Submitted URL: https://protect.checkpoint.com/v2/r02/___https://e.customeriomail.com/jdhdjDOqg1KugKcu4HN*~*NrWs0JxCZ00JVZuDgoisW6t6QYWHV0uT016...
Effective URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&...
Submission: On November 23 via api from RU — Scanned from DE

Summary

This website contacted 27 IPs in 3 countries across 21 domains to perform 60 HTTP transactions. The main IP is 2606:4700:10::6816:36e4, located in United States and belongs to CLOUDFLARENET, US. The main domain is tryhackme.com. The Cisco Umbrella rank of the primary domain is 154182.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on July 12th 2024. Valid for: 6 months.
This is the only time tryhackme.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 2600:9000:20e... 16509 (AMAZON-02)
1 1 35.227.225.220 396982 (GOOGLE-CL...)
1 19 2606:4700:10:... 13335 (CLOUDFLAR...)
3 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700:440... 13335 (CLOUDFLAR...)
2 2600:9000:21f... 16509 (AMAZON-02)
1 18.172.112.94 16509 (AMAZON-02)
1 34.120.62.213 396982 (GOOGLE-CL...)
1 13.32.27.21 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 13.33.187.92 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a02:26f0:350... 20940 (AKAMAI-AS...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 8 2606:4700:10:... 13335 (CLOUDFLAR...)
7 2a00:1450:400... 15169 (GOOGLE)
1 2600:9000:276... 16509 (AMAZON-02)
1 2606:4700:440... 13335 (CLOUDFLAR...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 3 2620:1ec:21::14 8068 (MICROSOFT...)
1 13.107.42.14 8068 (MICROSOFT...)
1 2001:4860:480... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2 2606:4700:20:... 13335 (CLOUDFLAR...)
1 34.120.129.162 396982 (GOOGLE-CL...)
2 54.212.172.172 16509 (AMAZON-02)
60 27
Apex Domain
Subdomains
Transfer
28 tryhackme.com
tryhackme.com — Cisco Umbrella Rank: 154182
blog.tryhackme.com
assets.tryhackme.com — Cisco Umbrella Rank: 327536
2 MB
7 gstatic.com
fonts.gstatic.com
150 KB
4 linkedin.com
px.ads.linkedin.com — Cisco Umbrella Rank: 333
px4.ads.linkedin.com — Cisco Umbrella Rank: 7032
3 KB
3 amplitude.com
cdn.amplitude.com — Cisco Umbrella Rank: 3096
api2.amplitude.com — Cisco Umbrella Rank: 1129
36 KB
3 customer.io
assets.customer.io — Cisco Umbrella Rank: 18083
track-eu.customer.io — Cisco Umbrella Rank: 78322
5 KB
3 googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 29
3 KB
2 gist.build
code.gist.build — Cisco Umbrella Rank: 15329
16 KB
2 googletagmanager.com
googletagmanager.com — Cisco Umbrella Rank: 37
www.googletagmanager.com — Cisco Umbrella Rank: 39
195 KB
2 hotjar.com
static.hotjar.com — Cisco Umbrella Rank: 888
script.hotjar.com — Cisco Umbrella Rank: 1185
61 KB
1 hubspot.com
track.hubspot.com — Cisco Umbrella Rank: 2477
1 KB
1 google.de
www.google.de — Cisco Umbrella Rank: 10745
63 B
1 doubleclick.net
stats.g.doubleclick.net — Cisco Umbrella Rank: 135
552 B
1 google.com
region1.analytics.google.com — Cisco Umbrella Rank: 4108
552 B
1 hs-analytics.net
js.hs-analytics.net — Cisco Umbrella Rank: 2358
25 KB
1 hs-banner.com
js.hs-banner.com — Cisco Umbrella Rank: 2343
26 KB
1 hs-scripts.com
js.hs-scripts.com — Cisco Umbrella Rank: 2580
908 B
1 licdn.com
snap.licdn.com — Cisco Umbrella Rank: 831
14 KB
1 sentry.io
o4507096022450176.ingest.de.sentry.io — Cisco Umbrella Rank: 457655
300 B
1 fontawesome.com
pro.fontawesome.com — Cisco Umbrella Rank: 5846
32 KB
1 customeriomail.com
e.customeriomail.com — Cisco Umbrella Rank: 69139
239 B
1 checkpoint.com
protect.checkpoint.com — Cisco Umbrella Rank: 64337
684 B
60 21
Domain Requested by
14 tryhackme.com 1 redirects tryhackme.com
13 blog.tryhackme.com 2 redirects tryhackme.com
7 fonts.gstatic.com fonts.googleapis.com
3 px.ads.linkedin.com 1 redirects tryhackme.com
3 fonts.googleapis.com tryhackme.com
2 api2.amplitude.com tryhackme.com
2 code.gist.build 1 redirects
2 assets.customer.io tryhackme.com
assets.customer.io
1 track-eu.customer.io
1 track.hubspot.com
1 www.google.de tryhackme.com
1 stats.g.doubleclick.net www.googletagmanager.com
1 region1.analytics.google.com tryhackme.com
1 px4.ads.linkedin.com tryhackme.com
1 js.hs-analytics.net js.hs-scripts.com
1 js.hs-banner.com js.hs-scripts.com
1 assets.tryhackme.com tryhackme.com
1 js.hs-scripts.com googletagmanager.com
1 snap.licdn.com googletagmanager.com
1 www.googletagmanager.com googletagmanager.com
1 script.hotjar.com static.hotjar.com
1 googletagmanager.com tryhackme.com
1 static.hotjar.com tryhackme.com
1 o4507096022450176.ingest.de.sentry.io tryhackme.com
1 cdn.amplitude.com tryhackme.com
1 pro.fontawesome.com tryhackme.com
1 e.customeriomail.com 1 redirects
1 protect.checkpoint.com 1 redirects
60 28
Subject Issuer Validity Valid
tryhackme.com
Cloudflare Inc ECC CA-3
2024-07-12 -
2024-12-31
6 months crt.sh
upload.video.google.com
WR2
2024-10-21 -
2025-01-13
3 months crt.sh
*.fontawesome.com
DigiCert Global G2 TLS RSA SHA256 2020 CA1
2024-07-30 -
2025-01-27
6 months crt.sh
*.customer.io
Amazon RSA 2048 M02
2024-09-17 -
2025-10-14
a year crt.sh
cdn.amplitude.com
Amazon RSA 2048 M03
2024-11-14 -
2025-12-13
a year crt.sh
ingest.de.sentry.io
DigiCert Global G2 TLS RSA SHA256 2020 CA1
2024-07-03 -
2025-08-03
a year crt.sh
*.hotjar.com
Amazon RSA 2048 M03
2024-05-22 -
2025-06-20
a year crt.sh
*.google-analytics.com
WR2
2024-10-21 -
2025-01-13
3 months crt.sh
snap.licdn.com
DigiCert SHA2 Secure Server CA
2023-12-13 -
2024-12-12
a year crt.sh
hs-scripts.com
WE1
2024-09-26 -
2024-12-25
3 months crt.sh
*.gstatic.com
WR2
2024-10-21 -
2025-01-13
3 months crt.sh
assets.tryhackme.com
Amazon RSA 2048 M03
2024-01-28 -
2025-02-25
a year crt.sh
hs-banner.com
WE1
2024-11-22 -
2025-02-20
3 months crt.sh
hs-analytics.net
WE1
2024-10-07 -
2025-01-05
3 months crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2024-10-14 -
2025-04-14
6 months crt.sh
*.g.doubleclick.net
WR2
2024-10-21 -
2025-01-13
3 months crt.sh
*.google.de
WR2
2024-10-21 -
2025-01-13
3 months crt.sh
hubspot.com
WE1
2024-10-03 -
2025-01-01
3 months crt.sh
track-eu.customer.io
WR3
2024-11-12 -
2025-02-10
3 months crt.sh
*.amplitude.com
COMODO RSA Domain Validation Secure Server CA
2024-01-31 -
2025-03-02
a year crt.sh

This page contains 2 frames:

Primary Page: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Frame ID: BC140CFDA38FF1E5CF96326C2B9B753C
Requests: 54 HTTP requests in this frame

Frame: https://tryhackme.com/cdn-cgi/challenge-platform/h/g/scripts/jsd/e4025c85ea63/main.js
Frame ID: 3A063DD247A6E256D171B7F79B899689
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

TryHackMe | Top 5 Web Application Security Vulnerabilities

Page URL History Show full URLs

  1. https://protect.checkpoint.com/v2/r02/___https://e.customeriomail.com/jdhdjDOqg1KugKcu4HN*~*NrWs0JxCZ00JVZu... HTTP 302
    https://e.customeriomail.com/e/c/eyJlbWFpbF9pZCI6ImRnVEsxUVVEQUpybjdnR1o1LTRCQVpOVW1sejVtZjVzX241V25rTHBY... HTTP 302
    https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=c... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • cdn\.amplitude\.com

Overall confidence: 100%
Detected patterns
  • (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)

Overall confidence: 100%
Detected patterns

Overall confidence: 100%
Detected patterns
  • googletagmanager\.com/gtm\.js
  • googletagmanager\.com/gtag/js

Overall confidence: 100%
Detected patterns
  • //static\.hotjar\.com/

Overall confidence: 100%
Detected patterns
  • js\.hs-analytics\.net/analytics

Overall confidence: 100%
Detected patterns
  • snap\.licdn\.com/li\.lms-analytics/insight\.min\.js

