Ettercap Filters:The Movie (Airpwn like stuff)(Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-14 13:38:01
*.llnl.gov128.115.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Livermore CA US2015-01-14 13:35:42
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USA Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP poisoning and other niceties. 2015-01-14 13:31:38
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-14 13:29:52
*.pac.army.mil150.137.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-14 13:01:27
*.afnoc.af.mil132.3.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; Tablet PC 2.0; InfoPath.3) MAFB-Gunter Annex AL USUsing msfpayload and msfencode from Metasploit 3.3 to bypass anti-virus (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-14 12:57:38
*.disa.mil144.251.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36 Columbus OH USStart With The BPT Then Worry About The APT! - Kevin Cardwel (ShowMeCon 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-14 12:40:07
*.disa.mil144.251.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36 Columbus OH USShowMeCon 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 12:39:53
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-14 12:37:52
*.nswc.navy.mil198.91.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-14 12:15:23
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-14 11:45:03
*.20.225.19.pnnl.gov130.20.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:34.0) Gecko/20100101 Firefox/34.0 Richland WA USOrigin of CyberSecurity Laws - An Insider's Story - Steve Riggs Louisville InfoSec 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 11:44:42
*.20.225.19.pnnl.gov130.20.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:34.0) Gecko/20100101 Firefox/34.0 Richland WA US2015-01-14 11:44:06
*.state.gov169.253.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Washington DC USAttacking and Defending WPA Enterprise Networks - Matt Neely (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 11:40:35
*.y12.doe.gov134.167.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Oak Ridge TN USAbusing Active Directory in Post-Exploitation - Carlos Perez Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 11:40:11
*.gor.army.mil140.153.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Fort Huachuca AZ USFun with Ettercap Filters2015-01-14 11:34:24
*.bop.gov149.101.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E) Potomac MD USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-14 11:24:10
*.y12.doe.gov134.167.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Oak Ridge TN USAbusing Active Directory in Post-Exploitation - Carlos Perez Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 11:18:57
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-14 11:18:45
*.20.224.173.pnnl.gov130.20.*.*Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.122 Safari/537.36 Richland WA USOrigin of CyberSecurity Laws - An Insider's Story - Steve Riggs Louisville InfoSec 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 11:18:23
*.pnl.gov192.35.*.*Mozilla/4.0 (compatible;) Richland WA USIrongeek.com2015-01-14 11:17:31
*.20.224.173.pnnl.gov130.20.*.*Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.122 Safari/537.36 Richland WA USRemote Phys Pen: Spooky Action at a Distance - Brian Martin Hack3rcon 5 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 11:17:01
*.20.224.173.pnnl.gov130.20.*.*Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.122 Safari/537.36 Richland WA US2015-01-14 11:08:22
*.y12.doe.gov134.167.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Oak Ridge TN USAbusing Active Directory in Post-Exploitation - Carlos Perez Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 11:01:53
*.pac.disa.mil214.16.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Columbus OH USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-14 10:54:12
*.nmci.usmc.mil138.162.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USUniversity campuses that use Irongeek.com materials for teaching infosec in Higher education2015-01-14 10:46:32
*.nmci.usmc.mil138.162.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USPacketFountain: Network Sniffing Screensaver2015-01-14 10:46:00
*.nmci.usmc.mil138.162.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USMobile Device Hacking: Turning your phone, PDA or internet tablet into a pen-testing platfor2015-01-14 10:44:09
*.nmci.usmc.mil138.162.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USPractical Foxhunting 101 - SimonJ (Defcon Wireless Village 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-14 10:39:24
*.tic.va.gov152.132.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USState Hacking/Computer Security Laws2015-01-14 10:37:26
*.llnl.gov128.115.*.*Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML,Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/7.1.2 Safari/537.85.11 Livermore CA USGetting started with the I2P Darknet (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-14 10:32:15
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-14 10:28:33
*.afnoc.af.mil132.3.*.*rv:34.0) Gecko/20100101 Firefox/34.0Mozilla/5.0 (Windows NT 6.1; rv:34.0) Gecko/20100101 Firefox/34.0 MAFB-Gunter Annex AL USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 10:24:50
*.y12.doe.gov134.167.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Oak Ridge TN USAbusing Active Directory in Post-Exploitation - Carlos Perez Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 10:20:15
*.usarec.army.mil199.123.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E) Fort Huachuca AZ USMini-DisplayPort on New Dells: Resolving issues with output to projectors in Windows 72015-01-14 10:11:21
*.y12.doe.gov134.167.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Oak Ridge TN USAbusing Active Directory in Post-Exploitation - Carlos Perez Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 09:57:29
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-14 09:44:57
*.sandia.gov134.253.*.*Mozilla/4.0 (compatible;) Albuquerque NM USIrongeek.com2015-01-14 09:41:46
*.afnoc.af.mil132.3.*.*rv:34.0) Gecko/20100101 Firefox/34.0Mozilla/5.0 (Windows NT 6.1; rv:34.0) Gecko/20100101 Firefox/34.0 MAFB-Gunter Annex AL USLiving Off the Land: A Minimalist’s Guide to Windows Post-Exploitation - Christopher Campbell, Matthew Graeber Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 09:40:10
*.soc.mil204.34.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-14 09:09:51
*.dhs.gov216.81.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; C15IE72011A) Washington DC USManual Page - netcat(1)2015-01-14 08:55:38
*.ncdoc.navy.mil205.57.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0) VIRGINIA BEACH VA USDarknets and hidden servers: Identifying the true IP/network identity of I2P service hosts2015-01-14 08:44:26
*.20.177.186.pnnl.gov130.20.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Richland WA USGrrCON 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 08:18:26
*.20.177.186.pnnl.gov130.20.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Richland WA US2015-01-14 08:17:44
*.20.177.186.pnnl.gov130.20.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Richland WA USSecurity On The Cheap - Joel Cardella GrrCON 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 08:07:05
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA US2015-01-14 08:05:47
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA USHumor2015-01-14 08:05:25
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA USWorkout at the Gym2015-01-14 08:05:13
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ US2015-01-14 08:00:12
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA USIrongeek's Links2015-01-14 07:59:45
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA US2015-01-14 07:58:38
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA USHoosier Hackers (And Louisville Kentucky Too)2015-01-14 07:58:03
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA USSMBrute2015-01-14 07:53:42
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA US2015-01-14 07:52:00
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA USApps/Scripts2015-01-14 07:51:08
