URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-usi...
Submission: On December 04 via manual from US

Summary

This website contacted 18 IPs in 5 countries across 13 domains to perform 88 HTTP transactions. The main IP is 2a02:26f0:6c00:18b::356e, located in Ascension Island and belongs to AKAMAI-ASN1, US. The main domain is www.microsoft.com.
TLS certificate: Issued by Microsoft IT TLS CA 5 on October 21st 2019. Valid for: 2 years.
This is the only time www.microsoft.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
32 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
3 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 184.30.221.161 20940 (AKAMAI-ASN1)
1 2.16.186.32 20940 (AKAMAI-ASN1)
7 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
19 107.154.114.97 19551 (INCAPSULA)
3 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
7 72.247.225.88 16625 (AKAMAI-AS)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 152.199.19.160 15133 (EDGECAST)
5 40.77.226.250 8075 (MICROSOFT...)
1 40.90.22.187 8075 (MICROSOFT...)
1 2a02:26f0:10c... 20940 (AKAMAI-ASN1)
3 2.21.36.164 20940 (AKAMAI-ASN1)
1 2 2a05:f500:10:... 14413 (LINKEDIN)
1 1 2a05:f500:11:... 14413 (LINKEDIN)
1 72.247.226.64 16625 (AKAMAI-AS)
88 18
Domain Requested by
32 www.microsoft.com www.microsoft.com
19 cloudblogs.microsoft.com www.microsoft.com
7 assets.adobedtm.com query.prod.cms.rt.microsoft.com
assets.adobedtm.com
7 c.s-microsoft.com www.microsoft.com
5 web.vortex.data.microsoft.com az725175.vo.msecnd.net
3 mem.gfx.ms www.microsoft.com
mem.gfx.ms
3 assets.onestore.ms www.microsoft.com
2 px.ads.linkedin.com 1 redirects
2 s7.addthis.com www.microsoft.com
s7.addthis.com
1 v1.addthisedge.com s7.addthis.com
1 z.moatads.com s7.addthis.com
1 www.linkedin.com 1 redirects
1 snap.licdn.com www.microsoft.com
1 login.live.com mem.gfx.ms
1 az725175.vo.msecnd.net www.microsoft.com
1 uhf.microsoft.com www.microsoft.com
1 img-prod-cms-rt-microsoft-com.akamaized.net www.microsoft.com
1 statics-marketingsites-wcus-ms-com.akamaized.net www.microsoft.com
1 query.prod.cms.rt.microsoft.com www.microsoft.com
88 19
Subject Issuer Validity Valid
www.microsoft.com
Microsoft IT TLS CA 5
2019-10-21 -
2021-10-21
2 years crt.sh
wildcard.onestore.ms
Microsoft IT TLS CA 4
2019-11-19 -
2021-11-19
2 years crt.sh
*.prod.cms.rt.microsoft.com
Microsoft IT TLS CA 2
2019-10-09 -
2021-10-09
2 years crt.sh
a248.e.akamai.net
DigiCert Secure Site ECC CA-1
2019-08-13 -
2020-08-12
a year crt.sh
cloudblogs.microsoft.com
Microsoft IT TLS CA 2
2018-02-21 -
2020-02-21
2 years crt.sh
mem.gfx.ms
Microsoft IT TLS CA 2
2018-02-05 -
2020-02-05
2 years crt.sh
assets.adobedtm.com
DigiCert SHA2 High Assurance Server CA
2019-10-22 -
2021-10-01
2 years crt.sh
unistore.www.microsoft.com
Microsoft IT TLS CA 5
2019-04-30 -
2021-04-30
2 years crt.sh
*.vo.msecnd.net
Microsoft IT TLS CA 2
2018-03-30 -
2020-03-30
2 years crt.sh
*.vortex.data.microsoft.com
Microsoft IT TLS CA 5
2018-01-30 -
2020-01-30
2 years crt.sh
login.live.com
Microsoft IT TLS CA 1
2019-11-05 -
2021-11-05
2 years crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2019-04-01 -
2021-05-07
2 years crt.sh
odc-prod-01.oracle.com
DigiCert SHA2 Secure Server CA
2019-10-10 -
2020-09-04
a year crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2019-05-29 -
2021-06-29
2 years crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh

This page contains 2 frames:

Primary Page: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Frame ID: FF19DF775F10F25EAE4AF374C4FFAA88
Requests: 88 HTTP requests in this frame

Frame: https://login.live.com/me.srf?wa=wsignin1.0&wreply=https%3A%2F%2Fwww.microsoft.com&uaid=653b3232-7dca-4d1b-2d86-3e88854bf68a&partnerId=mssecurity
Frame ID: ABBD52F1E2C9E1742E1EC741FA839FFB
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • script /\/\/assets.adobedtm.com\//i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
  • script /jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?/i

Page Statistics

88
Requests

100 %
HTTPS

50 %
IPv6

13
Domains

19
Subdomains

18
IPs

5
Countries

4875 kB
Transfer

7213 kB
Size

6
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 83
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=7850&url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2017%2F01%2F26%2Fphishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments%2F&time=1575487327099 HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D7850%26url%3Dhttps%253A%252F%252Fwww.microsoft.com%252Fsecurity%252Fblog%252F2017%252F01%252F26%252Fphishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments%252F%26time%3D1575487327099%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=7850&url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2017%2F01%2F26%2Fphishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments%2F&time=1575487327099&liSync=true

88 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
118 KB
24 KB
Document
General
Full URL
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
3f866510feae67f928b41c00cf13273dfe17cb07957bd12fc96ddb5732621dcf
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.microsoft.com
:scheme
https
:path
/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-User
?1

