A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Irongeek's Fed Watch Irongeek's Fed Watch

A quick report of the last 1000 web hits I recently got from hosts ending in .gov or .mil. To all of the United State Goverment folks that use my site: I'm honored you use my resources, please let me know if there are any training videos you would like for me to create. And send me a NSA/FBI/DHS hat or t-shirt. :)

HostnameIPOSBrowser AgentLocationPage ViewedDate/Time
*.irs.gov152.216.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; MS-RTC LM 8; Tablet PC 2.0) Washington DC USHardware Key Logging Part 1: An Overview Of USB Hardware Keyloggers, And A Review Of The KeyCarbon USB Home Mini2014-04-23 22:18:05
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-23 21:12:23
*.csd.disa.mil158.15.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH US2014-04-23 16:02:44
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-23 16:01:59
*.mda.mil140.32.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.2) Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-23 14:53:32
*.irs.gov152.216.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; InfoPath.1; .NET CLR 1.0.3705; .NET CLR 1.1.4322; .NET CLR 2.0.50727; MS-RTC LM 8; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; Washington DC US2014-04-23 14:44:21
*.sandia.gov198.102.*.*Intel Mac OS X 10_9_2) AppleWebKit/537.75.14 (KHTMMozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/537.75.14 Albuquerque NM USDeploying Metasploit's Meterpreter with MITM and an Ettercap filter (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-23 13:16:49
*.mhsi.med.osd.mil214.2.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Columbus OH USState Hacking/Computer Security Laws2014-04-23 12:32:16
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) MAFB-Gunter Annex AL USDeploying Metasploit's Meterpreter with MITM and an Ettercap filter (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-23 12:23:08
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-23 12:19:03
*.nmci.navy.mil138.163.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; InfoPath.3; .NET4.0E) VIRGINIA BEACH VA USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-23 12:03:32
*.virginia.gov166.67.*.*Mozilla/4.0 (compatible;) Chester VA USIrongeek.com2014-04-23 11:47:45
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-23 11:43:20
*.ngb.army.mil132.79.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-23 11:13:59
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USUsing msfpayload and msfencode from Metasploit 3.3 to bypass anti-virus (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-23 11:05:35
*.emd.wa.gov199.47.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Camp Murray WA USMutillidae 1: Setup (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-23 09:41:59
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; SLCC1; InfoPath.3) MAFB-Gunter Annex AL US2014-04-23 09:40:19
*.dma.mil155.7.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-23 09:38:39
*.ssmcnet.noaa.gov205.156.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Silver Spring MD US2014-04-23 09:33:40
*.nyc.gov161.185.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Brooklyn NY USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-23 08:56:22
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USCollaborative Penetration Testing With Lair - Tom Steele,Dan Kottmann Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-23 08:44:54
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-23 08:44:44
*.ri.gov158.123.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 5.1; rv:28.0) Gecko/20100101 Firefox/28.0 Providence RI USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2014-04-23 08:44:09
*.cpms.osd.mil155.19.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Fort Huachuca AZ USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-23 08:42:06
*.nyc.gov161.185.*.*WOW64) AppleWebKit/537.17 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.17 (KHTML, like Gecko) Chrome/24.0.1312.57 Safari/537.17 Brooklyn NY US2014-04-23 08:24:27
*.sd.spawar.navy.mil128.49.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 VIRGINIA BEACH VA USPractical Guide to Alternative Data Streams in NTFS2014-04-23 08:23:38
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-23 08:04:27
*.army.mil143.84.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-23 08:04:22
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA US2014-04-23 07:48:29
*.nmci.navy.mil138.162.*.*Mozilla/4.0 (compatible;) VIRGINIA BEACH VA USIrongeek.com2014-04-23 07:48:22
*.rcoh.supshipnn.navy.mil204.222.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; InfoPath.3; .NET CLR 1.1.4322; .NET4.0E) Columbus OH US2014-04-23 07:22:08
*.virginia.gov166.67.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Chester VA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-23 07:20:13
*.disa.mil214.36.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-23 07:07:01
*.net.cia.gov198.81.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Irongeek.com2014-04-23 06:08:00
*.virginia.gov166.67.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Chester VA USIrongeek.com2014-04-23 06:02:30
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-23 06:01:10
*.apg.army.mil140.153.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ USLocking down Windows Vista and Windows 7 against Malicious USB devices 2014-04-23 05:38:03
*.maine.gov198.182.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SIMBAR={4A8D19E4-D9E4-11E2-83C0-90B11C8F2C0D}; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC AUGUSTA ME USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-23 05:11:36
*.maine.gov198.182.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; MDDRJS) AUGUSTA ME USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-23 05:10:48
*.maine.gov198.182.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SIMBAR={4A8D19E4-D9E4-11E2-83C0-90B11C8F2C0D}; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC AUGUSTA ME USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-23 05:01:52
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-23 05:01:25
*.stewart.army.mil192.100.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-23 04:59:09
*.cpms.osd.mil155.19.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Fort Huachuca AZ USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-23 03:46:13
*.nsoc.med.osd.mil214.1.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-23 03:33:36
*.stuttgart.army.mil139.139.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ US Cracking Windows Vista Beta 2 Local Passwords (SAM and SYSKEY) 2014-04-23 02:59:17
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-23 02:30:11
*.usafricom.mil215.67.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USIrongeek.com2014-04-23 01:41:44
*.dhs.gov216.81.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC USBuilding an InfoSec lab, on the cheap2014-04-23 01:19:54
*.usafricom.mil215.67.*.*Mozilla/4.0 (compatible;) Columbus OH USIrongeek.com2014-04-23 00:36:51
*.usafricom.mil215.67.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) Columbus OH US2014-04-23 00:34:49
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-23 00:22:50
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-22 22:35:24
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-22 21:07:51
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-22 19:40:17
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-22 19:19:47
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-22 18:12:45
*.srvs.usps.gov56.0.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; NISSC; .NET CLR 1.0.3705; .NET CLR 2.0.50727; InfoPath.1; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; NISSC; NISSC) Raleigh NC US2014-04-22 16:16:44
*.srvs.usps.gov56.0.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; NISSC; .NET CLR 1.0.3705; .NET CLR 2.0.50727; InfoPath.1; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; NISSC; NISSC) Raleigh NC US2014-04-22 16:05:21
*.disa.mil214.36.*.*Mozilla/4.0 (compatible;) Columbus OH USIrongeek.com2014-04-22 15:49:58
*.dodmedia.osd.mil155.7.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-22 15:12:55
*.fnmoc.navy.mil152.80.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 VIRGINIA BEACH VA US2014-04-22 15:02:52
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USUsing msfpayload and msfencode from Metasploit 3.3 to bypass anti-virus (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-22 14:03:12
*.sandia.gov198.102.*.*Intel Mac OS X 10_9_2) AppleWebKit/537.75.14 (KHTMMozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/537.75.14 Albuquerque NM USDeploying Metasploit's Meterpreter with MITM and an Ettercap filter (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-22 13:04:32
*.state.gov169.253.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.117 Safari/537.36 Washington DC USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-22 13:00:19
*.osti.gov192.107.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Oak Ridge TN USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-22 12:50:53
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-22 12:01:15
*.nsoc.med.osd.mil214.1.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/7.0) Columbus OH US2014-04-22 12:01:00
*.nmci.navy.mil138.163.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; InfoPath.3; .NET4.0E) VIRGINIA BEACH VA USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-22 11:59:55
*.epa.gov204.46.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Research Triangle Park NC USBasics of Arpspoofing/Arppoisoning 2014-04-22 11:56:59
*.ri.gov158.123.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; BTRS124890; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; Zune 4.7 Providence RI USIrongeek.com2014-04-22 11:55:32
*.ri.gov158.123.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 5.1; rv:28.0) Gecko/20100101 Firefox/28.0 Providence RI USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2014-04-22 11:28:28
*.jwac.mil199.211.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USHacking Illustrated: Computer security videos2014-04-22 10:40:22
*.jwac.mil199.211.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USMobile Device Hacking: Turning your phone, PDA or internet tablet into a pen-testing platfor2014-04-22 10:40:16
*.jwac.mil199.211.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-22 10:39:53
*.gsfc.nasa.gov198.119.*.*Linux x86_64) AppleWebKit/537.36 (KHTML, like GeckMozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/33.0.1750.152 Chrome/33.0.1750.152 Safari/537.36 Mini-DisplayPort on New Dells: Resolving issues with output to projectors in Windows 72014-04-22 10:28:49
*.nlm.nih.gov130.14.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Bethessda MD USMan page of CRUNCH2014-04-22 10:22:46
*.ivv.nasa.gov129.164.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.59 Safari/537.36 MSFC AL USWebGoat 1: SQL Injection Demonstration (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-22 09:39:35
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-22 08:20:11
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-22 08:19:45
*.anl.gov146.137.*.*Intel Mac OS X 10_7_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Argonne IL USBig Data Technology – The Real World ‘Minority Report’
Brian Foster Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)
2014-04-22 07:47:22
*.anl.gov146.137.*.*Intel Mac OS X 10_7_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Argonne IL USCyber Security Program At UAH - Russ Ward (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-22 07:46:48
*.anl.gov146.137.*.*Intel Mac OS X 10_7_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Argonne IL USZero to Hero: Breaking into the security Field - Jeremy Conway (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-22 07:44:09
*.anl.gov146.137.*.*Intel Mac OS X 10_7_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Argonne IL US1337 in the Library: Obtaining your information security education on the cheap - Adrian Crenshaw @irongeek_adc (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-22 07:43:47
*.anl.gov146.137.*.*Intel Mac OS X 10_7_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Argonne IL US2014-04-22 07:32:00
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USCollaborative Penetration Testing With Lair - Tom Steele,Dan Kottmann Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-22 07:25:45
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-22 07:25:19
*.disa.mil214.36.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USManual Page - netcat(1)2014-04-22 06:41:24
*.stewart.army.mil192.100.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-22 06:31:01
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-22 06:10:34
*.afnoc.af.mil132.3.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 MAFB-Gunter Annex AL US2014-04-22 06:07:50
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-22 06:00:35
*.cpms.osd.mil155.19.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Fort Huachuca AZ USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-22 05:24:07
*.nsoc.med.osd.mil214.1.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-22 04:58:19
*.stewart.army.mil192.100.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-22 04:42:59
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-22 04:39:01
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; SLCC1; InfoPath.3) MAFB-Gunter Annex AL US2014-04-22 03:13:19
*.dodiis.mil214.3.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Columbus OH USDerbycon 2011 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-21 23:23:02
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-21 21:49:30
*.dodiis.mil214.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E) Columbus OH US2014-04-21 21:43:37
*.dodiis.mil214.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E) Columbus OH US2014-04-21 21:43:37
*.belvoir.army.mil128.190.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USIntro to Scanning: Nmap, Hping, Amap, TCPDump, Metasploit, etc. Jeremy Druin (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-21 20:27:16
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2014-04-21 19:29:26
*.fnmoc.navy.mil152.80.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 VIRGINIA BEACH VA US2014-04-21 15:49:53
*.lanl.gov192.12.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0 Los Alamos NM USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-21 15:24:50
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-21 15:24:29
*.lanl.gov192.12.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0 Los Alamos NM USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-21 14:06:59
*.nmci.navy.mil138.163.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; InfoPath.3; .NET4.0E) VIRGINIA BEACH VA USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-21 14:06:57
*.gsfc.nasa.gov128.183.*.*Intel Mac OS X 10.7Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:28.0) Gecko/20100101 Firefox/28.0 MSFC AL USManual Page - urlsnarf(8)2014-04-21 13:14:42
*.fnmoc.navy.mil152.80.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 VIRGINIA BEACH VA US2014-04-21 12:33:12
*.rcert-s.army.mil206.37.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) Columbus OH USLook Ma, No Exploits! – The Recon-ng Framework - Tim “LaNMaSteR53″ Tomes Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-21 12:19:20
*.occ.gov199.83.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2014-04-21 12:12:51
*.occ.gov199.83.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2014-04-21 12:12:40
*.occ.gov199.83.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2014-04-21 12:12:03
*.occ.gov199.83.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-21 12:11:14
*.stewart.army.mil192.100.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-21 11:27:40
*.hq.pacom.mil199.211.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-21 11:22:51
*.nist.gov129.6.*.*Intel Mac OS X 10.7Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:28.0) Gecko/20100101 Firefox/28.0 Gaithersburg MD US2014-04-21 11:17:15
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; .NET CLR 3.0.30618; SLCC1; Tablet PC 2.0; InfoPat MAFB-Gunter Annex AL US2014-04-21 10:43:34
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; .NET CLR 3.0.30618; SLCC1; Tablet PC 2.0; InfoPat MAFB-Gunter Annex AL US2014-04-21 10:43:20
*.lanl.gov192.12.*.*Intel Mac OS X 10.7Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:28.0) Gecko/20100101 Firefox/28.0 Los Alamos NM US Cracking Windows Vista Beta 2 Local Passwords (SAM and SYSKEY) 2014-04-21 09:12:51
*.lanl.gov192.12.*.*Intel Mac OS X 10.7Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:28.0) Gecko/20100101 Firefox/28.0 Los Alamos NM USCracking Windows Vista/XP/2000/NT Passwords via SAM and SYSKEY with Cain, Ophcrack, Saminside, BKhive, etc2014-04-21 09:12:32
*.lanl.gov192.12.*.*Intel Mac OS X 10.7Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:28.0) Gecko/20100101 Firefox/28.0 Los Alamos NM US Cracking Windows Vista Beta 2 Local Passwords (SAM and SYSKEY) 2014-04-21 09:11:54
*.atc.army.mil134.194.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-21 08:52:42
*.state.gov169.253.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2014-04-21 08:43:01
*.state.gov169.253.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Washington DC US2014-04-21 08:42:35