Page Statistics

60
Requests

90 %
HTTPS

71 %
IPv6

21
Domains

28
Subdomains

27
IPs

3
Countries

2511 kB
Transfer

6590 kB
Size

19
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://protect.checkpoint.com/v2/r02/___https://e.customeriomail.com/jdhdjDOqg1KugKcu4HN*~*NrWs0JxCZ00JVZuDgoisW6t6QYWHV0uT016xjo0y4o0E279607/wYMG3iE5cNnBnfMOq4nN*~*Nrm5iMGETnbAiMO/fLKof76qQrSAgXcDQ8Oqh7c6hrSqhDcngLcsQ8WAhH56Q2iq3n6mhMGxf1SmiLqAgn6E41S6hrq5jX67i1Cz42Om3rqxf2Wu42R_i2Wy28SAi2Oo4Y6of1chiYFBRo46iL6kg10pf20yU10y31qx2MZBRIN7i2Wy27Smg2Gmf1izU1O/iL0kf1/5RoOzg83nQHOugsWqhr/mgHN*~*NrSm4IZBSYlDRIKnTY3DT1KqS70qRIJnQHOxf1/w27qpNotCSYZCR85djb9*~*/a7g9bhcb7865jb5j6i5aj/h9k98gbckf*~2*ff7ia5jj76*~*b8fc8kbhabh*~*6b___.YzJlOnB1cmF0b3NudjIzOmM6bzozYmY0ODQxODEzZTAyYWI1OTA1OTNiOTJhMTc1ZTE5Yzo3OjVlYjM6NmRmM2RjZjJjZTVmZWY2Njg2N2U1OTNlYTQwYTgwNjEwZDIxNWI0NDJhZmIyYjIyZTdkZTU1N2E3NWM2OTZlMTpoOlQ6VA HTTP 302
    https://e.customeriomail.com/e/c/eyJlbWFpbF9pZCI6ImRnVEsxUVVEQUpybjdnR1o1LTRCQVpOVW1sejVtZjVzX241V25rTHBYdz09IiwiaHJlZiI6Imh0dHBzOi8vdHJ5aGFja21lLmNvbS9yL3Jlc291cmNlcy9ibG9nL3RvcC01LXdlYi1hcHBsaWNhdGlvbi1zZWN1cml0eS12dWxuZXJhYmlsaXRpZXM_dXRtX3NvdXJjZT1jaW9cdTAwMjZ1dG1fbWVkaXVtPWVtYWlsXHUwMDI2dXRtX2NhbXBhaWduPWJ5dGVfaW50MjJub3YiLCJpbnRlcm5hbCI6ImNhZDUwNTgyMDFiOTYyOWFlN2VlMDEiLCJsaW5rX2lkIjoxNTUxM30/e846572b48c982310e80e1d07e5c4f43b89fa66aa2d70ee21683a93f8c78c618 HTTP 302
    https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 13
  • https://tryhackme.com/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
  • https://tryhackme.com/cdn-cgi/challenge-platform/h/g/scripts/jsd/e4025c85ea63/main.js
Request Chain 33
  • https://blog.tryhackme.com/ghost/api/content/posts/slug/top-5-web-application-security-vulnerabilities?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&key=a0ed05fe5ffc034e42ec78f0fb HTTP 301
  • https://blog.tryhackme.com/ghost/api/content/posts/slug/top-5-web-application-security-vulnerabilities/?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&key=a0ed05fe5ffc034e42ec78f0fb
Request Chain 34
  • https://blog.tryhackme.com/ghost/api/content/posts?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&limit=4&key=a0ed05fe5ffc034e42ec78f0fb HTTP 301
  • https://blog.tryhackme.com/ghost/api/content/posts/?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&limit=4&key=a0ed05fe5ffc034e42ec78f0fb
Request Chain 40
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=7863281&time=1732384466267&url=https%3A%2F%2Ftryhackme.com%2Fr%2Fresources%2Fblog%2Ftop-5-web-application-security-vulnerabilities%3Futm_source%3Dcio%26utm_medium%3Demail%26utm_campaign%3Dbyte_int22nov&tm=gtmv2 HTTP 302
  • https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=7863281&time=1732384466267&url=https%3A%2F%2Ftryhackme.com%2Fr%2Fresources%2Fblog%2Ftop-5-web-application-security-vulnerabilities%3Futm_source%3Dcio%26utm_medium%3Demail%26utm_campaign%3Dbyte_int22nov&tm=gtmv2&e_ipv6=AQISsYa95Pir5gAAAZNaKSXBpYSDMz3TJdditTuoZm2rSf-1uHly29K2N5yVO9kd_ehSdCvw880F466T5ngiUIN1jBRzmQ
Request Chain 57
  • https://code.gist.build/web/latest/gist.min.js HTTP 302
  • https://code.gist.build/web/3.12.0/gist.min.js

60 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request top-5-web-application-security-vulnerabilities
tryhackme.com/r/resources/blog/
Redirect Chain
  • https://protect.checkpoint.com/v2/r02/___https://e.customeriomail.com/jdhdjDOqg1KugKcu4HN*~*NrWs0JxCZ00JVZuDgoisW6t6QYWHV0uT016xjo0y4o0E279607/wYMG3iE5cNnBnfMOq4nN*~*Nrm5iMGETnbAiMO/fLKof76qQrSAgXc...
  • https://e.customeriomail.com/e/c/eyJlbWFpbF9pZCI6ImRnVEsxUVVEQUpybjdnR1o1LTRCQVpOVW1sejVtZjVzX241V25rTHBYdz09IiwiaHJlZiI6Imh0dHBzOi8vdHJ5aGFja21lLmNvbS9yL3Jlc291cmNlcy9ibG9nL3RvcC01LXdlYi1hcHBsaWNh...
  • https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
3 KB
2 KB
Document
General
Full URL
https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
366a63af8a739aec884889a88ed8a43062d6f858581d48c82d4e17f83a3cc5f3

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

cache-control
max-age=0
cf-cache-status
DYNAMIC
cf-ray
8e73063bcf92d278-FRA
content-encoding
br
content-type
text/html
date
Sat, 23 Nov 2024 17:54:25 GMT
last-modified
Fri, 22 Nov 2024 15:20:17 GMT
server
cloudflare
vary
Accept-Encoding
x-amz-id-2
jLE53s1etFItiiwySUOdYpVmsALrITrB4r0qkFkrY2U8v80EW++rIlTypr9bQy6zFdKLuCPm63g=
x-amz-request-id
FFTEJKVPC375JBXB

Redirect headers

access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
cache-control
no-cache, no-store, must-revalidate, max-age=0
content-length
0
date
Sat, 23 Nov 2024 17:54:25 GMT
location
https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
via
1.1 google
css2
fonts.googleapis.com/
14 KB
965 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css2?family=Ubuntu:ital,wght@0,300;0,400;0,500;0,700;1,400;1,500;1,700&display=swap
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
341b23ac79da6497f896873d14b060ca3bf7a659855099a71fdfa2f6383f2f6e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

content-encoding
gzip
x-content-type-options
nosniff
expires
Sat, 23 Nov 2024 17:54:25 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Sat, 23 Nov 2024 17:54:25 GMT
content-type
text/css; charset=utf-8
vary
Sec-Fetch-Dest, Sec-Fetch-Mode, Sec-Fetch-Site
last-modified
Sat, 23 Nov 2024 17:54:25 GMT
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
cross-origin-opener-policy
same-origin-allow-popups
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
x-xss-protection
0
server
ESF
css2
fonts.googleapis.com/
31 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css2?family=Source+Sans+Pro:ital,wght@0,200;0,300;0,400;0,600;0,700;0,900;1,400&family=Ubuntu:ital,wght@0,300;0,400;0,500;0,700;1,400;1,500;1,700&display=swap
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
0a8507c5d1ffffeb69a7927cbfe6be0b44bbd70ef7788e1e0d8dae6a18e714b9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

content-encoding
gzip
x-content-type-options
nosniff
expires
Sat, 23 Nov 2024 17:54:25 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Sat, 23 Nov 2024 17:54:25 GMT
content-type
text/css; charset=utf-8
vary
Sec-Fetch-Dest, Sec-Fetch-Mode, Sec-Fetch-Site
last-modified
Sat, 23 Nov 2024 17:54:25 GMT
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
cross-origin-opener-policy
same-origin-allow-popups
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
x-xss-protection
0
server
ESF
css2
fonts.googleapis.com/
1 KB
928 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css2?family=Bungee&display=swap
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
89f6ec4470abd7be7c1442195e0c871bd2dcc456eecc9c86a809a40aa04a7a7e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

content-encoding
gzip
x-content-type-options
nosniff
expires
Sat, 23 Nov 2024 17:54:25 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Sat, 23 Nov 2024 17:54:25 GMT
content-type
text/css; charset=utf-8
vary
Sec-Fetch-Dest, Sec-Fetch-Mode, Sec-Fetch-Site
last-modified
Sat, 23 Nov 2024 16:22:04 GMT
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
cross-origin-opener-policy
same-origin-allow-popups
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
x-xss-protection
0
server
ESF
all.css
pro.fontawesome.com/releases/v5.12.0/css/
167 KB
32 KB
Stylesheet
General
Full URL
https://pro.fontawesome.com/releases/v5.12.0/css/all.css
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:4400::ac40:93bc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a34e129ed3df3b2296abf74f041f034510a11a31b3243803164b86ffe83855d7

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

cache-control
max-age=31556926
content-encoding
gzip
cf-cache-status
HIT
etag
W/"81b2e00ad71a15f478a9def1e55ca743"
age
1607078
x-amz-request-id
GCQ5YBS9T5W69BJ8
cf-ray
8e73063d0ddb4d8d-FRA
date
Sat, 23 Nov 2024 17:54:25 GMT
content-type
text/css
last-modified
Mon, 28 Jun 2021 17:05:57 GMT
vary
Accept-Encoding
server
cloudflare
x-amz-id-2
JDuDKO1kygCRJhUt8j5DFNNhEfnyuuwCtxMccRRf+y1MuqALadrMUWwvoytPDRrBOnvjiFu65CLnsE9YhWia+EXYAZ3XJvxu
main.5aa785c0.js
tryhackme.com/r/static/js/
4 MB
1 MB
Script
General
Full URL
https://tryhackme.com/r/static/js/main.5aa785c0.js
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8e905484948e9da6a9fe8e4469f2d2d4fdaf276c8cd21ba601c5f9949a73e492

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov

Response headers

cache-control
max-age=14400
content-encoding
br
cf-cache-status
HIT
etag
W/"601ca5f6feca0bd56da676ac3274ce37"
age
1682
cf-ray
8e73063d5c50d278-FRA
x-amz-request-id
SV6TH94ADGNX9F3H
date
Sat, 23 Nov 2024 17:54:25 GMT
content-type
application/javascript
last-modified
Fri, 22 Nov 2024 15:20:21 GMT
vary
Accept-Encoding
server
cloudflare
x-amz-id-2
rUz8l37K9DjF1QX0YmXUhQLw4SziDHidRjbIbiBbmaMMTUmpbY6/Ni9A1yHbpFYcwoOd3ktPRZPxLkVcOX+c6FW9IVG84AkwGTWOfO/JWbU=
main.b7b34309.css
tryhackme.com/r/static/css/
35 KB
6 KB
Stylesheet
General
Full URL
https://tryhackme.com/r/static/css/main.b7b34309.css
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e74ff25680c732b555d4ce3ff504d6b1b52bcc3299f8729e448a4ae297a49890

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov

Response headers

cache-control
max-age=14400
content-encoding
br
cf-cache-status
HIT
etag
W/"4935d55a56800e60097ab27dc061dbf1"
age
354
cf-ray
8e73063ca9e2d278-FRA
x-amz-request-id
MV9RCMBPYNN9CEJY
date
Sat, 23 Nov 2024 17:54:25 GMT
content-type
text/css
last-modified
Thu, 07 Nov 2024 16:41:28 GMT
vary
Accept-Encoding
server
cloudflare
x-amz-id-2
VyXWv/nqSxxUyTffzlmtH43cvdjAEiKu4v5FSgH4ParxZVg38v30nyhgZcBecTkiaHKwsyUY+3Y=
track-eu.js
assets.customer.io/assets/
7 KB
3 KB
Script
General
Full URL
https://assets.customer.io/assets/track-eu.js
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:21f3:ce00:11:9cfd:9400:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a7522401622d57760fd44e914b7a54c641d5c4356aae91c35bdc2ed0ef11f1f0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

vary
accept-encoding, Origin
content-encoding
gzip
etag
W/"c73f650511262844608d2b9ed259c082"
x-amz-version-id
jUxUt_qUdX36U5sWuXWqnMcR930RxMa.
age
57038
cross-origin-resource-policy
cross-origin
via
1.1 286eb4b50e0acf373dd03645aee00b7e.cloudfront.net (CloudFront)
x-cache
Hit from cloudfront
x-amz-cf-id
aKxfzekQTIp-UpXf9t1JrgFuzdHl662OO2muH2pGYtJDoapbgGdrXQ==
date
Sat, 23 Nov 2024 03:43:57 GMT
content-type
application/javascript
last-modified
Mon, 15 Apr 2024 20:40:42 GMT
server
AmazonS3
x-amz-cf-pop
FRA2-C2
x-amz-server-side-encryption
AES256
csrf
tryhackme.com/api/v2/auth/
76 B
568 B
Fetch
General
Full URL
https://tryhackme.com/api/v2/auth/csrf
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/static/js/main.5aa785c0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
3aec6e4c6c294ab7fcbab0a3511404507e925ff8327a137334e4818253376c5f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov

Response headers

x-robots-tag
noindex
content-encoding
br
cf-cache-status
DYNAMIC
etag
W/"4c-vyod2Y3BOmase1iNWpoXlaE4EgI"
cf-ray
8e73063fcb29d278-FRA
date
Sat, 23 Nov 2024 17:54:25 GMT
content-type
application/json; charset=utf-8
x-powered-by
Express
vary
Accept-Encoding
server
cloudflare
532.652c71b4.chunk.js
tryhackme.com/r/static/js/
90 KB
28 KB
Script
General
Full URL
https://tryhackme.com/r/static/js/532.652c71b4.chunk.js
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/static/js/main.5aa785c0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
006242f479974a276af243a95a03752711430fc45feae84b5fab5137e362f710