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA USShoveling a Shell using PHP Insecurities 2015-01-14 07:49:06
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA USGeneral Network Security2015-01-14 07:45:52
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA US2015-01-14 07:45:35
*.tic.va.gov152.133.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Washington DC USManual Page - urlsnarf(8)2015-01-14 07:45:07
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA US2015-01-14 07:45:06
*.usace.army.mil140.194.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ US2015-01-14 07:21:20
*.car.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USUsing Kon-Boot from a USB Flash Drive: Bypass those pesky Windows and Linux login passwords completely 2015-01-14 06:46:37
*.car.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USState Hacking/Computer Security Laws2015-01-14 06:45:31
*.car.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USDeliberately Insecure Web Applications For Learning Web App Security (WebGoat, BadStore, Hacme, SecuriBench, WebMaven)2015-01-14 06:45:12
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-14 06:25:52
*.house.gov143.228.*.*Intel Mac OS X 10_6_8) AppleWebKit/534.59.10 (KHTMMozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/534.59.10 (KHTML, like Gecko) Version/5.1.9 Safari/534.59.10 Washington DC USThumbscrew: Software USB Write Blocker2015-01-14 06:23:45
*.car.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacker Con WiFi Hijinx: Protecting Yourself On Potentially Hostile Networks2015-01-14 06:21:08
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Smyrna TN US2015-01-14 06:17:32
*.car.army.mil140.153.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-14 06:15:48
*.car.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USFear and loathing at the Riviera: A noobs guide to Defcon2015-01-14 06:15:40
*.car.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USXSS, Command and SQL Injection vectors: Beyond the Form2015-01-14 06:01:10
*.car.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-14 05:59:25
*.ssa.gov137.200.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Baltimore MD USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2015-01-14 05:48:57
*.car.army.mil140.153.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-14 05:46:56
*.car.army.mil140.153.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-14 05:46:45
*.car.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-14 05:46:32
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-14 05:35:34
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USLocking down Windows Vista and Windows 7 against Malicious USB devices 2015-01-14 05:24:38
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-14 05:18:10
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USMutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 102015-01-14 05:18:10
*.rev.army.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ US2015-01-14 05:17:48
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-14 05:15:23
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-14 05:13:56
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USFun with Ettercap Filters2015-01-14 05:04:22
*.arl.army.mil158.12.*.*rv:34.0) Gecko/20100101 Firefox/34.0Mozilla/5.0 (Windows NT 6.1; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ USgitDigger: Creating useful wordlists from public GitHub repositories - Jaime Filson (WiK) Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 04:54:49
*.car.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USCrude, Inconsistent Threat: Understanding Anonymous2015-01-14 04:52:06
*.car.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USUnicode Security Notes Page2015-01-14 04:42:44
*.y12.doe.gov134.167.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Oak Ridge TN USAbusing Active Directory in Post-Exploitation - Carlos Perez Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-14 04:31:17
*.car.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USCritically Plagiarizing?: Ideas On Spotting Plagiarism, While Spending No Money Adrian Crenshaw (yes, really, no one else would claim the typos)2015-01-14 04:26:33
*.me.navy.mil207.132.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) Columbus OH USLocking down Windows Vista and Windows 7 against Malicious USB devices 2015-01-14 04:22:03
*.car.army.mil140.153.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-14 04:02:25
*.car.army.mil140.153.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-14 04:02:07
*.car.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-14 04:01:14
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-14 02:54:37
*.me.navy.mil207.132.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) Columbus OH USIntro To DD and Autopsy By Williamc and Twinvega (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-14 02:01:44
*.me.navy.mil207.132.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) Columbus OH USIntro To DD and Autopsy By Williamc and Twinvega (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-13 23:41:23
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-13 21:10:53
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-13 20:37:52
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2015-01-13 17:24:37
*.disa.mil214.36.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.101 Safari/537.36 Columbus OH USBasic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-13 17:22:37
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-13 17:13:55
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-13 16:16:15
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-13 15:17:52
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-13 15:11:01
*.nmci.usmc.mil138.162.*.*Mozilla/4.0 (compatible;) VIRGINIA BEACH VA USIrongeek.com2015-01-13 14:16:24
*.nmci.usmc.mil138.162.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-13 14:16:23
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-13 14:13:53
*.nmci.usmc.mil138.162.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-13 14:10:16
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USManual Page - netcat(1)2015-01-13 14:07:47
*.nmci.navy.mil138.162.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USLocking down Windows Vista and Windows 7 against Malicious USB devices 2015-01-13 14:00:57
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-13 13:41:51
*.dhs.gov216.81.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2015-01-13 13:30:27
*.dhs.gov216.81.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko Washington DC USA Year in the (Backdoor) Factory - Joshua Pitts Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-13 13:30:08
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-13 13:27:20
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-13 13:25:51
*.y12.doe.gov134.167.*.*Mozilla/4.0 (compatible;) Oak Ridge TN USIrongeek.com2015-01-13 13:17:51
*.y12.doe.gov134.167.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Oak Ridge TN USAbusing Active Directory in Post-Exploitation - Carlos Perez Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-13 13:11:47
*.y12.doe.gov134.167.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Oak Ridge TN USDerbycon 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-13 13:09:53
*.y12.doe.gov134.167.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Oak Ridge TN USDerbycon 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-13 13:09:44
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA US2015-01-13 12:57:41
*.wf.mt.gov161.7.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Helena MT USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-13 12:28:30
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Irongeek's Forums are closed2015-01-13 12:23:47
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Hoosier Hackers (And Louisville Kentucky Too)2015-01-13 12:23:19
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) 2015-01-13 12:23:06
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) General Network Security2015-01-13 12:22:38
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Apps/Scripts2015-01-13 12:22:01
