Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
User-agent: * |
Title | hesec.de — Hacking and |
Description | Bug Bounty - Cross-site request forgery is a Hacking and |
Keywords | N/A |
WebSite | hesec.de |
Host IP | 35.185.44.232 |
Location | United States |
Euro€1,102
Zuletzt aktualisiert: 2022-10-19 12:36:50
hesec.de hat Semrush globalen Rang von 34,966,291. hesec.de hat einen geschätzten Wert von € 1,102, basierend auf seinen geschätzten Werbeeinnahmen. hesec.de empfängt jeden Tag ungefähr 551 einzelne Besucher. Sein Webserver befindet sich in United States mit der IP-Adresse 35.185.44.232. Laut SiteAdvisor ist hesec.de sicher zu besuchen. |
Kauf-/Verkaufswert | Euro€1,102 |
Tägliche Werbeeinnahmen | Euro€22,591 |
Monatlicher Anzeigenumsatz | Euro€7,714 |
Jährliche Werbeeinnahmen | Euro€551 |
Tägliche eindeutige Besucher | 551 |
Hinweis: Alle Traffic- und Einnahmenwerte sind Schätzungen. |
Host | Type | TTL | Data |
hesec.de. | A | 150 | IP: 35.185.44.232 |
hesec.de. | AAAA | 150 | IPV6: 2a03:4000:4a:c90:: |
hesec.de. | NS | 150 | NS Record: docks01.rzone.de. |
hesec.de. | NS | 150 | NS Record: shades10.rzone.de. |
hesec.de. | MX | 150 | MX Record: 5 smtpin.rzone.de. |
[root@hesec.de] # about me impressum tags about me impressum tags Bug Bounty - Cross-site request forgery is a thing 2022-09-12 — 6 min read #bug-bounty #csrf #xss In this post I will explain when CSRF can be a serious issue. I will use an example for which I got promoted $2.400 as bounty. Read more → I hacked the german armed forces, and all I got … 2022-03-04 — 5 min read #offsec #vdp #cve #xss #sqli This blog post will describe my adventure with the german armed forces and how I earned more than just a lousy T-Shirt. Topic: Vulnerability Disclosure Policy - Deutsche Bundeswehr Read more → My journey to OSEP 2022-01-18 — 9 min read #offsec #certs This blog post will give an insight into the world of becoming an Offensive Security Experienced Penetration Tester as I have experienced it Read more → [Gophish] Sophisticated Setup 2021-03-10 — 10 min read #go #phishing #pentesting In this article I will show how you use Gophish , Caddy and Maddy with webhook to setup a complex phishing |
HTTP/1.1 301 Moved Permanently Content-Type: text/html; charset=utf-8 Location: https://hesec.de/ Permissions-Policy: interest-cohort=() Vary: Origin Date: Fri, 14 Oct 2022 08:33:46 GMT HTTP/2 200 cache-control: max-age=600 content-type: text/html; charset=utf-8 etag: "100330541d7bba35aa741e526bf0fe702339868e2252daa000a0895a4352bf3e" expires: Fri, 14 Oct 2022 08:43:47 UTC last-modified: Tue, 13 Sep 2022 11:22:54 GMT permissions-policy: interest-cohort=() vary: Origin content-length: 12356 date: Fri, 14 Oct 2022 08:33:47 GMT |