Reverse pen-test or ‘Privacy Policy–under the hood’

Test
Get user info and display. This post will grab your external (real IP addy) and display it below. I do not collect this data per my privacy policy but I am trying to reverse engineer the script that yanks out this data.

IP check


As a for instance, I can store the IP and write something along the lines of

Open Whois.com
//in address bar type:
http://yourIP
print data to screen

This could wreak all sorts of havoc. This is essentially a new pen test. If it works; I’ll look for a patch. Btw; if you think the John Do test failed; think again. 192.168.0.0 is NOT your IP, but if you want to see what your LAN (your network) looks like, just open a new browser tab, type http://192.168.1.0/admin …or something very close. That’s your internal IP. The first computer connected to it got the suffix “point zero” then as other computers boot, tablets, laptops and smart phones move within the broadcast limits of the router, they get internal adds assigned by the screen you may be looking at for the first time. You should be able to see….
Jaime’s Mac 192.168.1.0
RarRarRatatooville 192.168.1.1
GayPornServer 192.168.1.2
MSOFT ERP 192.168.1.3
MSOFT Sharepoint 192.168.1.4
MyCellPhone 192.168.1.5 ….you get the idea. Oh you don’t have the password? Try “admin” and “password” ….you’d be shocked how often that gets me in. Also “guest” “guest” This info is provided so readers can protect their machines; not use them to spy on boyfriends or steal anything…period, ok? If you have sneak a peak at his cell phone? Sister you got problems already. He cheatin!

Leave a Reply

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.