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Irongeek In Print: Books that mention Irongeek.com2015-01-13 12:21:55
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Workout at the Gym2015-01-13 12:20:31
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) 2015-01-13 12:20:06
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Workout at the Gym2015-01-13 12:19:35
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Diet2015-01-13 12:19:34
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA USApps/Scripts2015-01-13 12:18:31
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Ron's Post-Workout Power Shake2015-01-13 12:18:26
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Diet2015-01-13 12:18:08
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA USMobile Device Hacking: Turning your phone, PDA or internet tablet into a pen-testing platfor2015-01-13 12:18:06
*.fdic.gov167.176.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Arlington VA USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-13 12:16:36
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) DerbyCon 2014 Higher Education Panel for Hackers: Irongeek’s Thoughts 2015-01-13 12:11:20
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) 2015-01-13 12:10:48
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) 2015-01-13 12:10:43
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USKinetic Pwnage: Obliterating the Line Between Computers and the Physical World - Ed Skoudis Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-13 12:10:00
*.usdoj.gov149.101.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; DI7SP2; rv:11.0) like Gecko Potomac MD USHacking Illustrated: Computer security videos2015-01-13 12:06:22
*.modot.mo.gov168.166.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 OPR/26.0.1656.60 Jefferson City MO US2015-01-13 12:06:21
*.anl.gov146.137.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Argonne IL USRed Teaming: Back and Forth, 5ever - FuzzyNop GrrCON 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-13 11:53:31
*.srvs.usps.gov56.0.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Raleigh NC USASAReaper: Grab Configs From Multiple Cisco Devices Over SSH (Demos PExpect and AES Encrypted INI Files in Python)2015-01-13 11:46:03
*.70.greshamoregon.gov208.187.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; rv:11.0) like Gecko Vancouver WA USFinding Rogue SMB File Shares On Your Network 2015-01-13 11:39:44
*.modot.mo.gov168.166.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 OPR/26.0.1656.60 Jefferson City MO US2015-01-13 11:37:49
*.modot.mo.gov168.166.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 OPR/26.0.1656.60 Jefferson City MO US2015-01-13 11:37:41
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-13 11:28:41
*.usdoj.gov149.101.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; DI7SP2) Potomac MD USPractical Guide to Alternative Data Streams in NTFS2015-01-13 11:03:42
*.ptr.hqda.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-13 10:59:00
*.ptr.hqda.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USMutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 102015-01-13 10:58:57
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USLocking down Windows Vista and Windows 7 against Malicious USB devices 2015-01-13 10:58:31
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USFinding Rogue SMB File Shares On Your Network 2015-01-13 10:36:59
*.ptr.hqda.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ US2015-01-13 10:24:37
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; Tablet PC 2.0) MAFB-Gunter Annex AL USUsing Metasploit to create a reverse Meterpreter payload EXE (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-13 10:22:30
*.atc.army.mil134.194.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Fort Huachuca AZ US2015-01-13 10:17:07
*.lewis.army.mil150.192.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) 2015-01-13 10:04:19
*.stratcom.mil143.250.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; .NET4.0C; .NET4.0E; USSTRATCOM msie6.0sp1; USSTRAT Columbus OH USLook Ma, No Exploits! – The Recon-ng Framework - Tim “LaNMaSteR53″ Tomes Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-13 08:45:20
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-13 07:38:48
*.amedd.army.mil192.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-13 07:15:40
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USBeEF:Browser Exploitation Framework XSS Fun (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-13 07:08:20
*.dmz.js.mil199.208.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USNQSFW Free CISSP Study Guide (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-13 07:00:37
*.osd.mil214.18.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-13 06:46:32
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2015-01-13 06:33:26
*.osd.mil214.18.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-13 06:26:55
*.osd.mil214.18.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-13 06:26:49
*.osd.mil214.18.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-13 06:26:18
*.usdoj.gov149.101.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; DI7SP2) Potomac MD USOut of Character: Use of Punycode and Homoglyph Attacks to Obfuscate URLs for Phishing2015-01-13 06:04:58
*.tobyhanna.army.mil192.108.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-13 05:39:06
*.afnoc.af.mil132.3.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-13 05:30:39
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Smyrna TN US2015-01-13 05:23:34
*.ferc.gov204.87.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Washington DC USBypassing Internet Explorer's XSS Filter - Carlos Munoz Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-13 05:12:10
*.ferc.gov204.87.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Washington DC USSo You Want To Murder a Software Patent - Jason Scott - Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-13 05:10:03
*.ferc.gov204.87.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Washington DC USHunting Malware on Linux Production Servers: The Windigo Backstory - Olivier Bilodeau Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-13 05:07:17
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-13 04:46:09
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-12 19:06:37
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2015-01-12 19:00:28
*.sandia.gov198.102.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Albuquerque NM USPractical Guide to Alternative Data Streams in NTFS2015-01-12 16:27:17
*.nmci.navy.mil138.163.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USARPFreeze: A tool for Windows to protect against ARP poisoning by setting up static ARP entries2015-01-12 15:31:26
*.doa.alaska.gov158.145.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Juneau AK USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-12 14:45:20
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-12 14:40:30
*.lanl.gov192.12.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:34.0) Gecko/20100101 Firefox/34.0 Los Alamos NM USHow to Give the Best Pen Test of Your Life , Ed Skoudis Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-12 14:08:30
*.house.gov143.231.*.*rv:34.0) Gecko/20100101 Firefox/34.0Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0 Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-12 14:00:45
*.wf.mt.gov161.7.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Helena MT USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-12 13:15:16
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-12 12:40:32
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 MAFB-Gunter Annex AL US2015-01-12 12:38:22
*.wf.mt.gov161.7.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko Helena MT USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-12 12:27:13
*.nmci.usmc.mil138.162.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USManual Page - urlsnarf(8)2015-01-12 12:16:15
*.gor.army.mil140.153.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ USUsing Metasploit to create a reverse Meterpreter payload EXE (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-12 12:15:55