*.lanl.gov192.12.*.*Intel Mac OS X 10.7Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:28.0) Gecko/20100101 Firefox/28.0 Los Alamos NM USSecurity and Hacking Plugins for Bart's PE Builder (Including Ghost 11)2014-04-21 08:20:09
*.lanl.gov192.12.*.*Intel Mac OS X 10.7Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:28.0) Gecko/20100101 Firefox/28.0 Los Alamos NM USApps/Scripts2014-04-21 08:19:47
*.lanl.gov192.12.*.*Intel Mac OS X 10.7Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:28.0) Gecko/20100101 Firefox/28.0 Los Alamos NM US2014-04-21 08:15:47
*.lanl.gov192.12.*.*Intel Mac OS X 10.7Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:28.0) Gecko/20100101 Firefox/28.0 Los Alamos NM US2014-04-21 08:14:00
*.redstone.army.mil136.205.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; MS-RTC LM 8) Fort Huachuca AZ US2014-04-21 08:13:51
*.nmci.navy.mil138.163.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA US2014-04-21 08:08:04
*.152.ptldnet.portlandoregon.gov74.120.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Portland OR USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-21 07:37:51
*.ssa.gov199.173.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) 2014-04-21 07:28:58
*.virginia.gov166.67.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.2; MS-RTC LM 8) Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-21 07:28:35
*.srvs.usps.gov56.0.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Raleigh NC USFinding Rogue SMB File Shares On Your Network 2014-04-21 07:16:42
*.afnoc.af.mil132.3.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 MAFB-Gunter Annex AL US2014-04-21 06:42:37
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-21 06:00:06
*.chs.spawar.navy.mil150.125.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/7.0) 2014-04-21 05:53:29
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-21 05:23:33
*.afcert.af.mil206.39.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:26.0) Gecko/20100101 Firefox/26.0 Columbus OH USIrongeek.com2014-04-21 05:19:15
*.atc.army.mil134.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USLessons Learned Implementing SDLC – and How To Do It Better -Sarah Clarke Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-21 04:36:21
*.atc.army.mil134.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2014-04-21 04:35:52
*.amedd.army.mil143.69.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2014-04-21 04:29:38
*.dodiis.mil214.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E) Columbus OH US2014-04-20 22:45:15
*.dodiis.mil214.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E) Columbus OH US2014-04-20 22:45:15
*.eu.navy.mil138.180.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USNQSFW Free CISSP Study Guide (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-20 01:08:30
*.redstone.army.mil136.205.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-20 01:01:07
*.hua.army.mil140.202.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-19 10:58:45
*.nsoc.med.osd.mil214.1.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-19 08:31:02
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-19 04:56:56
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-19 02:55:56
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-18 21:06:32
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-18 20:22:42
*.dhs.gov216.81.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC USSMalware Analysis 101 – N00b to Ninja in 60 Minutes - grecs Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-18 18:03:38
*.dhs.gov216.81.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2014-04-18 17:29:10
*.dhs.gov216.81.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC US2014-04-18 17:28:19
*.fnmoc.navy.mil152.80.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 VIRGINIA BEACH VA US2014-04-18 15:02:57
*.152.ptldnet.portlandoregon.gov74.120.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Portland OR US2014-04-18 13:39:11
*.152.ptldnet.portlandoregon.gov74.120.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Portland OR USLook Ma, No Exploits! – The Recon-ng Framework - Tim “LaNMaSteR53″ Tomes Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-18 13:37:54
*.matcombic.usmc.mil192.156.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-18 13:22:16
*.tic.va.gov152.132.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC US2014-04-18 11:49:41
*.tic.va.gov152.130.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC US2014-04-18 11:16:44
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-18 10:38:15
*.nosc.afcent.af.mil153.23.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Forensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-18 10:00:48
*.usdoj.gov149.101.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; DI7SP2) Potomac MD USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-18 09:09:50
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-18 08:49:59
*.nsoc.med.osd.mil214.1.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/7.0) Columbus OH US2014-04-18 08:38:40
*.ha.osd.mil159.133.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; dtsPdfWh) Columbus OH US2014-04-18 08:30:27
*.dot.gov152.120.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC USBuilding a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE Tutorial2014-04-18 08:15:09
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-18 05:19:04
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-18 01:28:35
*.amedd.army.mil192.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USPractical Guide to Alternative Data Streams in NTFS2014-04-18 00:23:51
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-17 20:44:20
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-17 18:48:41
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-17 18:26:29
*.tic.va.gov152.131.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-17 16:09:54
*.csd.disa.mil131.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USI2P/Tor Workshop Notes2014-04-17 15:49:34
*.csd.disa.mil131.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-17 15:49:03
*.nmci.navy.mil138.163.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0E; InfoPath.3; .NET4.0C) VIRGINIA BEACH VA US2014-04-17 15:41:11
*.state.gov169.253.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2014-04-17 15:27:08
*.jpl.nasa.gov137.79.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Firefox/24.0 MSFC AL USA Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP poisoning and other niceties. 2014-04-17 15:20:02
*.jpl.nasa.gov137.79.*.*Intel Mac OS X 10.9Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Firefox/24.0 MSFC AL USA Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP poisoning and other niceties. 2014-04-17 15:02:19
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-17 14:04:27
*.fdic.gov167.176.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Arlington VA US2014-04-17 13:22:58
*.ssmcnet.noaa.gov205.156.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Silver Spring MD USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-17 13:14:21
*.nr.navy.mil205.66.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) VIRGINIA BEACH VA USPractical Guide to Alternative Data Streams in NTFS2014-04-17 13:01:41
*.apg.army.mil140.153.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ USSMalware Analysis 101 – N00b to Ninja in 60 Minutes - grecs Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-17 12:55:36
*.apg.army.mil140.153.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ USMoving the Industry Forward – The Purple Team - David Kennedy Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-17 12:55:18
*.apg.army.mil140.153.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-17 12:45:21
*.apg.army.mil140.153.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-17 12:44:41
*.tooele.army.mil158.1.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USLocking down Windows Vista and Windows 7 against Malicious USB devices 2014-04-17 12:31:45
*.knox.army.mil147.238.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-17 12:23:32
*.sd.spawar.navy.mil128.49.*.*Linux i686Mozilla/5.0 (X11; Linux i686; rv:24.0) Gecko/20100101 Firefox/24.0 VIRGINIA BEACH VA USManual Page - minicom(1)2014-04-17 12:09:28
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-17 11:46:36
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; MS-RTC LM 8) MAFB-Gunter Annex AL USFun with Ettercap Filters2014-04-17 11:09:14
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-17 11:04:22
*.cts.wa.gov198.239.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Olympia WA USISSA Kentuckiana Web Pen-Testing Workshop (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-17 11:01:18
*.normanok.gov164.58.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Windows 7: Copy A Modified User Profile Over The Default Profile 2014-04-17 10:31:34
*.disa.mil214.36.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-17 09:33:45
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHow Im going to own your organization in just a few days. - RazorEQX` Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-17 09:27:16
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USKali Linux Live Boot USB Flash Drive - Jeremy Druin (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-17 08:25:16
*.tic.va.gov152.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC USDirty Red Team Tricks II Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-17 08:07:40
*.tic.va.gov152.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC USDerbycon 2012 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-17 08:07:15
*.state.gov169.253.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC US2014-04-17 08:05:59
*.afnoc.af.mil132.3.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 MAFB-Gunter Annex AL USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-17 07:41:50
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USIdentifying Evil: An introduction to Reverse Engineering Malware and other software - Bart ‘d4ncind4n’ Hopper Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-17 07:17:34
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHow Good is Your Phish - @sonoffish Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-17 07:15:04
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-17 07:14:54
*.afnoc.af.mil132.3.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 MAFB-Gunter Annex AL US2014-04-17 06:57:55
*.fdic.gov167.176.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Arlington VA US2014-04-17 06:27:36
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-17 06:26:34
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-17 06:07:43
*.wiesbaden.army.mil139.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-17 05:43:34
*.wiesbaden.army.mil139.139.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHumor2014-04-17 05:43:19
*.wiesbaden.army.mil139.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-17 05:42:31
*.wiesbaden.army.mil139.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-17 05:41:00
*.wiesbaden.army.mil139.139.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USManual Page - urlsnarf(8)2014-04-17 05:40:06
*.missi.ncsc.mil144.51.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USIntro to Scanning: Nmap, Hping, Amap, TCPDump, Metasploit, etc. Jeremy Druin (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-17 04:57:04
*.virginia.gov166.67.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.2; MS-RTC LM 8) Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-17 03:59:48
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-16 21:58:18
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2014-04-16 17:46:05
*.nmci.navy.mil138.163.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USUsing FOCA to collect Metadata about an organization (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 17:35:58
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-16 15:33:27
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-16 15:31:07
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-16 14:31:01
*.virginia.gov166.67.*.*Mozilla/4.0 (compatible;) Chester VA USIrongeek.com2014-04-16 13:08:13
*.tic.va.gov152.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC USDirty Red Team Tricks II Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-16 13:03:04
*.virginia.gov166.67.*.*Mozilla/4.0 (compatible;) Chester VA USIrongeek.com2014-04-16 12:58:52
*.dhs.gov216.81.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2014-04-16 12:50:25
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USWindows Attacks: AT is the new black - Chris Gates & Mubix “Rob” Fuller Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-16 12:40:27
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USCash is King: Who’s Wearing Your Crown? - Tom Eston & Spencer McIntyre Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-16 12:40:16
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USIOCAware – Actively Collect Compromise Indicators and Test Your Entire Enterprise - Matt Jezorek, Dennis Kuntz Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-16 12:39:44
*.soc.mil204.34.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Columbus OH USMan page of BULK_EXTRACTOR2014-04-16 12:24:11
*.lanl.gov192.12.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Los Alamos NM USPlug and Prey: Malicious USB Devices2014-04-16 11:49:05
*.csd.disa.mil131.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USIntro to Darknets: Tor and I2P Workshop (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 11:25:58
*.csd.disa.mil131.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USUncloaking IP Addresses on IRC - Derek Callaway @decalresponds (BSides Delaware 2013) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 11:12:34
*.jpl.nasa.gov137.79.*.*Intel Mac OS X 10_9_2) AppleWebKit/537.75.14 (KHTMMozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/537.75.14 MSFC AL USA Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP poisoning and other niceties. 2014-04-16 11:08:14
*.opm.gov205.131.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Locking down Windows Vista and Windows 7 against Malicious USB devices 2014-04-16 10:52:06
*.hua.army.mil140.202.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USKinetic Pwnage: Obliterating the Line Between Computers and the Physical World - Ed Skoudis Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-16 10:49:49
*.dhs.gov216.81.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; InfoPath.3; Tablet PC 2.0; .NET4.0E) Washington DC US2014-04-16 10:49:39
*.hua.army.mil140.202.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USKinetic Pwnage: Obliterating the Line Between Computers and the Physical World - Ed Skoudis Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-16 10:48:53
*.lanl.gov192.12.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Los Alamos NM USHP Printer Display Hack2014-04-16 10:44:14
*.grc.nasa.gov128.156.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Firefox/24.0 MSFC AL USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2014-04-16 10:38:25
*.texas.gov204.65.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Tablet PC 2.0; .NET4.0C; .NET4.0E) Using Kon-Boot from a USB Flash Drive: Bypass those pesky Windows and Linux login passwords completely 2014-04-16 10:29:22
*.mcc.gov12.14.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 MIDDLETOWN NJ USBasic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 10:27:13
*.ssmcnet.noaa.gov205.156.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20140319 Firefox/24.0 Iceweasel/24.4.0 Silver Spring MD USDeploying Metasploit's Meterpreter with MITM and an Ettercap filter (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 10:23:09
*.lanl.gov192.12.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Los Alamos NM USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-16 10:18:06
*.virginia.gov166.67.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.2; MS-RTC LM 8) Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 10:17:30
*.csd.disa.mil131.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USIntro to Darknets: Tor and I2P Workshop (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 10:12:47
*.csd.disa.mil131.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USCritically Plagiarizing?: Ideas On Spotting Plagiarism, While Spending No Money Adrian Crenshaw (yes, really, no one else would claim the typos)2014-04-16 10:11:27
*.csd.disa.mil131.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USLockade: Locksport Electronic Games2014-04-16 10:09:55
*.csd.disa.mil131.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-16 10:08:52
*.net.nih.gov137.187.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Bethesda MD USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-16 09:47:53
*.sd.spawar.navy.mil128.49.*.*Linux i686Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20131030 Firefox/17.0 Iceweasel/17.0.10 VIRGINIA BEACH VA USMetasploit Flash Tutorial (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 09:46:37
*.tobyhanna.army.mil192.108.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USSelective file shredding (DOD 5220.22-M) with Eraser and CCleaner to thwart forensics tools (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 09:32:39
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; InfoPath.2) MAFB-Gunter Annex AL USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-16 09:17:15
