They need either one Manually easy or Hard
1. Go to dnschecker.org input "www.motionborg.com"
· Go through the text records (A, AAAA, CNAME, MX, NS, PTR, SRV, SOA, TXT, CAA) In a word document copy and paste the information (Blue Text) of all the Text Record information
2. Use Sam Spade to get more information about the network, what ever you find put it in the word document as well. Sam Spade Video (If you do not like this video Google Sam Spade Footprinting)
Manually-Hard
3. Use Command Prompt: Run Traceroute on www.motionborg.com to get more details see document here
4. Use Command Prompt to Use nslookup see document here
They need either Manyally Hard or Easy.
I had done the Manually-Hard
3. Use Command Prompt: Run Traceroute on www.motionborg.com to get more details see document here
4. Use Command Prompt to Use nslookup see document here
Useful Links
https://kb.intermedia.net/article/682
https://kb.intermedia.net/Article/819
Use this links and try to find out some answers and prepare some matter to this.
· Is the site www.motionborg.com secure with SSL? is the site vulnerable to script injection attacks?
· Look at the source code does anything stand out to you?
· What did you find out about the network?
· Are other networks connected to it?
· Is it a Linux or Windows server
· Based on your findings what are some vulnerabilities
·
Note: It is really easy to get stuck in the Matrix, do not dive to in-depth - just the surface of gathering information.
Tracert www.motionborg.com
Then run the command : nslookup motionborg.com
Next run nslookup motionborg.com B.ROOT-SERVERS.NET
Next run nslookup motionborg.com m.gtld-servers.net
Next run : -q=CNAME motionborg.com ns35.domaincontrol.com
Is the site www.motionborg.com secure with SSL?
Not secure :
is the site vulnerable to script injection attacks?
No
https://suip.biz/?act=sqlmap
· Look at the source code does anything stand out to you?
No
· What did you find out about the network?
· Is it a Linux or Windows server
Linux
Based on your findings what are some vulnerabilities
https://www.scu.edu/is/secure/resources-and-information/ssl-vulnerabilities-/
They need either one Manually easy or Hard
1. Go to dnschecker.org input "www.motionborg.com"
· Go through the text records (A, AAAA, CNAME, MX, NS, PTR, SRV, SOA, TXT, CAA) In a word document copy and paste the information (Blue Text) of all the Text Record information
2. Use Sam Spade to get more information about the network, what ever you find put it in the word document as well. Sam Spade Video (If you do not like this video Google Sam Spade Footprinting)
Manually-Hard
3. Use Command Prompt: Run Traceroute on www.motionborg.com to get more details see document here
4. Use Command Prompt to Use nslookup see document here
They need either Manyally Hard or Easy.
I had done the Manually-Hard
3. Use Command Prompt: Run Traceroute on www.motionborg.com to get more details see document here
4. Use Command P.
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
They need either one Manually easy or Hard1. Go to dnschecker..docx
1. They need either one Manually easy or Hard
1. Go to dnschecker.org input "www.motionborg.com"
· Go through the text records (A, AAAA, CNAME, MX, NS,
PTR, SRV, SOA, TXT, CAA) In a word document copy and
paste the information (Blue Text) of all the Text Record
information
2. Use Sam Spade to get more information about the network,
what ever you find put it in the word document as
well. Sam Spade Video (If you do not like this video
Google Sam Spade Footprinting)
Manually-Hard
3. Use Command Prompt: Run Traceroute on
www.motionborg.com to get more details see document here
4. Use Command Prompt to Use nslookup see document here
They need either Manyally Hard or Easy.
I had done the Manually-Hard
3. Use Command Prompt: Run Traceroute on
www.motionborg.com to get more details see document here
4. Use Command Prompt to Use nslookup see document here
Useful Links
https://kb.intermedia.net/article/682
https://kb.intermedia.net/Article/819
Use this links and try to find out some answers and prepare
some matter to this.
· Is the site www.motionborg.com secure with SSL? is the site
vulnerable to script injection attacks?
· Look at the source code does anything stand out to you?
· What did you find out about the network?
· Are other networks connected to it?