*.dhs.gov216.81.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC USXSS, Command and SQL Injection vectors: Beyond the Form2015-01-12 12:09:37
*.ssmcnet.noaa.gov205.156.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Silver Spring MD US2015-01-12 11:12:28
*.ngb.army.mil132.79.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-12 11:11:11
*.nsoc.health.mil214.1.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Columbus OH USTor or not Tor: How to tell if someone is coming from a Tor exit node, in PHP2015-01-12 11:08:11
*.pac.army.mil150.137.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) 2015-01-12 10:54:26
*.ftd.army.mil143.85.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USA Crosswalk of the Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP) - John McLain Louisville InfoSec 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-12 10:39:31
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-12 10:05:44
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-12 10:04:43
*.stratcom.mil143.250.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; .NET4.0C; .NET4.0E; USSTRATCOM msie6.0sp1; USSTRAT Columbus OH USLook Ma, No Exploits! – The Recon-ng Framework - Tim “LaNMaSteR53″ Tomes Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-12 09:40:06
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 MAFB-Gunter Annex AL USBash Scripting for Penetration Testers - Lee Baird - Hack3rcon 5 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-12 09:25:02
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USBash Scripting 101 for Pen Testers Hack3rcon 3 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-12 09:10:33
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 MAFB-Gunter Annex AL US2015-01-12 08:26:33
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-12 07:44:54
*.lanl.gov192.12.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:34.0) Gecko/20100101 Firefox/34.0 Los Alamos NM USHow to Give the Best Pen Test of Your Life , Ed Skoudis Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-12 07:30:36
*.tic.va.gov152.133.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USASAReaper: Grab Configs From Multiple Cisco Devices Over SSH (Demos PExpect and AES Encrypted INI Files in Python)2015-01-12 07:12:28
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Arlington VA USYou Keep A-Knockin But You Cant Come In - grap3_ap3 Notacon 10 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-12 07:12:27
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Arlington VA USMake Me Babyproof!- Gina the kat Hoang Notacon 10 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-12 07:11:48
*.158.166.187.4k.usda.gov199.158.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Fort Collins CO US2015-01-12 06:59:59
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Arlington VA USCan You Hear Me Now? Leveraging Mobile Devices on Pentests Georgia Weidman AIDE 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-12 06:55:49
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Arlington VA USAIDE 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-12 06:55:41
*.redriver.army.mil147.58.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) Fort Huachuca AZ USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-12 06:53:00
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Smyrna TN US2015-01-12 06:46:53
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Arlington VA USNetwork King Of The Hill (NetKotH): A hacker wargame for organizers who are lazy Adrian Crenshaw (Irongeek) AIDE 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-12 06:27:12
*.peoavn.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Columbus OH USA Crosswalk of the Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP) - John McLain Louisville InfoSec 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-12 06:27:10
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Arlington VA USAIDE 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-12 06:26:45
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Arlington VA USInside the Hacker's Studio - Billy Hoffman and IronGeek Outerz0ne 9 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-12 06:25:24
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Arlington VA USIrongeek.com2015-01-12 06:22:41
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Arlington VA US2015-01-12 06:20:16
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Smyrna TN US2015-01-12 05:16:08
*.tic.va.gov152.130.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USThumb Sucking: Automatically copying data off of USB flash drives2015-01-12 03:43:29
*.state.gov169.252.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Washington DC USBasic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-12 03:17:53
*.scott.disa.mil209.22.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Columbus OH US2015-01-11 22:25:54
*.79.154.4.iarc.nv.gov64.79.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 USB write blocking with USBProxy - Dominic Spill (BSides Las Vegas 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-11 20:41:24
*.79.154.4.iarc.nv.gov64.79.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Bsides Las Vegas 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-11 20:41:06
*.nsoc.health.mil214.1.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USCompetitive Hacking- why you should capture the flag — Steve Vittitoe (Circle City Con 2014 Videos) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-11 10:49:46
*.newton.pentagon.mil214.4.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-10 22:16:43
*.nmci.navy.mil138.163.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA US2015-01-10 16:48:03
*.uar.navy.mil205.56.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 1.1.4322; InfoPath.1; .NET CLR 3.0.04506.30; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) VIRGINIA BEACH VA USIrongeek.com2015-01-10 05:37:47
*.uar.navy.mil205.56.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 1.1.4322; InfoPath.1; .NET CLR 3.0.04506.30; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) VIRGINIA BEACH VA US2015-01-10 05:07:44
*.afghan.swa.army.mil214.13.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USOSfuscate: Change your Windows OS TCP/IP Fingerprint to confuse P0f, NetworkMiner, Ettercap, Nmap and other OS detection tools 2015-01-10 04:16:26
*.cts.wa.gov198.239.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Olympia WA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-09 14:33:01
*.dekalbcountga.gov209.214.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Mini-DisplayPort on New Dells: Resolving issues with output to projectors in Windows 72015-01-09 12:50:26
*.net.nih.gov137.187.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Bethesda MD USFinding Rogue SMB File Shares On Your Network 2015-01-09 12:31:15
*.rttc.army.mil147.241.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko Fort Huachuca AZ US2015-01-09 12:14:59
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-09 12:01:32
*.ssmcnet.noaa.gov205.156.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Silver Spring MD USManual Page - truecrypt(1)2015-01-09 10:38:04
*.fdic.gov167.176.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Arlington VA USBasic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-09 10:19:33
*.csd.disa.mil199.10.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Columbus OH US2015-01-09 09:57:40
*.ptr.hqda.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USBsides Delaware 2013 Videos(Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-09 09:48:16
*.ptr.hqda.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ US2015-01-09 09:47:56
*.ptr.hqda.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Fort Huachuca AZ USBsides Delaware 2013 Videos(Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-09 09:47:38
*.disa.mil214.36.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.101 Safari/537.36 Columbus OH USBeEF:Browser Exploitation Framework XSS Fun (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-09 09:06:45
*.dhs.gov216.81.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Washington DC USUnicode Text Steganography Encoders/Decoders2015-01-09 08:34:01
