pentester.land
Open in
urlscan Pro
2606:4700:3031::681c:17ae
Public Scan
Submission: On May 06 via api from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on February 4th 2020. Valid for: 8 months.
This is the only time pentester.land was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2606:4700:303... 2606:4700:3031::681c:17ae | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 52.222.190.60 52.222.190.60 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:820::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2606:2800:234... 2606:2800:234:59:254c:406:2366:268c | 15133 (EDGECAST) (EDGECAST) | |
1 | 23.45.237.132 23.45.237.132 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
2 | 2a00:1450:400... 2a00:1450:4001:81b::200e | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:81f::2003 | 15169 (GOOGLE) (GOOGLE) | |
1 | 52.84.50.187 52.84.50.187 | 16509 (AMAZON-02) (AMAZON-02) | |
20 | 8 |
ASN16509 (AMAZON-02, US)
PTR: server-52-222-190-60.ham50.r.cloudfront.net
downloads.mailchimp.com |
ASN20940 (AKAMAI-ASN1, EU)
PTR: a23-45-237-132.deploy.static.akamaitechnologies.com
mc.us17.list-manage.com |
ASN15169 (GOOGLE, US)
www.google-analytics.com |
ASN16509 (AMAZON-02, US)
PTR: server-52-84-50-187.ham50.r.cloudfront.net
dtirydke3kdq7.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
mailchimp.com
downloads.mailchimp.com |
84 KB |
5 |
pentester.land
pentester.land |
217 KB |
2 |
google-analytics.com
www.google-analytics.com |
18 KB |
2 |
twitter.com
platform.twitter.com |
29 KB |
1 |
cloudfront.net
dtirydke3kdq7.cloudfront.net |
7 KB |
1 |
gstatic.com
fonts.gstatic.com |
13 KB |
1 |
list-manage.com
mc.us17.list-manage.com |
2 KB |
1 |
googleapis.com
fonts.googleapis.com |
496 B |
20 | 8 |
Domain | Requested by | |
---|---|---|
7 | downloads.mailchimp.com |
pentester.land
downloads.mailchimp.com |
5 | pentester.land |
pentester.land
|
2 | www.google-analytics.com |
pentester.land
|
2 | platform.twitter.com |
pentester.land
platform.twitter.com |
1 | dtirydke3kdq7.cloudfront.net |
pentester.land
|
1 | fonts.gstatic.com |
pentester.land
|
1 | mc.us17.list-manage.com |
downloads.mailchimp.com
|
1 | fonts.googleapis.com |
pentester.land
|
20 | 8 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-02-04 - 2020-10-09 |
8 months | crt.sh |
downloads.mailchimp.com Amazon |
2019-07-24 - 2020-08-24 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-04-07 - 2020-06-30 |
3 months | crt.sh |
*.twimg.com DigiCert SHA2 High Assurance Server CA |
2019-11-12 - 2020-11-18 |
a year | crt.sh |
wildcardsan.list-manage.com DigiCert SHA2 Secure Server CA |
2019-07-27 - 2020-10-25 |
a year | crt.sh |
*.google-analytics.com GTS CA 1O1 |
2020-04-15 - 2020-07-08 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-04-07 - 2020-06-30 |
3 months | crt.sh |
*.cloudfront.net DigiCert Global CA G2 |
2019-07-17 - 2020-07-05 |
a year | crt.sh |
This page contains 4 frames:
Primary Page:
https://pentester.land/newsletter/2020/05/05/the-5-hacking-newsletter-104.html
Frame ID: F1855533911E8A16593A2A39E8553F27
Requests: 15 HTTP requests in this frame
Frame:
https://platform.twitter.com/widgets/widget_iframe.c63890edc4243ee77048d507b181eeec.html?origin=https%3A%2F%2Fpentester.land
Frame ID: 388A38D1626B6ABF5A325C3E9E6DEB26
Requests: 1 HTTP requests in this frame
Frame:
https://downloads.mailchimp.com/css/signup-forms/popup/1.0/common.css
Frame ID: DC71FE97F7DA9FCB2373F4B76D3F60BF
Requests: 2 HTTP requests in this frame
Frame:
https://downloads.mailchimp.com/css/signup-forms/popup/1.0/common.css
Frame ID: 29BBBCA2D44EDA1DCA544992F7573271
Requests: 2 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Google Analytics (Analytics) Expand
Detected patterns
- script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Twitter (Widgets) Expand
Detected patterns
- script /\/\/platform\.twitter\.com\/widgets\.js/i
Page Statistics
171 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title: postMessage-tracker
Search URL Search Domain Scan URL
Title: semgrep
Search URL Search Domain Scan URL
Title: 1
Search URL Search Domain Scan URL
Title: 2
Search URL Search Domain Scan URL
Title: Piercing the Veal: Short Stories to Read with Friends
Search URL Search Domain Scan URL
Title: Finally! HOW TO solve the INTIGRITI Easter XSS challenge using only Chrome DEVTOOLS!