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-16 08:51:06
*.virginia.gov166.67.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.2; MS-RTC LM 8) Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 08:24:17
*.virginia.gov166.67.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 08:10:24
*.virginia.gov166.67.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0 Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 08:07:24
*.virginia.gov166.67.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; MS-RTC LM 8; .NET4.0C; .NET4.0E) Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 08:07:09
*.virginia.gov166.67.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 08:07:07
*.uscg.mil152.121.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Local Password Auditing Presentation for Indiana Higher Education Cybersecurity Summit 20052014-04-16 08:06:34
*.uscg.mil152.121.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Cracking Windows Vista/XP/2000/NT Passwords via SAM and SYSKEY with Cain, Ophcrack, Saminside, BKhive, etc2014-04-16 08:05:38
*.uscg.mil152.121.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Cracking Windows 2000 And XP Passwords With Only Physical Access 2014-04-16 07:57:04
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 07:41:48
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 07:25:37
*.virginia.gov166.67.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 07:09:50
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) MAFB-Gunter Annex AL USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-16 07:05:31
*.dhs.gov216.81.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-16 06:56:13
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 06:45:36
*.sandia.gov198.102.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 Albuquerque NM US2014-04-16 06:44:26
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USCollaborative Penetration Testing With Lair - Tom Steele,Dan Kottmann Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-16 06:33:32
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-16 06:26:31
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; SLCC1; InfoPath.3; Tablet PC 2.0) MAFB-Gunter Annex AL US2014-04-16 06:18:22
*.dhs.gov216.81.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; IE8Mercury; A9ELIPJT) Washington DC USDarknets and hidden servers: Identifying the true IP/network identity of I2P service hosts2014-04-16 05:31:11
*.rev.hq.af.mil134.205.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) MAFB-Gunter Annex AL USLook for deleted data on the slack space of a disk (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-16 04:54:39
*.korea.army.mil143.138.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-16 04:24:33
*.kuwait.army.mil143.81.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-16 02:46:48
*.dodiis.mil214.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E) Columbus OH US2014-04-16 00:25:28
*.army.mil143.84.*.*rv:24.0) Gecko/20100101 Firefox/24.0Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ USDerbycon 2012 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 21:55:55
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2014-04-15 21:14:22
*.les.mil205.77.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2; .NET4.0C; OfficeLiveConnector.1.5; Office VIRGINIA BEACH VA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-15 19:51:47
*.hud.gov170.97.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC USAdvanced Evasion Techniques - Pwning the Next Generation Security Products (Keynote) - David Kennedy Hack3rcon 4 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 19:16:53
*.hud.gov170.97.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC USHack3rcon 4 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-15 19:13:34
*.hud.gov170.97.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC US2014-04-15 19:13:16
*.nro.mil214.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; .NET CLR 1.1.4322; InfoPath.3; MS-RTC LM 8 Columbus OH US2014-04-15 18:20:27
*.swa.army.mil215.68.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Columbus OH US2014-04-15 17:25:07
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-15 16:50:00
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-15 15:29:39
*.nmci.navy.mil138.163.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-15 15:29:34
*.asab.afcent.af.mil153.25.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Ethical Analysis of Network Neutrality  2014-04-15 15:21:32
*.hua.army.mil140.202.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USThumbscrew: Software USB Write Blocker2014-04-15 14:27:05
*.virginia.gov166.67.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-15 14:19:02
*.ncsc.mil214.4.*.*rv:21.0) Gecko/20100101 Firefox/21.0Mozilla/5.0 (Windows NT 5.1; rv:21.0) Gecko/20100101 Firefox/21.0 Columbus OH USIrongeek.com2014-04-15 14:09:45
*.dhs.gov216.81.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-15 13:48:01
*.dsh.ca.gov158.96.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Rancho Cordova CA USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-15 13:40:52
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USSecurity Sucks, and You’re Wearing A Nursing Bra - Paul Asadoorian Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 12:46:57
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USCash is King: Who’s Wearing Your Crown? - Tom Eston & Spencer McIntyre Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 12:36:12
*.dhs.gov216.81.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-15 12:15:30
*.gordon.army.mil155.8.*.*WOW64Mozilla/5.0 (Windows NT 6.0; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 12:03:18
*.virginia.gov166.67.*.*Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Chester VA USThumbscrew: Software USB Write Blocker2014-04-15 11:57:06
*.cts.wa.gov198.239.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Olympia WA USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2014-04-15 11:49:35
*.dhs.gov216.81.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 11:31:53
*.mecklenburgcountync.gov199.59.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Charlotte NC USSMalware Analysis 101 – N00b to Ninja in 60 Minutes - grecs Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-15 11:22:25
*.mecklenburgcountync.gov199.59.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Charlotte NC USLessons Learned Implementing SDLC – and How To Do It Better -Sarah Clarke Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-15 11:22:14
*.mecklenburgcountync.gov199.59.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Charlotte NC USBuilding a private data storage cloud - Michael Meffie Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-15 11:16:06
*.mecklenburgcountync.gov199.59.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Charlotte NC USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 11:15:25
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USIOCAware – Actively Collect Compromise Indicators and Test Your Entire Enterprise - Matt Jezorek, Dennis Kuntz Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 11:03:28
*.jpl.nasa.gov137.79.*.*Intel Mac OS X 10_9_2) AppleWebKit/537.75.14 (KHTMMozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/537.75.14 MSFC AL USA Quick Intro to Sniffers: Wireshark/Ethereal, ARPSpoof, Ettercap, ARP poisoning and other niceties. 2014-04-15 10:26:23
*.mccoy.army.mil158.6.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Fort Huachuca AZ USMutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 102014-04-15 10:14:37
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USCrude, Inconsistent Threat: Understanding Anonymous2014-04-15 09:25:50
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USCognitive Injection: Reprogramming the Situation-Oriented Human OS - Andy Ellis Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 09:24:33
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USCognitive Injection: Reprogramming the Situation-Oriented Human OS - Andy Ellis Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 09:24:27
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USCrude, Inconsistent Threat: Understanding Anonymous2014-04-15 09:06:47
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USCrude, Inconsistent Threat: Understanding Anonymous2014-04-15 08:50:17
*.phoenix.gov148.167.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; GTB7.5; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Tablet PC 2.0; .NET4.0E; InfoPath.3; .NET4.0C) Phoenix AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-15 08:42:13
*.tic.va.gov152.132.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-15 08:29:28
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USIntro to Wireshark (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-15 08:18:09
*.dhs.gov216.81.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-15 08:00:53
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USCollaborative Penetration Testing With Lair - Tom Steele,Dan Kottmann Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 07:32:39
*.sandia.gov198.102.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 Albuquerque NM US2014-04-15 06:56:08
*.afnoc.af.mil132.3.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 MAFB-Gunter Annex AL US2014-04-15 06:37:40
*.fdic.gov167.176.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Arlington VA USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 06:29:33
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USIt’s Okay to Touch Yourself - Ben Ten (Ben0xA) Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 06:27:32
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-15 06:27:28
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-15 06:26:26
*.uscg.mil152.121.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) SMalware Analysis 101 – N00b to Ninja in 60 Minutes - grecs Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-15 06:15:48
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-15 05:43:39
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USASCII Barcode Chart:All your Bar Codes, are belong to us!!!2014-04-15 05:25:45
*.ct.gov159.247.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E; Tablet PC 2.0) East Hartford CT USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-15 05:11:08
*.net.nih.gov137.187.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Bethesda MD USInstalling Nessus on Kali Linux and Doing a Credentialed Scan (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-15 05:00:01
*.net.nih.gov137.187.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Bethesda MD USPen-testing practice in a box: How to assemble a virtual network (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-15 04:59:05
*.nsoc.med.osd.mil214.1.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-15 04:35:22
*.lead.army.mil160.134.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2014-04-15 03:04:02
*.stewart.army.mil192.100.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-15 02:26:02
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-15 02:18:06
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; SLCC1; InfoPath.3) MAFB-Gunter Annex AL US2014-04-15 01:57:58
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0 Columbus OH USMetasploit Class Videos  (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-15 00:27:05
*.afcert.af.mil206.39.*.*Mozilla/4.0 (compatible;) Columbus OH USIrongeek.com2014-04-15 00:18:07
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-15 00:07:24
*.pac.army.mil143.46.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2014-04-14 23:11:17
*.dodiis.mil214.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E) Columbus OH US2014-04-14 22:39:12
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-14 22:37:19
*.dhcp.lbl.gov131.243.*.*Linux x86_64) AppleWebKit/537.36 (KHTML, like GeckMozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Berkeley CA USBig Data Technology – The Real World ‘Minority Report’
Brian Foster Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)
2014-04-14 20:43:15
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-14 19:11:29
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0 Columbus OH USMetasploit Class Videos  (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 18:31:28
*.wl.spawar.navy.mil128.49.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 VIRGINIA BEACH VA USLocking down Windows Vista and Windows 7 against Malicious USB devices 2014-04-14 15:56:36
*.maricopa.gov156.42.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E) Phoenix AZ USBasic Nmap Usage (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 15:54:21
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-14 15:00:51
*.doe.gov205.254.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2014-04-14 14:41:02
*.sandia.gov198.102.*.*Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.152 Safari/537.36 Albuquerque NM USHacking Your Way Into the APRS Network on the Cheap - Mark Lenigan Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 14:35:30
*.sandia.gov198.102.*.*Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.152 Safari/537.36 Albuquerque NM USSMalware Analysis 101 – N00b to Ninja in 60 Minutes - grecs Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 14:35:21
*.sandia.gov198.102.*.*Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.152 Safari/537.36 Albuquerque NM USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 14:34:23
*.hood.army.mil150.113.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Crude, Inconsistent Threat: Understanding Anonymous2014-04-14 13:53:06
*.virginia.gov166.67.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 13:12:39
*.virginia.gov166.67.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 12:31:18
*.virginia.gov166.67.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 12:29:11
*.ptr.hqda.pentagon.mil141.116.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 2014-04-14 11:51:08
*.sandia.gov198.102.*.*Linux x86_64) AppleWebKit/537.36 (KHTML, like GeckMozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Albuquerque NM USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 11:15:47
*.sandia.gov198.102.*.*Linux x86_64) AppleWebKit/537.36 (KHTML, like GeckMozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.152 Safari/537.36 Albuquerque NM USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 11:08:08
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-14 11:06:13
*.virginia.gov166.67.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 10:52:05
*.afcert.af.mil206.39.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:26.0) Gecko/20100101 Firefox/26.0 Columbus OH USIrongeek.com2014-04-14 10:45:11
*.uscg.mil152.121.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) SMalware Analysis 101 – N00b to Ninja in 60 Minutes - grecs Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 10:09:52
*.cts.wa.gov198.239.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3) Olympia WA USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2014-04-14 10:04:21
*.usarec.army.mil199.123.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ US2014-04-14 09:55:32
*.virginia.gov166.67.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Chester VA USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 09:51:50
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Columbus OH USBSides Huntsville 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 09:51:37
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Columbus OH USCyber Security Program At UAH - Russ Ward (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 09:50:30
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Columbus OH USBSides Huntsville 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 09:50:17
*.virginia.gov166.67.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Chester VA USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 09:49:29
*.bart.gov148.165.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Oakland CA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-14 09:49:27
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Columbus OH USBuilding an InfoSec lab, on the cheap2014-04-14 09:48:52
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Columbus OH USBuilding an InfoSec lab, on the cheap2014-04-14 09:48:52
*.fnmoc.navy.mil152.80.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 VIRGINIA BEACH VA US2014-04-14 09:44:57
*.ncsc.mil214.4.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E) Columbus OH USMcCorkle & Rios 100 bugs in 100 days: An analysis of ICS (SCADA) software Derbycon 2011 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 09:38:29
*.uscg.mil152.121.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) SMalware Analysis 101 – N00b to Ninja in 60 Minutes - grecs Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 09:37:25
*.ncsc.mil214.4.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E) Columbus OH USDerbycon 2011 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 09:30:45
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 09:16:21
*.airtermnorva.navy.mil199.10.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) VIRGINIA BEACH VA USCrude, Inconsistent Threat: Understanding Anonymous2014-04-14 09:15:33
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 09:14:18
*.swa.army.mil214.27.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Columbus OH US2014-04-14 09:13:26