Response headers

status
200
nr-enabled
1
x-cacheable
SHORT
cache-control
max-age=600, must-revalidate
content-type
text/html; charset=UTF-8
x-cache-group
normal
x-wpe-loopback-upstream-addr
127.0.0.1:6783
content-encoding
gzip
content-security-policy
upgrade-insecure-requests
x-pingback
link
<https://mssecurity.wpengine.com/wp-json/>; rel="https://api.w.org/" <https://mssecurity.wpengine.com/?p=75750>; rel=shortlink
x-xss-protection
1; mode=block
x-content-type-options
nosniff
x-pass-why
x-frame-options
SAMEORIGIN
wpe-backend
apache
content-length
24245
x-edgeconnect-origin-mex-latency
1373
date
Wed, 04 Dec 2019 19:22:05 GMT
vary
Accept-Encoding
set-cookie
X-Mapping-fjhppofk=93D06DBE5987EE64E12CE66A638A6CF5; path=/
tls_version
tls1.2
strict-transport-security
max-age=31536000
x-rtag
RT
styles.css
www.microsoft.com/security/blog/wp-content/plugins/wds-ms-inline-interruption-styles-officeblogs/css/
10 KB
4 KB
Stylesheet
General
Full URL
https://www.microsoft.com/security/blog/wp-content/plugins/wds-ms-inline-interruption-styles-officeblogs/css/styles.css?ver=1575487324
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
0230395938cd2997e5b6e9000dafad270721af530ef7ce20b9fc719f0c7372bd
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
30
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
last-modified
Thu, 24 Oct 2019 17:43:09 GMT
x-rtag
RT
etag
W/"5db1e2ad-27cd"
vary
Accept-Encoding
content-type
text/css
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
3667
uhf-search-ui.css
www.microsoft.com/security/blog/wp-content/plugins/wds-ms-searchwp/features/uhf-search-ui/
160 B
369 B
Stylesheet
General
Full URL
https://www.microsoft.com/security/blog/wp-content/plugins/wds-ms-searchwp/features/uhf-search-ui/uhf-search-ui.css?ver=1.0.1
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
f258c099e2bb029f6c9d5e9900a78f53347a16b43aa1e37a9f9c1a1539e0748d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
22
date
Wed, 04 Dec 2019 19:22:05 GMT
last-modified
Tue, 02 Apr 2019 19:51:16 GMT
x-rtag
RT
etag
"5ca3bd34-a0"
strict-transport-security
max-age=31536000
content-type
text/css
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
accept-ranges
bytes
access-control-allow-origin
*
content-length
160
mwf-west-european-default.min.css
assets.onestore.ms/cdnfiles/external/mwf/short/v1/latest/css/
581 KB
71 KB
Stylesheet
General
Full URL
https://assets.onestore.ms/cdnfiles/external/mwf/short/v1/latest/css/mwf-west-european-default.min.css?ver=4.9.9
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:281::2957 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
4919e80f038d2b93f1184d1733ac35009643481735c7bc7aa31d8b56e118fc04
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-md5
QshXRY8/Osc4oVEHlL0Pbw==
status
200
content-length
71704
x-ms-lease-state
available
last-modified
Thu, 01 Feb 2018 02:22:19 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
etag
"0x8D5691A9EA468B4"
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-lease-state,x-ms-blob-type,Accept-Ranges,Content-Length,Date,Transfer-Encoding
cache-control
max-age=900
accept-ranges
bytes
style.css
www.microsoft.com/security/blog/wp-content/themes/ms_s/
342 B
463 B
Stylesheet
General
Full URL
https://www.microsoft.com/security/blog/wp-content/themes/ms_s/style.css?ver=1.0.0
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
f174b3ce00dc0ef25fe0867dae1da92a595c50f730dbe2cd1fd7f29546034e81
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
42
date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
last-modified
Fri, 22 Feb 2019 16:32:17 GMT
x-rtag
RT
etag
W/"5c702411-156"
vary
Accept-Encoding
content-type
text/css
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
238
style.min.css
www.microsoft.com/security/blog/wp-content/themes/ms-security/
62 KB
12 KB
Stylesheet
General
Full URL
https://www.microsoft.com/security/blog/wp-content/themes/ms-security/style.min.css?ver=2.4.2
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
15545c41aa48eb0b7e9c53a83fdf86248e9b8a305c3ce43bfae6c871ddad314e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
94
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
last-modified
Thu, 31 Oct 2019 20:10:47 GMT
x-rtag
RT
etag
W/"5dbb3fc7-f7b9"
vary
Accept-Encoding
content-type
text/css
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
11651
RE1r2ij
query.prod.cms.rt.microsoft.com/cms/api/am/binary/
4 KB
3 KB
Script
General
Full URL
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE1r2ij?ver=1.0.0
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.221.161 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-221-161.deploy.static.akamaitechnologies.com
Software
Microsoft-IIS/10.0 /
Resource Hash
c3c027a797b2f7112555a219c0a0c91e8689f97203aeab469382665f74f05016