Search URL Search Domain Scan URL
Title: Mindset hacking with zseano - What am I thinking when I hack?
Search URL Search Domain Scan URL
Title: Mayonaise Talks About His Recon Workflow, How to Learn Different Topics, and How to Bug Bounty!
Search URL Search Domain Scan URL
Title: Mental Hacking 4 Better Bounties
Search URL Search Domain Scan URL
Title: Raising your web hacking/bug bounty hunting game
Search URL Search Domain Scan URL
Title: Bug Business #3 – Zseano’s notes on hacking & mentoring
Search URL Search Domain Scan URL
Title: Mobexler’s Mobile Application Penetration Testing Checklist
Search URL Search Domain Scan URL
Title: Daily-commonspeak2
Search URL Search Domain Scan URL
Title: Commonspeak2
Search URL Search Domain Scan URL
Title: Bounty Thursdays - Automation, xss challenge, Getallurls, Burp Suite 2020.4, Logger++, hacker101.com
Search URL Search Domain Scan URL
Title: Free Tools! How to Use Developer Tools and Javascript in Webapp Pentests
Search URL Search Domain Scan URL
Title: How Deep Link RCE is possible on Android applications
Search URL Search Domain Scan URL
Title: Switching To ZSH
Search URL Search Domain Scan URL
Title: Interview With A 15 Year Old Bug Bounty Hunter
Search URL Search Domain Scan URL
Title: Docker Security Failures
Search URL Search Domain Scan URL
Title: VbScrub tutorials
Search URL Search Domain Scan URL
Title: Darknet Diaries EP 64: The Athens Shadow Games
Search URL Search Domain Scan URL
Title: How I approach a bug bounty program with this #bugbounty methodology
Search URL Search Domain Scan URL
Title: Transcript
Search URL Search Domain Scan URL
Title: Security Now 764 - RPKI
Search URL Search Domain Scan URL
Title: Risky Business #581 – Chinese telcos under fire in USA, spy firms pitch COVID-19 surveillance
Search URL Search Domain Scan URL
Title: Hacked Off? 059. - Mike Jones: Anonymous, Suits, and Building Better Security
Search URL Search Domain Scan URL
Title: Security Weekly News #28 - 0 Day Extravaganza, Zoom Can’t Win, & Starbleed - Wrap Up
Search URL Search Domain Scan URL
Title: Security Weekly News #29 - Shade Ransomware, FBI Warnings, & SCADA Attacks
Search URL Search Domain Scan URL
Title: Application Security Weekly #105 - Nintendo Breach, NSA Advisory, & Security of IoMT
Search URL Search Domain Scan URL
Title: Paul’s Security Weekly #648 - iOS Mail Hijack, Hacking Satellites, & 0-Days for Days
Search URL Search Domain Scan URL
Title: Android App Reverse Engineering LIVE! - Part 1
Search URL Search Domain Scan URL
Title: GitHub Security Lab Today (23-Apr) 4-7PM PT
Search URL Search Domain Scan URL
Title: IDOR - what, where and how? - Vatika Mittal
Search URL Search Domain Scan URL
Title: Kubernetes Post-Exploit - Live Code Session
Search URL Search Domain Scan URL
Title: Q&A: Mental Health While Staying at Home
Search URL Search Domain Scan URL
Title: IoT Hacking 101 – Firmware Funhouse!