*.larc.nasa.gov192.94.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 MSFC AL USDeploying Metasploit's Meterpreter with MITM and an Ettercap filter (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 09:05:41
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-14 08:36:37
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-14 08:23:29
*.uscg.mil152.121.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) SMalware Analysis 101 – N00b to Ninja in 60 Minutes - grecs Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 08:06:27
*.uscg.mil152.121.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Naisho DeNusumu (Stealing Secretly) – Exfiltration Tool/Framework - Adam Crompton Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 08:05:00
*.uscg.mil152.121.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Notacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 08:04:44
*.uscg.mil152.121.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) 2014-04-14 08:04:24
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 08:01:58
*.uscg.mil152.121.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0) Locking down Windows Vista and Windows 7 against Malicious USB devices 2014-04-14 07:46:41
*.doe.gov205.254.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2014-04-14 07:16:27
*.doe.gov205.254.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Washington DC US2014-04-14 07:16:20
*.michigan.gov136.181.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Lansing MI USUsing Kon-Boot from a USB Flash Drive: Bypass those pesky Windows and Linux login passwords completely 2014-04-14 07:11:50
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-14 07:07:33
*.ncsc.mil214.4.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E) Columbus OH USMcCorkle & Rios 100 bugs in 100 days: An analysis of ICS (SCADA) software Derbycon 2011 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 06:43:22
*.dhs.gov216.81.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC USANOTHER Log to Analyze - Utilizing DNS to Identify Malware - Nathan Magniez Hack3rcon 4 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 06:40:04
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-14 06:26:14
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-14 06:23:20
*.dhs.gov216.81.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2014-04-14 06:15:15
*.dhs.gov216.81.*.*Mozilla/4.0 (compatible;) Washington DC USIrongeek.com2014-04-14 06:11:35
*.dhs.gov216.81.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 06:09:33
*.lewis.army.mil150.192.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; MS-RTC LM 8; .NET4.0C; .NET4.0E) Man page of CRUNCH2014-04-14 06:06:51
*.state.gov169.253.*.*WOW64) AppleWebKit/537.31 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.64 Safari/537.31 Washington DC USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 06:04:45
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-14 06:03:54
*.rev.army.pentagon.mil134.11.*.*Intel Mac OS X 10.6Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USIntro to Linux System Hardening, and Applying it to BackTrack Linux Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 06:01:35
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-14 05:47:16
*.detrick.army.mil140.139.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 05:31:34
*.doe.gov205.254.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC USNindroid: Pentesting Apps for your Android device - Michael Palumbo Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 05:28:44
*.doe.gov205.254.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Washington DC USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 05:25:23
*.doe.gov205.254.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 05:24:27
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD USNaisho DeNusumu (Stealing Secretly) – Exfiltration Tool/Framework - Adam Crompton Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 04:43:47
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD USHacking Your Way Into the APRS Network on the Cheap - Mark Lenigan Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 04:42:38
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD USWireless Mesh Protocols - Alex Kot Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 04:41:08
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD USPwning the POS! - Mick Douglas Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-14 04:06:12
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 03:52:11
*.lewis.army.mil150.192.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; MS-RTC LM 8; .NET4.0C; .NET4.0E) Man page of CRUNCH2014-04-14 03:02:28
*.dhcp.lbl.gov131.243.*.*Linux x86_64) AppleWebKit/537.36 (KHTML, like GeckMozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Berkeley CA USBig Data Technology – The Real World ‘Minority Report’
Brian Foster Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)
2014-04-14 01:45:25
*.dhcp.lbl.gov131.243.*.*Linux x86_64) AppleWebKit/537.36 (KHTML, like GeckMozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Berkeley CA USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-14 01:45:18
*.wiesbaden.army.mil139.139.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USManual Page - urlsnarf(8)2014-04-14 00:46:56
*.lewis.army.mil150.192.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; MS-RTC LM 8; .NET4.0C; .NET4.0E) Basics of Arpspoofing/Arppoisoning 2014-04-13 23:02:34
*.dodiis.mil214.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E) Columbus OH US2014-04-13 22:41:19
*.lewis.army.mil150.192.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; MS-RTC LM 8; .NET4.0C; .NET4.0E) Man page of CRUNCH2014-04-13 22:32:50
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO USMadMACs: MAC Address Spoofing and Host Name Randomizing App for Windows 7 (Should work in Windows Vista and Windows 8 too) 2014-04-13 21:51:29
*.korea.army.mil143.138.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ US2014-04-13 16:39:00
*.edu.usafa.hpc.mil140.32.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Columbus OH USCollaboration between Artificial Intelligence and Humans: How to cure every disease within 50 years - Joe O’Donnell Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-13 14:11:16
*.edu.usafa.hpc.mil140.32.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Columbus OH USSMalware Analysis 101 – N00b to Ninja in 60 Minutes - grecs Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-13 14:11:02
*.edu.usafa.hpc.mil140.32.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Columbus OH USNotacon 11 (2014) Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-13 14:08:21
*.durhamcountync.gov168.215.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Man page of GENLIST.MAN.12014-04-13 12:14:09
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-12 19:30:43
*.uscg.mil152.121.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0) 2014-04-12 11:44:15
*.ngb.army.mil132.79.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-12 08:11:40
*.ngb.army.mil132.79.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:20.0) Gecko/20100101 Firefox/20.0 Fort Huachuca AZ USApps/Scripts2014-04-12 08:11:37
*.ngb.army.mil132.79.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-12 08:10:39
*.ngb.army.mil132.79.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-12 08:09:59
*.ngb.army.mil132.79.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:20.0) Gecko/20100101 Firefox/20.0 Fort Huachuca AZ US2014-04-12 08:09:43
*.maricopa.gov156.42.*.*Mozilla/4.0 (compatible;) Phoenix AZ USIrongeek.com2014-04-12 07:56:28
*.afghan.swa.army.mil214.13.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH US2014-04-11 21:16:51
*.ngb.army.mil132.79.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-11 14:08:23
*.sandia.gov134.253.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.75.14 (KHTMMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/6.1.3 Safari/537.75.14 Albuquerque NM USLook Ma, No Exploits! – The Recon-ng Framework - Tim “LaNMaSteR53″ Tomes Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-11 14:01:34
*.sandia.gov134.253.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.75.14 (KHTMMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/6.1.3 Safari/537.75.14 Albuquerque NM USRed Teaming Your Bug-Out Bag - Tom Moore Hack3rcon 4 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-11 14:00:09
*.sandia.gov134.253.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.75.14 (KHTMMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/6.1.3 Safari/537.75.14 Albuquerque NM USHTML 5 Security - Justin Klein Keane @madirish2600 (BSides Delaware 2013) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-11 13:59:38
*.net.cia.gov198.81.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Irongeek.com2014-04-11 13:27:20
*.florence-ky.gov207.250.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 What can you find out from an IP?2014-04-11 12:53:15
*.water.ca.gov136.200.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Sacramento CA USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-11 12:26:12
*.usdoj.gov149.101.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; DI60SP1001) Potomac MD USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-11 11:14:29
*.dmz.js.mil199.208.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH US2014-04-11 11:00:00
*.dmz.js.mil199.208.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH US2014-04-11 10:59:02
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USint0x80 (of Dual Core) Anti-Forensics for the Louise Derbycon 2011 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-11 09:26:08
*.usdoj.gov149.101.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; DI60SP1001) Potomac MD USAnti-Forensics: Occult Computing  (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-11 08:57:42
*.usdoj.gov149.101.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; DI60SP1001) Potomac MD USAnti-Forensics: Occult Computing  (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-11 08:51:27
*.usdoj.gov149.101.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Potomac MD USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-11 08:39:26
*.nyc.gov161.185.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Brooklyn NY USSecurity and Hacking Plugins for Bart's PE Builder (Including Ghost 11)2014-04-11 08:37:39
*.ngb.army.mil132.79.*.*Trident/7.0Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko Fort Huachuca AZ USint0x80 (of Dual Core) Anti-Forensics for the Louise Derbycon 2011 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-11 08:18:40
*.usmc.mil205.109.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) VIRGINIA BEACH VA US2014-04-11 08:14:50
*.sandia.gov134.253.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Albuquerque NM US2014-04-11 07:31:40
*.sandia.gov134.253.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Albuquerque NM US2014-04-11 07:04:42
*.wiesbaden.army.mil139.139.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2014-04-11 07:04:42
*.usdoj.gov149.101.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; DI60SP1001) Potomac MD US2014-04-11 07:02:49
*.sandia.gov134.253.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Albuquerque NM US2014-04-11 06:42:51
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-11 06:39:35
*.fdic.gov167.176.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Arlington VA USWindows Attacks: AT is the new black - Chris Gates & Mubix “Rob” Fuller Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-11 06:23:32
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-11 06:23:14
*.adab.afcent.af.mil153.24.*.*Mozilla/4.0 (compatible;) Irongeek.com2014-04-11 06:03:29
*.meade.army.mil150.177.*.*rv:26.0) Gecko/20100101 Firefox/26.0Mozilla/5.0 (Windows NT 6.1; rv:26.0) Gecko/20100101 Firefox/26.0 Forensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-11 05:05:56
*.redstone.army.mil136.205.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-11 03:51:19
*.amedd.army.mil192.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USPractical Guide to Alternative Data Streams in NTFS2014-04-11 00:40:03
*.wiesbaden.army.mil139.139.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-11 00:17:22
*.dhcp.lbl.gov128.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Berkeley CA USLocking down Windows Vista and Windows 7 against Malicious USB devices 2014-04-10 17:37:34
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA US2014-04-10 17:23:08
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-10 15:19:17
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-10 15:07:24
*.nv.doe.gov192.100.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20140319 Firefox/24.0 Iceweasel/24.4.0 Las Vegas NV USManual Page - ettercap(8)2014-04-10 14:55:18
*.pacsw.navy.mil144.141.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 VIRGINIA BEACH VA USFun with Ettercap Filters2014-04-10 14:40:50
*.ngb.army.mil132.79.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-10 14:30:21
*.doe.gov205.254.*.*UbuntuMozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:26.0) Gecko/20100101 Firefox/26.0 Washington DC USXmas scan with Nmap (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-10 13:52:55
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-10 13:29:31
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO USIdentifying the true IP/Network identity of I2P service hosts2014-04-10 13:29:09
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-10 13:28:45
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO US2014-04-10 13:27:28
*.usap.gov157.132.*.*Mozilla/4.0 (compatible;) Centennial CO USIrongeek.com2014-04-10 13:25:35
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO US2014-04-10 13:25:21
*.net.cia.gov198.81.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Irongeek.com2014-04-10 12:53:36
*.larc.nasa.gov192.94.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 MSFC AL USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-10 11:57:43
*.tic.va.gov152.131.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC US2014-04-10 11:38:05
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USThe High Risk of Low Risk Applications - Conrad Reynolds Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-10 11:20:23
*.ssa.gov137.200.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0) Baltimore MD USHumor2014-04-10 10:57:19
*.ssa.gov137.200.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0) Baltimore MD US2014-04-10 10:48:16
*.ssa.gov137.200.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0) Baltimore MD US2014-04-10 10:48:05
*.ssa.gov137.200.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0) Baltimore MD US2014-04-10 10:46:17
*.ssa.gov137.200.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0) Baltimore MD USGeneral Network Security2014-04-10 10:45:44
*.ssa.gov137.200.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0) Baltimore MD USHacking Illustrated: Computer security videos2014-04-10 10:45:39
*.ssa.gov137.200.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0) Baltimore MD US2014-04-10 10:45:19
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-10 10:40:20
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USScanning Darkly - HD Moore Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-10 10:19:45
*.ssa.gov137.200.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0) Baltimore MD USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-10 10:16:29
*.ssa.gov137.200.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0) Baltimore MD USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-10 10:16:24
*.ssa.gov137.200.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0) Baltimore MD USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-10 10:16:22
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USTMI: How to attack SharePoint servers and tools to make it easier - Kevin Johnson & James Jardine Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-10 10:16:14
*.ssa.gov137.200.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0) Baltimore MD USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-10 10:13:33
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USSeeing red in your future? - Ian Amit Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-10 09:58:13
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USSeeing red in your future? - Ian Amit Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-10 09:57:54
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USSecurity and Hacking Plugins for Bart's PE Builder (Including Ghost 11)2014-04-10 09:46:00
*.bragg.army.mil147.239.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-10 09:43:55
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USIrongeek's Logwatch Script To Grep For RFI, Webshells, Password Grabs, Web Scanners, Etc.2014-04-10 09:30:24
*.rev.army.pentagon.mil141.116.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Identifying the true IP/Network identity of I2P service hosts2014-04-10 09:29:55
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA US2014-04-10 09:26:32
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.116 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-10 09:11:16
*.nmci.usmc.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E) VIRGINIA BEACH VA US2014-04-10 08:47:05
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA US2014-04-10 08:01:00