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov

Response headers

cache-control
max-age=14400
content-encoding
br
cf-cache-status
HIT
etag
W/"ef16302f44b642aafb435e60b8a05015"
age
1653
cf-ray
8e7306400bd4d278-FRA
x-amz-request-id
Y5WY5N0HKJBNMECY
date
Sat, 23 Nov 2024 17:54:25 GMT
content-type
application/javascript
last-modified
Fri, 22 Nov 2024 15:20:19 GMT
vary
Accept-Encoding
server
cloudflare
x-amz-id-2
vBrJYaO1gS2L1ZRMWWdNu39h5NHVpDjZncRVNfMhhKUqHmhJH0PEIdO6YJKsufIF0i2xUkYS4KQ=
analytics-browser-2.11.9-min.js.gz
cdn.amplitude.com/libs/
126 KB
36 KB
Fetch
General
Full URL
https://cdn.amplitude.com/libs/analytics-browser-2.11.9-min.js.gz
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/static/js/main.5aa785c0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.172.112.94 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-172-112-94.fra60.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
530acfbd2e2ec0c5f663c6d6519f175ee6d3fb3beec49d828e47facddde21236

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

access-control-max-age
3000
content-encoding
gzip
etag
"fe2060a35bce44d9405ef6b0a68aea65"
x-amz-version-id
18gPn9ysmKDVT94.laZC9PQpJqQREbpu
age
152923
access-control-allow-methods
GET, HEAD
x-cache
Hit from cloudfront
x-amz-cf-id
BxvojakGOYr_tj-Bn4s2jyjv5KKmKJd7v1UokIAhIUbJY2mr7Kbz7Q==
date
Thu, 21 Nov 2024 23:25:42 GMT
content-type
application/javascript
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
last-modified
Tue, 05 Nov 2024 23:39:14 GMT
cache-control
max-age=31536000
via
1.1 df64c46f895e81567061da0488368914.cloudfront.net (CloudFront)
accept-ranges
bytes
access-control-allow-origin
*
content-length
35778
x-amz-cf-pop
FRA60-P8
server
AmazonS3
x-amz-server-side-encryption
AES256
/
o4507096022450176.ingest.de.sentry.io/api/4507096429756496/envelope/
2 B
300 B
Fetch
General
Full URL
https://o4507096022450176.ingest.de.sentry.io/api/4507096429756496/envelope/?sentry_key=175180b5f191796714d2f9138c06c76a&sentry_version=7&sentry_client=sentry.javascript.react%2F7.110.1
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/static/js/main.5aa785c0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.120.62.213 Kansas City, United States, ASN396982 (GOOGLE-CLOUD-PLATFORM, US),
Reverse DNS
213.62.120.34.bc.googleusercontent.com
Software
nginx /
Resource Hash
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Content-Type
text/plain;charset=UTF-8
Referer
https://tryhackme.com/

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
access-control-expose-headers
x-sentry-error,x-sentry-rate-limits,retry-after
cross-origin-resource-policy
cross-origin
via
1.1 google
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
2
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
application/json
vary
origin, access-control-request-method, access-control-request-headers
server
nginx
hotjar-1950941.js
static.hotjar.com/c/
13 KB
6 KB
Script
General
Full URL
https://static.hotjar.com/c/hotjar-1950941.js?sv=6
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.32.27.21 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-32-27-21.fra56.r.cloudfront.net
Software
/
Resource Hash
8c929a6df1935838c4399814fd7ca4f4e20cd1953e72dd67aeafad14bbf1e165
Security Headers
Name Value
Strict-Transport-Security max-age=2592000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

content-encoding
br
etag
W/34265e1fa967ddb009bf2b1fb885e3a1
age
26
x-content-type-options
nosniff
x-cache-hit
1
x-cache
Hit from cloudfront
x-amz-cf-id
GvPAM5nVBVuL7aW2TPTL4935iR8VZ_lyIa6vP-j4VeA7g_FT1B1AMA==
date
Sat, 23 Nov 2024 17:54:04 GMT
content-type
application/javascript; charset=UTF-8
vary
Accept-Encoding
strict-transport-security
max-age=2592000; includeSubDomains
cache-control
max-age=60
cross-origin-resource-policy
cross-origin
via
1.1 753f415578c1ca010e51a83aef192330.cloudfront.net (CloudFront)
access-control-allow-origin
*
x-amz-cf-pop
FRA56-C2
gtm.js
googletagmanager.com/
253 KB
86 KB
Script
General
Full URL
https://googletagmanager.com/gtm.js?id=GTM-WPFM5LPL
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
47542eefcbeeea35f63eb282f397c52ed29424f63bf78721f209e2e105b2659d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

content-encoding
br
report-to
{"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascgcycc:1080:0"}],}
expires
Sat, 23 Nov 2024 17:54:26 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
application/javascript; charset=UTF-8
vary
Accept-Encoding
last-modified
Sat, 23 Nov 2024 15:00:00 GMT
access-control-allow-headers
Cache-Control
strict-transport-security
max-age=31536000; includeSubDomains
cache-control
private, max-age=900
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
content-security-policy-report-only
script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascgcycc:1080:0
access-control-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to=coop_reporting
content-length
87201
x-xss-protection
0
server
Google Tag Manager
main.js
tryhackme.com/cdn-cgi/challenge-platform/h/g/scripts/jsd/e4025c85ea63/ Frame 3A06
Redirect Chain
  • https://tryhackme.com/cdn-cgi/challenge-platform/scripts/jsd/main.js
  • https://tryhackme.com/cdn-cgi/challenge-platform/h/g/scripts/jsd/e4025c85ea63/main.js?
8 KB
4 KB
Script
General
Full URL
https://tryhackme.com/cdn-cgi/challenge-platform/h/g/scripts/jsd/e4025c85ea63/main.js?
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f78d297276df5c83f79586cadc97d397e9f6a3ba1e0cbca813223d09f19d26a5
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

cache-control
max-age=14400, stale-if-error=10800, stale-while-revalidate=10800, public
content-encoding
br
x-content-type-options
nosniff
cf-ray
8e730640be1fd278-FRA
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
application/javascript; charset=UTF-8
vary
Accept-Encoding
server
cloudflare

Redirect headers

cache-control
max-age=300, stale-if-error=10800, stale-while-revalidate=10800, public
location
/cdn-cgi/challenge-platform/h/g/scripts/jsd/e4025c85ea63/main.js?
cf-ray
8e7306405cc9d278-FRA
access-control-allow-origin
*
content-length
0
date
Sat, 23 Nov 2024 17:54:25 GMT
vary
Accept-Encoding
server
cloudflare
8c36a178-272a-47b2-a78b-b967e4a7690a
https://tryhackme.com/ Frame
0
0

feature-flags
tryhackme.com/api/v2/
5 KB
1 KB
Fetch
General
Full URL
https://tryhackme.com/api/v2/feature-flags
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/static/js/main.5aa785c0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
91098f5d8a4d1b0a8578563c8784c223818ff4ee96fd8465bff371bb5ac0fe7e

Request headers

sentry-trace
70c2e88361304219a77a2695053fa4b6-b0354837d58a95db-0
Referer
https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
csrf-token
ztBFe5WB-1hsVC3xyXinzdBQkR_maH1wo3qo
baggage
sentry-environment=production,sentry-release=production-9938b47,sentry-public_key=175180b5f191796714d2f9138c06c76a,sentry-trace_id=70c2e88361304219a77a2695053fa4b6,sentry-sample_rate=0.0027,sentry-sampled=false

Response headers

x-robots-tag
noindex
content-encoding
br
cf-cache-status
DYNAMIC
etag
W/"1524-8fM0kqByyVhm6/Aud1SQYvJBF0c"
cf-ray
8e730640ce63d278-FRA
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
application/json; charset=utf-8
x-powered-by
Express
vary
Accept-Encoding
server
cloudflare
modules.86621fa4aeada5bcf025.js
script.hotjar.com/
222 KB
55 KB
Script
General
Full URL
https://script.hotjar.com/modules.86621fa4aeada5bcf025.js
Requested by
Host: static.hotjar.com
URL: https://static.hotjar.com/c/hotjar-1950941.js?sv=6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.33.187.92 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-33-187-92.fra60.r.cloudfront.net
Software
/
Resource Hash
feb5c0ee05ef970a3cf34bac95d465e96ccb3a3df353b3a641d9391c168e68ad
Security Headers
Name Value
Strict-Transport-Security max-age=2592000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

x-robots-tag
none
content-encoding
br
etag
"ff8702986a1c41356391628a5f5d6f03"
age
272540
x-content-type-options
nosniff
x-cache
Hit from cloudfront
x-amz-cf-id
iS3hJau40zhnnNZbdO_OjYSXDWpxA8z1T9rK2qlaNdxqZO2d1YjsRA==
date
Wed, 20 Nov 2024 14:12:06 GMT
content-type
application/javascript; charset=utf-8
last-modified
Wed, 20 Nov 2024 14:11:55 GMT
vary
Accept-Encoding
strict-transport-security
max-age=2592000; includeSubDomains
cache-control
max-age=31536000
cross-origin-resource-policy
cross-origin
via
1.1 c8faaa7d637dd73af72e1355a476ffc2.cloudfront.net (CloudFront)
accept-ranges
bytes
access-control-allow-origin
*
content-length
56243
x-amz-cf-pop
FRA60-P9
8e73063bcf92d278
tryhackme.com/cdn-cgi/challenge-platform/h/g/jsd/r/ Frame 3A06
0
617 B
XHR
General
Full URL
https://tryhackme.com/cdn-cgi/challenge-platform/h/g/jsd/r/8e73063bcf92d278
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/cdn-cgi/challenge-platform/scripts/jsd/main.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Content-Type
application/json
Referer

Response headers

cf-ray
8e7306413fb7d278-FRA
content-length
0
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
text/plain; charset=UTF-8
server
cloudflare
js
www.googletagmanager.com/gtag/
326 KB
109 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=G-Z8D4WL3D4P&l=dataLayer&cx=c&gtm=45He4bk0v9138706448za200
Requested by
Host: googletagmanager.com
URL: https://googletagmanager.com/gtm.js?id=GTM-WPFM5LPL
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
321e8540f101896f85634a8c652350e4cfaf73e375e86f75a2cfb4a3006b0128
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

content-encoding
br
report-to
{"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascgcycc:838:0"}],}
expires
Sat, 23 Nov 2024 17:54:26 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
application/javascript; charset=UTF-8
vary
Accept-Encoding
access-control-allow-headers
Cache-Control
strict-transport-security
max-age=31536000; includeSubDomains
cache-control
private, max-age=900
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
content-security-policy-report-only
script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascgcycc:838:0
access-control-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to=coop_reporting
content-length
110813
x-xss-protection
0
server
Google Tag Manager
insight.min.js
snap.licdn.com/li.lms-analytics/
40 KB
14 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: googletagmanager.com
URL: https://googletagmanager.com/gtm.js?id=GTM-WPFM5LPL
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:3500:10::210:a9a Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1 Akamai International B.V., NL),
Reverse DNS
Software
/
Resource Hash
8a27dc7b44ebe886390bfa0a9beeea36ea5a3f37479f0e0836b6c9b80d9b35ed
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