Search URL Search Domain Scan URL
Title: BSides Knoxville 2020 - Track 1 Live Stream
Search URL Search Domain Scan URL
Title: Track 2
Search URL Search Domain Scan URL
Title: Schedule
Search URL Search Domain Scan URL
Title: NSConclave 2020
Search URL Search Domain Scan URL
Title: SARCON 2020 - DAY 3 - SECARMY
Search URL Search Domain Scan URL
Title: HITB Lockdown
Search URL Search Domain Scan URL
Title: Slides
Search URL Search Domain Scan URL
Title: HellaConf 2020
Search URL Search Domain Scan URL
Title: Content Type Forcing – The XSS you may have missed.
Search URL Search Domain Scan URL
Title: So, you can read WEB-INF/web.xml. How can you escalate this issue?
Search URL Search Domain Scan URL
Title: Introducing Slacker: Monitoring subdomain additions in real time and automating directory scanning
Search URL Search Domain Scan URL
Title: Abusing docker.sock exposure
Search URL Search Domain Scan URL
Title: Remotely Host MSBuild Payloads
Search URL Search Domain Scan URL
Title: Staying Off the Land: A Threat Actor Methodology
Search URL Search Domain Scan URL
Title: Masquerading Windows processes like a DoubleAgent.
Search URL Search Domain Scan URL
Title: Let’s break into Payment Gateways
Search URL Search Domain Scan URL
Title: Subdomain Takeover via GitHub steps [ Point to IP Address ]
Search URL Search Domain Scan URL
Title: Subdomain Takeover via AWS Elastic Beanstalk with steps
Search URL Search Domain Scan URL
Title: How to hook Android Native methods with Frida (Noob Friendly)
Search URL Search Domain Scan URL
Title: Terminal Escape Injection
Search URL Search Domain Scan URL
Title: Privilege Escalation in Windows
Search URL Search Domain Scan URL
Title: Old Tricks Are Always Useful: Exploiting Arbitrary File Writes with Accessibility Tools
Search URL Search Domain Scan URL
Title: RCE on Windows from Linux Part 1: Impacket
Search URL Search Domain Scan URL
Title: Windows DLL Hijacking (Hopefully) Clarified
Search URL Search Domain Scan URL
Title: From directory deletion to SYSTEM shell
Search URL Search Domain Scan URL
Title: Exploiting JD bugs in crypto contexts to achieve RCE and tampering with Java applets
Search URL Search Domain Scan URL
Title: E-Learning Platforms Getting Schooled – Multiple Vulnerabilities in WordPress’ Most Popular Learning Management System Plugins
Search URL Search Domain Scan URL
Title: CVE-2020-0932: Remote Code Execution on Microsoft SharePoint Using TypeConverters
Search URL Search Domain Scan URL
Title: Exploiting GlobalProtect for Privilege Escalation, Part One: Windows
Search URL Search Domain Scan URL
Title: Stealing your SMS messages with iOS 0day
Search URL Search Domain Scan URL
Title: Exploiting Feedback Hub in Windows 10
Search URL Search Domain Scan URL
Title: Open the Gates! The (In)Security of Cloudless Smart Door Systems
Search URL Search Domain Scan URL
Title: Duplicated Vulnerabilities in WordPress Plugins
Search URL Search Domain Scan URL
Title: Arbitrary file read via the UploadsRewriter when moving and issue
Search URL Search Domain Scan URL
Title: Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams
Search URL Search Domain Scan URL
Title: Reflected XSS and sensitive data exposure, including payment details, on lioncityrentals.com.sg
Search URL Search Domain Scan URL
Title: Stealing the Trello token by abusing a cross-iframe XSS on the Butler Plugin
Search URL Search Domain Scan URL
Title: Researching Polymorphic Images for XSS on Google Scholar
Search URL Search Domain Scan URL
Title: Bitrix WAF bypass
Search URL Search Domain Scan URL
Title: [Bug Bounty Writeups] Exploiting SQL Injection Vulnerability
Search URL Search Domain Scan URL
Title: Indirect UXSS issue on a private Android target app
Search URL Search Domain Scan URL
Title: Account taken over in style !!!