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

AppEx-Activity-Id
476a7290-cdc3-475d-b970-c6131c7b39a4
Content-Encoding
gzip
X-CMS-Tenant
am
X-CMS-ServiceLocation
eastus:1
X-CMS-Type
binary
X-CMS-DocumentId
RE1r2ij
X-CMS-Alias
default
Content-Disposition
inline; filename=oa.min.js
Connection
keep-alive
MS-CV
IfUQDiMjKECzag4KeUWQCg.0
Content-Length
2299
X-Trace-Context
{"ActivityId":"476a7290-cdc3-475d-b970-c6131c7b39a4"}
X-CMS-Version
45
Last-Modified
Tue, 09 Oct 2018 21:46:16 GMT
Server
Microsoft-IIS/10.0
ETag
W/"133"
Vary
Accept-Encoding
Content-Type
application/x-javascript
X-CMS-ExecutionTimeInMilliseconds
205
Cache-Control
public, must-revalidate, max-age=11839
Date
Wed, 04 Dec 2019 19:22:05 GMT
X-CMS-State
Published
jquery.js
www.microsoft.com/security/blog/wp-includes/js/jquery/
95 KB
34 KB
Script
General
Full URL
https://www.microsoft.com/security/blog/wp-includes/js/jquery/jquery.js?ver=1.12.4
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
fc48d1d80ece71a79a7b39877f4104d49d3da6c3665cf6dc203000fb7df4447e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
25
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
last-modified
Mon, 23 May 2016 09:00:29 GMT
x-rtag
RT
etag
W/"5742c6ad-17ba0"
vary
Accept-Encoding
content-type
application/javascript
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
34003
jquery-migrate.min.js
www.microsoft.com/security/blog/wp-includes/js/jquery/
10 KB
4 KB
Script
General
Full URL
https://www.microsoft.com/security/blog/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
23
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
last-modified
Fri, 20 May 2016 06:11:28 GMT
x-rtag
RT
etag
W/"573eaa90-2748"
vary
Accept-Encoding
content-type
application/javascript
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
4016
mwf-main.var.min.js
assets.onestore.ms/cdnfiles/external/mwf/short/v1/latest/scripts/
302 KB
70 KB
Script
General
Full URL
https://assets.onestore.ms/cdnfiles/external/mwf/short/v1/latest/scripts/mwf-main.var.min.js?ver=v1.23.2+5182151
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:281::2957 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
b1d83c2d49c49ea38d578afa752aaec44a86d069d6ce2d54460e2612fc31a102
Security Headers
Name Value
X-Content-Type-Options nosniff, nosniff, nosniff, nosniff

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
x-content-type-options
nosniff, nosniff, nosniff, nosniff
content-md5
FuF99EJdzMvbQQjP24cb+Q==
status
200
content-length
71185
x-ms-lease-state
available
last-modified
Thu, 01 Feb 2018 02:22:29 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
etag
"0x8D5691AA4A90431"
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-lease-state,x-ms-blob-type,Accept-Ranges
cache-control
max-age=900
accept-ranges
bytes
c0-271f35
www.microsoft.com/onerfstatics/marketingsites-wcus-prod/west-european/shell/_scrf/css/themes=default.device=uplevel_web_pc/1d-2c4d46/9e-cf5a91/90-9e88ea/95-51d6a5/91-33a458/34-92be61/5f-45ce81/
161 KB
22 KB
Stylesheet
General
Full URL
https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/west-european/shell/_scrf/css/themes=default.device=uplevel_web_pc/1d-2c4d46/9e-cf5a91/90-9e88ea/95-51d6a5/91-33a458/34-92be61/5f-45ce81/c0-271f35?ver=2.0
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
a5ce92cdea8aced9e4ee82f69f79d693f09c0b5f949d5bde292d180c66de81c9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

ms-operation-id
d8226578ef27b344bf8beaaeb269b63a
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-rtag
RT
x-s2
2019-11-14T21:39:18
p3p
CP="CAO CONi OTR OUR DEM ONL"
status
200
x-activity-id
b1f374e6-06a1-44f5-aaf5-2e5adc5315ae
tls_version
tls1.2
strict-transport-security
max-age=31536000
ms-cv
mRN29+3qzkmuRuyM.0
vary
Accept-Encoding
content-length
21883
x-xss-protection
1; mode=block
last-modified
Thu, 14 Nov 2019 21:39:18 GMT
x-az
{did:92e7dc58ca2143cfb2c818b047cc5cd1, rid: OneDeployContainer, sn: marketingsites-prod-odnortheurope, dt: 2018-05-03T20:14:23.4188992Z, bt: 2019-11-01T01:59:42.0000000Z}
x-s1
2019-11-14T21:39:18
access-control-allow-methods
HEAD,GET,POST,PATCH,PUT,OPTIONS
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=29816330
timing-allow-origin
*
x-appversion
1.0.7243.34191
expires
Fri, 13 Nov 2020 21:40:55 GMT
override.css
statics-marketingsites-wcus-ms-com.akamaized.net/statics/
1 KB
907 B
Stylesheet
General
Full URL
https://statics-marketingsites-wcus-ms-com.akamaized.net/statics/override.css?c=7
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.16.186.32 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-32.deploy.static.akamaitechnologies.com
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
0bd288d5397a69ead391875b422bf2cbdcc4f795d64aa2f780aff45768d78248

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Wed, 04 Dec 2019 19:22:05 GMT
Content-Encoding
gzip
Last-Modified
Tue, 11 Jun 2019 23:22:13 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
ETag
0x8D6EEC3A2D67C35
Vary
Accept-Encoding
Content-Type
text/css
x-ms-request-id
448b3076-d01e-0002-19b5-4008f0000000
x-ms-version
2009-09-19
Connection
keep-alive
Content-Length
473
mscc-0.4.1.min.css
c.s-microsoft.com/mscc/statics/
1 KB
934 B
Stylesheet
General
Full URL
https://c.s-microsoft.com/mscc/statics/mscc-0.4.1.min.css
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:284::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
35211f76c4c35c17f2649b96868c0d691f1d78b107f7635d22619948d0ee6880

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
last-modified
Mon, 10 Sep 2018 17:42:23 GMT
content-md5
2MKxgMQLzH/8vixotX2Pog==
access-control-allow-origin
*
etag
0x8D61744C3ED0073
vary
Accept-Encoding
access-control-allow-methods
GET,POST
content-type
text/css;charset=utf-8
status
200
x-ms-request-id
41f924a0-901e-0090-04fe-4986d4000000
x-ms-version
2009-09-19
content-length
627
RE1Mu3b
img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/
4 KB
4 KB
Image
General
Full URL
https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE1Mu3b?ver=5c31
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00::210:ba1b , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
112fec798b78aa02e102a724b5cb1990c0f909bc1d8b7b1fa256eab41bbc0960