cache-control
max-age=33844
content-encoding
gzip
x-cdn
AKAM
x-content-type-options
nosniff
accept-ranges
bytes
content-length
14628
date
Sat, 23 Nov 2024 17:54:26 GMT
last-modified
Thu, 22 Aug 2024 10:43:55 GMT
content-type
application/javascript;charset=utf-8
vary
Accept-Encoding
x-amz-server-side-encryption
AES256
7168674.js
js.hs-scripts.com/
1010 B
908 B
Script
General
Full URL
https://js.hs-scripts.com/7168674.js
Requested by
Host: googletagmanager.com
URL: https://googletagmanager.com/gtm.js?id=GTM-WPFM5LPL
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:8dd1 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
927c757d20b1344b95a16365386fd2cf11238beb6392896d22a196ac008c1044
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

access-control-max-age
3600
content-encoding
gzip
cf-cache-status
HIT
age
26
x-content-type-options
nosniff
expires
Sat, 23 Nov 2024 17:55:56 GMT
date
Sat, 23 Nov 2024 17:54:26 GMT
x-hubspot-correlation-id
b39f62fd-1800-4217-ac5f-646eb56e54e4
content-type
application/javascript;charset=utf-8
vary
origin, Accept-Encoding
last-modified
Sat, 23 Nov 2024 17:53:27 GMT
cache-control
public, max-age=90
access-control-allow-credentials
true
cf-ray
8e7306419ca7dcc6-FRA
accept-ranges
bytes
access-control-allow-origin
https://tryhackme.com
content-length
538
server
cloudflare
top-5-web-application-security-vulnerabilities
blog.tryhackme.com/ghost/api/content/posts/slug/ Frame
0
0
Preflight
General
Full URL
https://blog.tryhackme.com/ghost/api/content/posts/slug/top-5-web-application-security-vulnerabilities?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&key=a0ed05fe5ffc034e42ec78f0fb
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::ac43:1b0a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Headers
accept-version
Access-Control-Request-Method
GET
Origin
https://tryhackme.com
Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

access-control-allow-headers
accept-version
access-control-allow-methods
GET,HEAD,PUT,PATCH,POST,DELETE
access-control-allow-origin
*
access-control-max-age
86400
cache-control
public, max-age=0
cf-cache-status
DYNAMIC
cf-ray
8e73064228176933-FRA
content-length
0
content-version
v5.48
date
Sat, 23 Nov 2024 17:54:26 GMT
server
cloudflare
vary
Accept-Version, Access-Control-Request-Headers
x-powered-by
Express
posts
blog.tryhackme.com/ghost/api/content/ Frame
0
0
Preflight
General
Full URL
https://blog.tryhackme.com/ghost/api/content/posts?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&limit=4&key=a0ed05fe5ffc034e42ec78f0fb
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::ac43:1b0a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Headers
accept-version
Access-Control-Request-Method
GET
Origin
https://tryhackme.com
Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

access-control-allow-headers
accept-version
access-control-allow-methods
GET,HEAD,PUT,PATCH,POST,DELETE
access-control-allow-origin
*
access-control-max-age
86400
cache-control
public, max-age=0
cf-cache-status
DYNAMIC
cf-ray
8e730642281b6933-FRA
content-length
0
content-version
v5.48
date
Sat, 23 Nov 2024 17:54:26 GMT
server
cloudflare
vary
Accept-Version, Access-Control-Request-Headers
x-powered-by
Express
aoc-internal-banner.b1efdf1f98c5eba25828.png
tryhackme.com/r/static/media/
191 KB
192 KB
Image
General
Full URL
https://tryhackme.com/r/static/media/aoc-internal-banner.b1efdf1f98c5eba25828.png
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
510e7e1b0b62809acae230ed19d057ac06ea538c9771e0b19e27937a9f23c13b

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov

Response headers

cf-cache-status
HIT
etag
"9fa55ae6aa3af2351dce6e03f19ddd7f"
age
5347
cf-bgj
imgq:100,h2pri
cf-polished
origSize=277813
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
image/png
last-modified
Tue, 12 Nov 2024 14:51:46 GMT
vary
Accept-Encoding
x-amz-id-2
dXlbUICcWjIOXnKCZfekymD+roYphvWWe5hafPY0td19NCe+4ab7g8Nqe1Nk4mrc+Ru3chm3CpE=
cache-control
max-age=14400
cf-ray
8e73064198ded278-FRA
x-amz-request-id
R1A43E4X5WBVYYV7
accept-ranges
bytes
content-length
196092
server
cloudflare
resources-page-banner-w1920px.3f4f054a81f90c21e4410207a4fa2d94.svg
tryhackme.com/r/static/media/
1 KB
820 B
Image
General
Full URL
https://tryhackme.com/r/static/media/resources-page-banner-w1920px.3f4f054a81f90c21e4410207a4fa2d94.svg
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5cf000ebb0c841559cc926b0ac6ff71c1752637582a4625f4e8fe05ec844131e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov

Response headers

cache-control
max-age=14400
content-encoding
br
cf-cache-status
HIT
etag
W/"41701df30bf7b247d2c7130242a3bed4"
age
1644
cf-ray
8e73064198e2d278-FRA
x-amz-request-id
4P7QQSTC9TW6CQDT
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
image/svg+xml
last-modified
Thu, 07 Nov 2024 16:41:34 GMT
vary
Accept-Encoding
server
cloudflare
x-amz-id-2
esq6A2jRA9OQ5Cc2I+VqGpbYDvvVhjQtfXptNrjU3ulowlJtrWifv6Aivh+1aN6EZA+xudtgUjI=
6xKydSBYKcSV-LCoeQqfX1RYOo3i54rwlxdu.woff2
fonts.gstatic.com/s/sourcesanspro/v22/
14 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/sourcesanspro/v22/6xKydSBYKcSV-LCoeQqfX1RYOo3i54rwlxdu.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css2?family=Source+Sans+Pro:ital,wght@0,200;0,300;0,400;0,600;0,700;0,900;1,400&family=Ubuntu:ital,wght@0,300;0,400;0,500;0,700;1,400;1,500;1,700&display=swap
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ca57b79a870bbf54700730858603a70d79743779c1b059922ec401bfddc5adc9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://tryhackme.com
Referer
https://fonts.googleapis.com/

Response headers

age
268494
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
x-content-type-options
nosniff
expires
Thu, 20 Nov 2025 15:19:32 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Wed, 20 Nov 2024 15:19:32 GMT
last-modified
Thu, 01 Jun 2023 22:52:55 GMT
content-type
font/woff2
cache-control
public, max-age=31536000
timing-allow-origin
*
cross-origin-opener-policy
same-origin; report-to="apps-themes"
cross-origin-resource-policy
cross-origin
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
accept-ranges
bytes
access-control-allow-origin
*
content-length
14824
x-xss-protection
0
server
sffe
4iCv6KVjbNBYlgoCxCvjsGyN.woff2
fonts.gstatic.com/s/ubuntu/v20/
29 KB
29 KB
Font
General
Full URL
https://fonts.gstatic.com/s/ubuntu/v20/4iCv6KVjbNBYlgoCxCvjsGyN.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css2?family=Ubuntu:ital,wght@0,300;0,400;0,500;0,700;1,400;1,500;1,700&display=swap
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7c00752ce82d6abaed0b9766d35b906b16675facdbe24115b410d1fab975effa
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://tryhackme.com
Referer
https://fonts.googleapis.com/

Response headers

age
408964
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
x-content-type-options
nosniff
expires
Wed, 19 Nov 2025 00:18:22 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Tue, 19 Nov 2024 00:18:22 GMT
last-modified
Wed, 27 Apr 2022 17:05:11 GMT
content-type
font/woff2
cache-control
public, max-age=31536000
timing-allow-origin
*
cross-origin-opener-policy
same-origin; report-to="apps-themes"
cross-origin-resource-policy
cross-origin
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
accept-ranges
bytes
access-control-allow-origin
*
content-length
29752
x-xss-protection
0
server
sffe
grinched.bc1058eedc3a3d230300.otf
tryhackme.com/r/static/media/
29 KB
21 KB
Font
General
Full URL
https://tryhackme.com/r/static/media/grinched.bc1058eedc3a3d230300.otf
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b3525119397ec22552616363e7b98ee1a89caf374da14a5df85221bfd2a4e221

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://tryhackme.com
Referer
https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov

Response headers

cache-control
max-age=14400
content-encoding
br
cf-cache-status
HIT
etag
W/"95af6944056b0002f5b3c76e3aef590d"
age
6525
cf-ray
8e730641d9dbd278-FRA
x-amz-request-id
R1AENH50XH58MT6M
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
font/ttf
last-modified
Tue, 12 Nov 2024 14:51:48 GMT
vary
Accept-Encoding
server
cloudflare
x-amz-id-2
FihEQisGrSFSLhNnXfPm8v2yRWjRAbWtsHlK7ign+WM9EhB6RPUn89ZQ4VpSufuPKbuXh+J/AGitY5CZIx5S7YvRteBartxjnWqn5EmVuOE=
6xK3dSBYKcSV-LCoeQqfX1RYOo3qOK7l.woff2
fonts.gstatic.com/s/sourcesanspro/v22/
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/sourcesanspro/v22/6xK3dSBYKcSV-LCoeQqfX1RYOo3qOK7l.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css2?family=Source+Sans+Pro:ital,wght@0,200;0,300;0,400;0,600;0,700;0,900;1,400&family=Ubuntu:ital,wght@0,300;0,400;0,500;0,700;1,400;1,500;1,700&display=swap
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7b348b30ea1fe43857e68fc462c29e5c6e63c97666af75135c4396a272e54762
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://tryhackme.com
Referer
https://fonts.googleapis.com/

Response headers

age
325084
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
x-content-type-options
nosniff
expires
Wed, 19 Nov 2025 23:36:22 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Tue, 19 Nov 2024 23:36:22 GMT
last-modified
Thu, 01 Jun 2023 22:52:56 GMT
content-type
font/woff2
cache-control
public, max-age=31536000
timing-allow-origin
*
cross-origin-opener-policy
same-origin; report-to="apps-themes"
cross-origin-resource-policy
cross-origin
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
accept-ranges
bytes
access-control-allow-origin
*
content-length
14892
x-xss-protection
0
server
sffe
4iCs6KVjbNBYlgoKfw72.woff2
fonts.gstatic.com/s/ubuntu/v20/
34 KB
34 KB
Font
General
Full URL
https://fonts.gstatic.com/s/ubuntu/v20/4iCs6KVjbNBYlgoKfw72.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css2?family=Ubuntu:ital,wght@0,300;0,400;0,500;0,700;1,400;1,500;1,700&display=swap
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7f653b3ce9d3277457fc6da4edb246ae2f6c913f088c42dcb8cd2e96267aa21a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://tryhackme.com
Referer
https://fonts.googleapis.com/

Response headers

age
352255
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
x-content-type-options
nosniff
expires
Wed, 19 Nov 2025 16:03:31 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Tue, 19 Nov 2024 16:03:31 GMT
last-modified
Wed, 27 Apr 2022 16:31:23 GMT
content-type
font/woff2
cache-control
public, max-age=31536000
timing-allow-origin
*
cross-origin-opener-policy
same-origin; report-to="apps-themes"
cross-origin-resource-policy
cross-origin
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
accept-ranges
bytes
access-control-allow-origin
*
content-length
34852
x-xss-protection
0
server
sffe
4iCv6KVjbNBYlgoCjC3jsGyN.woff2
fonts.gstatic.com/s/ubuntu/v20/
30 KB
30 KB
Font
General
Full URL
https://fonts.gstatic.com/s/ubuntu/v20/4iCv6KVjbNBYlgoCjC3jsGyN.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css2?family=Ubuntu:ital,wght@0,300;0,400;0,500;0,700;1,400;1,500;1,700&display=swap
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e8e147e15907f25cad69b2bcf060213efad4ed04e0d36374715cbca17b2afc1c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://tryhackme.com
Referer
https://fonts.googleapis.com/