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA US2014-04-10 07:59:39
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USProgrammable HID USB Keystroke Dongle: Using the Teensy as a pen testing device2014-04-10 07:36:55
*.med.navy.mil214.1.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Columbus OH USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-10 07:25:23
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USProgrammable HID USB Keystroke Dongle: Using the Teensy as a pen testing device2014-04-10 07:09:49
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USProgrammable HID USB Keystroke Dongle: Using the Teensy as a pen testing device2014-04-10 07:08:36
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USLook Ma, No Exploits! – The Recon-ng Framework - Tim “LaNMaSteR53″ Tomes Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-10 07:02:33
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USPlug and Prey: Malicious USB Devices2014-04-10 07:02:03
*.ssmcnet.noaa.gov205.156.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Silver Spring MD US2014-04-10 06:55:20
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USJTAGulator: Assisted discovery of on-chip debug interfaces - Joe Grand Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-10 06:50:03
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-10 06:22:27
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USCognitive Injection: Reprogramming the Situation-Oriented Human OS - Andy Ellis Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-10 05:42:20
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USPractical Exploitation Using A Malicious Service Set Identifier (SSID) - Deral Heiland Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-10 05:42:19
*.afnoc.af.mil132.3.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 MAFB-Gunter Annex AL US2014-04-10 05:38:59
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USManual Page - macchanger(1)2014-04-10 05:03:19
*.ria.army.mil140.153.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; MS-RTC LM 8; InfoPath Fort Huachuca AZ USNQSFW Free CISSP Study Guide (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-10 04:43:19
*.uar.navy.mil205.56.*.*rv:14.0) Gecko/20100101 Firefox/14.0.1Mozilla/5.0 (Windows NT 5.1; rv:14.0) Gecko/20100101 Firefox/14.0.1 VIRGINIA BEACH VA US2014-04-10 04:33:07
*.stewart.army.mil192.100.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-09 23:45:21
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO USThumb Sucking: Automatically copying data off of USB flash drives2014-04-09 21:46:23
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO USShmooCon Firetalks 2014 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-09 21:42:03
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO USNetwork King Of The Hill (NetKotH): A hacker wargame for organizers who are lazy Adrian Crenshaw (Irongeek) AIDE 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-09 21:22:57
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO USAbout Adrian2014-04-09 21:22:22
*.usap.gov157.132.*.*Mozilla/4.0 (compatible;) Centennial CO USIrongeek.com2014-04-09 21:10:33
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO US2014-04-09 21:10:19
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO US2014-04-09 21:09:53
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO USMadMACs: MAC Address Spoofing and Host Name Randomizing App for Windows 7 (Should work in Windows Vista and Windows 8 too) 2014-04-09 21:05:31
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO US2014-04-09 21:05:06
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-09 20:37:49
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO USMadMACs: MAC Address Spoofing and Host Name Randomizing App for Windows 7 (Should work in Windows Vista and Windows 8 too) 2014-04-09 18:27:06
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO USHoosier Hackers (And Louisville Kentucky Too)2014-04-09 18:26:25
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO USApps/Scripts2014-04-09 18:26:00
*.usap.gov157.132.*.*Mozilla/4.0 (compatible;) Centennial CO USIrongeek.com2014-04-09 18:25:31
*.usap.gov157.132.*.*Mozilla/4.0 (compatible;) Centennial CO USIrongeek.com2014-04-09 18:25:24
*.usap.gov157.132.*.*Mozilla/4.0 (compatible;) Centennial CO USIrongeek.com2014-04-09 18:25:02
*.usap.gov157.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Centennial CO US2014-04-09 18:24:30
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-09 14:22:03
*.fdic.gov167.176.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20131023 Firefox/17.0 Arlington VA US2014-04-09 14:18:32
*.lanl.gov192.12.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Los Alamos NM US2014-04-09 12:55:39
*.aphis.usda.gov168.68.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Collins CO USLocking down Windows Vista and Windows 7 against Malicious USB devices 2014-04-09 12:29:04
*.apg.army.mil140.153.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2014-04-09 11:48:28
*.apg.army.mil140.153.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-09 11:47:56
*.apg.army.mil140.153.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ USSupplements2014-04-09 11:47:47
*.apg.army.mil140.153.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-09 11:47:22
*.apg.army.mil140.153.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-09 11:47:14
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USWinn Schwartau: I Survived Rock and Roll! SkyDogCon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-09 11:12:43
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH US2014-04-09 11:09:17
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH US2014-04-09 11:09:17
*.cdc.gov158.111.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Atlanta GA USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2014-04-09 10:57:33
*.cdc.gov158.111.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Atlanta GA USMutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 102014-04-09 10:57:29
*.cdc.gov158.111.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Atlanta GA USDeliberately Insecure Web Applications For Learning Web App Security (WebGoat, BadStore, Hacme, SecuriBench, WebMaven)2014-04-09 10:55:32
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH US2014-04-09 10:50:42
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH US2014-04-09 10:50:41
*.dhs.lacounty.gov159.225.*.*Mozilla/4.0 (compatible;) Los Angeles CA USIrongeek.com2014-04-09 09:46:46
*.dhs.lacounty.gov159.225.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Los Angeles CA USPlug and Prey: Malicious USB Devices2014-04-09 09:46:23
*.gtwy.uscourts.gov199.107.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 San Diego CA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-09 09:46:12
*.gtwy.uscourts.gov199.107.*.*WOW64Mozilla/5.0 (Windows NT 6.3; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 San Diego CA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-09 09:44:28
*.tic.va.gov152.133.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USMan page of GISKISMET.MAN.12014-04-09 09:22:38
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USLook Ma, No Exploits! – The Recon-ng Framework - Tim “LaNMaSteR53″ Tomes Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-09 09:13:14
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-09 09:13:07
*.detrick.army.mil140.139.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-09 08:53:44
*.virginia.gov166.67.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.2; MS-RTC LM 8) Chester VA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-09 08:43:58
*.20.14.170.pnnl.gov130.20.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Richland WA US2014-04-09 08:11:25
*.larc.nasa.gov192.94.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) MSFC AL USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-09 08:05:03
*.bop.gov149.101.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; chromeframe/32.0.1700.107; .NET4.0C; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0E) Potomac MD USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-09 08:00:16
*.dhs.lacounty.gov159.225.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Los Angeles CA USPlug and Prey: Malicious USB Devices2014-04-09 07:50:12
*.cdc.gov158.111.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Atlanta GA USNQSFW Free CISSP Study Guide (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-09 07:23:48
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; Tablet PC 2.0) MAFB-Gunter Annex AL USPractical Guide to Alternative Data Streams in NTFS2014-04-09 06:58:39
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USLook Ma, No Exploits! – The Recon-ng Framework - Tim “LaNMaSteR53″ Tomes Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-09 06:54:09
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USKinetic Pwnage: Obliterating the Line Between Computers and the Physical World - Ed Skoudis Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-09 06:50:55
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-09 06:50:49
*.stratcom.mil143.250.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; USSTRATCOM msie6.0sp1; USSTRATCOM msie6.0; msie7.0; msie8.0; USSTRATCOM msie8.0) Columbus OH USManual Page - dnsspoof(8)2014-04-09 06:37:02
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-09 06:21:57
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0 Columbus OH USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-09 06:07:29
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USScanning Darkly - HD Moore Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-09 05:51:30
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-09 05:51:14
*.hst.nasa.gov198.118.*.*rv:24.0) Gecko/20100101 Firefox/24.0Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0 MSFC AL USChanging Your MAC Address In Window XP/Vista, Linux And Mac OS X (Sometimes known as MAC spoofing)2014-04-09 05:50:56
*.stuttgart.army.mil139.139.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-09 05:49:17
*.afnoc.af.mil132.3.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 MAFB-Gunter Annex AL US2014-04-09 05:39:32
*.ssmcnet.noaa.gov205.156.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Silver Spring MD US2014-04-09 05:08:57
*.rcert-s.army.mil206.37.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-09 04:59:11
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; SLCC1; InfoPath.3) MAFB-Gunter Annex AL US2014-04-09 00:44:15
*.apg.army.mil140.153.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ US2014-04-08 23:44:27
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-08 22:31:17
*.cts.wa.gov198.239.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Olympia WA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-08 19:19:29
*.doa.alaska.gov158.145.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E) Juneau AK US2014-04-08 17:45:03
*.sandia.gov134.253.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Albuquerque NM USHTML 5 Security - Justin Klein Keane @madirish2600 (BSides Delaware 2013) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-08 17:31:09
*.lanl.gov192.12.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Los Alamos NM US2014-04-08 15:07:53
*.ssa.gov137.200.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET CLR 1.1.4322; InfoPath.3; MS-RTC Baltimore MD USTMI: How to attack SharePoint servers and tools to make it easier - Kevin Johnson & James Jardine Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-08 14:30:08
*.atc.army.mil134.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2014-04-08 13:23:03
*.gordon.army.mil155.8.*.*WOW64Mozilla/5.0 (Windows NT 6.0; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-08 13:05:08
*.usar.army.mil206.39.*.*Mozilla/4.0 (compatible;) Columbus OH USIrongeek.com2014-04-08 12:25:47
*.usar.army.mil206.39.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USXmas scan with Nmap (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-08 12:24:22
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Bethessda MD US2014-04-08 12:01:07
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Bethessda MD US2014-04-08 12:01:06
*.nlm.nih.gov130.14.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Bethessda MD US2014-04-08 12:00:08
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD US2014-04-08 11:59:49
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD US2014-04-08 11:59:45
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD USIntro to Metasploit Class at IU Southeast  (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-08 11:56:31
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD US2014-04-08 11:55:32
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD US2014-04-08 11:54:30
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD USApps/Scripts2014-04-08 11:54:14
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; Tablet PC 2.0; InfoPath.3) MAFB-Gunter Annex AL USUsing msfpayload and msfencode from Metasploit 3.3 to bypass anti-virus (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-08 11:45:13
*.nmci.navy.mil138.163.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA US2014-04-08 11:30:28
*.usar.army.mil206.39.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Columbus OH USManual Page - netcat(1)2014-04-08 11:26:47
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-08 11:15:57
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-08 11:15:45
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-08 11:12:06
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-08 11:11:13
*.knox.army.mil147.238.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-08 11:05:13
*.bernco.gov160.230.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Albuquerque NM USUsing Metasploit to create a reverse Meterpreter payload EXE (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-08 11:05:05
*.afnoc.af.mil132.3.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) MAFB-Gunter Annex AL US2014-04-08 10:45:47
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-08 10:33:41
*.loc.gov140.147.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Washington DC US2014-04-08 09:37:18
*.loc.gov140.147.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Washington DC US2014-04-08 09:37:14
*.ngb.army.mil132.79.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-08 09:19:24
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0 Columbus OH US2014-04-08 09:14:34
*.knox.army.mil147.238.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-08 08:29:27
*.ssmcnet.noaa.gov205.156.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Silver Spring MD US2014-04-08 08:19:15
*.tic.va.gov152.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC US2014-04-08 07:43:43
*.stratcom.mil143.250.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; USSTRATCOM msie6.0; msie7.0; msie8.0; USSTRATCOM msie6.0sp1; USSTRATCOM msie8.0) Columbus OH USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-08 07:35:18
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-08 07:06:29
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-08 07:06:25
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-08 07:04:54
*.knox.army.mil147.238.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-08 06:56:58
*.wiesbaden.army.mil139.139.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USManual Page - urlsnarf(8)2014-04-08 06:40:20
*.wcisc.hpc.mil140.32.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 Columbus OH USNetwork King Of The Hill (NetKotH): A hacker wargame for organizers who are lazy Adrian Crenshaw (Irongeek) AIDE 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-08 06:32:17
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-08 06:21:29
*.xr.usgs.gov130.11.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0) Reston VA USIronkey High Security Flash Drive: Use and Review (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-08 06:12:34
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-08 06:02:22
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0 Columbus OH US2014-04-08 05:46:46
*.gtwy.uscourts.gov199.107.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 San Diego CA USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-08 05:44:06
*.afnoc.af.mil132.3.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 MAFB-Gunter Annex AL US2014-04-08 05:42:36
*.tn.gov170.142.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-08 05:09:36
*.afghan.swa.army.mil214.13.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Columbus OH USChanging Your MAC Address In Window XP/Vista, Linux And Mac OS X (Sometimes known as MAC spoofing)2014-04-08 01:34:58
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-08 00:36:04
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-08 00:26:15
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0 Columbus OH USIntroduction to hacking with PowerShell - Scott Busby (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-07 23:55:22
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0 Columbus OH US2014-04-07 23:49:59
*.honolulu.gov206.195.*.*Mozilla/4.0 (compatible;) Honolulu HI USIrongeek.com2014-04-07 21:43:24
*.lpdb.la.gov68.96.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Intro to Darknets: Tor and I2P Workshop (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-07 14:41:57