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-cms-cdninvalkey
am:RE1Mu3b
date
Wed, 04 Dec 2019 19:22:05 GMT
x-aspnet-version
4.0.30319
x-source-length
4054
x-powered-by
ASP.NET
status
200
x-activityid
542d29ae-df69-4a97-941a-7c62ce3daaeb
x-deployment
a89a5014e89c41b7b60a64d7ee950637
content-length
4054
timing-allow-origin
*
last-modified
Sat, 30 Nov 2019 23:50:39 GMT
server
Microsoft-IIS/10.0
x-datacenter
NorthEU
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=102547
x-instance
Resizer.Web_IN_1
content-location
https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE1Mu3b?ver=5c31
expires
Thu, 05 Dec 2019 23:51:12 GMT
wp-emoji-release.min.js
www.microsoft.com/security/blog/wp-includes/js/
12 KB
5 KB
Script
General
Full URL
https://www.microsoft.com/security/blog/wp-includes/js/wp-emoji-release.min.js?ver=4.9.9
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
d2458b9fd9089fdcb9de317093e004ef3a65597dc68b9adfdeb15a7c9968d0d5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
30
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
last-modified
Fri, 13 Jul 2018 06:37:26 GMT
x-rtag
RT
etag
W/"5b4848a6-2efa"
vary
Accept-Encoding
content-type
application/javascript
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
4421
linkedin-black.png
www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/
424 B
636 B
Image
General
Full URL
https://www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/linkedin-black.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
dfc6de0e1501679bd71244faed1d26b977260f78853325c865754d05c238fe22
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
30
date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Thu, 31 Oct 2019 20:10:48 GMT
x-rtag
RT
etag
"5dbb3fc8-1a8"
strict-transport-security
max-age=31536000
content-type
image/png
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
accept-ranges
bytes
access-control-allow-origin
*
content-length
424
facebook-black.png
www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/
231 B
441 B
Image
General
Full URL
https://www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/facebook-black.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
875071ac76430f551ed9b36d0827d818157658b2247662db454ffcba6c07bb07
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
22
date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Thu, 31 Oct 2019 20:10:48 GMT
x-rtag
RT
etag
"5dbb3fc8-e7"
strict-transport-security
max-age=31536000
content-type
image/png
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
accept-ranges
bytes
access-control-allow-origin
*
content-length
231
twitter-black.png
www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/
395 B
607 B
Image
General
Full URL
https://www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/twitter-black.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
d52a506abeec5c7cb2e6cafe138da0763f555a16c2920683a7eb866453624f39
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
21
date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Thu, 31 Oct 2019 20:10:48 GMT
x-rtag
RT
etag
"5dbb3fc8-18b"
strict-transport-security
max-age=31536000
content-type
image/png
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
accept-ranges
bytes
access-control-allow-origin
*
content-length
395
mail-black.png
www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/
247 B
458 B
Image
General
Full URL
https://www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/mail-black.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
9dc88b264cb2061fdeccef48662172bf52cc1cd5c668e242e9e600f3bf39c84b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
99
date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Thu, 31 Oct 2019 20:10:48 GMT
x-rtag
RT
etag
"5dbb3fc8-f7"
strict-transport-security
max-age=31536000
content-type
image/png
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
accept-ranges
bytes
access-control-allow-origin
*
content-length
247
skype-black.png
www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/
557 B
769 B
Image
General
Full URL
https://www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/skype-black.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
f25fb12269bb1060790dd528cb700a87c49d8f3531cedaad0d37c617a4d1c5af
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
21
date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Thu, 31 Oct 2019 20:10:48 GMT
x-rtag
RT
etag
"5dbb3fc8-22d"
strict-transport-security
max-age=31536000
content-type
image/png
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
accept-ranges
bytes
access-control-allow-origin
*
content-length
557
messenger-black.png
www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/
448 B
659 B
Image
General
Full URL
https://www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/messenger-black.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
cd9f9701c135d4c08a851bc5f634242f03fef8132f8d763cddc9b8ed1d20344a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
21
date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Thu, 31 Oct 2019 20:10:49 GMT
x-rtag
RT
etag
"5dbb3fc9-1c0"
strict-transport-security
max-age=31536000
content-type
image/png
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
accept-ranges
bytes
access-control-allow-origin
*
content-length
448
whatsapp-black.png
www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/
502 B
713 B
Image
General
Full URL
https://www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/images/whatsapp-black.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
4dadc2332aba5151f4b0bd990760d4ea2f3207f9690d0bfeff626bccef8d335f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
28
date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Thu, 31 Oct 2019 20:10:49 GMT
x-rtag
RT
etag
"5dbb3fc9-1f6"
strict-transport-security
max-age=31536000
content-type
image/png
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
accept-ranges
bytes
access-control-allow-origin
*
content-length
502
120.jpg
cloudblogs.microsoft.com/uploads/prod/2018/01/
97 KB
98 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/120.jpg
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
0e5803f03d6e9620adfb04317bf593bd26e735f26d4b715ced7320578108c5ff

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:51:36 GMT
X-CDN
Incapsula
Etag
"0x8D5574692D412D7"
Content-Type
image/jpeg
X-Iinfo
5-218513326-218502446 2CNN RT(1575487325233 12) q(0 0 0 0) r(0 0) U18
Cache-Control
max-age=315001228, public
Content-Length
99802
Expires
Tue, 27 Nov 2029 15:42:33 GMT
PDF-example-1-screenshot-1.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
299 KB
300 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-1-screenshot-1.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
77f13a3f9bf0a4a1a55383732d33560b30da1efe68caea8db15d9ae40791caa4