Response headers

age
268247
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
x-content-type-options
nosniff
expires
Thu, 20 Nov 2025 15:23:39 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Wed, 20 Nov 2024 15:23:39 GMT
last-modified
Wed, 27 Apr 2022 16:04:03 GMT
content-type
font/woff2
cache-control
public, max-age=31536000
timing-allow-origin
*
cross-origin-opener-policy
same-origin; report-to="apps-themes"
cross-origin-resource-policy
cross-origin
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
accept-ranges
bytes
access-control-allow-origin
*
content-length
30480
x-xss-protection
0
server
sffe
truncated
/
14 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
43f5f26fce90b03b3262aee19fc9582dd7112603dbf983cc742d4659f13806d6

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
tryhackme_logo_full.svg
assets.tryhackme.com/img/logo/
20 KB
21 KB
Image
General
Full URL
https://assets.tryhackme.com/img/logo/tryhackme_logo_full.svg
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2761:e000:1f:54cc:9ec0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8582638dc2f8a9a97d4c167892592c9757e357a284d6a34b6f1a9b40f63279ab

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

x-amz-version-id
0HJrgx4n38i4eEABdh4nymcVO7_D.Ikt
etag
"f7960ed89a507f28f0bcfc3e5c783532"
age
9514
via
1.1 67697a0060e2336f6ffa8579d528820e.cloudfront.net (CloudFront)
accept-ranges
bytes
x-cache
Hit from cloudfront
content-length
20707
x-amz-cf-id
jhOj33BKuuJDDSiCHsly-1f77n_C4KH-kJKl9lnimrEP-Nw0CyxvwQ==
date
Sat, 23 Nov 2024 15:16:07 GMT
content-type
image/svg+xml
last-modified
Fri, 22 Nov 2024 15:09:24 GMT
server
AmazonS3
x-amz-cf-pop
FRA60-P8
x-amz-server-side-encryption
AES256
/
blog.tryhackme.com/ghost/api/content/posts/slug/top-5-web-application-security-vulnerabilities/
Redirect Chain
  • https://blog.tryhackme.com/ghost/api/content/posts/slug/top-5-web-application-security-vulnerabilities?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&key=a0ed05fe5ffc034...
  • https://blog.tryhackme.com/ghost/api/content/posts/slug/top-5-web-application-security-vulnerabilities/?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&key=a0ed05fe5ffc03...
14 KB
5 KB
Fetch
General
Full URL
https://blog.tryhackme.com/ghost/api/content/posts/slug/top-5-web-application-security-vulnerabilities/?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&key=a0ed05fe5ffc034e42ec78f0fb
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Server
2606:4700:10::ac43:1b0a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
80c57655ae1eff4314eb803af025749b1c01b29301d2ccbd4d6e1d673143cec2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

content-version
v5.48
cache-control
public, max-age=0
content-encoding
gzip
cf-cache-status
DYNAMIC
etag
W/"39ee-SiNwVQwr4NR7jghDIJzJqcYVUQg"
cf-ray
8e730643890f6933-FRA
access-control-allow-origin
*
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
application/json; charset=utf-8
x-powered-by
Express
vary
Accept-Version, Accept-Encoding
server
cloudflare

Redirect headers

content-version
v5.48
cache-control
public, max-age=31536000
location
/ghost/api/content/posts/slug/top-5-web-application-security-vulnerabilities/?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&key=a0ed05fe5ffc034e42ec78f0fb
cf-cache-status
DYNAMIC
cf-ray
8e730642b87e6933-FRA
access-control-allow-origin
*
date
Sat, 23 Nov 2024 17:54:26 GMT
x-powered-by
Express
vary
Accept-Version
server
cloudflare
/
blog.tryhackme.com/ghost/api/content/posts/
Redirect Chain
  • https://blog.tryhackme.com/ghost/api/content/posts?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&limit=4&key=a0ed05fe5ffc034e42ec78f0fb
  • https://blog.tryhackme.com/ghost/api/content/posts/?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&limit=4&key=a0ed05fe5ffc034e42ec78f0fb
53 KB
16 KB
Fetch
General
Full URL
https://blog.tryhackme.com/ghost/api/content/posts/?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&limit=4&key=a0ed05fe5ffc034e42ec78f0fb
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Server
2606:4700:10::ac43:1b0a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
727788e5dd8602b6f4b4637ef31d76df3c3774d98c1543507fa86cc223883913

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

content-version
v5.48
cache-control
public, max-age=0
content-encoding
gzip
cf-cache-status
DYNAMIC
etag
W/"d33a-+F3MabB4iDu71n8GA5dSLQy9FBg"
cf-ray
8e73064378f76933-FRA
access-control-allow-origin
*
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
application/json; charset=utf-8
x-powered-by
Express
vary
Accept-Version, Accept-Encoding
server
cloudflare

Redirect headers

content-version
v5.48
cache-control
public, max-age=31536000
location
/ghost/api/content/posts/?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&limit=4&key=a0ed05fe5ffc034e42ec78f0fb
cf-cache-status
DYNAMIC
cf-ray
8e730642b8776933-FRA
access-control-allow-origin
*
date
Sat, 23 Nov 2024 17:54:26 GMT
x-powered-by
Express
vary
Accept-Version
server
cloudflare
announcements
tryhackme.com/api/v2/
30 B
486 B
Fetch
General
Full URL
https://tryhackme.com/api/v2/announcements
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/static/js/main.5aa785c0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
20bc1392a17b383b46fffc33c8e796755452883bfcfc2d33c90342ea70227639

Request headers

sentry-trace
fcc277b49f914945972733a78eb8d168-aea2ca5cb10ff2bd-0
Referer
https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
csrf-token
ztBFe5WB-1hsVC3xyXinzdBQkR_maH1wo3qo
baggage
sentry-environment=production,sentry-release=production-9938b47,sentry-public_key=175180b5f191796714d2f9138c06c76a,sentry-trace_id=fcc277b49f914945972733a78eb8d168,sentry-sample_rate=0.0027,sentry-transaction=%2Fr%2Fresources%2Fblog%2F%3Aslug,sentry-sampled=false

Response headers

x-robots-tag
noindex
cf-cache-status
DYNAMIC
etag
W/"1e-JkPcI+pGj7BBTxOuZTVVIm91zaY"
cf-ray
8e730641c9b7d278-FRA
content-length
30
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
application/json; charset=utf-8
x-powered-by
Express
vary
Accept-Encoding
server
cloudflare
banner.js
js.hs-banner.com/v2/7168674/
71 KB
26 KB
Script
General
Full URL
https://js.hs-banner.com/v2/7168674/banner.js
Requested by
Host: js.hs-scripts.com
URL: https://js.hs-scripts.com/7168674.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:4400::ac40:9310 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fddcddc31b70fcf6226a351bc6952aa6c25f1dfa0d5ade69237669e8150c3d4d

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

x-evy-trace-virtual-host
all
access-control-max-age
604800
x-request-id
2f3afcea-8682-4b71-965f-45463ff5b73c
access-control-expose-headers
x-last-modified-timestamp, X-HubSpot-NotFound, X-HS-User-Request, Link, Server-Timing
content-encoding
gzip
cf-cache-status
HIT
etag
W/"74fbcac8248d16400c410b99fba50643"
x-amz-version-id
EVsurnPy.wavtzf_rCZ.k5GI1UA7b..U
age
253
access-control-allow-methods
GET, OPTIONS, PUT, POST, DELETE, PATCH, HEAD
expires
Sat, 23 Nov 2024 17:52:00 GMT
x-evy-trace-listener
listener_https
date
Sat, 23 Nov 2024 17:54:26 GMT
x-hubspot-correlation-id
2f3afcea-8682-4b71-965f-45463ff5b73c
content-type
text/javascript; charset=UTF-8
last-modified
Wed, 21 Aug 2024 14:45:57 GMT
vary
origin, Accept-Encoding
x-amz-id-2
9b6ZEnM07uyu0U5JtKsRy5vOEN4TSPKbiz7eb6EHTyuzjNXgdAegBrp6dPvK0rvKn/JIwnpyJbmby5bPxMRNBlcaykabIGQC
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Accept, Accept-Charset, Accept-Encoding, X-Override-Internal-Permissions, X-Properties-Source, X-Properties-SourceId, X-Properties-Flag, X-Hubspot-User-Id, X-Hubspot-Trace, X-Hubspot-Callee, X-Hubspot-Offset, X-Hubspot-No-Trace, X-HubSpot-Static-App-Info, X-HubSpot-Messages-Uri, X-HubSpot-Request-Source, X-HubSpot-Request-Reason, Subscription-Billing-Auth-Token, X-App-CSRF, X-Tools-CSRF, Online-Payment-Signing-UUID, X-Source, X-SourceId, X-Origin-UserId, X-Biden-Request-Source, X-HubSpot-CSRF-hubspotapi, X-Force-Cookie-Refresh, X-Force-Cookie-Refresh-No-Cache, X-HS-User-Request, X-Application-Id, X-HS-Referer, X-HubSpot-Correlation-Id
x-evy-trace-route-service-name
envoyset-translator
cache-control
max-age=300,public
timing-allow-origin
*
x-evy-trace-served-by-pod
iad02/analytics-js-proxy-td/envoy-proxy-58b4c4568d-w6gwj
x-envoy-upstream-service-time
120
access-control-allow-credentials
true
x-amz-request-id
0SBF8NFZMZC80RXC
cf-ray
8e7306426b13d9d0-FRA
access-control-allow-origin
https://tryhackme.com
x-evy-trace-route-configuration
listener_https/all
server
cloudflare
x-amz-server-side-encryption
AES256
7168674.js
js.hs-analytics.net/analytics/1732384200000/
68 KB
25 KB
Script
General
Full URL
https://js.hs-analytics.net/analytics/1732384200000/7168674.js
Requested by
Host: js.hs-scripts.com
URL: https://js.hs-scripts.com/7168674.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:a0a8 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
16e16243200f22c4bd96bc802af6e1e23d49f797957d827b96107a014b7ddcb6

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

x-amz-server-side-encryption
AES256
x-request-id
e0a9dd2e-e0d1-42c3-910f-beb2739003b8
content-encoding
gzip
cf-cache-status
HIT
etag
W/"047428de429ad073bd188e6b225ce3c0"
x-amz-version-id
null
age
252
expires
Sat, 23 Nov 2024 17:55:14 GMT
x-evy-trace-listener
listener_https
date
Sat, 23 Nov 2024 17:54:26 GMT
x-hubspot-correlation-id
e0a9dd2e-e0d1-42c3-910f-beb2739003b8
content-type
text/javascript
last-modified
Tue, 22 Oct 2024 20:49:28 GMT
vary
origin, Accept-Encoding
x-amz-id-2
+H1n6YsWFNv/ej9MvpoAdfDGRhe+W/lgSJUPp8i9Nwxnf0j1KwvujJ4NC+Cy+KcuerXu9noMd2o=
x-evy-trace-route-service-name
envoyset-translator
cache-control
max-age=300,public
x-evy-trace-served-by-pod
iad02/analytics-js-proxy-td/envoy-proxy-8586d94f84-2ftsj
x-envoy-upstream-service-time
26
access-control-allow-credentials
false
x-amz-request-id
G99RZWN7XS3KT5ZD
cf-ray
8e7306426bb4d9d3-FRA
x-evy-trace-route-configuration
listener_https/all
server
cloudflare
x-evy-trace-virtual-host
all
/
px.ads.linkedin.com/wa/
0
621 B
XHR
General
Full URL
https://px.ads.linkedin.com/wa/
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/static/js/main.5aa785c0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:21::14 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://tryhackme.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept
*
Content-Type
text/plain;charset=UTF-8