2. · Is it a Linux or Windows server
· Based on your findings what are some vulnerabilities
·
Note: It is really easy to get stuck in the Matrix, do not dive to
in-depth - just the surface of gathering information.
Tracert www.motionborg.com
Then run the command : nslookup motionborg.com
Next run nslookup motionborg.com B.ROOT-SERVERS.NET
Next run nslookup motionborg.com m.gtld-servers.net
Next run : -q=CNAME motionborg.com
ns35.domaincontrol.com
Is the site www.motionborg.com secure with SSL?
Not secure :
is the site vulnerable to script injection attacks?
No
https://suip.biz/?act=sqlmap
· Look at the source code does anything stand out to you?
3. No
· What did you find out about the network?
· Is it a Linux or Windows server
Linux
Based on your findings what are some vulnerabilities
https://www.scu.edu/is/secure/resources-and-information/ssl-
vulnerabilities-/
They need either one Manually easy or Hard
1. Go to dnschecker.org input "www.motionborg.com"
· Go through the text records (A, AAAA, CNAME, MX, NS,
PTR, SRV, SOA, TXT, CAA) In a word document copy and
paste the information (Blue Text) of all the Text Record
information
2. Use Sam Spade to get more information about the network,
what ever you find put it in the word document as
well. Sam Spade Video (If you do not like this video
Google Sam Spade Footprinting)
Manually-Hard
3. Use Command Prompt: Run Traceroute on
www.motionborg.com to get more details see document here
4. Use Command Prompt to Use nslookup see document here
They need either Manyally Hard or Easy.
I had done the Manually-Hard
3. Use Command Prompt: Run Traceroute on
www.motionborg.com to get more details see document here
4. Use Command Prompt to Use nslookup see document here
4. Useful Links
https://kb.intermedia.net/article/682
https://kb.intermedia.net/Article/819
Use this links and try to find out some answers and prepare
some matter to this.
· Is the site www.motionborg.com secure with SSL? is the site
vulnerable to script injection attacks?
· Look at the source code does anything stand out to you?
· What did you find out about the network?
· Are other networks connected to it?
· Is it a Linux or Windows server
· Based on your findings what are some vulnerabilities
·
Note: It is really easy to get stuck in the Matrix, do not dive to
in-depth - just the surface of gathering information.
Tracert www.motionborg.com
Then run the command : nslookup motionborg.com
Next run nslookup motionborg.com B.ROOT-SERVERS.NET
Next run nslookup motionborg.com m.gtld-servers.net
Next run : -q=CNAME motionborg.com
ns35.domaincontrol.com
8. Module 02 Page 93
http://www.scmogazineuk.com
http://www.scmagazineuk.com
Exam 312-50 Certified Ethical HackerEthical Hacking and
Countermeasures
Footprinting and Reconnaissance
"Hacktivism made up 58 per cent of attacks in the Verizon Data
Breach Intelligence Report,
and they are going after information on Facebook that can be
used to humiliate a person. All
types of attackers have their own techniques."
On how attackers get a password in the first place, Imperva
claimed that different keyloggers
are used, while phishing kits that create a fake Facebook login
page have been seen, and a
more primitive method is a brute force attack, where the
attacker repeatedly attempts to guess
the user's password.
In more extreme cases, a Facebook administrators rights can be
accessed. Although it said that
this requires more effort on the hacker side and is not as
prevalent, it is the "holy grail" of
attacks as it provides the hacker with data on all users.
On protection, Bar-Yosef said the roll-out of SSL across the
whole website, rather than just at
the login page, was effective, but users still needed to opt into
this.
By Dan Raywood
15. the target organization. Attackers try to extract information
from the employees by conducting
social engineering: on-site visits, interviews, questionnaires,
etc.
This refers to the process of collecting information from sources
anonymously so that
your efforts cannot be traced back to you.
<— —i Pseudonym ous Footprinting
Pseudonymous footprinting refers to the process of collecting
information from the
sources that have been published on the Internet but is not
directly linked to the author's
name. The information may be published under a different name
or the author may have a
well-established pen name, or the author may be a corporate or
government official and be
prohibited from posting under his or her original name.
Irrespective of the reason for hiding the
Private footprint""ing involves collecting information from an
organization's web-
based calendar and email services.
| | Internet Footprinting
Internet footprinting refers to the process of collecting
information of the target
organization's connections to the Internet.