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:51:57 GMT
X-CDN
Incapsula
Etag
"0x8D557469F4F3FAF"
Content-Type
image/png
X-Iinfo
0-43794018-43775218 2CNN RT(1575487325233 10) q(0 0 0 0) r(0 0) U18
Cache-Control
max-age=313941149, public
Content-Length
306007
Expires
Thu, 15 Nov 2029 09:14:34 GMT
PDF-example-1-screenshot-2.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
46 KB
47 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-1-screenshot-2.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
99028bb0106e4290db4614022de7e54f98342d1c7168307f8db6e39b2c99b29a

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:52:07 GMT
X-CDN
Incapsula
Etag
"0x8D55746A5135DC1"
Content-Type
image/png
X-Iinfo
1-79581573-79581397 2CNN RT(1575487325233 10) q(0 0 0 0) r(0 0) U18
Cache-Control
max-age=315243853, public
Content-Length
47293
Expires
Fri, 30 Nov 2029 11:06:18 GMT
PDF-edge-smartscreen.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
31 KB
32 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-edge-smartscreen.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
d8817cabab31b432c5a7d2206851a3aac223001c7abf46ac451c28d088aa3b50

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:51:47 GMT
X-CDN
Incapsula
Etag
"0x8D557469922D6EA"
Content-Type
image/png
X-Iinfo
4-179256197-179236776 2CNN RT(1575487325233 10) q(0 0 0 0) r(0 0) U18
Cache-Control
max-age=315253488, public
Content-Length
31465
Expires
Fri, 30 Nov 2029 13:46:53 GMT
PDF-example-1-screenshot-3.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
326 KB
327 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-1-screenshot-3.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
a1049a4d70e8296d9da2a3316b0926004914d358d6229fe6ecb2c744615c4b40

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:52:18 GMT
X-CDN
Incapsula
Etag
"0x8D55746ABFD6CAD"
Content-Type
image/png
X-Iinfo
2-112359014-112358715 2CNN RT(1575487325233 10) q(0 0 0 0) r(0 0) U18
Cache-Control
max-age=313941148, public
Content-Length
333677
Expires
Thu, 15 Nov 2029 09:14:33 GMT
PDF-example-1-screenshot-4.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
61 KB
61 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-1-screenshot-4.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
273d4ff04ad9096ccb285961f85974b5c8ecd5bcf05948669dfb6aed032dcd2e

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:52:28 GMT
X-CDN
Incapsula
Etag
"0x8D55746B1EA4FED"
Content-Type
image/png
X-Iinfo
5-218513325-218509267 2CNN RT(1575487325233 10) q(0 0 0 0) r(0 0) U18
Cache-Control
max-age=315253487, public
Content-Length
62109
Expires
Fri, 30 Nov 2029 13:46:52 GMT
PDF-example-2-screenshot-1.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
159 KB
160 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-2-screenshot-1.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
047701925737ffd7d44c77ce4258bd8374a68392dafa31abc2c5edf016c9864e

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:52:38 GMT
X-CDN
Incapsula
Etag
"0x8D55746B79AE255"
Content-Type
image/png
X-Iinfo
4-179256197-179236776 2CNN RT(1575487325233 28) q(0 0 0 -1) r(0 0) U18
Cache-Control
max-age=315243854, public
Content-Length
163199
Expires
Fri, 30 Nov 2029 11:06:19 GMT
PDF-example-2-screenshot-2.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
214 KB
215 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-2-screenshot-2.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
2d1a885ac3301ad0246b496308be9ee715f1160df51006cf88bb50a03fce40cc

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:52:50 GMT
X-CDN
Incapsula
Etag
"0x8D55746BE9CEA73"
Content-Type
image/png
X-Iinfo
1-79581573-79581397 2CNN RT(1575487325233 29) q(0 0 0 -1) r(0 0) U18
Cache-Control
max-age=313941148, public
Content-Length
219501
Expires
Thu, 15 Nov 2029 09:14:33 GMT
PDF-example-2-screenshot-3.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
249 KB
250 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-2-screenshot-3.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
40870bc1a050b918621682ed01f76e1eb01da8a54a54904a1f79017adad1a666

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:53:01 GMT
X-CDN
Incapsula
Etag
"0x8D55746C5B58BF0"
Content-Type
image/png
X-Iinfo
5-218513325-218506004 2CNN RT(1575487325233 30) q(0 0 0 -1) r(0 0) U18
Cache-Control
max-age=302386257, public
Content-Length
255003
Expires
Wed, 04 Jul 2029 15:33:02 GMT
PDF-example-2-screenshot-4.jpg
cloudblogs.microsoft.com/uploads/prod/2018/01/
121 KB
122 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-2-screenshot-4.jpg
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
d25056ec54469ded6a9f7f3bbfa16fc04142147af8044845cf72720d7ddc4f6b

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:53:12 GMT
X-CDN
Incapsula
Etag
"0x8D55746CC1BACD4"
Content-Type
image/jpeg
X-Iinfo
5-218513326-218502766 2CNN RT(1575487325233 33) q(0 0 0 -1) r(0 0) U18
Cache-Control
max-age=315243856, public
Content-Length
124091
Expires
Fri, 30 Nov 2029 11:06:21 GMT
PDF-example-2-screenshot-5.jpg
cloudblogs.microsoft.com/uploads/prod/2018/01/
113 KB
113 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-2-screenshot-5.jpg
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
b452d01d501ddfad20bb492483681ab572c848a9a7d0ea265e5b273b7b4ae2ee

