Used Maltego CE to run an investigation on findingassange.com domain. Here's the topology it spit back out to me:
Part 1 -
https://sli.mg/Z1bHvz.png
Part 2 -
https://sli.mg/Ujaxwy.png
This is where I need some help and opinions : wildcard-in-use.findingassange.com
Weird looking website really, and the IP block is originating from somewhere else than the original URL findingassange.com.
Also weird privacy statement with no contact info and product reference : http://wildcard-in-use.findingassange.com/privacy
The IP for wildcard-in-use.findingassange.com linked to these two entities:
Bodis : https://bodis.com/ --> domain parking
Prolexic Technologies : https://en.wikipedia.org/wiki/Prolexic_Technologies --> DDoS mitigation and IT security services
The IP for findingassange.com linked to these two different entities:
WILDCARD-AS --> cant find shit on this
I Fast Net LTD : https://ifastnet.com/ --> hosting
Also, ftp.findingassange.com prompts for username password, if anyone wants to try to work their way in.
I'll keep digging, but to me, it looks weird, and I need opinions about this! Upvoat for visibility!!!
view the rest of the comments →
belphegorsprime ago
So, let me get this straight. These guys have the operational security to handle what might be the biggest leak the world has ever seen, but can't be bothered to get a cert, and use port 443?
This smells like LARPing. We shall see, I suppose.