*.nbc.gov137.227.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1700.102 Safari/537.36 Reston VA USTracking users, malware and data leaks via the USB serial numbers on flash drives, smart phones and MP3 players2014-04-07 14:24:54
*.nbc.gov137.227.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1700.102 Safari/537.36 Reston VA USPlug and Prey: Malicious USB Devices2014-04-07 14:23:07
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0E; Tablet PC 2.0; .NET4.0C; InfoPath.3) MAFB-Gunter Annex AL USWorkout at the Gym2014-04-07 14:06:58
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0E; Tablet PC 2.0; .NET4.0C; InfoPath.3) MAFB-Gunter Annex AL US2014-04-07 14:05:52
*.ihs.gov198.45.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Albuquerque NM US2014-04-07 12:35:29
*.inl.gov134.20.*.*UbuntuMozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0 Idaho Falls ID USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-07 12:25:57
*.inl.gov134.20.*.*UbuntuMozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0 Idaho Falls ID USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-07 12:25:10
*.inl.gov134.20.*.*UbuntuMozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0 Idaho Falls ID USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-07 12:24:37
*.ngb.army.mil132.79.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Win64; x64; Trident/6.0) Fort Huachuca AZ USLocking down Windows Vista and Windows 7 against Malicious USB devices 2014-04-07 12:20:41
*.grc.nasa.gov128.156.*.*Intel Mac OS X 10.8Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Firefox/24.0 MSFC AL USDeliberately Insecure Web Applications For Learning Web App Security (WebGoat, BadStore, Hacme, SecuriBench, WebMaven)2014-04-07 11:55:44
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-07 11:10:15
*.detrick.army.mil140.139.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-07 10:58:50
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-07 10:58:15
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-07 10:42:18
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-07 10:30:17
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-07 10:18:15
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-07 10:10:15
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-07 10:02:15
*.detrick.army.mil140.139.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-07 09:54:15
*.tic.va.gov152.132.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USLocking down Windows Vista and Windows 7 against Malicious USB devices 2014-04-07 09:22:10
*.detrick.army.mil140.139.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-07 08:29:44
*.belvoir.army.mil128.190.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USOSInt, Cyberstalking, Footprinting and Recon: Getting to know you (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-07 08:21:49
*.afcert.af.mil206.39.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:26.0) Gecko/20100101 Firefox/26.0 Columbus OH USIrongeek.com2014-04-07 07:37:59
*.sandia.gov134.253.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Albuquerque NM USLook Ma, No Exploits! – The Recon-ng Framework - Tim “LaNMaSteR53″ Tomes Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-07 07:22:56
*.sandia.gov134.253.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Albuquerque NM USRed Teaming Your Bug-Out Bag - Tom Moore Hack3rcon 4 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-07 07:20:43
*.sandia.gov134.253.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Albuquerque NM USHTML 5 Security - Justin Klein Keane @madirish2600 (BSides Delaware 2013) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-07 07:20:24
*.tic.va.gov152.131.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-07 07:16:21
*.sandia.gov198.102.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Albuquerque NM USLook Ma, No Exploits! – The Recon-ng Framework - Tim “LaNMaSteR53″ Tomes Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-07 07:05:13
*.sandia.gov198.102.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Albuquerque NM USRed Teaming Your Bug-Out Bag - Tom Moore Hack3rcon 4 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-07 07:03:45
*.sandia.gov198.102.*.*Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/6.1.2 Safari/537.74.9 Albuquerque NM USHTML 5 Security - Justin Klein Keane @madirish2600 (BSides Delaware 2013) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-07 07:03:09
*.ncsc.mil214.4.*.*rv:21.0) Gecko/20100101 Firefox/21.0Mozilla/5.0 (Windows NT 5.1; rv:21.0) Gecko/20100101 Firefox/21.0 Columbus OH USIrongeek.com2014-04-07 06:51:18
*.hq.nasa.gov131.182.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 MSFC AL USMan page of THC-IPV62014-04-07 06:36:34
*.epa.gov134.67.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Research Triangle Park NC USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-07 06:31:03
*.epa.gov134.67.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Research Triangle Park NC USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-07 06:28:09
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-07 06:20:51
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-07 06:03:29
*.ncsc.navy.mil130.109.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 VIRGINIA BEACH VA USChanging Your MAC Address In Window XP/Vista, Linux And Mac OS X (Sometimes known as MAC spoofing)2014-04-07 05:35:17
*.adab.afcent.af.mil153.24.*.*Mozilla/4.0 (compatible;) Irongeek.com2014-04-06 23:14:51
*.adab.afcent.af.mil153.24.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) 2014-04-06 23:13:41
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-06 19:27:21
*.edu.usafa.hpc.mil140.32.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Columbus OH USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-06 19:17:36
*.ngb.army.mil132.79.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USOffice XML Steganography Tool2014-04-06 09:48:10
*.stewart.army.mil192.100.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-06 04:24:49
*.honolulu.gov206.195.*.*Mozilla/4.0 (compatible;) Honolulu HI USIrongeek.com2014-04-05 13:52:51
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-05 13:04:27
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; Tablet PC 2.0) MAFB-Gunter Annex AL USPractical Guide to Alternative Data Streams in NTFS2014-04-05 10:23:08
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; Tablet PC 2.0) MAFB-Gunter Annex AL USPractical Guide to Alternative Data Streams in NTFS2014-04-05 10:17:59
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; Tablet PC 2.0) MAFB-Gunter Annex AL USPractical Guide to Alternative Data Streams in NTFS2014-04-05 10:14:41
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-05 10:01:43
*.tic.va.gov152.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-05 06:57:51
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-05 05:55:56
*.pac.army.mil143.214.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2) Fort Huachuca AZ USGeneral Network Security2014-04-04 16:31:21
*.pac.army.mil143.214.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2) Fort Huachuca AZ US2014-04-04 16:21:43
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-04 15:42:09
*.sofsa.mil192.203.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) Columbus OH USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-04 15:40:06
*.srvs.usps.gov56.0.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.0.3705; .NET CLR 2.0.50727; InfoPath.1; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; NISSC; NIS Raleigh NC USSecurity and Software Defined Networking: Practical Possibilities and Potential Pitfalls2014-04-04 14:43:38
*.153.56.204.4k.usda.gov199.153.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Collins CO USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-04 14:04:53
*.knox.army.mil147.238.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-04 13:06:53
*.spawar.navy.mil150.125.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 How can I do that? Intro to hardware hacking with an RFID badge reader - Kevin Bong Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-04 12:52:27
*.apg.army.mil140.153.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Fort Huachuca AZ USNcat Tutorial: A modern Netcat from the Nmap team (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-04 12:41:57
*.sandia.gov198.102.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 Albuquerque NM US2014-04-04 12:32:37
*.ngb.army.mil132.79.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E; Tablet PC 2.0) Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-04 12:32:15
*.sandia.gov134.253.*.*Mozilla/4.0 (compatible;) Albuquerque NM USIrongeek.com2014-04-04 12:30:07
*.knox.army.mil147.238.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-04 12:16:55
*.ngb.army.mil132.79.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E; Tablet PC 2.0) Fort Huachuca AZ USCertifications in Cybersecurity - Adam Wade Lewis (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-04 12:14:53
*.ngb.army.mil132.79.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E; Tablet PC 2.0) Fort Huachuca AZ USBSides Huntsville 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-04 12:14:27
*.ngb.army.mil132.79.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E; Tablet PC 2.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2014-04-04 12:14:09
*.ens.ornl.gov128.219.*.*Intel Mac OS X 10_9_2) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/7.0.2 Safari/537.74.9 Oak Ridge TN US2014-04-04 12:11:28
*.ngb.army.mil132.79.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E; Tablet PC 2.0) Fort Huachuca AZ USGeneral Network Security2014-04-04 12:11:10
*.loc.gov140.147.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Washington DC US2014-04-04 12:10:57
*.ngb.army.mil132.79.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E; Tablet PC 2.0) Fort Huachuca AZ USAre You Smarter Than A CISSP? Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-04 12:09:10
*.ngb.army.mil132.79.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E; Tablet PC 2.0) Fort Huachuca AZ USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-04 12:06:40
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; Tablet PC 2.0; InfoPath.3) MAFB-Gunter Annex AL USFun with Ettercap Filters2014-04-04 10:51:16
*.sd.spawar.navy.mil128.49.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2) VIRGINIA BEACH VA USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2014-04-04 10:47:53
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-04 10:10:28
*.ssmcnet.noaa.gov205.156.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Silver Spring MD US2014-04-04 09:49:47
*.tn.gov170.142.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Smyrna TN USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-04 09:37:00
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-04 09:09:07
*.jsf.mil209.22.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USLocking down Windows Vista and Windows 7 against Malicious USB devices 2014-04-04 08:58:10
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-04 08:31:47
*.tn.gov170.142.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-04 08:31:45
*.virginia.gov166.67.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Chester VA USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-04 08:19:29
*.csd.disa.mil214.3.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH US Log Files and Linux.2014-04-04 07:16:25
*.afnoc.af.mil132.3.*.*rv:27.0) Gecko/20100101 Firefox/27.0Mozilla/5.0 (Windows NT 6.1; rv:27.0) Gecko/20100101 Firefox/27.0 MAFB-Gunter Annex AL US2014-04-04 07:04:38
*.ri.gov158.123.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Providence RI USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-04 07:00:08
*.cpsc.gov63.74.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Forensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-04 06:48:27
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-04 06:05:29
*.afnoc.af.mil132.3.*.*rv:27.0) Gecko/20100101 Firefox/27.0Mozilla/5.0 (Windows NT 6.1; rv:27.0) Gecko/20100101 Firefox/27.0 MAFB-Gunter Annex AL US2014-04-04 05:43:08
*.atc.army.mil134.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2014-04-04 04:31:48
*.pr.navy.mil205.56.*.*rv:17.0) Gecko/20100101 Firefox/17.0Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0 VIRGINIA BEACH VA USBasics of Arpspoofing/Arppoisoning 2014-04-04 01:14:18
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-04 00:36:29
*.redstone.army.mil136.205.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-03 17:42:40
*.lanl.gov192.12.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Los Alamos NM US2014-04-03 15:17:13
*.lanl.gov192.12.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Los Alamos NM US2014-04-03 15:17:11
*.doe.gov205.254.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MDDRJS) Washington DC USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-03 15:13:02
*.tic.va.gov152.131.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USChanging Your MAC Address In Window XP/Vista, Linux And Mac OS X (Sometimes known as MAC spoofing)2014-04-03 14:50:53
*.gtwy.uscourts.gov199.107.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C) San Diego CA USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-03 14:12:30
*.sd.spawar.navy.mil128.49.*.*UbuntuMozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0 VIRGINIA BEACH VA US2014-04-03 13:44:56
*.lpdb.la.gov68.96.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Intro to Darknets: Tor and I2P Workshop (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-03 13:43:46
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-03 13:22:44
*.usace.army.mil140.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USSay It to My Face - Shannon Sistrunk(BSides Las Vegas 2013) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-03 13:21:03
*.nswc.navy.mil198.91.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) VIRGINIA BEACH VA USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-03 13:16:53
*.sd.spawar.navy.mil128.49.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2) VIRGINIA BEACH VA USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2014-04-03 13:08:54
*.sd.spawar.navy.mil128.49.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 VIRGINIA BEACH VA USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2014-04-03 13:08:25
*.sd.spawar.navy.mil128.49.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 VIRGINIA BEACH VA USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-03 13:04:43
*.cpsc.gov63.74.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Forensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-03 12:59:37
*.nmci.navy.mil138.163.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA US2014-04-03 12:53:11
*.ri.gov158.123.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.3; .NET4.0C; .NET4.0E) Providence RI US2014-04-03 12:45:01
*.disa.mil214.36.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Columbus OH USNetworkMiner for Network Forensics (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-03 12:20:57
*.honolulu.gov206.195.*.*Mozilla/4.0 (compatible;) Honolulu HI USIrongeek.com2014-04-03 12:18:46
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-03 11:59:58
*.ogn.af.mil137.9.*.*rv:27.0) Gecko/20100101 Firefox/27.0Mozilla/5.0 (Windows NT 6.1; rv:27.0) Gecko/20100101 Firefox/27.0 MAFB-Gunter Annex AL USState Hacking/Computer Security Laws2014-04-03 11:48:09
*.csd.disa.mil131.64.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USWhy you are pwn’d and don’t know it! - Ben Miller (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-03 11:38:56
*.csd.disa.mil131.64.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-03 11:38:30
*.csd.disa.mil131.64.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USPractical Guide to Alternative Data Streams in NTFS2014-04-03 11:28:15
*.pr.navy.mil205.56.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET CLR 1.1.4322) VIRGINIA BEACH VA US2014-04-03 10:08:38
*.119.dla.mil131.78.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; Tablet PC 2.0) Columbus OH USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-03 09:47:11
*.dhs.gov216.81.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; C15IE72011A) Washington DC USPlug and Prey: Malicious USB Devices2014-04-03 09:41:02
*.rcert-s.army.mil206.37.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USIntro to Metasploit Class at IU Southeast  (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-03 09:37:49
*.rcert-s.army.mil206.37.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USHacking Illustrated: Computer security videos2014-04-03 09:37:25
*.rcert-s.army.mil206.37.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USHoosier Hackers (And Louisville Kentucky Too)2014-04-03 09:34:39
*.rcert-s.army.mil206.37.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-03 09:34:15
*.rcert-s.army.mil206.37.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USIrongeek In Print: Books that mention Irongeek.com2014-04-03 09:33:26
*.rcert-s.army.mil206.37.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-03 09:32:14
*.rcert-s.army.mil206.37.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USBuilding The Future of P-12 Cyber Education - Dr. Casey Wardynski (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-03 09:30:25
*.rcert-s.army.mil206.37.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USIntroduction to hacking with PowerShell - Scott Busby (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-03 09:20:00