Anonymous Footprinting
author's name, collecting information from such sources is
19. Module 02 Page 101
Exam 312-50 Certified Ethical HackerEthical Hacking and
Countermeasures
Footprinting and Reconnaissance
W hy F o o tp rin tin g ? CEH
Urti*W itkM l lUckw
Why Footprinting?
I'n'n'r'n'n'
For attackers to build a hacking strategy, they need to gather
information about the
target organization's network, so that they can find the easiest
way to break into the
organization's security perimeter. As mentioned previously,
footprinting is the easiest way to
gather information about the target organization; this plays a
vital role in the hacking process.
Footprinting helps to:
• Know Security Posture
Performing footprinting on the target organization in a
systematic and methodical manner
gives the complete profile of the organization's security posture.
You can analyze this report
to figure out loopholes in the security posture of your target
organization and then you can
build your hacking plan accordingly.
• Reduce Attack Area
22. 0 Security policies implemented
0 Web server links relevant to the
organization
0 Background of the organization
0 News articles/press releases
User and group names ג
* System banners
System architecture ־
* Remote system type
1 v/1 >־
• Routing tables
: SNMP information
• System names
: Passwords
0 Employee details
0 Organization's website
0 Company directory
0 Location details
0 Address and phone numbers
O Collect
O Network Information
Collect
System
Information
Collect
33. A web search engine is designed to search for information on
the World Wide Web.
The search results are generally presented in a line of results
often referred to as search engine
results pages (SERPs). In the present world, many search
engines allow you to extract a target
organization's information such as technology platforms,
employee details, login pages,
intranet portals, and so on. Using this information, an attacker
may build a hacking strategy to
break into the target organization's network and may carry out
other types of advanced system
attacks. A Google search could reveal submissions to forums by
security personnel that reveal
brands of firewalls or antivirus software in use at the target.
Sometimes even network
diagrams are found that can guide an attack.
If you want to footprint the target organization, for example
XYZ pvt ltd, then type XYZ pvt ltd in
the Search box of the search engine and press Enter. This will
display all the search results
containing the keywords "XYZ pvt ltd." You can even narrow
down the results by adding a
specific keyword while searching. Furthermore, we will discuss
other footprinting techniques
such as website footprinting and email Footprinting.
For example, consider an organization, perhaps Microsoft. Type
Microsoft in the Search box of
a search engine and press Enter; this will display all the results
containing information about
Microsoft. Browsing the results may provide critical
information such as physical location,
35. Text-only /ersicn
Create account & Log in
Read View source View history
Microsoft
W־N 122‘74242״55 22*38'47 -
M icrosort c o rp o ra tio n
Microsoft׳
Type Rjblc
Traded as NASDAQ: MSFT ̂
SEHK: 4333 (£>
Cow Jones Industrial Average
component
NASDAQ-100 component
S&P50D component
Induttry Computer tofiwar•
Onlir• t#rvic♦•
Video gorroo
Founded Albuquerque, New Mexico,
United States (April 4,1975)
Founder(•) Bill Gates, Paul Alien
Headquarters Microsoft Redmond Campts,
From Wikipedia. the free encyclopedia
Microsoft Corporation (NASDAQ: MSFTt? ) is ar American
multinational corporation headquartered n ReJrrond.