Response headers

linkedin-action
1
x-li-pop
afd-prod-lor1-x
x-msedge-ref
Ref A: 07C7D33A6CE84CB3BA56CAA3E4F3E548 Ref B: DUS30EDGE0809 Ref C: 2024-11-23T17:54:26Z
x-li-fabric
prod-lor1
access-control-allow-credentials
true
x-li-uuid
AAYnmDDBAG5qIRSIgGoeUA==
x-li-proto
http/2
access-control-allow-origin
https://tryhackme.com
x-cache
CONFIG_NOCACHE
date
Sat, 23 Nov 2024 17:54:26 GMT
vary
Origin
attribution_trigger
px.ads.linkedin.com/
2 B
816 B
XHR
General
Full URL
https://px.ads.linkedin.com/attribution_trigger?pid=7863281&time=1732384466267&url=https%3A%2F%2Ftryhackme.com%2Fr%2Fresources%2Fblog%2Ftop-5-web-application-security-vulnerabilities%3Futm_source%3Dcio%26utm_medium%3Demail%26utm_campaign%3Dbyte_int22nov&tm=gtmv2
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/static/js/main.5aa785c0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:21::14 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept
*
Referer
https://tryhackme.com/

Response headers

x-li-pop
afd-prod-lva1-x
content-encoding
gzip
x-fs-uuid
0006279830bb92423ced75f29a1ea3a7
x-msedge-ref
Ref A: AEF50D17A4414981BDA7429AD24697F1 Ref B: DUS30EDGE0917 Ref C: 2024-11-23T17:54:26Z
x-li-fabric
prod-lva1
x-restli-protocol-version
1.0.0
access-control-allow-methods
GET, OPTIONS
x-li-uuid
AAYnmDC7kkI87XXymh6jpw==
x-li-proto
http/2
access-control-allow-origin
*
x-cache
CONFIG_NOCACHE
date
Sat, 23 Nov 2024 17:54:25 GMT
content-type
application/json
access-control-allow-headers
*
collect
px4.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=7863281&time=1732384466267&url=https%3A%2F%2Ftryhackme.com%2Fr%2Fresources%2Fblog%2Ftop-5-web-application-security-vulnerabilities%3Futm_source%3D...
  • https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=7863281&time=1732384466267&url=https%3A%2F%2Ftryhackme.com%2Fr%2Fresources%2Fblog%2Ftop-5-web-application-security-vulnerabilities%3Futm_source%3...
0
267 B
Image
General
Full URL
https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=7863281&time=1732384466267&url=https%3A%2F%2Ftryhackme.com%2Fr%2Fresources%2Fblog%2Ftop-5-web-application-security-vulnerabilities%3Futm_source%3Dcio%26utm_medium%3Demail%26utm_campaign%3Dbyte_int22nov&tm=gtmv2&e_ipv6=AQISsYa95Pir5gAAAZNaKSXBpYSDMz3TJdditTuoZm2rSf-1uHly29K2N5yVO9kd_ehSdCvw880F466T5ngiUIN1jBRzmQ
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Server
13.107.42.14 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

linkedin-action
1
x-li-pop
afd-prod-lva1-x
x-msedge-ref
Ref A: 6B971D6E56854EAC9534D2E6C96EEEB9 Ref B: AMS04EDGE2112 Ref C: 2024-11-23T17:54:26Z
x-li-fabric
prod-lva1
x-li-uuid
AAYnmDDBHnDTSxtVBZGzvQ==
x-li-proto
http/2
x-cache
CONFIG_NOCACHE
content-length
0
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
application/javascript

Redirect headers

linkedin-action
1
x-li-pop
afd-prod-lva1-x
location
https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=7863281&time=1732384466267&url=https%3A%2F%2Ftryhackme.com%2Fr%2Fresources%2Fblog%2Ftop-5-web-application-security-vulnerabilities%3Futm_source%3Dcio%26utm_medium%3Demail%26utm_campaign%3Dbyte_int22nov&tm=gtmv2&e_ipv6=AQISsYa95Pir5gAAAZNaKSXBpYSDMz3TJdditTuoZm2rSf-1uHly29K2N5yVO9kd_ehSdCvw880F466T5ngiUIN1jBRzmQ
x-msedge-ref
Ref A: 13F3316B1CF54B3DB56D65A9559B9850 Ref B: DUS30EDGE0809 Ref C: 2024-11-23T17:54:26Z
x-li-fabric
prod-lva1
x-li-uuid
AAYnmDC7WQxCGDLmEicpsQ==
x-li-proto
http/2
x-cache
CONFIG_NOCACHE
content-length
0
date
Sat, 23 Nov 2024 17:54:25 GMT
collect
region1.analytics.google.com/g/
0
552 B
Fetch
General
Full URL
https://region1.analytics.google.com/g/collect?v=2&tid=G-Z8D4WL3D4P&gtm=45je4bk0v890603083z89138706448za200zb9138706448&_p=1732384465961&_gaz=1&gcd=13l3l3l2l1l1&npa=1&dma_cps=syphamo&dma=1&tag_exp=101925629~102067555~102067808~102077855~102081485&cid=2431483.1732384466&ul=de-de&sr=1600x1200&uaa=&uab=&uafvl=&uamb=0&uam=&uap=&uapv=&uaw=0&are=1&frm=0&pscdl=noapi&_s=1&sid=1732384466&sct=1&seg=0&dl=https%3A%2F%2Ftryhackme.com%2Fr%2Fresources%2Fblog%2Ftop-5-web-application-security-vulnerabilities%3Futm_source%3Dcio%26utm_medium%3Demail%26utm_campaign%3Dbyte_int22nov&dt=TryHackMe%20%7C%20Resources&en=page_view&_fv=1&_nsi=1&_ss=1&tfd=1800
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/static/js/main.5aa785c0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:32::36 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

cache-control
no-cache, no-store, must-revalidate
pragma
no-cache
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
content-security-policy-report-only
script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascnsrsggc:136:0
report-to
{"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascnsrsggc:136:0"}],}
expires
Fri, 01 Jan 1990 00:00:00 GMT
access-control-allow-origin
https://tryhackme.com
cross-origin-opener-policy-report-only
same-origin; report-to=coop_reporting
content-length
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
text/plain
server
Golfe2
collect
stats.g.doubleclick.net/g/
0
552 B
Ping
General
Full URL
https://stats.g.doubleclick.net/g/collect?v=2&tid=G-Z8D4WL3D4P&cid=2431483.1732384466&gtm=45je4bk0v890603083z89138706448za200zb9138706448&aip=1&dma=1&dma_cps=syphamo&gcd=13l3l3l2l1l1&npa=1&frm=0&tag_exp=101925629~102067555~102067808~102077855~102081485
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=G-Z8D4WL3D4P&l=dataLayer&cx=c&gtm=45He4bk0v9138706448za200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c00::9b Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

cache-control
no-cache, no-store, must-revalidate
pragma
no-cache
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
content-security-policy-report-only
script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascnsrsggc:111:0
report-to
{"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascnsrsggc:111:0"}],}
expires
Fri, 01 Jan 1990 00:00:00 GMT
access-control-allow-origin
https://tryhackme.com
cross-origin-opener-policy-report-only
same-origin; report-to=coop_reporting
content-length
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
text/plain
server
Golfe2
ga-audiences
www.google.de/ads/
42 B
63 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&t=sr&slf_rd=1&_r=4&tid=G-Z8D4WL3D4P&cid=2431483.1732384466&gtm=45je4bk0v890603083z89138706448za200zb9138706448&aip=1&dma=1&dma_cps=syphamo&gcd=13l3l3l2l1l1&npa=1&frm=0&tag_exp=101925629~102067555~102067808~102077855~102081485&tag_exp=101925629~102067555~102067808~102077855~102081485&z=2115626387
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
pragma
no-cache
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
expires
Fri, 01 Jan 1990 00:00:00 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
42
date
Sat, 23 Nov 2024 17:54:26 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
/
blog.tryhackme.com/ghost/api/content/posts/ Frame
0
0
Preflight
General
Full URL
https://blog.tryhackme.com/ghost/api/content/posts/?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&limit=4&key=a0ed05fe5ffc034e42ec78f0fb
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::ac43:1b0a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Headers
accept-version
Access-Control-Request-Method
GET
Origin
https://tryhackme.com
Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

access-control-allow-headers
accept-version
access-control-allow-methods
GET,HEAD,PUT,PATCH,POST,DELETE
access-control-allow-origin
*
access-control-max-age
86400
cache-control
public, max-age=0
cf-cache-status
DYNAMIC
cf-ray
8e73064318bd6933-FRA
content-length
0
content-version
v5.48
date
Sat, 23 Nov 2024 17:54:26 GMT
server
cloudflare
vary
Accept-Version, Access-Control-Request-Headers
x-powered-by
Express
/
blog.tryhackme.com/ghost/api/content/posts/slug/top-5-web-application-security-vulnerabilities/ Frame
0
0
Preflight
General
Full URL
https://blog.tryhackme.com/ghost/api/content/posts/slug/top-5-web-application-security-vulnerabilities/?include=authors%2Ctags&slug=top-5-web-application-security-vulnerabilities&key=a0ed05fe5ffc034e42ec78f0fb
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::ac43:1b0a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Headers
accept-version
Access-Control-Request-Method
GET
Origin
https://tryhackme.com
Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

access-control-allow-headers
accept-version
access-control-allow-methods
GET,HEAD,PUT,PATCH,POST,DELETE
access-control-allow-origin
*
access-control-max-age
86400
cache-control
public, max-age=0
cf-cache-status
DYNAMIC
cf-ray
8e73064328cc6933-FRA
content-length
0
content-version
v5.48
date
Sat, 23 Nov 2024 17:54:26 GMT
server
cloudflare
vary
Accept-Version, Access-Control-Request-Headers
x-powered-by
Express
6xKydSBYKcSV-LCoeQqfX1RYOo3ig4vwlxdu.woff2
fonts.gstatic.com/s/sourcesanspro/v22/
14 KB
14 KB
Font
General
Full URL
https://fonts.gstatic.com/s/sourcesanspro/v22/6xKydSBYKcSV-LCoeQqfX1RYOo3ig4vwlxdu.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css2?family=Source+Sans+Pro:ital,wght@0,200;0,300;0,400;0,600;0,700;0,900;1,400&family=Ubuntu:ital,wght@0,300;0,400;0,500;0,700;1,400;1,500;1,700&display=swap
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0d0a6262c545e8bbc895116e5afb22579c468d7abb77e378f377d6fed57c1dce
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://tryhackme.com
Referer
https://fonts.googleapis.com/

Response headers

age
385073
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
x-content-type-options
nosniff
expires
Wed, 19 Nov 2025 06:56:33 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Tue, 19 Nov 2024 06:56:33 GMT
last-modified
Thu, 01 Jun 2023 22:52:57 GMT
content-type
font/woff2
cache-control
public, max-age=31536000
timing-allow-origin
*
cross-origin-opener-policy
same-origin; report-to="apps-themes"
cross-origin-resource-policy
cross-origin
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
accept-ranges
bytes
access-control-allow-origin
*
content-length
14712
x-xss-protection
0
server
sffe
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1504aeddc505d04b465b5f551e70e66ebdbe12abedde5024dbb22584203e1d4e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
Web-App-Pentesting-Blog-Banner_WithNew.svg
blog.tryhackme.com/content/images/2024/11/
189 KB
113 KB
Image
General
Full URL
https://blog.tryhackme.com/content/images/2024/11/Web-App-Pentesting-Blog-Banner_WithNew.svg
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
1c7aa41699db450baca3d26180e5a7446ec8ab631ac3749cbd4185959017d278