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:53:23 GMT
X-CDN
Incapsula
Etag
"0x8D55746D2AE15E9"
Content-Type
image/jpeg
X-Iinfo
0-43794018-43775218 2CNN RT(1575487325233 46) q(0 0 0 -1) r(0 0) U18
Cache-Control
max-age=310063889, public
Content-Length
115296
Expires
Mon, 01 Oct 2029 12:13:34 GMT
PDF-example-2-screenshot-6.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
333 KB
334 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-2-screenshot-6.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
cf4a2e14c26f06b1c0d05ff7fbb3aaa03e650de59d67efff5583de33f2b81ef8

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:53:37 GMT
X-CDN
Incapsula
Etag
"0x8D55746DAA1FD12"
Content-Type
image/png
X-Iinfo
4-179256197-179236776 2CNN RT(1575487325233 48) q(0 0 0 -1) r(0 0) U18
Cache-Control
max-age=302386258, public
Content-Length
341309
Expires
Wed, 04 Jul 2029 15:33:03 GMT
PDF-example-3.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
375 KB
375 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-3.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
4c380ba70e696dad3d2035f60cba766d30ba9551ce18e113019e7cb5f4fc1593

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:53:49 GMT
X-CDN
Incapsula
Etag
"0x8D55746E219E6E1"
Content-Type
image/png
X-Iinfo
5-218513326-218502766 2CNN RT(1575487325233 48) q(0 0 0 -1) r(0 0) U18
Cache-Control
max-age=315253488, public
Content-Length
384083
Expires
Fri, 30 Nov 2029 13:46:53 GMT
PDF-example-4.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
353 KB
353 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-4.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
d24eaf0606fb08e84738f500415351af16f32713f0eec192cdf12a57d7f47f79

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:54:01 GMT
X-CDN
Incapsula
Etag
"0x8D55746E90220B3"
Content-Type
image/png
X-Iinfo
1-79581573-79580926 2CNN RT(1575487325233 49) q(0 0 0 -1) r(0 0) U18
Cache-Control
max-age=302386258, public
Content-Length
361535
Expires
Wed, 04 Jul 2029 15:33:03 GMT
PDF-example-5.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
272 KB
272 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-5.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
ebca18da4b2d8873fc66b4eaa061fa0aa8d5be75769da94cabcdfae9657f36d4

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:51:01 GMT
X-CDN
Incapsula
Etag
"0x8D557467DCDAC5B"
Content-Type
image/png
X-Iinfo
5-218513325-218470073 2CNN RT(1575487325233 63) q(0 0 0 -1) r(1 1) U18
Cache-Control
max-age=315253488, public
Content-Length
278267
Expires
Fri, 30 Nov 2029 13:46:53 GMT
PDF-example-6.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
152 KB
152 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-6.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
8e440de439c445a47ddb5d12823e4af205b61e2819622096fa793fb925ff94e5

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:51:12 GMT
X-CDN
Incapsula
Etag
"0x8D557468460B1D5"
Content-Type
image/png
X-Iinfo
2-112359014-112358732 2CNN RT(1575487325233 52) q(0 0 0 -1) r(0 0) U18
Cache-Control
max-age=315243858, public
Content-Length
155247
Expires
Fri, 30 Nov 2029 11:06:23 GMT
PDF-example-8.jpg
cloudblogs.microsoft.com/uploads/prod/2018/01/
27 KB
28 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-8.jpg
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
f3ebccaea92359e56bdc38f0296dccc9c85f17b101ceeba702b2f90dc7065332

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:51:28 GMT
X-CDN
Incapsula
Etag
"0x8D557468DCDC216"
Content-Type
image/jpeg
X-Iinfo
0-43794018-43783074 2CNN RT(1575487325233 61) q(0 0 0 -1) r(0 0) U18
Cache-Control
max-age=315243858, public
Content-Length
27922
Expires
Fri, 30 Nov 2029 11:06:23 GMT
PDF-example-7.png
cloudblogs.microsoft.com/uploads/prod/2018/01/
133 KB
134 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/01/PDF-example-7.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
818a4b1143bf8626755ff7421e9405d63f0d3049593df83c28ed9c0faa8c60ea

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Tue, 09 Jan 2018 09:51:20 GMT
X-CDN
Incapsula
Etag
"0x8D55746898257CA"
Content-Type
image/png
X-Iinfo
1-79581573-79581134 2CNN RT(1575487325233 67) q(0 1 1 -1) r(1 1) U18
Cache-Control
max-age=315243859, public
Content-Length
136405
Expires
Fri, 30 Nov 2029 11:06:24 GMT
windows-defender-atp-8.png
cloudblogs.microsoft.com/uploads/prod/2018/04/
22 KB
22 KB
Image
General
Full URL
https://cloudblogs.microsoft.com/uploads/prod/2018/04/windows-defender-atp-8.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.154.114.97 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
107.154.114.97.ip.incapdns.net
Software
/
Resource Hash
857b665b2ee3c407a22ead2afb97f7fcbb8752431c4829dd266e51ec6daac1de