Search URL Search Domain Scan URL
Title: github-secrets.py
Search URL Search Domain Scan URL
Title: SonarSearch
Search URL Search Domain Scan URL
Title: Introduction
Search URL Search Domain Scan URL
Title: VHosts Sieve
Search URL Search Domain Scan URL
Title: Enemies Of Symfony (EOS)
Search URL Search Domain Scan URL
Title: @apps3c’s ysoserial fork
Search URL Search Domain Scan URL
Title: download-networks.sh
Search URL Search Domain Scan URL
Title: Chrome Galvanizer
Search URL Search Domain Scan URL
Title: Introduction
Search URL Search Domain Scan URL
Title: CursedChrome
Search URL Search Domain Scan URL
Title: Trishul
Search URL Search Domain Scan URL
Title: APKEnum
Search URL Search Domain Scan URL
Title: Introduction
Search URL Search Domain Scan URL
Title: WebIDL
Search URL Search Domain Scan URL
Title: Nozaki
Search URL Search Domain Scan URL
Title: DevToolReader
Search URL Search Domain Scan URL
Title: Introduction
Search URL Search Domain Scan URL
Title: pwncat
Search URL Search Domain Scan URL
Title: SitRep
Search URL Search Domain Scan URL
Title: jbosswidlyfly_to_hashcat.py
Search URL Search Domain Scan URL
Title: AzureADLateralMovement
Search URL Search Domain Scan URL
Title: Introduction
Search URL Search Domain Scan URL
Title: Pivotnacci
Search URL Search Domain Scan URL
Title: Wifipumpkin3
Search URL Search Domain Scan URL
Title: @GochaOqradze’s Jaeles signatures
Search URL Search Domain Scan URL
Title: The XSS rat’s Youtube channel
Search URL Search Domain Scan URL
Title: Offensive Security Cheatsheet
Search URL Search Domain Scan URL
Title: The Extended AWS Security Ramp-Up Guide
Search URL Search Domain Scan URL
Title: Hunting for credentials and building a credential type reference catalog
Search URL Search Domain Scan URL
Title: Kusto Query Internals – Azure Sentinel Reference
Search URL Search Domain Scan URL
Title: Wireless Penetration Testing Cheat Sheet
Search URL Search Domain Scan URL
Title: Windows-Priviledge-Escalation-Resources
Search URL Search Domain Scan URL
Title: Active Directory Exploitation Cheat Sheet
Search URL Search Domain Scan URL
Title: Introducing BetaFast – NetSPI’s Vulnerable Thick Client
Search URL Search Domain Scan URL
Title: Damn Vulnerable WordPress
Search URL Search Domain Scan URL
Title: Writing a scanner to find reflected XSS vulnerabilities — Part 1
Search URL Search Domain Scan URL
Title: Part 2
Search URL Search Domain Scan URL
Title: Code
Search URL Search Domain Scan URL
Title: Working-As-Intended: RCE to IAM Privilege Escalation in GCP Cloud Build
Search URL Search Domain Scan URL
Title: What is old is new again: The Relay Attack
Search URL Search Domain Scan URL
Title: Kerberos Tickets on Linux Red Teams
Search URL Search Domain Scan URL
Title: SSSDKCMExtractor
Search URL Search Domain Scan URL
Title: Sharing a Logon Session a Little Too Much
Search URL Search Domain Scan URL
Title: Amazon’s new VDP
Search URL Search Domain Scan URL
Title: Hack Your Resumé Workshop @ #LevelUp0x06
Search URL Search Domain Scan URL
Title: Bug Bounty Q&A #4: How does Intigriti optimize bug bounty success?
Search URL Search Domain Scan URL
Title: Professional / Community 2020.4
Search URL Search Domain Scan URL
Title: Introducing YSoSerial.Net April 2020 Improvements
Search URL Search Domain Scan URL
Title: Microsoft: Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk
Search URL Search Domain Scan URL
Title: Top Attacks Against Financial Services Organizations 2017–2019
Search URL Search Domain Scan URL
Title: Kaspersky: RDP brute-force attacks have gone up since start of COVID-19
Search URL Search Domain Scan URL
Title: Android OEM patch rates have improved, with Nokia and Google leading the charge
Search URL Search Domain Scan URL
Title: We’re going on a vuln hunt. We’re going catch a big one: Researchers find Windows bugs dominate – but fixes are fast
Search URL Search Domain Scan URL
Title: What’s worse than an annoying internet filter? How about one with a pre-auth remote-command execution hole and there’s no patch?