*.rcert-s.army.mil206.37.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USBSides Huntsville 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-03 09:19:44
*.rcert-s.army.mil206.37.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH US2014-04-03 09:19:25
*.nlm.nih.gov130.14.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Bethessda MD USManual Page - freebcp(1)2014-04-03 09:12:00
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-03 09:08:32
*.dodiis.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Columbus OH US2014-04-03 09:04:28
*.epa.gov161.80.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Research Triangle Park NC USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-03 08:25:50
*.stewart.army.mil192.100.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-03 08:24:13
*.ens.ornl.gov128.219.*.*Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.152 Safari/537.36 Oak Ridge TN USIronkey High Security Flash Drive: Use and Review (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-03 08:23:06
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-03 08:00:04
*.epa.gov161.80.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Research Triangle Park NC USPractical Guide to Alternative Data Streams in NTFS2014-04-03 07:54:32
*.tobyhanna.army.mil192.108.*.*Win64Mozilla/5.0 (Windows NT; Win64; x64; rv:26.0) Gecko/20100101 Firefox/26.0 Waterfox/26.0 Fort Huachuca AZ US2014-04-03 07:52:35
*.gtwy.uscourts.gov199.107.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko San Diego CA USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-03 07:45:47
*.state.gov169.253.*.*Intel Mac OS X 10_9_2) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/7.0.2 Safari/537.74.9 Washington DC US2014-04-03 06:29:38
*.roads.nebraska.gov164.119.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Lincoln NE USFile Systems and Thumb Drives: Choosing between FAT16, FAT32 and NTFS to get a faster USB Flash Drive 2014-04-03 05:52:40
*.ssa.gov199.173.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET CLR 1.1.4322; .NET4.0C; InfoPath.3; MS-RTC 2014-04-03 05:19:17
*.dhs.gov216.81.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Washington DC USPlug and Prey: Malicious USB Devices2014-04-03 04:56:51
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-02 23:10:42
*.fe.navy.mil163.251.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Win64; x64; Trident/4.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) 2014-04-02 20:54:03
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Arlington VA USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2014-04-02 15:37:06
*.belvoir.army.mil128.190.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-02 15:10:26
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-02 13:59:15
*.wsc.nasa.gov192.77.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Manual Page - netcat(1)2014-04-02 13:31:00
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) MAFB-Gunter Annex AL US2014-04-02 12:56:53
*.ssa.gov199.173.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET CLR 1.1.4322; InfoPath.3; MS-RTC Attacking and Defending Full Disk Encryption - Tom Kopchak (BSides Las Vegas 2013) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-02 12:41:42
*.20.107.209.pnnl.gov130.20.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 Richland WA USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2014-04-02 12:13:00
*.dhs.gov216.81.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; IE8Mercury) Washington DC USDarknets and hidden servers: Identifying the true IP/network identity of I2P service hosts2014-04-02 11:43:24
*.sd.spawar.navy.mil128.49.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 VIRGINIA BEACH VA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-02 10:34:35
*.xr.usgs.gov136.177.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Reston VA US2014-04-02 10:34:25
*.bpa.gov170.160.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; MS-RTC LM 8; .NET4.0E; .NET4.0C) Portland OR US2014-04-02 10:13:33
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-02 09:44:26
*.sofsa.mil192.203.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; .NET4.0C; .NET4.0E) Columbus OH USPlug and Prey: Malicious USB Devices2014-04-02 09:21:44
*.state.gov169.253.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E) Washington DC USCracking Cached Domain/Active Directory Passwords on Windows XP/2000/2003 2014-04-02 09:11:25
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-02 09:08:08
*.dmz.js.mil199.208.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Columbus OH USChanging Your MAC Address In Window XP/Vista, Linux And Mac OS X (Sometimes known as MAC spoofing)2014-04-02 08:25:35
*.csc.noaa.gov140.172.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20140319 Firefox/24.0 Iceweasel/24.4.0 Boulder CO USManual Page - etterfilter(8)2014-04-02 08:22:48
*.dc3.mil214.3.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Columbus OH USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-02 07:57:29
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Arlington VA USCash is King: Who’s Wearing Your Crown? - Tom Eston & Spencer McIntyre Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-02 07:57:19
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Arlington VA USIOCAware – Actively Collect Compromise Indicators and Test Your Entire Enterprise - Matt Jezorek, Dennis Kuntz Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-02 07:56:19
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-02 07:32:16
*.sofsa.mil192.203.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; .NET4.0C; .NET4.0E) Columbus OH USPlug and Prey: Malicious USB Devices2014-04-02 06:43:25
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Arlington VA USIt’s Okay to Touch Yourself - Ben Ten (Ben0xA) Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-02 06:35:45
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Arlington VA USTMI: How to attack SharePoint servers and tools to make it easier - Kevin Johnson & James Jardine Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-02 06:28:24
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Arlington VA USScanning Darkly - HD Moore Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-02 05:58:54
*.fdic.gov167.176.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Arlington VA USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-02 05:54:35
*.aphis.usda.gov168.68.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Fort Collins CO USShmooCon Firetalks 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-02 05:39:35
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-02 05:30:44
*.ptr.hqda.pentagon.mil141.116.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 2014-04-02 05:20:52
*.usarec.army.mil199.123.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ US2014-04-02 04:31:01
*.swa.army.mil143.81.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-02 04:16:45
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-02 02:21:03
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-02 00:07:39
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-01 22:13:37
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-01 22:01:32
*.virginia.gov166.67.*.*Mozilla/4.0 (compatible;) Chester VA USIrongeek.com2014-04-01 19:49:07
*.dhcp.lbl.gov128.3.*.*Intel Mac OS X 10_6_8) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.152 Safari/537.36 Berkeley CA USIrongeek.com2014-04-01 16:53:58
*.gsac.disa.mil214.4.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Columbus OH USManual Page - atftpd(8)2014-04-01 16:30:05
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-01 15:21:40
*.virginia.gov166.67.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Chester VA USMan page of HYDRA2014-04-01 14:24:35
*.virginia.gov166.67.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Chester VA USMan page of CRUNCH2014-04-01 14:18:07
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USASAReaper: Grab Configs From Multiple Cisco Devices Over SSH (Demos PExpect and AES Encrypted INI Files in Python)2014-04-01 14:12:03
*.doe.gov198.124.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20100101 Firefox/29.0 Cracking Windows 2000 And XP Passwords With Only Physical Access 2014-04-01 13:09:43
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USASAReaper: Grab Configs From Multiple Cisco Devices Over SSH (Demos PExpect and AES Encrypted INI Files in Python)2014-04-01 12:15:20
*.lanl.gov192.12.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0 Los Alamos NM USUsing Bart's PE Builder to Make an Anti-Spyware and Rescue CD2014-04-01 12:02:06
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-01 11:57:51
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; Tablet PC 2.0; InfoPath.3) MAFB-Gunter Annex AL USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-01 11:56:52
*.gtwy.uscourts.gov199.107.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; MDDR; .NET4.0C; .NET4.0E; dtsPdfWh) San Diego CA USDeliberately Insecure Web Applications For Learning Web App Security (WebGoat, BadStore, Hacme, SecuriBench, WebMaven)2014-04-01 11:56:04
*.bop.gov149.101.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; BTRS18532; .NET4.0C; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0E) Potomac MD USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-04-01 11:55:46
*.nga.mil207.132.*.*rv:24.0) Gecko/20100101 Firefox/24.0Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0 Columbus OH US2014-04-01 11:47:41
*.epa.gov134.67.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Research Triangle Park NC USIncident Response U3 Switchblade From TCSTool (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-01 11:14:21
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-04-01 11:08:52
*.nga.mil214.28.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:22.0) Gecko/20100101 Firefox/22.0 Columbus OH USShattering the Glass: Crafting Post Exploitation Tools with PowerShell - Matt Johnson Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-01 10:45:06
*.gtwy.uscourts.gov199.107.*.*Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 San Diego CA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-04-01 10:24:03
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USDigital Energy – BPT - Paul Coggin Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-01 10:20:21
*.afnoc.af.mil132.3.*.*rv:28.0) Gecko/20100101 Firefox/28.0Mozilla/5.0 (Windows NT 6.1; rv:28.0) Gecko/20100101 Firefox/28.0 MAFB-Gunter Annex AL USIntro to DD-WRT: Mod your wireless router to do more (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-01 10:03:40
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USBSides Huntsville 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-01 09:48:14
*.amrdec.army.mil199.209.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USBSides Huntsville 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-01 09:48:13
*.cdc.gov158.111.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Atlanta GA USXSS, Command and SQL Injection vectors: Beyond the Form2014-04-01 09:36:33
*.cdc.gov158.111.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Atlanta GA US2014-04-01 09:33:01
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD US2014-04-01 08:56:28
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD USApps/Scripts2014-04-01 08:55:47
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD USIntroduction to hacking with PowerShell - Scott Busby (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-01 08:55:12
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD US2014-04-01 08:54:47
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD USGeneral Network Security2014-04-01 08:54:44
*.nlm.nih.gov130.14.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Bethessda MD USWeb Application Pen-testing Tutorials With Mutillidae (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-01 08:37:45
*.tn.gov170.142.*.*rv:19.0) Gecko/20100101 Firefox/19.0Mozilla/5.0 (Windows NT 6.1; rv:19.0) Gecko/20100101 Firefox/19.0 Smyrna TN USForensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)2014-04-01 08:21:21
*.ngb.army.mil132.79.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E; Tablet PC 2.0) Fort Huachuca AZ USHacking Illustrated: Computer security videos2014-04-01 07:48:20
*.ngb.army.mil132.79.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E; Tablet PC 2.0) Fort Huachuca AZ USSecurity Onion: Network Security Monitoring in Minutes Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-04-01 07:47:35
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-01 07:25:35
*.ndc.nasa.gov143.232.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) MSFC AL USIrongeek's GUI HP Printer Display Hack2014-04-01 07:09:26
*.ndc.nasa.gov143.232.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) MSFC AL USHP Printer Display Hack2014-04-01 07:03:37
*.sandia.gov198.102.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 Albuquerque NM US2014-04-01 07:03:20
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA USXmas scan with Nmap (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-01 07:00:37
*.virginia.gov166.67.*.*Mozilla/4.0 (compatible;) Chester VA USIrongeek.com2014-04-01 06:43:27
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Smyrna TN US2014-04-01 06:40:24
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; Tablet PC 2.0; InfoPath.3) MAFB-Gunter Annex AL USUsing msfpayload and msfencode from Metasploit 3.3 to bypass anti-virus (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-01 06:28:26
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; Tablet PC 2.0; InfoPath.3) MAFB-Gunter Annex AL USUsing msfpayload and msfencode from Metasploit 3.3 to bypass anti-virus (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-01 06:23:14
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-04-01 06:05:00
*.nyc.gov161.185.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2) Brooklyn NY US2014-04-01 06:05:00
*.afnoc.af.mil132.3.*.*rv:27.0) Gecko/20100101 Firefox/27.0Mozilla/5.0 (Windows NT 6.1; rv:27.0) Gecko/20100101 Firefox/27.0 MAFB-Gunter Annex AL US2014-04-01 05:26:24
*.nsoc.med.osd.mil214.1.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 Columbus OH US2014-04-01 05:01:52
*.stewart.army.mil192.100.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-04-01 04:20:16
*.kuwait.swa.army.mil143.81.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-31 23:41:32
*.korea.army.mil144.59.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Fort Huachuca AZ USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-03-31 17:28:26
*.tic.va.gov152.132.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Washington DC USUsing Bart's PE Builder to Make an Anti-Spyware and Rescue CD2014-03-31 16:07:26
*.nv.doe.gov192.100.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; MS-RTC LM 8) Las Vegas NV USMadMACs: MAC Address Spoofing and Host Name Randomizing App for Windows 7 (Should work in Windows Vista and Windows 8 too) 2014-03-31 14:29:29
*.hua.army.mil140.202.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ US2014-03-31 14:24:42
*.usdoj.gov149.101.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; DOJ3jx7bf; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729 Potomac MD USPlug and Prey: Malicious USB Devices2014-03-31 14:13:05
*.usdoj.gov149.101.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; DOJ3jx7bf; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729 Potomac MD USPlug and Prey: Malicious USB Devices2014-03-31 14:13:04
*.virginia.gov166.67.*.*rv:26.0) Gecko/20100101 Firefox/26.0Mozilla/5.0 (Windows NT 5.1; rv:26.0) Gecko/20100101 Firefox/26.0 Chester VA USPractical Guide to Alternative Data Streams in NTFS2014-03-31 13:27:51
*.dot.gov65.254.*.*Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.152 Safari/537.36 Melville NY USPlug and Prey: Malicious USB Devices2014-03-31 13:24:22
*.aoc.gov192.136.*.*Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.152 Safari/537.36 Washington DC USRaspberry Pi Recipes2014-03-31 12:44:12
*.bop.gov149.101.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E) Potomac MD USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-03-31 12:32:06
*.nv.doe.gov192.100.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; MS-RTC LM 8) Las Vegas NV USMadMACs: MAC Address Spoofing and Host Name Randomizing App for Windows 7 (Should work in Windows Vista and Windows 8 too) 2014-03-31 12:00:21
*.nlm.nih.gov130.14.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Bethessda MD USShoveling a Shell using PHP Insecurities 2014-03-31 11:54:15
*.nsoc.med.osd.mil214.1.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 Columbus OH US2014-03-31 11:48:14
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-31 11:48:08
*.lpdb.la.gov68.96.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Intro to Darknets: Tor and I2P Workshop (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-31 11:46:20
*.159.49.118.4k.usda.gov199.159.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Collins CO USHacking Illustrated: Computer security videos2014-03-31 11:27:57
*.159.49.118.4k.usda.gov199.159.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Collins CO USGeneral Network Security2014-03-31 11:27:52
*.159.49.118.4k.usda.gov199.159.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Collins CO US2014-03-31 11:26:11