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Smyrna TN US2015-01-09 08:23:09
*.nyc.gov161.185.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.104 Safari/537.36 Brooklyn NY US2015-01-09 08:01:41
*.gtwy.uscourts.gov199.107.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko San Diego CA USAttacking Drupal - Greg Foss (BSides Las Vegas 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-09 07:56:49
*.nmci.navy.mil138.163.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA US2015-01-09 07:37:47
*.nmci.usmc.mil138.162.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USBasic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-09 07:21:23
*.doc.wa.gov198.239.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Cracking Cached Domain/Active Directory Passwords on Windows XP/2000/2003 2015-01-09 07:15:36
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USSocial Engineering Defense Contractors on LinkedIN & Facebook: Whos plugged in to your employees? Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-09 07:11:26
*.ibwc.gov63.96.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.69 Safari/537.36 Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-09 07:11:13
*.disa.mil214.36.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.101 Safari/537.36 Columbus OH USBeEF:Browser Exploitation Framework XSS Fun (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-09 07:06:35
*.srvs.usps.gov56.0.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Raleigh NC USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-09 07:00:37
*.gtwy.uscourts.gov199.107.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 San Diego CA USA Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP poisoning and other niceties. 2015-01-09 06:57:23
*.159.150.198.4k.usda.gov199.159.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Collins CO US2015-01-09 06:46:41
*.sandia.gov198.102.*.*Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Albuquerque NM USIntro to Darknets: Tor and I2P Workshop (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-09 06:31:08
*.sandia.gov198.102.*.*Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Albuquerque NM USHacking Illustrated: Computer security videos2015-01-09 06:30:37
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Introduction to hacking with PowerShell - Scott Busby (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-09 05:41:16
*.nyc.gov161.185.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:21.0) Gecko/20100101 Firefox/21.0 Brooklyn NY USThumbscrew: Software USB Write Blocker2015-01-09 05:33:40
*.dhec.sc.gov74.254.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Ironkey High Security Flash Drive: Use and Review (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-09 05:03:06
*.atsc.army.mil160.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-09 04:52:36
*.redstone.army.mil136.205.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-09 04:38:51
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) MAFB-Gunter Annex AL USMobile Device Hacking: Turning your phone, PDA or internet tablet into a pen-testing platfor2015-01-09 04:19:05
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) MAFB-Gunter Annex AL USApps/Scripts2015-01-09 04:16:32
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) MAFB-Gunter Annex AL USHacking Illustrated: Computer security videos2015-01-09 04:15:57
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) MAFB-Gunter Annex AL USRaspberry Pi Recipes2015-01-09 04:15:09
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) MAFB-Gunter Annex AL USGeneral Network Security2015-01-09 04:13:16
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USIrongeek's Links2015-01-09 03:41:56
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USHacking Illustrated: Computer security videos2015-01-09 03:41:38
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-09 03:38:04
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-09 03:37:46
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-09 03:37:04
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USGeneral Network Security2015-01-09 03:36:52
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-09 03:36:34
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-09 03:36:25
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-09 03:34:35
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USNcat Tutorial: A modern Netcat from the Nmap team (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-09 03:33:56
*.sandia.gov198.102.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Albuquerque NM USUsing msfpayload and msfencode from Metasploit 3.3 to bypass anti-virus (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-08 17:34:31
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-08 17:21:05
*.srvs.usps.gov56.0.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; NISSC) Raleigh NC USASCII Barcode Chart:All your Bar Codes, are belong to us!!!2015-01-08 15:33:20
*.srvs.usps.gov56.0.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; NISSC) Raleigh NC US2015-01-08 15:25:43
*.sandia.gov198.102.*.*Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Albuquerque NM USIntroduction to HTML Injection (HTMLi) and Cross Site Scripting (XSS) Using Mutillidae - ISSA Kentuckiana workshop 9  (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-08 14:35:16
*.sandia.gov198.102.*.*Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Albuquerque NM USIntroduction to Pen Testing Simple Network Management Protocol (SNMP) - ISSA Kentuckiana workshop 9 - Jeremy Druin (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-08 14:35:14
*.sandia.gov198.102.*.*Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Albuquerque NM USSQL Server Hacking from ISSA Kentuckiana workshop 7 - Jeremy Druin (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-08 14:35:11
*.arc.nasa.gov128.102.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MSFC AL USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-08 13:37:30
*.in.gov108.59.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Indianapolis IN USFinding Rogue SMB File Shares On Your Network 2015-01-08 12:00:54
*.doe.gov205.254.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC US2015-01-08 11:54:17
*.srvs.usps.gov56.0.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; NISSC) Raleigh NC USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-08 11:48:48
*.atsc.army.mil160.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-08 11:43:37
*.net.cia.gov198.81.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Irongeek.com2015-01-08 11:20:37
*.afnoc.af.mil132.3.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36 MAFB-Gunter Annex AL USLocking down Windows Vista and Windows 7 against Malicious USB devices 2015-01-08 10:49:19
*.srvs.usps.gov56.0.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Raleigh NC USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-08 10:29:17
*.ustranscom.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USMobile Device Hacking: Turning your phone, PDA or internet tablet into a pen-testing platfor2015-01-08 10:24:45
*.ustranscom.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-08 10:24:26
*.srvs.usps.gov56.0.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; NISSC) Raleigh NC USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2015-01-08 10:17:00
*.srvs.usps.gov56.0.*.*Mozilla/4.0 (compatible;) Raleigh NC USIrongeek.com2015-01-08 10:15:12
*.srvs.usps.gov56.0.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Raleigh NC USMutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 102015-01-08 10:15:10
*.fdic.gov167.176.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Arlington VA USEverybody gets clickjacked: Hard knock lessons on bug bounties - Jonathan Cran Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-08 10:07:09
*.fdic.gov167.176.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Arlington VA USFun with Ettercap Filters2015-01-08 09:48:51
*.fdic.gov167.176.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Arlington VA USManual Page - ettercap(8)2015-01-08 09:47:28
*.maricopa.gov156.42.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Phoenix AZ USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-08 09:20:55