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

server
cloudflare
cache-control
public, max-age=31536000
content-encoding
gzip
cf-cache-status
HIT
etag
W/"2f51d-1934941ac91"
age
283365
cf-ray
8e7306448a30d278-FRA
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
image/svg+xml
x-powered-by
Express
vary
Accept-Encoding
last-modified
Wed, 20 Nov 2024 11:07:41 GMT
Festive-Gift-Guide-Blog-banner-1920x400px-.png
blog.tryhackme.com/content/images/2024/11/
116 KB
116 KB
Image
General
Full URL
https://blog.tryhackme.com/content/images/2024/11/Festive-Gift-Guide-Blog-banner-1920x400px-.png
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
2a99c257144a30de1b71190c7f496e2ac2db1cd3621c56771fbb485e5c64adc6

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

cache-control
public, max-age=31536000
cf-bgj
imgq:100,h2pri
etag
W/"24607-193261aa7e8"
age
863429
cf-cache-status
HIT
cf-ray
8e7306448a2cd278-FRA
accept-ranges
bytes
cf-polished
origSize=148999
content-length
118596
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
image/png
last-modified
Wed, 13 Nov 2024 15:18:21 GMT
x-powered-by
Express
server
cloudflare
vary
Accept-Encoding
10_BlogBanner_OCT.svg
blog.tryhackme.com/content/images/2024/10/
42 KB
13 KB
Image
General
Full URL
https://blog.tryhackme.com/content/images/2024/10/10_BlogBanner_OCT.svg
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
08a466bb29f0dad5755781561d8961508936c8275ee0727dacc2764cef6d0386

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

server
cloudflare
cache-control
public, max-age=31536000
content-encoding
gzip
cf-cache-status
HIT
etag
W/"a8d5-192d3fe5e1d"
age
1386312
cf-ray
8e7306448a2ed278-FRA
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
image/svg+xml
x-powered-by
Express
vary
Accept-Encoding
last-modified
Mon, 28 Oct 2024 16:38:35 GMT
6xK1dSBYKcSV-LCoeQqfX1RYOo3qPZ7nsDI.woff2
fonts.gstatic.com/s/sourcesanspro/v22/
14 KB
14 KB
Font
General
Full URL
https://fonts.gstatic.com/s/sourcesanspro/v22/6xK1dSBYKcSV-LCoeQqfX1RYOo3qPZ7nsDI.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css2?family=Source+Sans+Pro:ital,wght@0,200;0,300;0,400;0,600;0,700;0,900;1,400&family=Ubuntu:ital,wght@0,300;0,400;0,500;0,700;1,400;1,500;1,700&display=swap
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
500f8aaf69ddcf71a16ceae58c927f03371b33665185e16df347b67f7f11bdb9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://tryhackme.com
Referer
https://fonts.googleapis.com/

Response headers

age
411050
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
x-content-type-options
nosniff
expires
Tue, 18 Nov 2025 23:43:36 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Mon, 18 Nov 2024 23:43:36 GMT
last-modified
Thu, 01 Jun 2023 22:52:57 GMT
content-type
font/woff2
cache-control
public, max-age=31536000
timing-allow-origin
*
cross-origin-opener-policy
same-origin; report-to="apps-themes"
cross-origin-resource-policy
cross-origin
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
accept-ranges
bytes
access-control-allow-origin
*
content-length
14160
x-xss-protection
0
server
sffe
Web-App-Security_Blog.svg
blog.tryhackme.com/content/images/2024/11/
387 KB
245 KB
Image
General
Full URL
https://blog.tryhackme.com/content/images/2024/11/Web-App-Security_Blog.svg
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
da7ba1fc20bd39641cad2d33af293ae1a4b8aa5db53e80062ac175d7483fd867

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

server
cloudflare
cache-control
public, max-age=31536000
content-encoding
gzip
cf-cache-status
HIT
etag
W/"60b07-19344016de7"
age
257546
cf-ray
8e730644aa9cd278-FRA
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
image/svg+xml
x-powered-by
Express
vary
Accept-Encoding
last-modified
Tue, 19 Nov 2024 10:39:24 GMT
IMG_5001-1.jpg
blog.tryhackme.com/content/images/2023/12/
60 KB
60 KB
Image
General
Full URL
https://blog.tryhackme.com/content/images/2023/12/IMG_5001-1.jpg
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
ce9c8341825d3ca9c70d8aa03747657622eaf5f07a7495103b242948b4848882

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

cache-control
public, max-age=31536000
cf-bgj
imgq:100,h2pri
etag
W/"faa1-18c82fcdf57"
age
1385973
cf-cache-status
HIT
cf-ray
8e730644aaa0d278-FRA
accept-ranges
bytes
cf-polished
origSize=64161
content-length
61494
date
Sat, 23 Nov 2024 17:54:26 GMT
content-type
image/jpeg
last-modified
Tue, 19 Dec 2023 16:50:59 GMT
x-powered-by
Express
server
cloudflare
vary
Accept-Encoding
in-app-eu.js
assets.customer.io/assets/
3 KB
2 KB
Script
General
Full URL
https://assets.customer.io/assets/in-app-eu.js
Requested by
Host: assets.customer.io
URL: https://assets.customer.io/assets/track-eu.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:21f3:ce00:11:9cfd:9400:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
d9511413b5827ebee36ef21bdc3dcde689bf36afa67f4f051c5bb441eb61917f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

vary
accept-encoding, Origin
content-encoding
gzip
etag
W/"85bfecc27d87cbfbba98eae25ea81590"
x-amz-version-id
vinNvoaf1aaWvhMO1GC8I4xUg4jjVpXB
age
53737
cross-origin-resource-policy
cross-origin
via
1.1 286eb4b50e0acf373dd03645aee00b7e.cloudfront.net (CloudFront)
x-cache
Hit from cloudfront
x-amz-cf-id
38-rOH_PYrzfet6Db-3JJZEDZkcbykk5LVZN3hCyvHQwV-YmTGot8A==
date
Sat, 23 Nov 2024 09:13:05 GMT
content-type
application/javascript
last-modified
Mon, 15 Apr 2024 20:40:43 GMT
server
AmazonS3
x-amz-cf-pop
FRA2-C2
x-amz-server-side-encryption
AES256
__ptq.gif
track.hubspot.com/
45 B
1 KB
Image
General
Full URL
https://track.hubspot.com/__ptq.gif?k=1&sd=1600x1200&cd=24-bit&cs=UTF-8&ln=de-de&bfp=3377520574&v=1.1&a=7168674&rcu=https%3A%2F%2Ftryhackme.com%2Fr%2Fresources%2Fblog%2Ftop-5-web-application-security-vulnerabilities&pu=https%3A%2F%2Ftryhackme.com%2Fr%2Fresources%2Fblog%2Ftop-5-web-application-security-vulnerabilities%3Futm_source%3Dcio%26utm_medium%3Demail%26utm_campaign%3Dbyte_int22nov&t=TryHackMe+%7C+Top+5+Web+Application+Security+Vulnerabilities&cts=1732384466977&vi=20dd2b785f9789520dac2217c592abfa&nc=true&u=256179476.20dd2b785f9789520dac2217c592abfa.1732384466976.1732384466976.1732384466976.1&b=256179476.1.1732384466976&cc=15
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7574 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dc111a70984a9eda00752b06277113029ef288f1125c31eff2477413e15e8aa4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

x-robots-tag
none
x-request-id
95fc666a-031e-4f1c-a255-40ebd5cf7ffd
cf-cache-status
DYNAMIC
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oxXriIyDEz50N1S8oyglh9%2FZaizpo3ppiNeNtM3UC79ZuEN52BpgjmqLrrCeHbwHW2EjnrHNG87l9KLBCMJ3homzMaGciaHqEraSX9RboadvaiHrHMcX8c%2FXXdlXgI9TeRlLHCVvKLv4X0vGFaql"}],"group":"cf-nel","max_age":604800}
x-content-type-options
nosniff
x-evy-trace-listener
listener_https
p3p
CP="NOI CUR ADM OUR NOR STA NID"
date
Sat, 23 Nov 2024 17:54:27 GMT
x-hubspot-correlation-id
95fc666a-031e-4f1c-a255-40ebd5cf7ffd
content-type
image/gif
vary
origin, Accept-Encoding
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-evy-trace-route-service-name
envoyset-translator
cache-control
no-cache, no-store, no-transform
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
x-evy-trace-served-by-pod
iad02/analytics-tracking-td/envoy-proxy-c658cb6d4-c2pg8
x-envoy-upstream-service-time
8
access-control-allow-credentials
false
cf-ray
8e730646f99191f5-FRA
x-evy-trace-route-configuration
listener_https/all
content-length
45
server
cloudflare
x-evy-trace-virtual-host
all
favicon.png
tryhackme.com/r/
8 KB
8 KB
Other
General
Full URL
https://tryhackme.com/r/favicon.png
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6816:36e4 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
86ce9e7a84dcab716ddf184279782248c44d8cfd91872247ae56740f3cd6e268

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/r/resources/blog/top-5-web-application-security-vulnerabilities?utm_source=cio&utm_medium=email&utm_campaign=byte_int22nov

Response headers

cf-cache-status
HIT
etag
"e49ecf40c7fdf87b783f5d2b575fe517"
age
3665
cf-bgj
imgq:100,h2pri
cf-polished
origSize=16404
date
Sat, 23 Nov 2024 17:54:27 GMT
content-type
image/png
last-modified
Thu, 07 Nov 2024 16:41:28 GMT
vary
Accept-Encoding
x-amz-id-2
YumfP/yu65O2IjJRIlj7HTArMRmvtk93p0Dqw8s1I1zda4X9GWyMYSU11FMQGfy9iwg406TfctM=
cache-control
max-age=14400
cf-ray
8e730646a822d278-FRA
x-amz-request-id
5ASR6Z2N1EEMC0ED
accept-ranges
bytes
content-length
7868
server
cloudflare
gist.min.js
code.gist.build/web/3.12.0/
Redirect Chain
  • https://code.gist.build/web/latest/gist.min.js
  • https://code.gist.build/web/3.12.0/gist.min.js
45 KB
15 KB
Script
General
Full URL
https://code.gist.build/web/3.12.0/gist.min.js
Protocol
H2
Server
2606:4700:20::681a:b92 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
512375e9231f8ca4142ce4ef32afea8e19ce388d28d1be5549869805f095f912
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

x-envoy-upstream-healthchecked-cluster
content-encoding
gzip
cf-cache-status
HIT
etag
W/"d92ce7cf9b80be1d32ef8a424a4ffecf"
age
1999
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fwlCtoza%2FTz%2F85TlMJuTrWmeuew2cMmlyYz3kyyhgKrKyk%2BU9qoVa7AoomlJrGTHtjEJUqobNRZGUZNN9H05HoUuBhGGtZU7pUSpywLEWF3LI0FrPnb9%2Bxw1UjEmSisgUexHeYJ7w9peNoIRog%3D%3D"}],"group":"cf-nel","max_age":604800}
server-timing
cfL4;desc="?proto=TCP&rtt=19225&sent=9&recv=13&lost=0&retrans=0&sent_bytes=4863&recv_bytes=2239&delivery_rate=208761&cwnd=255&unsent_bytes=0&cid=d88746b94c6b4925&ts=73&x=0"
date
Sat, 23 Nov 2024 17:54:27 GMT
x-rgw-object-type
Normal
content-type
application/javascript
last-modified
Fri, 08 Nov 2024 14:04:59 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
x-do-cdn-uuid
03b5fb56-b915-4b88-b380-33c921f54627
strict-transport-security
max-age=15552000; includeSubDomains; preload
cache-control
max-age=14400
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
x-amz-request-id
tx000005e76db1da07d182a-0067337f66-45f2098a-ams3b
cf-ray
8e7306474d376aeb-FRA
server
cloudflare