36. Washington. United States that develops, manufactures
licenses, and supports a wide range cf products and services
rolatod to computing. Tho company was foundoc by Bill Gatos
and Paul Allen on Apr J 4. 1975. Microsoft is the world's
largest
software corporation measured by revenues
Microsoft was established to develop and sell BASC
inteipieteis foi the Altai! 8800 It rose to dominate the home
computer operating system market wth MS-OOS n the mid•
1980s followed by the Microsoft Wndows line of operating
systems The company’s 1986 initial public oferng. and
subsequent rise in the share price, created ar estimated three
billionaires and 12.000 millionaires from Microsoft employees
Since the 1990s. the company has increasingly d1ersrf1ed from
the operating system market. In May 2011 Microsoft acquired
Skype for $8 5 billion in its largest acquisition to date PI
Main page
Contents
Featured content
Current events
Random article
Donate to vviKipeaia
Interaction
Help
About Wikipedia
Community portal
Recent changes
Contact Wikipedia
► Print/export
▼ Languages
FIGURE 2.1: Screenshot showing information about Microsoft
46. Exam 312-50 Certified Ethical HackerEthical Hacking and
Countermeasures
Footprinting and Reconnaissance
* Pldcwe * י*גי
U, PI0C63
C ט far per ar/Phces
* Liytit
S 0 Je Q«>flr«wr1 cvyec
OS fto•*
5 O BuMngo
t£ '* :troct >‘osv
* H r B c r l n <rd latcti
□ Q ►011c י ם o **־׳־ *
5. 0 0fll»׳v
• □v >WC«1 Awirviwvi
& D t Ftaeeeofiwrroitי םס Mo•B fcffim
FIGURE 2.4: Google Earth showing location
Example: maps.google.com
Google Maps provides a Street View feature that provides you
with a series of images of
building, as well as its surroundings, including WI-FI networks.
Attackers may use Google Maps
to find or locate entrances to buildings, security cameras, gates,
places to hide, weak spots in
perimeter fences, and utility resources like electricity
50. Exam 312-50 Certified Ethical HackerEthical Hacking and
Countermeasures
Footprinting and Reconnaissance
P eople Search O nline S erv ices CEH
123 People Search
h ttp ://w w w . 12 3people, com
PeekYou
http ://ww w.peekyou. comC
Intelius
http ://ww w.inte lius.com
PeopleSmart
http ://ww w.peoplesm art. com&
WhitePages
m o • I P http://www.whitepages.comV/ >—J
M Zaba Searchhttp://www.zabasearch.com
M % Zoomlnfo
http ://ww w.zoom info . com
Wink People Search
http ://w ink.com
AnyWho
http://www.anywho.com
People Lookup
52. Module 02 Page 122
http://www
http://www.peekyou
http://www.intelius.com
http://www.peoplesmart
http://www.whitepages.com
http://www.zabasearch.com
http://www.zoominfo
http://wink.com
http://www.anywho.com
https://www.peoplelookup.com
http://www.zabasearch.com
http://www.zoominfo.com
Exam 312-50 Certified Ethical HackerEthical Hacking and
Countermeasures
Footprinting and Reconnaissance
Zoom Info is a business people directory using which you can
find business contacts, people's
professional profiles, biographies, work histories, affiliations,
links to employee profiles with
verified contact information, and more.
Wink People Search
.E ו_צ
Source: http://wink.com
Wink People Search is a people search engine that provides
information about people by name
and location. It gives phone number, address, websites, photos,
work, school, etc.
53. ohWynA ״
Source: http://www.anywho.com
AnyWho is a website that helps you find information about
people, their businesses, and their
locations online. With the help of a phone number, you can get
all the details of an individual.
People Lookup
Source: https://www.peoplelookup.com
People Lookup is a people search engine that allows you to
find, locate, and then connect with
people. It also allows you to look up a phone number, search for
cell numbers, find an address
or phone number, and search for people in the US. This
database uses information from public
records.
123 People Search
Source: http://www.123people.com
123 People Search is a people search tool that allows you to
find information such as public
records, phone numbers, addresses, images, videos, and email
addresses.
PeekYou
Source: http://www.peekyou.com
PeekYou is a people search engine that allows you to search for
profiles and contact
information of people in India and cities' top employers and
schools. It allows you to search for
the people with their names or usernames.
58. Facebook allows you to search for people, their friends,
colleagues, and people living
around them and others with whom they are affiliated. In
addition, you can also find their
professional information such as their company or business,
current location, phone number,
email ID, photos, videos, etc. It allows you to search for people
by username or email address.
Sear<* for people, places and tvig i□facebook
Carmen f lectra About *
A na*<ra of «ha md-watt. Carman graw near C mamas,
900. and got hor •״ ! braak *htn a tcout for fwc*
aponad har danang and a*ad har to cama and aud«on for
Carman *roto a bock. >to* toBaSaxv'wfvtftwat
oubkihad by Random noma In +* book Carman convayi
tm ascW irdifM ndngifontlnw M lfaN cor•
a•״ Carman * aiao the *ace of Ma* factor ,a brand that
W t J aknoat 100 yaari ago and • •nwadataJY Mad to
aod1 «י»י moat baauHU facaa. Carman • par mm»10»1<׳
.$•• . Mai factor *eahset her m Tv and pm
FIGURE 2.7: Facebook a social networking service to search for
people across the world
Linkedln
1 J Source: http://www.linkedin.com
Linkedln is a social networking website for professional people.
It allows you to find people by
name, keyword, company, school, etc. Searching for people on
Linkedln gives you information
66. Support fusing VWndows tmtaitucljrf VM
OrtctofY 2003. SMS. SUS. C1»« SOL Sew. SOL
Clusters. Ewhange 55. Eahange 2003. vn war*, vertas
backip i0*wir«. h court and M«n securty. Master
Recwery wivkm. RMO technologies. and FOrt̂ AN <*s*
KMlorU■__________________
MD
17123M546706
42319173004
Boca Raton. FL 33417
J06 Mjfin
IT/Sofcare Devolopmert
• 5 or more years espenence *wttig מ IT *nplemerAng and
sgppodngiglobalbusntss
> Pnor nponorxt r supportng a global WladM l ttftW and
Doma* tofrastoxture
Ê rttfC .ywlwD MV gnisoppus dna gnlnonftlpn■ )kimm י
Metalrafne. SOL Server. SOL Cluster. DNS. DHCP. WHS. and
Etthange 2003 m an Enterprise ecMronmert
VKy strong systems towweshoolng sMs י
Eipenence m prowfcng 24-hour support to a gktoai erterpnse י
as part of an orvcal rotaton
• Edectwe interpersonal sloiswdhfieabrtor to be persuasae
• Otttf stalls Bulling Elect*■* Teams, Acton Onerted Peer
RtlaftonsMps, Customer Focus. Pnor% Setng, ProWwi
SoMng, and Business Acumen1 Bachelor***•* Degree or
equwalerteipenence
67. MCSE (2003) certtcafton a plus. Cdra Certtcafton a plus י
facebookE
FIGURE 2.12: Gathering information through Job websites
Usually attackers look for the following information:
• Job requirements
• Employee's profile
• Hardware information
• Software information
Examples of job websites include:
Q http //www. monster.com
Q http //www.careerbu ilder.com
S http //www.dice.com
a-
׳
4-
׳
4-CCD //www.simplvhired.com
S http //www.indeed.com
Q http //www. usajobs.gov
70. security aides יזו a brazen bombog attack close to Mr Assads
own residonce. called Trei
into question the ability of a government that depends on an
insular group of loyalists to
S t t «! ?ft tea t r
San Jose Mercury Mews
Turr.s out < Mas 3s easy as using a rug to scale a ra20r *ire
topped security fence at a small Utah
arport in the rroddie cf night slipping past security bearding an
idle empty S0-passeog?r SkyWest
Aifhnes and rewng up the engines. He Clashed the ...
?tpnts m th!? .
Kti-Stan fltASMiantr amMiia jmutma aost mi
Reuters
BEIRUT'AMMAN (Reuters) - Mystery surrounded the
whereabouts of Syr an President Basha* 31-
Assad cn Thursday a day after a oomoer killed and wounded his
security cnefs anc rebels closed
in on the centre of Damascus vowing to *liberate" the capital.
5 1 9 ?tpnts ?ח ».h? >
ftista Sira Laamra Inrcr Cirflg
W a l Street Journal
BEIRUT—Syrian rebels pierced the innermost circle 01
President Bashar a -Assads w ii st^«!
regime wKh a bomb blast that kiled thiee high-lewl officials
and raised questions about a — <
the aMity of the courftry's security forces to sustain the
embattled government Syna
Alerts
@yahoo com
74. t; X-Powered-By information
Web server in use and its version
W ebsite Footprinting
It is possible for an attacker to build a detailed map of a
website's structure and
architecture without IDS being triggered or without raising any
sys admin suspicions. It can be
accomplished either with the help of sophisticated footprinting
tools or just with the basic tools
that come along with the operating system, such as telnet and a
browser.