*.modot.mo.gov168.166.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 OPR/26.0.1656.60 Jefferson City MO USIrongeek.com2015-01-08 09:18:47
*.modot.mo.gov168.166.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 OPR/26.0.1656.60 Jefferson City MO US2015-01-08 09:18:43
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL US2015-01-08 08:39:51
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-08 08:31:31
*.chs.spawar.navy.mil150.125.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 2015-01-08 08:27:43
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Smyrna TN US2015-01-08 08:23:12
*.nmci.usmc.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) VIRGINIA BEACH VA US The Seven Habits of a Successful Information Security Career Manager (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-08 08:14:06
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Fort Huachuca AZ USAdvanced Threats and Lateral Movement  - Terrance Davis GrrCON 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-08 07:48:01
*.cts.wa.gov198.239.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Olympia WA USEthics of full disclosure concerning security vulnerabilities 2015-01-08 07:44:40
*.usdoj.gov149.101.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; DOJ3jx7bf; rv:11.0) like Gecko Potomac MD USEvery Unicode Character2015-01-08 07:19:48
*.tic.va.gov152.131.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC US2015-01-08 07:02:08
*.afnoc.af.mil132.3.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MAFB-Gunter Annex AL USIntro to Metasploit Class at IU Southeast  (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-08 06:56:46
*.gor.army.mil140.153.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko Fort Huachuca AZ USBasic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-08 06:42:48
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2015-01-08 06:34:10
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2015-01-08 06:18:14
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USHomemade Hardware Keylogger/PHUKD Hybrid2015-01-08 04:26:20
*.korea.army.mil143.138.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-07 21:39:16
*.tic.va.gov152.130.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Washington DC USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-07 19:29:30
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2015-01-07 18:06:16
*.tic.va.gov152.130.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Washington DC USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-07 14:54:37
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-07 13:30:10
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-07 13:26:53
*.samhouston.army.mil139.161.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-07 13:11:19
*.samhouston.army.mil139.161.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-07 13:09:59
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) MAFB-Gunter Annex AL USPlug and Prey: Malicious USB Devices2015-01-07 13:09:58
*.samhouston.army.mil139.161.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-07 13:08:57
*.ngb.army.mil132.79.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; rv:11.0) like Gecko Fort Huachuca AZ US2015-01-07 13:04:46
*.20.225.19.pnnl.gov130.20.*.*Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML,Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/7.1.2 Safari/537.85.11 Richland WA US2015-01-07 11:40:55
*.net.cia.gov198.81.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Irongeek.com2015-01-07 11:37:58
*.ncsc.mil214.4.*.*rv:31.0) Gecko/20100101 Firefox/31.0Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USIrongeek.com2015-01-07 11:31:51
*.ncsc.mil214.4.*.*rv:31.0) Gecko/20100101 Firefox/31.0Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USIrongeek.com2015-01-07 11:18:20
*.ilga.gov12.43.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 2015-01-07 10:50:46
*.ilga.gov12.43.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Beating the Infosec Learning Curve Without Burning Out - Scott ‘secureholio’ Thomas GrrCON 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 10:48:54
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USPlug and Prey: Malicious USB Devices2015-01-07 10:48:38
*.ilga.gov12.43.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 DERP - Dangerous Electronic Redteam Practices - Luis Santana Hack3rcon 5 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 10:48:14
*.ilga.gov12.43.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 2015-01-07 10:47:14
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Critically Plagiarizing?: Ideas On Spotting Plagiarism, While Spending No Money Adrian Crenshaw (yes, really, no one else would claim the typos)2015-01-07 10:35:19
*.oni.nmic.navy.mil205.68.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 VIRGINIA BEACH VA US802.11 Wireless Security Class for the Louisville ISSA Part 1 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 10:34:19
*.oni.nmic.navy.mil205.68.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 VIRGINIA BEACH VA USIrongeek.com2015-01-07 10:32:54
*.oni.nmic.navy.mil205.68.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 VIRGINIA BEACH VA US2015-01-07 10:31:11
*.oni.nmic.navy.mil205.68.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 VIRGINIA BEACH VA US2015-01-07 10:31:08
*.oni.nmic.navy.mil205.68.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 VIRGINIA BEACH VA US2015-01-07 10:31:00
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 A Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP poisoning and other niceties. 2015-01-07 10:28:24
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Using Bart's PE Builder to Make an Anti-Spyware and Rescue CD2015-01-07 10:28:22
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Plug and Prey: Malicious USB Devices2015-01-07 10:27:59
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Out of Character: Use of Punycode and Homoglyph Attacks to Obfuscate URLs for Phishing2015-01-07 10:27:21
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Critically Plagiarizing?: Ideas On Spotting Plagiarism, While Spending No Money Adrian Crenshaw (yes, really, no one else would claim the typos)2015-01-07 10:27:09
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Building a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2015-01-07 10:27:02
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 2015-01-07 10:26:52
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Passwordscon 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 10:25:29
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 TakeDownCon Rocket City 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 10:25:25
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Defcon Wireless Village 2014 (Defcon 22) 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 10:25:20
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 BSides Cleveland 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 10:25:17
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 OISF 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 10:25:13
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Circle City Con 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 10:25:09
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Bsides Las Vegas 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 10:25:04
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0  Log Files and Linux.2015-01-07 10:23:50
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 MAFB-Gunter Annex AL USIntroduction to hacking with PowerShell - Scott Busby (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-07 10:23:27
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 MAFB-Gunter Annex AL USIntroduction to hacking with PowerShell - Scott Busby (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-07 10:19:57
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 DreamHost Review2015-01-07 10:17:45
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 General Network Security2015-01-07 10:14:42
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Reviews2015-01-07 10:14:33
