Ranking Alexa Global: # 2,142,453
Server:cloudflare...
The main IP address: 104.27.172.188,Your server Singapore,Singapore ISP:CloudFlare Inc. TLD:com CountryCode:SG
The description :legacy security group is a whitehat ethical security penetration testing group that specializes in physical security, rfid, magstripes, sdr/rf, wifi, hardware hacking, software pentesting, reverse eng...
This report updates in 24-Jun-2018
Created Date: | 2015-10-28 |
Changed Date: | 2018-05-29 |
Geo IP provides you such as latitude, longitude and ISP (Internet Service Provider) etc. informations. Our GeoIP service found where is host legacysecuritygroup.com. Currently, hosted in Singapore and its service provider is CloudFlare Inc. .
Latitude: | 1.2896699905396 |
Longitude: | 103.85006713867 |
Country: | Singapore (SG) |
City: | Singapore |
Region: | Singapore |
ISP: | CloudFlare Inc. |
HTTP Header information is a part of HTTP protocol that a user's browser sends to called cloudflare containing the details of what the browser wants and will accept back from the web server.
Content-Encoding: | gzip |
Transfer-Encoding: | chunked |
Set-Cookie: | __cfduid=d01ae04bebb067845b21b6e0050ca1fcd1529823662; expires=Mon, 24-Jun-19 07:01:02 GMT; path=/; domain=.legacysecuritygroup.com; HttpOnly, e0fafc883483be9d8fdd624bea3639b0=f55d5re89dok3rdap0572cptd3; path=/; HttpOnly, cwGeoData=unknown+city%7Cunknown+country%7Cxx; expires=Tue, 24-Jul-2018 07:01:02 GMT; Max-Age=2592000; path=/ |
Expires: | Wed, 17 Aug 2005 00:00:00 GMT |
Server: | cloudflare |
Last-Modified: | Sun, 24 Jun 2018 07:01:02 GMT |
Connection: | keep-alive |
Pragma: | no-cache |
Cache-Control: | no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
Date: | Sun, 24 Jun 2018 07:01:02 GMT |
CF-RAY: | 42fd5221676b186a-EWR |
Content-Type: | text/html; charset=utf-8 |
soa: | becky.ns.cloudflare.com. dns.cloudflare.com. 2028107286 10000 2400 604800 3600 |
ns: | becky.ns.cloudflare.com. dom.ns.cloudflare.com. |
ipv4: | IP:104.27.172.188 ASN:13335 OWNER:CLOUDFLARENET - Cloudflare, Inc., US Country:US IP:104.27.173.188 ASN:13335 OWNER:CLOUDFLARENET - Cloudflare, Inc., US Country:US |
ipv6: | 2400:cb00:2048:1::681b:adbc//13335//CLOUDFLARENET - Cloudflare, Inc., US//US 2400:cb00:2048:1::681b:acbc//13335//CLOUDFLARENET - Cloudflare, Inc., US//US |
txt: | "google-site-verification=t-04_Phh_qlQSbQF66pneeRqsmwTWl8l_Nd_BiX_Gg4" "v=spf1 mx mx:legacysecuritygroup.com -all" |
mx: | MX preference = 10, mail exchanger = dc-491a81e60789.legacysecuritygroup.com. |
legacy security group about us contact profile legal projects category list featured recent code our github search log in esp rfid tool details corey harding physical security 10 february 2018 introducing esp-rfid-tool a universal data logger that captures the raw binary data from a standard 5v wiegand interface. the device is capable of logging the credentials for access control systems or nearly any device that utilizes a wiegand interface such as rfid card readers, pin pads, magnetic stripe systems, barcode, and even some biometric readers. to purchase a device or to view the source code and for additional information please visit: https://www.rfid-tool.com add new comment brute forcing woods rf power outlet using the rfpwnon post hardware module in metasploit details corey harding sdr / rf devices 16 july 2017 rfpwnon metasploit module: https://www.rapid7.com/db/modules/post/hardware/rftransceiver/rfpwnon add new comment firmware/instructions for proxmark3 standalone emulation/cloning/brute-forcing of rfid tags with the elechouse rdv2 or the original proxmark3 details corey harding rfid 09 november 2015 standalone emulation demo video: proxbrute demo video: files available at: https://github.com/exploitagency/github-proxmark3-standalone-lf-emulator read more: firmware/instructions for proxmark3 standalone emulation/cloning/brute-forcing of rfid tags with... 1 comment esploitv2 wifi keystroke injection firmware released for cactus whid details corey harding physical security 08 july 2017 code available from: https://github.com/exploitagency/esploitv2 add new comment rfpwnon.py rfcat ask ook brute force tool details corey harding sdr / rf devices 29 november 2015 above is a video demo of a linear delta-3 garage door receiver being brute forced using the rfpwnon.py script. this receiver has 8 dip switches and it takes around 2 minutes to run through all possible permutations of the code when being brute forced. this garage door is less secure than the remote control light that is shown later in the article. code is available at: https://github.com/exploitagency/github-rfpwnon read more: rfpwnon.py rfcat ask ook brute force tool add new comment more articles ... esportal - fake wifi portal credential harvester using esp8266 esploit - wifi controlled keystroke injection tool page 1 of 2 start prev 1 2 next end copyright © 2015- legacy security group