Search URL Search Domain Scan URL
Title: Microsoft Teams accounts could be hijacked via malicious GIFs
Search URL Search Domain Scan URL
Title: TL;DR
Search URL Search Domain Scan URL
Title: Salt peppered with holes? Automation tool vulnerable to auth bypass: Patch now
Search URL Search Domain Scan URL
Title: “Zero-click” mobile phone attacks – and how to avoid them
Search URL Search Domain Scan URL
Title: In trying times like these, it’s reassuring to know you can still get pwned five different ways by Adobe Illustrator files
Search URL Search Domain Scan URL
Title: The 2020 URL Querystring Data Leaks — Millions of User Emails Leaking from Popular Websites to Advertising & Analytics Companies
Search URL Search Domain Scan URL
Title: Sophos XG Firewall zero-day vulnerability gets patched
Search URL Search Domain Scan URL
Title: CVE-2020-12271: Sophos XG Firewall Pre-Auth SQL Injection Vulnerability Remediation Guidance and Exposure Overview
Search URL Search Domain Scan URL
Title: GDPR.EU has er… a data leakage issue
Search URL Search Domain Scan URL
Title: Sophisticated Android Spyware Attack Spreads via Google Play
Search URL Search Domain Scan URL
Title: This new Android mobile malware targets banks, financial services across Europe
Search URL Search Domain Scan URL
Title: Lucy malware for Android adds file-encryption for ransomware ops
Search URL Search Domain Scan URL
Title: PerSwaysion Campaign - Playbook of Microsoft Document Sharing-Based Phishing Attack
Search URL Search Domain Scan URL
Title: Twitter turns off SMS-based tweeting in most countries
Search URL Search Domain Scan URL
Title: ICANN has voted to REJECT the sale of the .ORG registry to private equity firm Ethos Capital
Search URL Search Domain Scan URL
Title: Shade (Troldesh) ransomware shuts down and releases decryption keys
Search URL Search Domain Scan URL
Title: Here’s the NSA’s guide for choosing a safe text chat and video conferencing service
Search URL Search Domain Scan URL
Title: Facebook-NSO lawsuit: Hundreds of WhatsApp attacks linked to one IP address
Search URL Search Domain Scan URL
Title: NSO Employee Abused Phone Hacking Tech to Target a Love Interest
Search URL Search Domain Scan URL
Title: Cybersecurity professionals being sidetracked by coronavirus home-working drive
Search URL Search Domain Scan URL
Title: Microsoft warns of malware surprise pushed via pirated movies
Search URL Search Domain Scan URL
Title: Malicious advertising slingers up the ante during Covid-19 pandemic
Search URL Search Domain Scan URL
Title: Split opens up in Europe on privacy control for Covid-19 contact-tracing apps
Search URL Search Domain Scan URL
Title: Australian contact-tracing app leaks telling info and increases chances of third-party tracking, say security folks
Search URL Search Domain Scan URL
Title: YESWEHACK PROPHILE ON HISXO
Search URL Search Domain Scan URL
Title: Honeysploit: Exploiting the Exploiters
Search URL Search Domain Scan URL
Title: Payment Card Industry (PCI) – Recurring Requirements Require Attention!