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:05 GMT
Last-Modified
Wed, 06 Jun 2018 16:04:18 GMT
X-CDN
Incapsula
Etag
"0x8D5CBC728EFAC26"
Content-Type
image/png
X-Iinfo
2-112359014-0 0CNN RT(1575487325233 69) q(0 -1 -1 -1) r(0 -1)
Cache-Control
max-age=300214258, public
Content-Length
22032
Expires
Sat, 09 Jun 2029 12:13:03 GMT
MSC19_microsoftInclusion_redmond_078.jpg
www.microsoft.com/security/blog/wp-content/uploads/2019/11/
162 KB
163 KB
Image
General
Full URL
https://www.microsoft.com/security/blog/wp-content/uploads/2019/11/MSC19_microsoftInclusion_redmond_078.jpg
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
711c5a78f396b5804f31b6fc8113faf62f05fa232eeb3c8e45ed1dbe4d0fa587
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
21
date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Tue, 26 Nov 2019 18:14:20 GMT
x-rtag
RT
etag
"5ddd6b7c-289d7"
strict-transport-security
max-age=31536000
content-type
image/jpeg
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
accept-ranges
bytes
access-control-allow-origin
*
content-length
166359
dexphot-blog.jpg
www.microsoft.com/security/blog/wp-content/uploads/2019/11/
158 KB
158 KB
Image
General
Full URL
https://www.microsoft.com/security/blog/wp-content/uploads/2019/11/dexphot-blog.jpg
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
a086eb76a713049f3c3976035c47f45811ebf1c769d02fccea2c71d2a79b2a96
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
29
date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Mon, 25 Nov 2019 17:53:09 GMT
x-rtag
RT
etag
"5ddc1505-27687"
strict-transport-security
max-age=31536000
content-type
image/jpeg
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
accept-ranges
bytes
access-control-allow-origin
*
content-length
161415
The-Windows-10-random-number-generation-infrastructure-blog.png
www.microsoft.com/security/blog/wp-content/uploads/2019/11/
96 KB
96 KB
Image
General
Full URL
https://www.microsoft.com/security/blog/wp-content/uploads/2019/11/The-Windows-10-random-number-generation-infrastructure-blog.png
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
bf194f241e29332d6acf08273fad461b75d95713a4bb86c9016761f5e67ecfd6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
30
date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Mon, 25 Nov 2019 18:47:19 GMT
x-rtag
RT
etag
"5ddc21b7-17f68"
strict-transport-security
max-age=31536000
content-type
image/png
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
accept-ranges
bytes
access-control-allow-origin
*
content-length
98152
CTA-feature-1024x729.jpg
www.microsoft.com/security/blog/wp-content/uploads/2019/02/
161 KB
162 KB
Image
General
Full URL
https://www.microsoft.com/security/blog/wp-content/uploads/2019/02/CTA-feature-1024x729.jpg
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
a58941524adf31d97c86f42995772c3a250918e696d00afc4c78d149f2adc43f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
24
date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Tue, 26 Feb 2019 00:33:13 GMT
x-rtag
RT
etag
"5c748949-28405"
strict-transport-security
max-age=31536000
content-type
image/jpeg
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
accept-ranges
bytes
access-control-allow-origin
*
content-length
164869
microsoft-uhf.js
www.microsoft.com/security/blog/wp-content/plugins/microsoft-uhf/assets/
3 KB
1 KB
Script
General
Full URL
https://www.microsoft.com/security/blog/wp-content/plugins/microsoft-uhf/assets/microsoft-uhf.js?ver=0.2.0
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
30f70cbb95de1c084e40c56914124b3c133873440057daba9659694041245be6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
44
date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
last-modified
Mon, 13 May 2019 14:16:12 GMT
x-rtag
RT
etag
W/"5cd97c2c-ae9"
vary
Accept-Encoding
content-type
application/javascript
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
1202
eucc.js
www.microsoft.com/security/blog/wp-content/plugins/wds-microsoft-eu-cookie-compliance/assets/js/
9 KB
3 KB
Script
General
Full URL
https://www.microsoft.com/security/blog/wp-content/plugins/wds-microsoft-eu-cookie-compliance/assets/js/eucc.js?ver=2.2.2
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
c3c6fe97f918fcc40403ff671209d7d042dd4a8a7dc66e974eb1becc2bfe16ed
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
24
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
last-modified
Fri, 22 Feb 2019 16:33:32 GMT
x-rtag
RT
etag
W/"5c70245c-2542"
vary
Accept-Encoding
content-type
application/javascript
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
2931
uhf-search-ui.js
www.microsoft.com/security/blog/wp-content/plugins/wds-ms-searchwp/features/uhf-search-ui/
4 KB
1 KB
Script
General
Full URL
https://www.microsoft.com/security/blog/wp-content/plugins/wds-ms-searchwp/features/uhf-search-ui/uhf-search-ui.js?ver=1.0.1
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
16d6e957a9525cb4848051b0efc5aa101d256a3c6838007dc4ac2c41121eaade
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
24
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
last-modified
Tue, 02 Apr 2019 19:51:16 GMT
x-rtag
RT
etag
W/"5ca3bd34-105b"
vary
Accept-Encoding
content-type
application/javascript
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
1039
modernizr.js
www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/bower_components/modernizer/
50 KB
16 KB
Script
General
Full URL
https://www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/bower_components/modernizer/modernizr.js?ver=2.8.2
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
b828b15e9b7836b493a8bd6e832a24ee13aa8b6f8b4a1bf307a7af2912014178
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
108
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
last-modified
Fri, 22 Feb 2019 16:33:49 GMT
x-rtag
RT
etag
W/"5c70246d-c897"
vary
Accept-Encoding
content-type
application/javascript
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
15897
mwf-auto-init-main.var.min.js
assets.onestore.ms/cdnfiles/external/mwf/short/v1/latest/scripts/
303 KB
71 KB
Script
General
Full URL
https://assets.onestore.ms/cdnfiles/external/mwf/short/v1/latest/scripts/mwf-auto-init-main.var.min.js?ver=v1.23.2+5182151
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:281::2957 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
f2a28cd82e7ec00d2d8158f21fb0507722cd8b09fa4a0a16fadc58f30385cc25
Security Headers
Name Value
X-Content-Type-Options nosniff, nosniff, nosniff