*.afnoc.af.mil132.3.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; Tablet PC 2.0; InfoPath.3) MAFB-Gunter Annex AL USLook Ma, No Exploits! – The Recon-ng Framework - Tim “LaNMaSteR53″ Tomes Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-31 10:58:51
*.tn.gov170.142.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3) Smyrna TN USMan page of READPST2014-03-31 10:18:49
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-31 09:37:20
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USSecurity Onion: Network Security Monitoring in Minutes Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-31 09:37:00
*.ncsc.mil214.4.*.*rv:21.0) Gecko/20100101 Firefox/21.0Mozilla/5.0 (Windows NT 5.1; rv:21.0) Gecko/20100101 Firefox/21.0 Columbus OH USIrongeek.com2014-03-31 09:03:50
*.doe.gov198.124.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E) Security Phreak & SkyDog: The Dark Arts of OSINT SkyDogCon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-31 08:11:39
*.irs.gov152.216.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; MS-RTC LM 8; .NET4.0C; .NET4.0E) Washington DC USFile Systems and Thumb Drives: Choosing between FAT16, FAT32 and NTFS to get a faster USB Flash Drive 2014-03-31 07:55:27
*.y12.doe.gov134.167.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Oak Ridge TN US2014-03-31 07:52:43
*.irs.gov152.216.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; MS-RTC LM 8; .NET4.0C; .NET4.0E) Washington DC USFile Systems and Thumb Drives: Choosing between FAT16, FAT32 and NTFS to get a faster USB Flash Drive 2014-03-31 07:51:55
*.honolulu.gov206.195.*.*Mozilla/4.0 (compatible;) Honolulu HI USIrongeek.com2014-03-31 07:15:29
*.gordon.army.mil155.8.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ US2014-03-31 07:04:16
*.doe.gov198.124.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E) 2014-03-31 07:01:27
*.mhsi.med.osd.mil214.2.*.*rv:23.0) Gecko/20100101 Firefox/23.0Mozilla/5.0 (Windows NT 6.1; rv:23.0) Gecko/20100101 Firefox/23.0 Columbus OH US2014-03-31 06:56:14
*.mhsi.med.osd.mil214.2.*.*rv:23.0) Gecko/20100101 Firefox/23.0Mozilla/5.0 (Windows NT 6.1; rv:23.0) Gecko/20100101 Firefox/23.0 Columbus OH USZero to Hero: Breaking into the security Field - Jeremy Conway (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-31 06:55:56
*.mhsi.med.osd.mil214.2.*.*rv:23.0) Gecko/20100101 Firefox/23.0Mozilla/5.0 (Windows NT 6.1; rv:23.0) Gecko/20100101 Firefox/23.0 Columbus OH US2014-03-31 06:55:21
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Smyrna TN US2014-03-31 06:39:52
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-31 06:29:01
*.maine.gov198.182.*.*Intel Mac OS X 10_9_2) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/7.0.2 Safari/537.74.9 AUGUSTA ME USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-03-31 05:46:11
*.maine.gov198.182.*.*Intel Mac OS X 10_9_2) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/7.0.2 Safari/537.74.9 AUGUSTA ME USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-03-31 05:33:02
*.149.47.77.4k.usda.gov199.149.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Collins CO USCritically Plagiarizing?: Ideas On Spotting Plagiarism, While Spending No Money Adrian Crenshaw (yes, really, no one else would claim the typos)2014-03-31 05:22:50
*.149.47.77.4k.usda.gov199.149.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Collins CO US2014-03-31 05:21:29
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA US2014-03-31 04:39:30
*.dsid218.usmc.mil214.15.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Columbus OH USKali Linux Live Boot USB Flash Drive - Jeremy Druin (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-30 23:06:10
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-03-30 18:25:12
*.stewart.army.mil192.100.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-30 14:59:56
*.nro.mil209.22.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Win64; x64; Trident/4.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) Columbus OH USManual Page - ettercap(8)2014-03-30 13:05:02
*.afghan.swa.army.mil214.13.*.*Mozilla/4.0 (compatible;) Columbus OH USIrongeek.com2014-03-30 07:16:58
*.afghan.swa.army.mil214.13.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USLocking down Windows Vista and Windows 7 against Malicious USB devices 2014-03-30 02:58:06
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-03-30 01:07:00
*.maricopa.gov156.42.*.*Mozilla/4.0 (compatible;) Phoenix AZ USIrongeek.com2014-03-29 13:24:14
*.jtfgtmo.southcom.mil130.22.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Columbus OH USDecaffeinatID: A Very Simple IDS / Log Watching App / ARPWatch For Windows 2014-03-29 12:55:04
*.stewart.army.mil192.100.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-29 11:11:47
*.honolulu.gov206.195.*.*Mozilla/4.0 (compatible;) Honolulu HI USIrongeek.com2014-03-29 07:50:01
*.xr.usgs.gov130.118.*.*rv:27.0) Gecko/20100101 Firefox/27.0Mozilla/5.0 (Windows NT 6.1; rv:27.0) Gecko/20100101 Firefox/27.0 Reston VA USSetting up an Ethernet bridge in Ubuntu Linux (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-28 17:29:56
*.20.107.209.pnnl.gov130.20.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 Richland WA USle="text-align:center;">Mutillidae
What is Mutillidae?
 
Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software.
 
Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools. If you would like to practice pen-testing/hacking a web application by exploiting cross-site scripting, sql injection, response-splitting, html injection, javascript injection, clickjacking, cross frame scripting, forms-caching, authentication bypass, or many other vulnerabilities, then Mutillidae is for you.
 
The current version of Mutillidae, code named "NOWASP Mutillidae 2.x", was developed by Jeremy Druin aka webpwnized. Mutillidae 2.x is based on Adrian "Irongeek" Crenshaw's Mutillidae project which is now refered to as Mutillidae 1.x or Mutillidae classic. Mutillidae 1.x is still available on Sourceforge along side the current project.
 
Downloads
Announcements
Quickstart Installation Video
Documentation
Usage Instructions
 
Mutillidae contains all of the vulnerabilties from the OWASP Top 10.

Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help.

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
Get rid of PHP "Strict" Errors
 
Please see documentation at the Sourceforge documentation page. Please note help file "tips-on-php-strict-errors.txt" concerning PHP strict errors.
 
Notes
  • Created by Jeremy "webpwnized" Druin based on the original Mutillidae project of Irongeek.
  • If you would like to learn about other deliberately vulnerable web applications, check out Deliberately Insecure Web Applications For Learning Web App Security.
  • Do NOT  run this code on a production network. Either run it on a private network, or restrict your web server software to only use the local loopback address. By default Mutillidae only allows access from localhost (127.*.*.*). Edit the .htaccess file to change this behavior (not recommended on a public network). If for some reason .htaccess is not parsed you can restrict the IP by finding the "Listen" line in the http.conf file and changing it to read: Listen 127.0.0.1:80
2014-03-28 16:34:11
*.korea.army.mil143.138.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 16:26:35
*.korea.army.mil143.138.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 16:26:16
*.korea.army.mil143.138.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 16:22:58
*.korea.army.mil143.138.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Fort Huachuca AZ USHacking Illustrated: Computer security videos2014-03-28 16:21:50
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-03-28 15:31:44
*.stewart.army.mil192.100.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 14:31:40
*.tic.va.gov152.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 14:29:25
*.tic.va.gov152.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC USBSides Huntsville 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 14:29:14
*.tic.va.gov152.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC USHacking Illustrated: Computer security videos2014-03-28 14:29:09
*.tic.va.gov152.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC USGeneral Network Security2014-03-28 14:29:03
*.pacsw.navy.mil144.141.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko VIRGINIA BEACH VA USUsing msfpayload and msfencode from Metasploit 3.3 to bypass anti-virus (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-28 14:28:45
*.tic.va.gov152.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC US2014-03-28 14:28:43
*.nga.mil207.132.*.*rv:24.0) Gecko/20100101 Firefox/24.0Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0 Columbus OH US2014-03-28 14:20:30
*.redstone.army.mil136.205.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 12:48:57
*.dren.pica.army.mil131.92.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Fort Huachuca AZ USSetting up the HoneyBOT HoneyPot (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-28 12:25:50
*.nsoc.med.osd.mil214.1.*.*Linux x86_64Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 Columbus OH US2014-03-28 12:12:43
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USPrivilege Escalation with the Metasploit Framework Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 11:57:02
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USPrivilege Escalation with the Metasploit Framework Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 11:55:59
*.texas.gov204.65.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Tablet PC 2.0; .NET4.0C; .NET4.0E) What can you find out from an IP?2014-03-28 11:39:40
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USHow screwed are we? Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 11:30:55
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USIntro to Linux System Hardening, and Applying it to BackTrack Linux Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 11:29:39
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USDirty Red Team Tricks II Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 11:28:39
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USUsing McAfee Secure/TrustGuard as Attack Tools Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 11:23:41
*.dtra.mil214.3.*.*rv:27.0) Gecko/20100101 Firefox/27.0Mozilla/5.0 (Windows NT 6.1; rv:27.0) Gecko/20100101 Firefox/27.0 Columbus OH US2014-03-28 11:03:55
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 10:58:28
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USSeparating Security Intelligence from Security FUD Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 10:58:24
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 10:56:19
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USBuilding a Database Security Program Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 10:56:09
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 10:53:26
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USSE me, SE you Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 10:53:21
*.nro.mil209.22.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; .NET CLR 1.1.4322; InfoPath.3; MS-RTC LM 8 Columbus OH USPlug and Prey: Malicious USB Devices2014-03-28 10:51:09
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USIntroduction to Metasploit Post Exploitation Modules (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-28 10:50:07
*.in.gov108.59.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C; .NET4.0E) Indianapolis IN USApplying the 32 Zombieland Rules to IT Security - Larry Pesce Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 10:49:47
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USAmbush Catching Intruders At Any Point Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 10:48:32
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 10:45:09
*.knox.army.mil147.238.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 10:45:03
*.knox.army.mil147.238.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USDerbycon 2012 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 10:45:02
*.rrmc.army.mil207.133.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Columbus OH USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-03-28 10:27:47
*.i2wd.apg.army.mil146.15.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ USNQSFW Free CISSP Study Guide (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-28 10:09:59
*.virginia.gov166.67.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Chester VA USHacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)2014-03-28 10:01:12
*.sedgwick.gov205.172.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Wichita KS USCracking Corporate Passwords – Exploiting Password Policy Weaknesses - Minga / Rick Redman Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 09:38:46
*.sedgwick.gov205.172.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Wichita KS USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 09:38:39
*.sedgwick.gov205.172.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Wichita KS USAdvanced Evasion Techniques - Pwning the Next Generation Security Products (Keynote) - David Kennedy Hack3rcon 4 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 09:38:32
*.nrel.gov192.174.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Golden CO US2014-03-28 08:56:47
*.sedgwick.gov205.172.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Wichita KS USAdvanced Evasion Techniques - Pwning the Next Generation Security Products (Keynote) - David Kennedy Hack3rcon 4 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 08:17:05
*.sedgwick.gov205.172.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Wichita KS USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 08:06:47
*.sedgwick.gov205.172.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Wichita KS USCracking Corporate Passwords – Exploiting Password Policy Weaknesses - Minga / Rick Redman Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 08:06:38
*.sedgwick.gov205.172.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Wichita KS USPassword Intelligence Project – Advanced Password Recovery and Modern Mitigation Strategies - John Moore “Rabid Security” Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 08:06:10
*.sedgwick.gov205.172.*.*WOW64) AppleWebKit/537.36 (KHTML, like Gecko) ChroMozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 Wichita KS USDerbycon 2013 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 08:05:15
*.tic.va.gov152.132.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Washington DC USDavid Cowen: Running a Successful Red Team Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos) 2014-03-28 07:55:34
*.afnoc.af.mil132.3.*.*rv:27.0) Gecko/20100101 Firefox/27.0Mozilla/5.0 (Windows NT 6.1; rv:27.0) Gecko/20100101 Firefox/27.0 MAFB-Gunter Annex AL US2014-03-28 07:29:54
*.maine.gov198.182.*.*Intel Mac OS X 10_9_2) AppleWebKit/537.74.9 (KHTMLMozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/7.0.2 Safari/537.74.9 AUGUSTA ME USWindows 7: Copy A Modified User Profile Over The Default Profile 2014-03-28 07:13:16
*.nmci.navy.mil138.162.*.*MSIE 8.0Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3) VIRGINIA BEACH VA US2014-03-28 07:03:35
*.samhouston.army.mil139.161.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 06:59:52
*.samhouston.army.mil139.161.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 06:56:00
*.samhouston.army.mil139.161.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Fort Huachuca AZ US2014-03-28 06:54:09
*.tn.gov170.142.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 Smyrna TN US2014-03-28 06:43:57
*.ptr.hqda.pentagon.mil141.116.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 2014-03-28 06:22:10
*.atc.army.mil134.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USIntroduction to hacking with PowerShell - Scott Busby (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-28 05:00:25
*.atc.army.mil134.194.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-28 04:59:58
*.atc.army.mil134.194.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ US2014-03-28 04:59:54
*.mlrnoc.navy.mil205.66.*.*MSIE 7.0Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; InfoPath.2; .NET4.0C; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) VIRGINIA BEACH VA USLocking down Windows Vista and Windows 7 against Malicious USB devices 2014-03-28 03:10:50
*.swa.army.mil143.81.*.*WOW64Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0 Fort Huachuca AZ USManual Page - urlsnarf(8)2014-03-28 00:49:31
*.stewart.army.mil192.100.*.*Mozilla/4.0 (compatible;) Fort Huachuca AZ USIrongeek.com2014-03-27 23:07:34
*.korea.army.mil143.138.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Fort Huachuca AZ USBasic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-27 21:57:53
*.pacsw.navy.mil144.141.*.*MSIE 10.0Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) VIRGINIA BEACH VA USIntro to Wireshark (Hacking Illustrated Series InfoSec Tutorial Videos)2014-03-27 21:29:05
*.honolulu.gov206.195.*.*Mozilla/4.0 (compatible;) Honolulu HI USIrongeek.com2014-03-27 21:21:53
*.afnoc.af.mil132.3.*.*Mozilla/4.0 (compatible;) MAFB-Gunter Annex AL USIrongeek.com2014-03-27 18:11:27
*.med.navy.mil214.1.*.*MSIE 9.0Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Columbus OH USMobile Device Hacking: Turning your phone, PDA or internet tablet into a pen-testing platfor2014-03-27 17:21:17

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast