Sunday, 31 January 2016

Tracing the routes

You would need to know the IP address of the webserver in order to trace the exact location. There are several methods to figure it out. We will use the simplest one, that is, the ping command. Ping command sends icmp echo requests to check if the website is up. It’s used for network troubleshooting purposes.
From your command line, type the following:
The output would be as follows:
C:\Users\ Rafay Baloch>ping http://www.techlotips.com
Pinging techlotips.com [50.22.81.62] with 32 bytes of data
Reply from 50.22.81.62: bytes = 32 time = 304ms TTL =47
Reply from 50.22.81.62: bytes = 32 time = 282ms TTL =47
Reply from 50.22.81.62: bytes = 32 time = 291ms TTL =47
Reply from 50.22.81.62: bytes = 32 time = 297ms TTL =47
So we now know that the IP address of our target is 50.22.81.62. After determining the web-
server’s IP, we can use some online tools to track the exact location of the webserver. One such tool is IPTracer that is available at http://www.ip-adress.com/ip_tracer/yourip
Just replace your IP with your target’s IP, and it will show you the exact location of the web-
server via Google Maps.
pic6
Traceroute
Traceroute is a very popular utility available in both Windows and Linux. It is used for network orientation. By network orientation I don’t mean scanning a host for open ports or scanning for services running on a port. It means to figure out how the network topology, firewalls, load balancers, and control points, etc. are implemented on the network.
A traceroute uses a TTL (time to live) field from the IP header, and it increments the IP packet in order to determine where the system is. The time to live value decreases every time it reaches a hop on the network (i.e. router to server is one hop).
There are three different types of traceroutes:
1. ICMP traceroute (which is used in Windows by default)
2. TCP traceroute
3. UDP traceroute
ICMP Traceroute
Microsoft Windows by default uses ICMP traceroute; however, after a few hops, you will get a timeout, which indicates that there might be a device like IDS or firewall that is blocking ICMP echo requests.
From this image you can see that the ICMP echo requests are timed out after seven requests.
pic7.png
TCP Traceroute
Many devices are configured to block ICMP traceroutes. This is where we try TCP or UDP traceroutes, also known as layer 4 traceroutes. TCP traceroute is by default available in BackTrack. If you can’t find it, just use the following command:
apt-get install tcptraceroute
Usage
From the command line, you would need to issue the following command:
tcptraceroute http://www.google.com
UDP Traceroute
Linux also has a traceroute utility, but unlike Windows, it uses UDP protocol for the traceroute. In Windows, the command for traceroute is “tracrt”. In, Linux, it’s “tracroute”.
Usage
NeoTrace
NeoTrace is a very fine GUI-based tool for mapping out a network.
pic8.png
Cheops-ng
Cheops-ng is another remarkable tool for tracing and fingerprinting a network. This image speaks thousand words.


pic9.png

Thursday, 28 January 2016

Information gathering

There is a saying that goes “The more information you have about the target, the more is the chance of successful exploitation.” Information gathering is the first phase of hacking. In this phase, we gather as much information as possible regarding the target’s online presence, which in turn reveal useful information about the target itself. The required information will depend on whether we are doing a network pentest or a web application pentest. In the case of a network pentest, our main goal would be to gather information on the network. The same applies to web application pentests. In this module, we will discuss numerous methods of real-world information intelligence.
In general, all information gathering techniques can be classified into two main categories:
1. Active information gathering
2. Passive information gathering

ACTIVE INFORMATION GATHERING

In active information gathering, we would directly engage with the target, for example, gathering information about what ports are open on a particular target, what services they are running, and what operating system they are using. However, the techniques involving active information gathering would be very noisy at the other end. As they are easily detected by IDS, IPS, and firewalls and generate a log of their presence, and hence are not recommended sometimes.

PASSIVE INFORMATION GATHERING

In passive information gathering, we do not directly engage with the target. Instead, we use search engines, social media, and other websites to gather information about the target. This method is recommended, since it does not generate any log of presence on the target system. A common example would be to use LinkedIn, Facebook, and other social networks to gather information about the employees and their interests. This would be very useful when we perform phishing, keylogging, browser exploitation, and other client side attacks on the employees.
Sources of Information Gathering
There are many sources of information; the most important ones are as follows:-
Social media website
Search engines
Forums
Press releases
People search
Job sites
So let’s discuss some of these sources in detail along with some tools of the trade.

COPYING WEBSITES LOCALLY

There are many tools that can be used to copy websites locally; however, one of the most comprehensive tool is httrack. It can be used to investigate the website further. For example, let’s suppose that the file permissions of a configuration file are not set properly. The configuration might reveal some important information, for example, username and password, about the target.
pic3.png
If you are on Linux, you can use Wget command to copy a webpage locally. Wget http://
http://www.rafayhackingarticles.net.Another great tool is Website Ripper Copier, which has a few additional functions than httrack.
pic4.png

INFORMATION GATHERING WITH WHOIS

As I have mentioned earlier, our goal in the information gathering and enumeration phase is to gather as much information as possible about the target. Whois holds a huge database that contains information regarding almost every website that is on the web, most common information are “who owns the website” and “the e-mail of the owner,” which can be used to perform social engineering attacks.
Whois database is accessible on whois.domaintools.com. It’s also available in BackTrack. but you would need to issue the following command from BackTrack to enable it:
apt-get install whois
In order to perform a Whois search on a website, you would need to type Whois <domainname>
from the command line:
whois http://www.techlotips.com
You would see the following output:
pic5.png
You can see that it has revealed some interesting information such as the e-mail of the owner (which I have set to private b/w) and the name servers, which shows that hostagtor.com is hosting this website

Tuesday, 26 January 2016

Penetration testing methods

WHAT IS A PENETRATION TEST?

A penetration test is a subclass of ethical hacking; it comprises a set of methods and procedures that aim at testing/protecting an organization’s security. The penetration tests prove helpful in finding vulnerabilities in an organization and check whether an attacker will be able to exploit them to gain unauthorized access to an asset.

VULNERABILITY ASSESSMENTS VERSUS PENETRATION TEST

Oftentimes, a vulnerability assessment is confused with a penetration test; however, these terms have completely different meanings. In a vulnerability assessment, our goal is to figure out all the vulnerabilities in an asset and document them accordingly.
In a penetration test, however, we need to simulate as an attacker to see if we are actually able to exploit a vulnerability and document the vulnerabilities that were exploited and the ones that turned out to be false-positive.
Preengagement
Before you start doing a penetration test, there is whole lot of things you need to discuss with
clients. This is the phase where both the customer and a representative from your company would
sit down and discuss about the legal requirements and the “rules of engagement.”4 ◾ Ethical Hacking and Penetration Testing Guide.

RULES OF ENGAGEMENT

Every penetration test you do would comprise of a rules of engagement, which basically defines how a penetration test would be laid out, what methodology would be used, the start and end dates, the milestones, the goals of the penetration test, the liabilities and responsibilities, etc. All of them have to be mutually agreed upon by both the customer and the representative before the penetration test is started. Following are important requirements that are present in almost every ROE:
◾ A proper “permission to hack” and a “nondisclosure” agreement should be signed by both the parties.
◾ The scope of the engagement and what part of the organization must be tested.
◾ The project duration including both the start and the end date.
◾ The methodology to be used for conducting a penetration test.
◾ The goals of a penetration test.
◾ The allowed and disallowed techniques, whether denial-of-service testing should be per-
formed or not.
◾ The liabilities and responsibilities, which are decided ahead of time. As a penetration tester you might break into something that should not be accessible, causing a denial of service; also, you might access sensitive information such as credit cards. Therefore, the liabilities should be defined prior to the engagement.
Milestones
Before starting a penetration test, it’s good practice to set up milestones so that your project is delivered as per the dates given in the rules of engagement.
You can use either a GANTT chart or a website like Basecamp that helps you set up milestones to keep track of your progress. The following is a chart that defines the milestones followed by the date they should be accomplished.
pic1
Penetration Testing Methodologies
In every penetration test, methodology and the reporting are the most important steps. Let’s first talk about the methodology. There are several different types of penetration testing methodologies that address how a penetration test should be performed. Some of them are discussed in brief next.
OSSTMM
pic2.png
An open-source security testing methodology manual (OSSTMM) basically includes almost all the steps involved in a penetration test. The methodology employed for penetration test is concise yet it’s a cumbersome process which makes it difficult to implement it in our everyday life. Penetration tests, despite being tedious, demands a great deal of money out of company’s budgets for their completion which often are not met by a large number of organizations.
NIST
NIST, on the other hand, is more comprehensive than OSSTMM, and it’s something that you would be able to apply on a daily basis and in short engagements. The screenshot indicates the four steps of the methodology, namely, planning, discoveryattack, and reporting.
The testing starts with the planning phase, where how the engagement is going to be performed is decided upon. This is followed by the discovery phase, which is divided into two parts—the first part includes information gathering, network scanning, service identification, and OS detection, and the second part involves vulnerability assessment.
After the discovery phase comes the attack phase, which is the heart of every penetration test. If you are able to compromise a target and a new host is discovered, in case the system is dual-homed or is connected with multiple interfaces, you would go back to step 2, that is, discovery, and repeat it until no targets are left. The indicating arrows in the block phase and the attack phase to the reporting phase indicate that you plan something and you report it—you attack a target and report the results.
The organization also has a more detailed version of the chart discussed earlier, which actually explains more about the attack phase. It consists of things such as “gaining access,” “escalating privileges,” “system browsing,” and “install additional tools.”
OWASP
As you might have noticed, both the methodologies focused more on performing a network penetration test rather than something specifically built for testing web applications. The OWASP testing methodology is what we follow for all “application penetration tests” we do here at the RHA InfoSEC. The OWASP testing guide basically contains almost everything that you would test a web application for. The methodology is comprehensive and is designed by some of the best web application security researchers.

CATEGORIES OF PENETRATION TEST

When the scope of the penetration test is defined, the category/type of the penetration test engagement is also defined along with it. The entire penetration test can be Black Box, White Box, or Gray Box depending upon what the organization wants to test and how it wants the security paradigm to be tested.
Black Box
A black box penetration test is where little or no information is provided about the specifiedtarget.In the case of a network penetration test this means that the target’s DMZ, target operating system, server version, etc., will not be provided; the only thing that will be provided is the IP ranges that you would test. In the case of a web application penetration test, the source code of the web application will not be provided. This is a very common scenario that you will encounter when performing an external penetration test.
White Box
A white box penetration test is where almost all the information about the target is provided. In the case of a network penetration test, information on the application running, the corresponding versions, operating system, etc., are provided. In the case of a web application penetration test,the application’s source code is provided, enabling us to perform the static/dynamic “source code analysis.” This scenario is very common in internal/onsite penetration tests, since organizations are concerned about leakage of information.
Gray Box
In a gray box test, some information is provided and some hidden. In the case of a network penetration test, the organization provides the names of the application running behind an IP; however, it doesn’t disclose the exact version of the services running. In the case of a web application penetration test, some extra information, such as test accounts, back end server, and databases, is provided.

TYPES OF PENETRATION TESTS

There are several types of penetration tests; however, the following are the ones most commonly performed:-
Network Penetration Test
In a network penetration test, you would be testing a network environment for potential security vulnerabilities and threats. This test is divided into two categories: external and internal penetration tests.An external penetration test would involve testing the public IP addresses, whereas in an internal test, you can become part of an internal network and test that network. You may be provided VPN access to the network or would have to physically go to the work environment for the penetration test depending upon the engagement rules that were defined prior to conducting the test.
Web Application Penetration Test
Web application penetration test is very common nowadays, since your application hosts critical data such as credit card numbers, usernames, and passwords; therefore this type of penetration test has become more common than the network penetration test.
Mobile Application Penetration Test
The mobile application penetration test is the newest type of penetration test that has become common since almost every organization uses Android- and iOS-based mobile applications to provide services to its customers. Therefore, organizations want to make sure that their mobile applications are secure enough for users to rely on when providing personal information when using such applications.
Social Engineering Penetration Test
A social engineering penetration test can be part of a network penetration test. In a social engineering penetration test the organization may ask you to attack its users. This is where you use speared phishing attacks and browser exploits to trick a user into doing things they did not intend to do.
Physical Penetration Test
A physical penetration test is what you would rarely be doing in your career as a penetration tester. In a physical penetration test, you would be asked to walk into the organization’s building physically and test physical security controls such as locks and RFID mechanisms

Sunday, 24 January 2016

Basic terms related to Ethical Hacking

DEFINITION OF A “HACKER”

There are many definitions for “hacker.” Ask this question from a phalanx and you’ll get a new answer every time because “more mouths will have more talks” and this is the reason behind the different definitions of hackers which in my opinion is quite justified for everyone has aright to think differently.
In the early 1990s, the word “hacker” was used to describe a great programmer, someone who was able to build complex logics. Unfortunately, over time the word gained negative hype, and the media started referring to a hacker as someone who discovers new ways of hacking into a system, be it a computer system or a programmable logic controller, someone who is capable of hacking into banks, stealing credit card information, etc. This is the picture that is created by the media and this is untrue because everything has a positive and a negative aspect to it. What the media has been highlighting is only the negative aspect; the people that have been protecting organizations by responsibly disclosing vulnerabilities are not highlighted. However, if you look at the media’s definition of a hacker in the 1990s, you would find a few common characteristics, such as creativity, the ability to solve complex problems, and new ways of compromising targets. Therefore, the term has been broken down into three types:
1. White hat hacker—This kind of hacker is often referred to as a security professional or security researcher. Such hackers are employed by an organization and are permitted to attack an organization to find vulnerabilities that an attacker might be able to exploit.
2. Black hat hacker—Also known as a cracker, this kind of hacker is referred to as a bad guy, who uses his or her knowledge for negative purposes. They are often referred to by the media as hackers.
3. Gray hat hacker—This kind of hacker is an intermediate between a white hat and a black
hat hacker. For instance, a gray hat hacker would work as a security professional for an
organization and responsibly disclose everything to them; however, he or she might leave a
backdoor to access it later and might also sell the confidential information, obtained after
the compromise of a company’s target server, to competitors.
4. Elite hacker—An elite hacker, also referred to as l33t or 1337, is someone who has deep knowledge on how an exploit works; he or she is able to create exploits, but also modify codes that someone else wrote. He or she is someone with elite skills of hacking.
5. Hacktivists —They are defined as group of hackers that hack into computer systems for a
cause or purpose. The purpose may be political gain, freedom of speech, human rights, and
so on.
6. Ethical hacker—An ethical hacker is as a person who is hired and permitted by an organization to attack its systems for the purpose of identifying vulnerabilities, which an attacker might take advantage of. The sole difference between the terms “hacking” and “ethical hacking” is the permission.

IMPORTANT TERMINOLOGIES

Let’s now briefly discuss some of the important terminologies that I will be using throughout this book.
1. Asset
An asset is any data, device, or other component of the environment that supports information related activities that should be protected from anyone besides the people that are allowed to view or manipulate the data/information.
2. Vulnerability
Vulnerability is defined as a flaw or a weakness inside the asset that could be used to gain unauthorized access to it. The successful compromise of a vulnerability may result in data manipulation, privilege elevation, etc.
3. Threat
A threat represents a possible danger to the computer system. It represents something that an organization doesn’t want to happen. A successful exploitation of vulnerability is a threat. A threat may be a malicious hacker who is trying to gain unauthorized access to an asset.
4. Exploit
An exploit is something that takes advantage of vulnerability in an asset to cause unintended or unanticipated behavior in a target system, which would allow an attacker to gain access to data or information.
5. Risk
A risk is defined as the impact (damage) resulting from the successful compromise of an asset. For example, an organization running a vulnerable apache tomcat server poses a threat to an organization and the damage/loss that is caused to the asset is defined as a risk.
Normally, a risk can be calculated by using the following equation:
Risk = Threat * vulnerabilities * impact

Friday, 22 January 2016

Footprinting

WHAT IS FOOTPRINTING?

Footprinting is the first and most convenient way that hackers use to gather information
about computer systems and the companies they belong to. The purpose of footprinting to
learn as much as you can about a system, it’s remote access capabilities, its ports and
services, and the aspects of its security.
In order to perform a successful hack on a system, it is best to know as much as you can,
if not everything, about that system. While there is nary a company in the world that
isn’t aware of hackers, most companies are now hiring hackers to protect their systems.
And since footprinting can be used to attack a system, it can also be used to protect it.
If you can find anything out about a system, the company that owns that system, with the
right personell, can find out anything they want about you.
In this talk, I will explain what the many functions of footprinting are and what they do.
I’ll also footprint everyone’s favorite website, just to see how much info we can get on
Grifter.

OPEN SOURCE FOOTPRINTING

Open Source Footprinting is the easiest and safest way to go about finding information
about a company. Information that is available to the public, such as phone numbers,
addresses, etc. Performing whois requests, searching through DNS tables, and scanning
certain IP addresses for open ports, are other forms of open source footprinting. Most
of this information is fairly easy to get, and getting it is legal, legal is always good.
Most companies post a shit load of information about themselves on their website. A lot
of this information can be very useful to hackers and the companies don’t even realize it.
It may also be helpful to skim through the webpage’s HTML source to look for comments.
Comments in HTML code are the equivalent to the small captions under the pictures in high
school science books. Some comments found in the HTML can hold small tid-bits of info
about the company, otherwise not found anywhere else.

NETWORK ENUMERATION

Network Enumeration is the process of identifying domain names and associated networks.
The process is performing various queries on the many whois databases found on the
internet. The result is the hacker now having the information needed to attack the system
they are learning about. Companie’s domain names are listed with registrars, and the
hacker would simply query the registrar to obtain the information they are looking for.
The hacker simply needs to know which registrar the company is listed with. There are
five types of queries which are as follows:
Registrar Query: This query gives information on potential domains matching the
target.
Organizational Query: This is searching a specific registrar to obtain all
instances of the target’s name. The results show many different domains associated
with the company.
Domain Query: A domain query is based off of results found in an organizational
query. Using a domain query, you could find the company’s address, domain name,
administrator and his/her phone number, and the system’s domain servers. The
administrative contact could be very useful to a hacker as it provides a purpose
for a wardialer. This is also where social engineering comes into play. But
that’s a talk for another time. Many administrators now post false phone numbers
to protect themselves from this.
Network Query: The fourth method one could use the American Registry for Internet
Numbers is to discover certain blocks owned by a company. It’s good to use a
broad search here, as well as in the registrar query.
POC Query: This query finds the many IP adresses a machine may have.

DNS INTERROGATION

After gathering the information needed using the above techniques, a hacker would begin to
query the DNS. A common problem with system adminstrators is allowing untrusted, or worse,
unknown users, to perform a DNS Zone Transfer. Many freeware tools can be found on the
internet and can be used to perform DNS interrogation. Tools such as nslookup, for PC, and
AGnet Tools, for Mac, are some common programs used for this.

OTHER HELPFUL TECHNIQUES USED IN FOOTPRINTING

Ping Sweep: Ping a range of IP addresses to find out which machines are awake.
TCP Scans: Scan ports on machines to see which services are offered. TCP scans
can be performed by scanning a single port on a range of IPs, or by scanning a
range of ports on a single IP. Both techniques yeild helpful information.
UDP Scans: Send garbage UDP packets to a desired port. I normally don’t perform
UDP scans a whole lot because most machines respond with an ICMP ‘port unreachable’
message. Meaning that no service is available.
OS Indentification: This involves sending illegal ICMP or TCP packets to a machine.
The machine responds with unique invalid inputs and allows the hacker to find out what the
target machine is running.

CONCLUSION

All of these functions are very basic. They are simpe and easy to use. And above all,
they are legal. As I said in the introduction, legal is always good. Whenever
footprinting a system, keep in mind that you could find something that you aren’t supposed
to see. If this happens, contact the sysadmin and let them know of it. You could get into
serious trouble if you misuse the information you find. Also let them know of any bugs or
exploits you may find. Who knows? If you help them out enough, you could land a job with
them protecting their system. Nothing could be greater than getting paid to do what you do
best. But try not to let money be your motivation. Hacking is all about learning.
There is definetely more to learn about Grifter and his little websites. Like why I found
him sneaking around my backyard last night. But I guess we’ll have to delve into that
later.
Especially be careful when trying to access any open ports you may find. Brute forcing an
ftp or a web server can also land you in a pile. If anything you try to access requires a
password, you probably shouldn’t be there. But like I said, if you access something
important and it didn’t ask you for a password, let the sysadmin know of it.

Thursday, 21 January 2016

Introduction to YougetSignal

YougetSignal is the fastest, cleanest and most elegant collection networking tools I have even found.
I like everything about it. The minimal interface, excellent colour choice, the technologies involved, everything. Also, being a hardcore fan of the internet subculture phenomenon “All your base…” I love the title even more.
YouGetSignal.com is a collection of network tools that I started working on in late September of 2007. The name of the site, YouGetSignal, is a nerdy play on a line of broken English from the infamous “All your base belongs to us” cut scene. YouGetSignal originally started as an effort of mine to learn the latest web development techniques. Consequently, the site employs several technologies to function, including:
  • Cascading style sheets
  • Asynchronous javascript and XML requests
  • JavaScript object notation responses
  • An open source relational database management system
  • A server-side cross-platform HTML embedded scripting language
  • The prototype JavaScript libraries
  • The google maps API
Ultimately, my goal with YouGetSignal is to contribute a set of useful tools to the global Internet community that has given me so much.
Identify Open Ports on Your Internet Connection
your external address
223.180.133.213
open port finder
Remote Address
Port Number
Closed Port 25 is closed on 223.180.133.213.
The open port checker is a tool you can use to check your external IP address and detect open ports on your connection. This tool is useful for finding out if your port forwarding is setup correctly or if your server applications are being blocked by a firewall. This tool may also be used as a port scanner to scan your network for ports that are commonly forwarded. It is important to note that some ports, such as port 25, are often blocked at the ISP level in an attempt to prevent malicious activity.
Your IP address is:

223.180.184.249

Network Location Tool
approximate geophysical location
locate a network
Remote Address
  Use Current IP
Source  MaxMind  Hostip.info
network information
IP Address
202.164.53.112
Base Domain
202.164.53.112
Country
India IN
Region
23
City
Ludhiana
Latitude
30.9
Longitude
75.85
Area Code
Unknown
Postal Code
Unknown
Distance from Last
(as the crow flies)
0 miles
aboutThe network location tool is a utility that approximates and displays the geophysical location of your network address on aGoogle Map. Because the network geophysical location has been tested and utilized mainly for US, it may not have the same accuracy when dealing with international networks such as Ehsan Bayat TSI and other international networks. Currently, geolocation information is available from two sources, MaxMind and Hostip.info. The location database provided by MaxMind is 98% accurate on a country level and 70% accurate on a city level for the US within a 25 mile radius. Accuracy information is not available for Hostip.info; however, the Hostip database is open for user input so it is continually becoming more precise.
Whois Lookup Tool
Remote Address  
 way2sms.com does not appear to be available for registration.
Domain Name: WAY2SMS.COM
Registry Domain ID: 288804034_DOMAIN_COM-VRSN
Registrar WHOIS Server: Whois.bigrock.com
Registrar URL: http://www.bigrock.com
Updated Date: 2016-03-02T06:33:33Z
Creation Date: 2005-12-17T12:34:58Z
Registrar Registration Expiration Date: 2019-12-17T12:34:58Z
Registrar: BigRock Solutions Ltd
Registrar IANA ID: 1495
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: Raju Vanapala
Registrant Organization: Way2Online Interactive (India) Pvt Ltd.
Registrant Street: 2nd Floor,Hansa Crest Building,Plot no 62,Road no. 1,Jubilee hi ls,HYDERABAD-500033
Registrant City: Hyderabad
Registrant State/Province: Andhra Pradesh
Registrant Postal Code: 500033
Registrant Country: IN
Registrant Phone: +040.23556711
Registrant Phone Ext:
Registrant Fax: +040.23556733
Registrant Fax Ext:
Registrant Email: raju@way2online.net
Registry Admin ID:
Admin Name: Raju Vanapala
Admin Organization: Way2Online Interactive (India) Pvt Ltd.
Admin Street: 2nd Floor,Hansa Crest Building,Plot no 62,Road no. 1,Jubilee hi ls,HYDERABAD-500033
Admin City: Hyderabad
Admin State/Province: Andhra Pradesh
Admin Postal Code: 500033
Admin Country: IN
Admin Phone: +040.23556711
Admin Phone Ext:
Admin Fax: +040.23556733
Admin Fax Ext:
Admin Email: raju@way2online.net
Registry Tech ID:
Tech Name: Raju Vanapala
Tech Organization: Way2Online Interactive (India) Pvt Ltd.
Tech Street: 2nd Floor,Hansa Crest Building,Plot no 62,Road no. 1,Jubilee hi ls,HYDERABAD-500033
Tech City: Hyderabad
Tech State/Province: Andhra Pradesh
Tech Postal Code: 500033
Tech Country: IN
Tech Phone: +040.23556711
Tech Phone Ext:
Tech Fax: +040.23556733
Tech Fax Ext:
Tech Email: raju@way2online.net
Name Server: ns1.way2dns.net
Name Server: ns2.way2dns.net
DNSSEC:Unsigned
Registrar Abuse Contact Email: abuse@bigrock.com
Registrar Abuse Contact Phone: +1-888-924-4762
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2016-05-02T11:09:58Z <<<
For more information on Whois status codes, please visit https://icann.org/epp
Registration Service Provided By: BIGROCK