Search URL Search Domain Scan URL
Title: The Duality of Attackers - Or Why Bad Guys are a Good Thing™
Search URL Search Domain Scan URL
Title: Why Cloud Is Impossible without Open Source
Search URL Search Domain Scan URL
Title: A game changer technology - Quantum Security Series - Part 1
Search URL Search Domain Scan URL
Title: InfoSec questions
Search URL Search Domain Scan URL
Title: Tweets from 04/24/2020 to 05/01/2020
Search URL Search Domain Scan URL
Title: Intigriti
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
the-5-hacking-newsletter-104.html
pentester.land/newsletter/2020/05/05/ |
51 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
embed.js
downloads.mailchimp.com/js/signup-forms/popup/ |
126 KB 46 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
pentester.land/assets/css/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
843 B 496 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
pentester.land/assets/img/ |
29 KB 30 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
T5HN104.png
pentester.land/assets/img/newsletters/ |
166 KB 166 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
email-decode.min.js
pentester.land/cdn-cgi/scripts/5c5dd728/cloudflare-static/ |
1 KB 881 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
widgets.js
platform.twitter.com/ |
96 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
form-settings
mc.us17.list-manage.com/subscribe/ |
1 KB 2 KB |
Script
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics.js
www.google-analytics.com/ |
44 KB 18 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
zOL64pLDlL1D99S8g8PtiKchq-dmjcDidBc.woff2
fonts.gstatic.com/s/abrilfatface/v11/ |
13 KB 13 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hootlet.js
dtirydke3kdq7.cloudfront.net/ |
6 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
collect
www.google-analytics.com/r/ |
35 B 101 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
widget_iframe.c63890edc4243ee77048d507b181eeec.html
platform.twitter.com/widgets/ Frame 388A |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popup.js
downloads.mailchimp.com/js/signup-forms/popup/1.0/ |
96 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.css
downloads.mailchimp.com/css/signup-forms/popup/1.0/ Frame DC71 |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
banner.css
downloads.mailchimp.com/css/signup-forms/popup/1.0/ Frame DC71 |
708 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.css
downloads.mailchimp.com/css/signup-forms/popup/1.0/ Frame 29BB |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
layout-1.css
downloads.mailchimp.com/css/signup-forms/popup/1.0/ Frame 29BB |
597 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
modal-slidein.css
downloads.mailchimp.com/css/signup-forms/popup/1.0/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
23 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| define function| require object| dojo object| dijit object| dojox object| dojo_request_script_callbacks string| GoogleAnalyticsObject function| ga object| _hs object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| __twttrll object| twttr object| __twttr function| disqus_config function| loadDisqusComments function| SignupForm function| PopupSignupForm object| parts4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.pentester.land/ | Name: _gat Value: 1 |
|
.pentester.land/ | Name: _gid Value: GA1.2.181641508.1588749981 |
|
.pentester.land/ | Name: _ga Value: GA1.2.1820749127.1588749981 |
|
.pentester.land/ | Name: __cfduid Value: d9d678f679ab8ebf91f9c83f5a6d7926d1588749979 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
downloads.mailchimp.com
dtirydke3kdq7.cloudfront.net
fonts.googleapis.com
fonts.gstatic.com
mc.us17.list-manage.com
pentester.land
platform.twitter.com
www.google-analytics.com
23.45.237.132
2606:2800:234:59:254c:406:2366:268c
2606:4700:3031::681c:17ae
2a00:1450:4001:81b::200e
2a00:1450:4001:81f::2003
2a00:1450:4001:820::200a
52.222.190.60
52.84.50.187
040b7a66d0cc5ae40aa826e3a235d80c52968ee1cf1271faede03c53898a020f
07442f2bc9e417e7e700d142493b5564d926d3b28a365632e87f9e0a1c992b70
08cfed105d43f975eb03e61592398a2a97ce05554d919e1ebc5824faf62ce229
135bbc21db8d6d09243eeacaf8a59f0e31ef9dc61a76fb41e8849d42f39733a8
14c9a7dc9bccb4c05355faa624889b917c27c8676d0c34a59f7d2d785add5667
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
36c5f7607d984907e699860f94d6e0265ea8bf51269b9adc12d1ce63aa8b9e8b
4a93d3441e3e49fbd3d35c948e980e1e315eece84ef1be03b8cd47487beb2989
57e824b7c5aa9de70da2c2e2d7a9864204ab094d8556909518a46e53e68299fb
6e1c2a610d019d17bcebd21ba285668e83901f9a5e4e90bab23a6540d18a19d4
7c21826d1cb5d2a8d57fd6ac5a83f222e3c04c579cbc155618cc481cb3ce6ae6
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
bc16a569b4e42d18b8d4221182b071c2961debbd2cd86e13084362862d1c04db
ca738afb7895f8698d7c725cb1a084e589489a1efa8981f7fe778dbcacfb07b2
cbe964e2fb6abb968864de34357dd96c6a7ebdeb6c591bd1dc5a179e1f5b2284
d846be9502c36e791fb7ad212e76ce3fe7de64226de5898d8c13c6ca9b25b437
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
f4eeb4ceea453fd7c1e54e6990325e6f6659219ba99debdf1d0fe69a14e6851d