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 2015-01-07 10:14:30
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Irongeek's Links2015-01-07 10:14:25
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Mobile Device Hacking: Turning your phone, PDA or internet tablet into a pen-testing platfor2015-01-07 10:14:18
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0  Log Files and Linux.2015-01-07 10:13:03
*.gor.army.mil140.153.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.2; Tablet PC 2.0) Fort Huachuca AZ US2015-01-07 10:12:35
*.disa.mil209.22.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Columbus OH USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-07 09:39:12
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-07 09:22:02
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-07 09:20:43
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USDefcon Wireless Village 2014 (Defcon 22) 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 08:52:35
*.ens.ornl.gov128.219.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Oak Ridge TN USARPFreeze: A tool for Windows to protect against ARP poisoning by setting up static ARP entries2015-01-07 08:39:46
*.gor.army.mil140.153.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Fort Huachuca AZ USAnti-Forensics: Occult Computing  (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-07 08:32:54
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-07 08:31:09
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USDual booting Winbuilder/Win7PE SE and Backtrack 5 on a USB flash drive with XBOOT (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-07 08:30:26
*.pppl.gov198.125.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0 2015-01-07 08:29:08
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Smyrna TN US2015-01-07 08:22:20
*.apg.army.mil140.153.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Fort Huachuca AZ USOut of Character: Use of Punycode and Homoglyph Attacks to Obfuscate URLs for Phishing2015-01-07 08:09:58
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USWhat can you find out from an IP?2015-01-07 07:45:56
*.ngb.army.mil132.79.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-07 07:43:36
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2015-01-07 07:43:24
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USApps/Scripts2015-01-07 07:42:43
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-07 07:42:26
*.ngb.army.mil132.79.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-07 07:37:16
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USBeating the Infosec Learning Curve Without Burning Out - Scott ‘secureholio’ Thomas GrrCON 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 07:37:03
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USBash Scripting for Penetration Testers - Lee Baird - Hack3rcon 5 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 07:36:34
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USUniversity campuses that use Irongeek.com materials for teaching infosec in Higher education2015-01-07 07:34:46
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-07 07:33:50
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-07 07:33:11
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-07 07:27:32
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-07 07:25:43
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USUniversity campuses that use Irongeek.com materials for teaching infosec in Higher education2015-01-07 07:25:23
*.ngb.army.mil132.79.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-07 07:24:51
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2015-01-07 07:24:41
*.bop.gov149.101.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E) Potomac MD USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-07 07:03:46
*.usbr.gov140.216.*.*Mozilla/4.0 (compatible;) Sacramento CA USIrongeek.com2015-01-07 06:51:32
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USExploit Development with Ruby An Intro Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 05:58:47
*.gor.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-07 05:09:29
*.atc.army.mil134.194.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Fort Huachuca AZ US2015-01-07 04:37:46
*.nmci.navy.mil138.162.*.*Mozilla/4.0 (compatible;) VIRGINIA BEACH VA USIrongeek.com2015-01-07 04:19:17
*.nmci.navy.mil138.162.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2015-01-07 04:17:34
*.ssmcnet.noaa.gov205.156.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Silver Spring MD US2015-01-07 04:17:18
*.gor.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2015-01-07 03:56:59
*.gor.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-07 03:56:42
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USExploit Development with Ruby An Intro Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-07 03:32:15
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-07 00:50:44
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-06 20:57:32
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-06 19:38:12
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2015-01-06 17:25:58
*.242.dccan.dc.gov166.91.*.*rv:34.0) Gecko/20100101 Firefox/34.0Mozilla/5.0 (Windows NT 6.1; rv:34.0) Gecko/20100101 Firefox/34.0 Washington DC DC USMini-DisplayPort on New Dells: Resolving issues with output to projectors in Windows 72015-01-06 13:11:03
*.gor.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USFootprinting, scoping and recon with DNS, Google Hacking and Metadata (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-06 13:10:56
*.doe.gov205.254.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2015-01-06 12:51:48
*.afnoc.af.mil132.3.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USLinks for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking2015-01-06 12:31:49
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL US2015-01-06 12:30:46
*.bliss.army.mil147.71.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2015-01-06 12:02:17
*.dhhq.health.mil214.1.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USA Crosswalk of the Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP) - John McLain Louisville InfoSec 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-06 11:34:23
*.dhhq.health.mil214.1.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USA Crosswalk of the Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP) - John McLain Louisville InfoSec 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-06 11:34:17
*.dhhq.health.mil214.1.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USA Crosswalk of the Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP) - John McLain Louisville InfoSec 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-06 11:33:37
*.gor.army.mil140.153.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-06 11:32:54
*.afnoc.af.mil132.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USThumbscrew: Software USB Write Blocker2015-01-06 11:15:42
*.ria.army.mil140.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USA Crosswalk of the Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP) - John McLain Louisville InfoSec 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-06 11:12:59
*.ustranscom.mil214.3.*.*Mozilla/4.0 (compatible;) Columbus OH USIrongeek.com2015-01-06 11:10:08
*.gor.army.mil140.153.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Fort Huachuca AZ USThumbscrew: Software USB Write Blocker2015-01-06 11:07:48
*.gor.army.mil140.153.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Fort Huachuca AZ USThumbscrew: Software USB Write Blocker2015-01-06 11:07:05
*.dhs.gov216.81.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-06 10:52:49
*.stratcom.mil143.250.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; USSTRATCOM msie6.0sp1; USSTRATCOM msie6.0; msie7.0; msie8.0; USSTRATCOM msie8.0) Columbus OH USThe Human Buffer Overflow aka Amygdala Hijacking - Christopher Hadnagy Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-06 10:49:45
*.wiesbaden.army.mil139.139.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USXmas scan with Nmap (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-06 10:39:20