Redirect headers

cache-control
private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
location
https://code.gist.build/web/3.12.0/gist.min.js
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vRLN1WiDz%2ByAy8utFLFDKIGaBnH%2F5ZFULJjWNxENjjuilQjAd3ie01AySJLZLsJVFmFdGtGQlt9jIcIBLJ1xvWiS%2FZqtRnGHIh0wJmoHiAdCD1IVBtp65%2FIIXrLKCHiJqDLGEBJwiSTSpZPT2Q%3D%3D"}],"group":"cf-nel","max_age":604800}
cf-ray
8e7306471d136aeb-FRA
expires
Thu, 01 Jan 1970 00:00:01 GMT
server-timing
cfL4;desc="?proto=TCP&rtt=18830&sent=6&recv=10&lost=0&retrans=0&sent_bytes=3984&recv_bytes=2142&delivery_rate=208761&cwnd=252&unsent_bytes=0&cid=d88746b94c6b4925&ts=40&x=0"
content-length
143
date
Sat, 23 Nov 2024 17:54:27 GMT
content-type
text/html
vary
Accept-Encoding
server
cloudflare
page.gif
track-eu.customer.io/events/
35 B
265 B
Image
General
Full URL
https://track-eu.customer.io/events/page.gif?name=https%3A%2F%2Ftryhackme.com%2Fr%2Fresources%2Fblog%2Ftop-5-web-application-security-vulnerabilities%3Futm_source%3Dcio%26utm_medium%3Demail%26utm_campaign%3Dbyte_int22nov&data%5Butm_source%5D=cio&data%5Butm_medium%5D=email&data%5Butm_campaign%5D=byte_int22nov&data%5Bwidth%5D=1600&data%5Bheight%5D=1200&c=&s=fc4e3707-96f7-7897-56cc-c27c2fb8a83c&site_id=1fb6cc3507accadb5446&timestamp=1732384467025
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.120.129.162 Kansas City, United States, ASN396982 (GOOGLE-CLOUD-PLATFORM, US),
Reverse DNS
162.129.120.34.bc.googleusercontent.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://tryhackme.com/

Response headers

cache-control
no-cache, no-store, must-revalidate, max-age=0
cross-origin-resource-policy
cross-origin
content-transfer-encoding
binary
via
1.1 google
status
200 OK
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
35
date
Sat, 23 Nov 2024 17:54:27 GMT
content-disposition
attachment
content-type
image/gif
httpapi
api2.amplitude.com/2/
93 B
217 B
Fetch
General
Full URL
https://api2.amplitude.com/2/httpapi
Requested by
Host: tryhackme.com
URL: https://tryhackme.com/r/static/js/main.5aa785c0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
54.212.172.172 Boardman, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-212-172-172.us-west-2.compute.amazonaws.com
Software
/
Resource Hash
97aa320dc8b2811da0a9b7e4b6b188a4ae9a9f35d90df51214813de4a01cf06b
Security Headers
Name Value
Strict-Transport-Security max-age=15768000

Request headers

Referer
https://tryhackme.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept
*/*
Content-Type
application/json

Response headers

strict-transport-security
max-age=15768000
access-control-allow-origin
*
content-length
93
date
Sat, 23 Nov 2024 17:54:27 GMT
content-type
application/json
httpapi
api2.amplitude.com/2/ Frame
0
0
Preflight
General
Full URL
https://api2.amplitude.com/2/httpapi
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
54.212.172.172 Boardman, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-212-172-172.us-west-2.compute.amazonaws.com
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15768000

Request headers

Accept
*/*
Access-Control-Request-Headers
content-type
Access-Control-Request-Method
POST
Origin
https://tryhackme.com
Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

access-control-allow-headers
content-type
access-control-allow-methods
GET, POST
access-control-allow-origin
*
access-control-max-age
86400
content-length
0
date
Sat, 23 Nov 2024 17:54:27 GMT
strict-transport-security
max-age=15768000

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
tryhackme.com
URL
blob:https://tryhackme.com/8c36a178-272a-47b2-a78b-b967e4a7690a

Verdicts & Comments Add Verdict or Comment

41 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 function| Intercom object| _cio object| _global object| _sentryDebugIds string| _sentryDebugIdIdentifier object| SENTRY_RELEASE object| webpackChunkthm_platform_client object| FontAwesomeConfig object| ___FONT_AWESOME___ object| __localeData__ object| __SENTRY__ function| hj object| _hjSettings object| dataLayer object| analyticsConnectorInstances object| hjSiteSettings object| hjLazyModules function| hjBootstrap object| hjBootstrapCalled object| google_tag_manager object| google_tag_data object| _linkedin_data_partner_ids boolean| _already_called_lintrk object| _hsp function| lintrk object| ORIBILI function| onYouTubeIframeAPIReady object| gaGlobal object| _hsq function| sanitizeKey boolean| _hstc_loaded object| hsCookieBanner boolean| _hspb_loaded boolean| _hspb_ran boolean| _hstc_ran object| hsCallsToActionsReady string| __hsUserToken number| expireDateTime function| Gist

19 Cookies

Domain/Path Name / Value
protect.checkpoint.com/ Name: x-cloud-sec-ctp
Value: 2a76401f-ec30-4596-af6b-92fea44e7381
tryhackme.com/ Name: _csrf
Value: rMgep3j8ntJ2IoqPEiDgMETo
.tryhackme.com/ Name: AMP_d09a34bd2d
Value: JTdCJTIyZGV2aWNlSWQlMjIlM0ElMjJmZGVmZmU1ZS1jZWQ1LTQ0MTYtYTQ2NS1iMGZmNzhjZmZhMWIlMjIlMkMlMjJzZXNzaW9uSWQlMjIlM0ExNzMyMzg0NDY2MDIwJTJDJTIyb3B0T3V0JTIyJTNBZmFsc2UlMkMlMjJsYXN0RXZlbnRUaW1lJTIyJTNBMTczMjM4NDQ2NjAyMCUyQyUyMmxhc3RFdmVudElkJTIyJTNBMCUyQyUyMnBhZ2VDb3VudGVyJTIyJTNBMCU3RA==
.tryhackme.com/ Name: cf_clearance
Value: 8z8l9uBWrDi3IHG8.uiLyAeoS93gpdiESCm01G_2eic-1732384466-1.2.1.1-7Wq5DKvTHGOJW559gHwE3MQzDZ_8rR6NwsZ0nr4wA7t2dqaid4AovdXQeqTshjkB26QaDIlZ43vD1i2mn1pZ933KXoZHaj.g8t7nssV5dUebSIJ8CXPadJWieJRJ2Z9J_tGDL7j25tg4snGNkrcr0C5e2wgMVZh6Hc7Degotp5xFJDHRnbL29UVChHoSwNbeC20DXEJl6zqdrq6AI1JV3oOKtpHt7qldX5.8Y.xkpa3t4jPR9TxDtqibZQ0XCYSDzdll0vU1gfgMe0rWHV9FtYbrtpWQcgOggd6fL4mijovfkCf_BrWerKztMvR4Jamv7gbnxpRgrsoctrKSMet33tK4wcYS4fo_UvIozIq_CdyVW.4DqhGmXAIsG6Zun1El
.tryhackme.com/ Name: _hjSessionUser_1950941
Value: eyJpZCI6IjRmY2Y0MjAxLWYzMzctNTk4ZS1iM2M3LTA1NDNiOGU4YzIzZiIsImNyZWF0ZWQiOjE3MzIzODQ0NjYyMzQsImV4aXN0aW5nIjp0cnVlfQ==
.tryhackme.com/ Name: _hjSession_1950941
Value: eyJpZCI6IjE1Zjc5NGY0LWUxYzItNDJiMC04YmE4LTMwNTNjNDNiNmYzYSIsImMiOjE3MzIzODQ0NjYyMzUsInMiOjEsInIiOjAsInNiIjowLCJzciI6MCwic2UiOjAsImZzIjoxLCJzcCI6MH0=
tryhackme.com/ Name: AWSALB
Value: jpuqFbGbQyV3Jle4LLdKjxmNh2uuQMSrJAbbD6gHJvPB0my/4Bve02tXGhN59JSmEqrrWEgJ81GfR65WFHpBJEW60q33Njg7wOji5pSP83QRaKvGE9BFd/PIAbyd
.tryhackme.com/ Name: _ga_Z8D4WL3D4P
Value: GS1.1.1732384466.1.0.1732384466.60.0.0
.tryhackme.com/ Name: _ga
Value: GA1.1.2431483.1732384466
.linkedin.com/ Name: bcookie
Value: "v=2&0064a8ec-a307-47ea-8a86-46c038569358"
.linkedin.com/ Name: li_gc
Value: MTswOzE3MzIzODQ0NjY7MjswMjFMYqQvhMUPJ3DNsGTYTljCOp2G5TV50CDhYMMjimRcmQ==
.linkedin.com/ Name: lidc
Value: "b=OGST02:s=O:r=O:a=O:p=O:g=3410:u=1:x=1:i=1732384466:t=1732470866:v=2:sig=AQGKH-7kK9HbndqWKGweVNxt_4VR2Jm7"
.tryhackme.com/ Name: __hstc
Value: 256179476.20dd2b785f9789520dac2217c592abfa.1732384466976.1732384466976.1732384466976.1
.tryhackme.com/ Name: hubspotutk
Value: 20dd2b785f9789520dac2217c592abfa
.tryhackme.com/ Name: __hssrc
Value: 1
.tryhackme.com/ Name: __hssc
Value: 256179476.1.1732384466976
.tryhackme.com/ Name: _cioanonid
Value: fc4e3707-96f7-7897-56cc-c27c2fb8a83c
.hubspot.com/ Name: __cf_bm
Value: EK.G3Mh9_LywRJjtbQHPWu7dXwhI5VIqwVFvYB0orM8-1732384467-1.0.1.1-04xFbxv7FGonFMEcGurwdzjXLBaFe7f4_XFN6oxck._DfRWGRy25Ek1iKLAmq41XZUAHGA5gWBZJvcGCI003.g
.hubspot.com/ Name: _cfuvid
Value: oz5Zr6AORajvphvr1oNXd4FtPiKhiBtBaF5QYqEjovU-1732384467159-0.0.1.1-604800000

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

api2.amplitude.com
assets.customer.io
assets.tryhackme.com
blog.tryhackme.com
cdn.amplitude.com
code.gist.build
e.customeriomail.com
fonts.googleapis.com
fonts.gstatic.com
googletagmanager.com
js.hs-analytics.net
js.hs-banner.com
js.hs-scripts.com
o4507096022450176.ingest.de.sentry.io
pro.fontawesome.com
protect.checkpoint.com
px.ads.linkedin.com
px4.ads.linkedin.com
region1.analytics.google.com
script.hotjar.com
snap.licdn.com
static.hotjar.com
stats.g.doubleclick.net
track-eu.customer.io
track.hubspot.com
tryhackme.com
www.google.de
www.googletagmanager.com
tryhackme.com
13.107.42.14
13.32.27.21
13.33.187.92
18.172.112.94
2001:4860:4802:32::36
2600:9000:20eb:d200:a:c6a1:780:93a1
2600:9000:21f3:ce00:11:9cfd:9400:93a1
2600:9000:2761:e000:1f:54cc:9ec0:93a1
2606:4700:10::6816:36e4
2606:4700:10::ac43:1b0a
2606:4700:20::681a:b92
2606:4700:4400::ac40:9310
2606:4700:4400::ac40:93bc
2606:4700::6810:7574
2606:4700::6810:8dd1
2606:4700::6810:a0a8
2620:1ec:21::14
2a00:1450:4001:80e::200a
2a00:1450:4001:80f::2003
2a00:1450:4001:80f::2008
2a00:1450:4001:811::2003
2a00:1450:4001:829::2008
2a00:1450:400c:c00::9b
2a02:26f0:3500:10::210:a9a
34.120.129.162
34.120.62.213
35.227.225.220
54.212.172.172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