http://www.legacysecuritygroup.com/projects/categories
http://www.legacysecuritygroup.com/projects/recent
http://www.legacysecuritygroup.com/projects/recent/15-physical-security/41-esploitv2-released-for-whid-cactus#addcomments
http://www.legacysecuritygroup.com/projects/recent/9-rfid/7-proxmark-3-emulating-hid-tags-in-standalone-mode#comments
http://www.legacysecuritygroup.com/projects/recent/13-sdr/42-brute-forcing-woods-rf-power-outlet-using-the-rfpwnon-post-hardware-module-in-metasploit#addcomments
http://www.legacysecuritygroup.com/projects/recent/9-rfid/7-proxmark-3-emulating-hid-tags-in-standalone-mode
http://www.legacysecuritygroup.com/projects/recent/15-physical-security/45-esp-rfid-tool#addcomments
http://www.legacysecuritygroup.com/log-in
http://www.legacysecuritygroup.com/projects/recent/15-physical-security/41-esploitv2-released-for-whid-cactus
http://www.legacysecuritygroup.com/projects/recent/12-software/28-esportal-fake-wifi-portal-credential-harvester
http://www.legacysecuritygroup.com/projects/recent/15-physical-security/45-esp-rfid-tool
http://www.legacysecuritygroup.com/about-us/about
http://www.legacysecuritygroup.com/?start=5
http://www.legacysecuritygroup.com/about-us/legal
http://www.legacysecuritygroup.com/about-us/contact
Whois is a protocol that is access to registering information. You can reach when the website was registered, when it will be expire, what is contact details of the site with the following informations. In a nutshell, it includes these informations;
Domain Name: LEGACYSECURITYGROUP.COM
Registry Domain ID: 1972955788_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: http://www.namesilo.com
Updated Date: 2018-05-29T09:01:30Z
Creation Date: 2015-10-28T22:19:47Z
Registry Expiry Date: 2019-10-28T22:19:47Z
Registrar: NameSilo, LLC
Registrar IANA ID: 1479
Registrar Abuse Contact Email: [email protected]
Registrar Abuse Contact Phone: +1.4805240066
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: BECKY.NS.CLOUDFLARE.COM
Name Server: DOM.NS.CLOUDFLARE.COM
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2018-06-24T07:00:54Z <<<
For more information on Whois status codes, please visit https://icann.org/epp
NOTICE: The expiration date displayed in this record is the date the
registrar's sponsorship of the domain name registration in the registry is
currently set to expire. This date does not necessarily reflect the expiration
date of the domain name registrant's agreement with the sponsoring
registrar. Users may consult the sponsoring registrar's Whois database to
view the registrar's reported date of expiration for this registration.
TERMS OF USE: You are not authorized to access or query our Whois
database through the use of electronic processes that are high-volume and
automated except as reasonably necessary to register domain names or
modify existing registrations; the Data in VeriSign Global Registry
Services' ("VeriSign") Whois database is provided by VeriSign for
information purposes only, and to assist persons in obtaining information
about or related to a domain name registration record. VeriSign does not
guarantee its accuracy. By submitting a Whois query, you agree to abide
by the following terms of use: You agree that you may use this Data only
for lawful purposes and that under no circumstances will you use this Data
to: (1) allow, enable, or otherwise support the transmission of mass
unsolicited, commercial advertising or solicitations via e-mail, telephone,
or facsimile; or (2) enable high volume, automated, electronic processes
that apply to VeriSign (or its computer systems). The compilation,
repackaging, dissemination or other use of this Data is expressly
prohibited without the prior written consent of VeriSign. You agree not to
use electronic processes that are automated and high-volume to access or
query the Whois database except as reasonably necessary to register
domain names or modify existing registrations. VeriSign reserves the right
to restrict your access to the Whois database in its sole discretion to ensure
operational stability. VeriSign may restrict or terminate your access to the
Whois database for failure to abide by these terms of use. VeriSign
reserves the right to modify these terms at any time.
The Registry database contains ONLY .COM, .NET, .EDU domains and
Registrars.
REGISTRAR NameSilo, LLC
SERVERS
SERVER com.whois-servers.net
ARGS domain =legacysecuritygroup.com
PORT 43
TYPE domain
DOMAIN
NAME legacysecuritygroup.com
CHANGED 2018-05-29
CREATED 2015-10-28
STATUS
clientTransferProhibited https://icann.org/epp#clientTransferProhibited
NSERVER
BECKY.NS.CLOUDFLARE.COM 173.245.58.73
DOM.NS.CLOUDFLARE.COM 173.245.59.157
REGISTERED yes
The following list shows you to spelling mistakes possible of the internet users for the website searched .