*.csd.disa.mil131.64.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; .NET4.0C; .NET4.0E) Columbus OH USInfoSec - from the mouth of babes (or an 8 year old) - Reuben A. Paul (RAPstar) and Mano Paul Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-06 10:20:00
*.afnoc.af.mil132.3.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-06 10:18:30
*.dhs.gov216.81.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; InfoPath.3; .NET4.0E) Washington DC USA Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP poisoning and other niceties. 2015-01-06 10:12:22
*.training.navy.mil160.127.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) VIRGINIA BEACH VA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-06 10:10:45
*.ustranscom.mil214.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH US2015-01-06 09:36:25
*.dhs.gov216.81.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; InfoPath.3; .NET4.0E) Washington DC USA Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP poisoning and other niceties. 2015-01-06 09:24:53
*.tac.army.mil143.85.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USWeaponizing your Coffee Pot - Daniel Buentello Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-06 09:13:08
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; Tablet PC 2.0; InfoPath.3) MAFB-Gunter Annex AL US2015-01-06 08:48:24
*.cts.wa.gov198.239.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Olympia WA USEthics of full disclosure concerning security vulnerabilities 2015-01-06 08:22:32
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Smyrna TN US2015-01-06 08:22:10
*.nmci.usmc.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Win64; x64; Trident/4.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA US2015-01-06 08:14:42
*.loc.gov140.147.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Washington DC USChanging Your MAC Address In Window XP/Vista, Linux And Mac OS X (Sometimes known as MAC spoofing)2015-01-06 08:10:13
*.arc.nasa.gov128.102.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:22.0) Gecko/20100101 Firefox/22.0 MSFC AL USWindows 7: Copy A Modified User Profile Over The Default Profile 2015-01-06 08:06:34
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USFootprinting, scoping and recon with DNS, Google Hacking and Metadata (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-06 08:01:09
*.nmci.navy.mil138.163.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) VIRGINIA BEACH VA US2015-01-06 07:57:50
*.doe.gov205.254.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Washington DC US2015-01-06 07:43:30
*.tic.va.gov152.130.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Washington DC USInstalling the I2P darknet software in Linux (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-06 07:03:49
*.nmci.usmc.mil138.162.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USThe Future of RE: Dynamic Binary Visualization Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-06 06:59:21
*.wood.army.mil155.9.*.*rv:34.0) Gecko/20100101 Firefox/34.0Mozilla/5.0 (Windows NT 6.1; rv:34.0) Gecko/20100101 Firefox/34.0 Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-06 06:35:38
*.dcpds.cpms.osd.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Columbus OH USMan page of CRUNCH2015-01-06 06:33:07
*.okc.disa.mil152.229.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-06 05:27:22
*.tn.gov170.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Smyrna TN US2015-01-06 05:04:44
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; Tablet PC 2.0; InfoPath.3) MAFB-Gunter Annex AL USHack3rcon 5 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-06 04:57:51
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; Tablet PC 2.0; InfoPath.3) MAFB-Gunter Annex AL USHack3rcon 5 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-06 04:54:01
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; Tablet PC 2.0; InfoPath.3) MAFB-Gunter Annex AL US2015-01-06 04:53:18
*.xr.usgs.gov137.227.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Reston VA USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-06 03:46:23
*.xr.usgs.gov137.227.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Reston VA USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2015-01-06 03:21:00
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-06 00:05:22
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-05 21:24:11
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-05 18:14:25
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2015-01-05 16:26:40
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2015-01-05 14:44:19
*.xr.usgs.gov152.61.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Sioux Falls SD USAuditing Syskey and the SAM on Windows Using Samdump2 and John (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-05 13:39:52
*.med.navy.mil131.158.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; Tablet PC 2.0) VIRGINIA BEACH VA USA Crosswalk of the Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP) - John McLain Louisville InfoSec 2014 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-05 12:45:06
*.ustranscom.mil214.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH US2015-01-05 12:38:51
*.army.mil206.37.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Columbus OH US2015-01-05 12:06:49
*.army.mil206.37.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Columbus OH USUniversity campuses that use Irongeek.com materials for teaching infosec in Higher education2015-01-05 12:06:40
*.afnoc.af.mil132.3.*.*Win64Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko MAFB-Gunter Annex AL USLinks for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking2015-01-05 12:06:03
*.army.mil206.37.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Columbus OH USHacking Illustrated: Computer security videos2015-01-05 12:05:55
*.army.mil206.37.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Columbus OH USSupplements2015-01-05 12:04:15
*.army.mil206.37.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Columbus OH USDiet2015-01-05 12:03:58
*.army.mil206.37.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Columbus OH USWorkout at the Gym2015-01-05 12:01:18
*.army.mil206.37.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Columbus OH US2015-01-05 11:57:51
*.sd.spawar.navy.mil128.49.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2015-01-05 11:56:40
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USIrongeek.com2015-01-05 11:20:54
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USIrongeek.com2015-01-05 11:20:54
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2015-01-05 11:16:49
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) MAFB-Gunter Annex AL US2015-01-05 10:50:38
*.fdic.gov167.176.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Arlington VA USBasics of Arpspoofing/Arppoisoning 2015-01-05 10:32:45
*.hqda.pentagon.mil134.11.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Fort Huachuca AZ USLook Ma, No Exploits! – The Recon-ng Framework - Tim “LaNMaSteR53″ Tomes Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2015-01-05 10:20:27
*.oni.nmic.navy.mil205.68.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) VIRGINIA BEACH VA USBasic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-05 10:11:32
*.bpa.gov170.160.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 Portland OR USPortaPack: Is that a HackRF in your pocket? - Jared Boone (Defcon Wireless Village 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-05 09:48:37
*.belvoir.army.mil160.147.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; BOIE9;ENUSSEM; rv:11.0) like Gecko Fort Huachuca AZ USFile Systems and Thumb Drives: Choosing between FAT16, FAT32 and NTFS to get a faster USB Flash Drive 2015-01-05 09:31:18
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USNetworkMiner Professional for Network Forensics (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-05 08:54:30
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0 Columbus OH USIntro to Darknets: Tor and I2P Workshop (Hacking Illustrated Series InfoSec Tutorial Videos)2015-01-05 08:39:59

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2015, IronGeek
Louisville / Kentuckiana Information Security Enthusiast