Using the Netcraft tool you can gather website information such
as IP address, registered name
and address of the domain owner, domain name, host of the site,
OS details, etc. But this tool
may not give all these details for every site. In such cases, you
should browse the target
website.
Browsing the target website will provide you with the following
information:
Q Software used and its version: You can find not only the
software in use but also the
version easily on the off-the-shelf software-based website.
Q Operating system used: Usually the operating system can also
be determined.
9 Sub-directories and parameters: You can reveal the sub-
directories and parameters by
making a note of all the URLs while browsing the target
79. o ־ e n p t type"״text^avascr1pt*>
var QosInitTime ■ <new Date()) •getTime () ;
9 var QosLoadTim* • •;י
var QosPageUn • encodeURI (window, location);
var QosBaseSrc • window.location.protocol ♦
new)) + •יoft.com/tran^_plxel.a3px?route*64DE^ctrl-
9C5A4tzצe.micro//י
Date()) .getTimezoneOffset () / 60) ♦ •tcot-Stqos.un■• ♦
QosPagetJri;
document.write("clink rel”"3tylesheet■ type“*text/css• href•"' ♦
QosSuildUrl(•lnit‘) ♦ •"/>');
function QosBuildUn (n) (
14 var time » (new Date ()).getTuse () ;
var cd - window.cookieDisabled;
if (typeof cd “ *undefined*)
cd • 1; // Default to 1 (cookies disabled) if the wedcs script has
not set it yet
return QosBaseSrc ♦ *ted•' • cd ♦ •tqos.ti■' ♦ QosInitTme ♦
•4ts■' ♦
time + ,*qos.tl“• ♦ QosLoadTlme ♦ •iqos.n•1 ♦ n;t»l } v
FIGURE 2.15: Screenshot showing Microsoft script works
Examine cookies set by the server to determine the software
running and its behavior. You can
also identify the script in platforms by observing sessions and
other supporting cookies.
Cook* * ar*d site data X
Sit• Locally stored data Remove $0 SeercH toofc*et
85. Source: http://www.surfoffline.com
SurfOffline is a website download software. The software
allows you to download entire
websites and download web pages to your local hard drive.
After downloading the target
website, you can use SurfOffline as an offline browser and view
downloaded web pages in it. If
you prefer to view downloaded webpages in another browser,
you can use the Export Wizard.
SurfOffline's Export Wizard also allows you to copy
downloaded websites to other computers in
order to view them later and prepares websites for burning them
to a CD or DVD.
J SurfOffline Professional 2.1 Unregistered trial version. You
have 30 day(s) left I ** 1 ° 1 x
F.4e View Projects 8rowver HHp
iL £) Zi O Hi> O ^ OQjj $
JuggyboyQ uestion the Rules
+ +
O Promts
<5 New Project
1m Pfoywi Set Loaded byt« Sutus1: http:.'׳/www.j1»ggyt>... 0 0
Connoting
2: http7/wwŵ u9gyb— 0 0 Connoting
J: http--//www.;1>ggyb... 0 0 Connecting
* http, // www /uggyb. 0 0 Connecting
S: http://www.;u9g>-b... 0 0 Connecting v J
■ __________>*»*mg. 0 10*6*4 11 Queued S1 (1 <tem(*)
rem**1rKj) Downloading picture http־.//ww 1
87. Exam 312-50 Certified Ethical HackerEthical Hacking and
Countermeasures
Footprinting and Reconnaissance
X l« W M 1» MaowACotporjBon Scftmn. V iw lcto n n O rtnr
G m v Claud Co״ cw tn j It t«trw«og>OomHôt י ״
^ »■ — [()»■ 0|V»» Q»>» 2J***'״ S ’**■
'fj l« « tn g liw 1a• m U h jh
Welcome to Microsoft
*o*ucta 00» « e *d1 S * o ^ » Support •wy
FIGURE 2.20: SurfOffline screenshot
Webripper
Source: http://www.calluna-software.com
WebRipper is an Internet scanner and downloader. It downloads
massive amount of images,
videos, audio, and executable documents from any website.
WebRipper uses spider-technology
to follow the links in all directions from the start-address. It
filters out the interesting files, and
adds them to the download-queue for downloading.
