URL: https://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All-wp.pdf
Submission: On November 28 via api from BY — Scanned from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 2606:4700::6811:b485, located in United States and belongs to CLOUDFLARENET, US. The main domain is i.blackhat.com.
TLS certificate: Issued by WE1 on October 12th 2024. Valid for: 3 months.
This is the only time i.blackhat.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 2606:4700::68... 13335 (CLOUDFLAR...)
2 1
Apex Domain
Subdomains
Transfer
2 blackhat.com
i.blackhat.com
308 B
2 1
Domain Requested by
2 i.blackhat.com
2 1

This site contains no links.

Subject Issuer Validity Valid
i.blackhat.com
WE1
2024-10-12 -
2025-01-10
3 months crt.sh

This page contains 1 frames:

Primary Page: https://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All-wp.pdf
Frame ID: B2BD1B7D1C2817D7ACCCD0D0C08A1118
Requests: 2 HTTP requests in this frame

Screenshot


Page Statistics

2
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

0 kB
Transfer

1 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All-wp.pdf
i.blackhat.com/USA-19/Thursday/
345 B
0
Document
General
Full URL
https://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All-wp.pdf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:b485 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f501222b167bfc67359e59c8fdf5322fcfa8ff71243cb2822b2ee17a0085905

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
cache-control
public, max-age=86400
cf-cache-status
REVALIDATED
cf-ray
8e9b9a4738a8429b-EWR
content-length
604667
content-type
application/pdf
date
Thu, 28 Nov 2024 16:05:59 GMT
etag
"939fb-58f3e1b850500"
expires
Fri, 29 Nov 2024 16:05:59 GMT
last-modified
Sat, 03 Aug 2019 22:36:36 GMT
server
cloudflare
vary
Accept-Encoding
favicon.ico
i.blackhat.com/
196 B
308 B
Other
General
Full URL
https://i.blackhat.com/favicon.ico
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:b485 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
80c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer
https://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All-wp.pdf

Response headers

cache-control
public, max-age=86400
content-encoding
gzip
cf-cache-status
EXPIRED
cf-ray
8e9b9a4acdd4429b-EWR
expires
Fri, 29 Nov 2024 16:06:00 GMT
date
Thu, 28 Nov 2024 16:06:00 GMT
content-type
text/html; charset=iso-8859-1
vary
Accept-Encoding
server
cloudflare

Verdicts & Comments Add Verdict or Comment

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0

1 Cookies

Domain/Path Name / Value
.blackhat.com/ Name: __cf_bm
Value: alqeklEM8iXXA2tu_gNAws4uFI60QBp3p8gxzn3otoM-1732809959-1.0.1.1-yaW.PZ0_wTWuNVteE3TBKNupJxU8T3Gxry5j5qaxnukiRVndUz_3wRgNZNyDitQ8pURgqpGDOs_MMhOcBepOpQ

1 Console Messages

Source Level URL
Text
network error URL: https://i.blackhat.com/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

i.blackhat.com
2606:4700::6811:b485
2f501222b167bfc67359e59c8fdf5322fcfa8ff71243cb2822b2ee17a0085905
80c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880