Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
User-agent: * Disallow: Sitemap: https://www.silentrobots.com/sitemap.xml |
Title | Silent Robot |
Description | SSRF Protocol Smuggling in Plaintext Credential Handlers : SSRF Protocol Smuggling in Plaintext Credential Handlers : LDAP SSRF protocol smuggling involves an attacker injecting one TCP protocol into a |
Keywords | N/A |
WebSite | silentrobots.com |
Host IP | 104.21.52.176 |
Location | United States |
Site | Rank |
US$325,626
Last updated: 2022-08-26 19:22:17
silentrobots.com has Semrush global rank of 32,504,528. silentrobots.com has an estimated worth of US$ 325,626, based on its estimated Ads revenue. silentrobots.com receives approximately 37,573 unique visitors each day. Its web server is located in United States, with IP address 104.21.52.176. According to SiteAdvisor, silentrobots.com is safe to visit. |
Purchase/Sale Value | US$325,626 |
Daily Ads Revenue | US$301 |
Monthly Ads Revenue | US$9,018 |
Yearly Ads Revenue | US$108,208 |
Daily Unique Visitors | 2,505 |
Note: All traffic and earnings values are estimates. |
Host | Type | TTL | Data |
silentrobots.com. | A | 300 | IP: 104.21.52.176 |
silentrobots.com. | A | 300 | IP: 172.67.202.88 |
silentrobots.com. | AAAA | 300 | IPV6: 2606:4700:3031::6815:34b0 |
silentrobots.com. | AAAA | 300 | IPV6: 2606:4700:3035::ac43:ca58 |
silentrobots.com. | NS | 86400 | NS Record: cleo.ns.cloudflare.com. |
silentrobots.com. | NS | 86400 | NS Record: lorna.ns.cloudflare.com. |
silentrobots.com. | MX | 300 | MX Record: 1 aspmx.l.google.com. |
silentrobots.com. | TXT | 300 | TXT Record: google-site-verification=JHQtlzrF-_NxqFiE2LvzPQ8lP11283jpN1EH4TY-MdI |
--> Recent Posts SSRF Protocol Smuggling in Plaintext Credential Handlers : LDAP odle: piping security data Exploiting CVE-2016-4264 With OXML_XXE Finding Hosts Using SSL Certificate Organization And Censys Exploiting XXE In File Upload Functionality About Projects Presentations Github - github.com/BuffaloWill Twitter - @0xrst Email - will _at_ silentrobots.com SSRF Protocol Smuggling in Plaintext Credential Handlers : LDAP SSRF protocol smuggling involves an attacker injecting one TCP protocol into a dissimilar TCP protocol. A classic example is using gopher (i.e. the first protocol) to smuggle SMTP (i.e. the second protocol): 1 gopher : // 127 . 0 . 0 . 1 : 25 /% 0 D % 0 AHELO % 20 localhost % 0 D % 0 AMAIL % 20 FROM % 3 Abadguy @evil . com % 0 D % 0 ARCPT % 20 TO % 3 Avictim @site . com % 0 D % 0 ADATA % 0 D % 0 A . . . . The keypoint above is the use of the CRLF character (i.e. %0D%0A) which breaks up the commands of the second protocol. This attack is only possible with the |
HTTP/1.1 301 Moved Permanently Date: Tue, 21 Dec 2021 09:07:41 GMT Content-Type: text/html Connection: keep-alive location: http://www.silentrobots.com/ x-github-request-id: 8160:5332:DE9F2:1E8139:61C1995D accept-ranges: bytes via: 1.1 varnish age: 0 x-served-by: cache-ewr18146-EWR x-cache: MISS x-cache-hits: 0 x-timer: S1640077661.390975,VS0,VE9 vary: Accept-Encoding x-fastly-request-id: acbedcdc7c87d28688630b77faa3480c8b268a5d CF-Cache-Status: DYNAMIC Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Bl1hvWqkt9ZGPAEeCieeEF2jnBDVeGRQA8hyG3SaN1F2VDnMI2TSedsQ1hMGFGGAj1zwJiixgTlTbrdhsdALq%2Fy%2F8F4r%2FHlqi39OYCEh7rea20M1TWLNeKMJy49iaTTtAFrr"}],"group":"cf-nel","max_age":604800} NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800} Server: cloudflare CF-RAY: 6c0ff6278dc117f9-EWR alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400 HTTP/1.1 200 OK Date: Tue, 21 Dec 2021 09:07:41 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive last-modified: Wed, 20 Nov 2019 18:04:27 GMT access-control-allow-origin: * expires: Tue, 21 Dec 2021 09:17:41 GMT cache-control: max-age=600 x-proxy-cache: MISS x-github-request-id: E730:3B5C:200BFC:31A257:61C1995D via: 1.1 varnish age: 0 x-served-by: cache-ewr18145-EWR x-cache: MISS x-cache-hits: 0 x-timer: S1640077661.442950,VS0,VE13 vary: Accept-Encoding x-fastly-request-id: 30e53d73cf804f7dfb4bcdb47af2b216839cf7bf CF-Cache-Status: DYNAMIC Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=nURBzuqN9kLHYxlzu%2B1SlYgF7UUacxBFC3QY1AAg8sU1VTffJclNFEWhNuO4UbOIsrjbVxMuSv%2FrHSCPi2sP7kkGYD1dO%2BmRNJmSZ0bWXcVQD0DhakzIKCfR05Lnl7wTA1xGIgw5Bw%3D%3D"}],"group":"cf-nel","max_age":604800} NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800} Server: cloudflare CF-RAY: 6c0ff627e97c32c7-EWR alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400 |
Domain Name: SILENTROBOTS.COM Registry Domain ID: 1866046249_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.namecheap.com Registrar URL: http://www.namecheap.com Updated Date: 2021-06-08T07:43:41Z Creation Date: 2014-07-08T18:10:03Z Registry Expiry Date: 2022-07-08T18:10:03Z Registrar: NameCheap, Inc. Registrar IANA ID: 1068 Registrar Abuse Contact Email: abuse@namecheap.com Registrar Abuse Contact Phone: +1.6613102107 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Name Server: CLEO.NS.CLOUDFLARE.COM Name Server: LORNA.NS.CLOUDFLARE.COM DNSSEC: unsigned >>> Last update of whois database: 2021-12-24T07:50:51Z <<< |