You can restrict downloaded items by file type, minimum file,
maximum file, and image size. All
the downloaded links can also be restricted by keywords to
avoid wasting your bandwidth.
Wrt>R»ppef 03 - Copyright (0 200S-2009 - StmsonSoft
0 SamsonSoft
Ne M> T00H *dp
F<xsy3Mm fiwemgW•• SucceeAiMee fM ta Seemed page•
95. Exam 312-50 Certified Ethical HackerEthical Hacking and
Countermeasures
Footprinting and Reconnaissance
Monitoring Web Updates Using
Website Watcher
Website Watcher automatically checks web pages for updates
and changes
WebSite-Watcher 2012 <12_2> .cockmartcwsw. 28 days
available
[ 11* goot/narks £h«ck Took Jcnpt Qptions Jftew tJelp Byy
Now
change Statu* Last check
Warning: whole content _ 13:14
2012-07-18 1&2&22 CK. mibafccril RecSrect.on 2012-07-18
16:2*33
200®-10-07 1fclS27 CK 2008-10-07 15:4*30
20CS-10-C7 15744:4s CK. pfcp6B2 Plugin proc... 2008-10-07
15:44:49
a| ם j 4|[b1̂ rs
Sign In http:Vww1At.hotmail.com
fAcrosoft Corporation: Software ... http://www.miuoicft com
WebS4e-Watcher - Download http-7/www a^ne com'dowmloa—
WebSrte-Watcher - Support Forum
http:/«'׳wrw.a1gne1.com'fo»v»n'11-
e . S l a y I nWebSite- Watche
Hchpp r p j j u w Scfp^rwhot*; VWo< EowpIo.kI■, Buy Now
Siionort
103. number assigned
.google.com to
itify theme:
Date and time received
by the originator's
email servers
Delivored-To: - _ 0gmc1il.com
Received: by 10.112.39.167 with SMTP id q7cj
Fri, 1 Jun 2012 21:24:01 - O T O O i f ^
Return-Path: < •*״ - [email protected]>
Received-SPF: pass (google.com: domain of
sender) client־ip=10.224.205.1 377
Authentication-Results: |m^goog^^^om^
10.224.205.137 as p e r m i ^ ? ? ^
header. i«;_ •»«-*.. * [email protected]
Received: frommr.google.com ([10.224.205.137])
!hY wir.h SMTP Iri fr»^..n^8570qab.39.131
I Fri, 01 Jun 2Q12 21;24:QQ -0700 (PDT)I —
Sender's mail serverrrwl
SmtpTml^H
ect:from:to
75MxDR8־t2־P!
Authentication system
used by sender's
104. mail server
d=gma11.com; 3=20120113;
h-mime-version:in-reply-to:
:content-type;
bh=TGEIPb4ti7gfQG+ghh70kPj kx+Tt/iAClfl
b־KyuZLTLfg2-»-QZX;cZKexlNnvRcnD/ + P4+Nkl
A unique
l.com> j b m
bl PK3p J3Uf/CsaB7.Wr>TTOXI״aKOAGrP3BOt
92MCZFxeUUQ9uwL/xHAI״SnkoUTF.F.*»KGqOC
0a9hD59D30Xl8KAC7ZmkblGzXmV4DlWf
fCL894RaMBOU1*MzRwOWWIib95al I38cqt If P
ZhrWFKh5xSnZXsE73xZPEYzp7yeeCeQuYHZNGslKxc07xQje
Zuw+HWK/vR6xChDJapZ4
K5ZAfYZmkIkFX+VdLZqu7YGFzy60HcuP16y3/C2fXHVd3uY
<״nMT/yecvhCV080y7FKt6
/Kzw-■
MIME-Veraion: 1.0
Received; by 10.224.205.137 with SMTP id fq9;
Fri, 01 Jun 2012 21:24:00 -0700 (PDT)
Received: by 10.229.230.79 with HTTP; Fri
In-Reply-To: <CAOYWATTlzdDXE308D2rhiE4Ber
Referaaa
Date
1040318;
nO’-EMJcgfgX+mUf jB tt2sy2dXA0mail. gmail .com>
1LUTIONS : : :