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
x-content-type-options
nosniff, nosniff, nosniff
content-md5
12go4t01WZJhAGBag3beKQ==
status
200
content-length
71611
x-ms-lease-state
available
last-modified
Thu, 01 Feb 2018 02:22:29 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
etag
"0x8D5691AA4A3D407"
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-lease-state,x-ms-blob-type,Accept-Ranges
cache-control
max-age=900
accept-ranges
bytes
picturefill.min.js
www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/bower_components/picturefill/dist/
12 KB
5 KB
Script
General
Full URL
https://www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/bower_components/picturefill/dist/picturefill.min.js?ver=3.0.3
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
893fa7fe8b6e69e2828319c04a7cbb6f129ea820db695d4ced5757d59450b6a8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
22
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
last-modified
Fri, 22 Feb 2019 16:34:16 GMT
x-rtag
RT
etag
W/"5c702488-2e1f"
vary
Accept-Encoding
content-type
application/javascript
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
5181
imagesloaded.min.js
www.microsoft.com/security/blog/wp-includes/js/
8 KB
3 KB
Script
General
Full URL
https://www.microsoft.com/security/blog/wp-includes/js/imagesloaded.min.js?ver=3.2.0
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
854d677b850907cd851eac7e3f02f05a1e056f05bd5563199c5d93044ff16840
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
30
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
last-modified
Thu, 03 Nov 2016 05:40:34 GMT
x-rtag
RT
etag
W/"581acdd2-1f3a"
vary
Accept-Encoding
content-type
application/javascript
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
2491
masonry.min.js
www.microsoft.com/security/blog/wp-includes/js/
28 KB
9 KB
Script
General
Full URL
https://www.microsoft.com/security/blog/wp-includes/js/masonry.min.js?ver=3.3.2
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
3ca3e467b7d4d6b403aa4619019d9250b11449c8ee9c91c90bcbc9acdd64fea2
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
23
date
Wed, 04 Dec 2019 19:22:05 GMT
content-encoding
gzip
last-modified
Tue, 28 Jun 2016 18:48:31 GMT
x-rtag
RT
etag
W/"5772c67f-711a"
vary
Accept-Encoding
content-type
application/javascript
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
8584
project.min.js
www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/scripts/
7 KB
2 KB
Script
General
Full URL
https://www.microsoft.com/security/blog/wp-content/themes/ms-security/assets/scripts/project.min.js?ver=1.0.0
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
ea49a34ae66ff6330e30845980df1589a88990a50391b5b2d53248086c184924
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
28
date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
last-modified
Thu, 31 Oct 2019 20:10:49 GMT
x-rtag
RT
etag
W/"5dbb3fc9-1b58"
vary
Accept-Encoding
content-type
application/javascript
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
1988
wp-embed.min.js
www.microsoft.com/security/blog/wp-includes/js/
1 KB
988 B
Script
General
Full URL
https://www.microsoft.com/security/blog/wp-includes/js/wp-embed.min.js?ver=4.9.9
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
2152557cac69e2bd7d6debef5037a9f554f9209cc305b8141b3329acb10c42b7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-edgeconnect-origin-mex-latency
20
date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
last-modified
Fri, 31 Aug 2018 06:29:28 GMT
x-rtag
RT
etag
W/"5b88e048-57b"
vary
Accept-Encoding
content-type
application/javascript
status
200
tls_version
tls1.2
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000
access-control-allow-origin
*
content-length
753
d6-c4d640
www.microsoft.com/onerfstatics/marketingsites-wcus-prod/shell/_scrf/js/themes=default/54-af9f9f/c0-247156/de-099401/e1-a50eee/e7-954872/d8-97d509/f0-251fe2/46-be1318/77-04a268/11-240c7b/63-077520/a...
125 KB
34 KB
Script
General
Full URL
https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/shell/_scrf/js/themes=default/54-af9f9f/c0-247156/de-099401/e1-a50eee/e7-954872/d8-97d509/f0-251fe2/46-be1318/77-04a268/11-240c7b/63-077520/a4-34de62/1b-c96630/db-bc0148/dc-7e9864/78-4c7d22/38-74a735/16-4c1a9d/cd-23d3b0/6d-1e7ed0/b7-cadaa7/ca-40b7b0/4e-ee3a55/3e-f5c39b/c3-6454d7/f9-7592d3/92-10345d/79-499886/7e-cda2d3/62-95a6e7/93-283c2d/e0-3c9860/91-97a04f/1f-100dea/33-abe4df/d6-c4d640?ver=2.0&iife=1
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
3aeb702d542adff15de4de96b866ee317a8f35a4e8dea6a97be316cf6fc95d56
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

ms-operation-id
bef10a9157dfb046ac1465539f1b214a
date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-rtag
RT
x-s2
2019-10-22T20:34:19
p3p
CP="CAO CONi OTR OUR DEM ONL"
status
200
x-activity-id
ed65b800-869f-4aa2-a1eb-cc689661d0e3
tls_version
tls1.2
strict-transport-security
max-age=31536000
ms-cv
guq8p8SEXUytLqN+.0
vary
Accept-Encoding
content-length
33672
x-xss-protection
1; mode=block
last-modified
Tue, 22 Oct 2019 20:34:19 GMT
x-az
{did:92e7dc58ca2143cfb2c818b047cc5cd1, rid: OneDeployContainer, sn: marketingsites-prod-odeastasia, dt: 2018-05-03T20:14:23.4188992Z, bt: 2019-10-22T08:05:26.0000000Z}
x-s1
2019-10-22T20:34:19
access-control-allow-methods
HEAD,GET,POST,PATCH,PUT,OPTIONS
content-type
text/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=27825231
timing-allow-origin
*
x-appversion
1.0.7234.163
expires
Wed, 21 Oct 2020 20:35:57 GMT
meversion
mem.gfx.ms/
26 KB
9 KB
Script
General
Full URL
https://mem.gfx.ms/meversion?partner=MSSecurity&market=en-us&uhf=1
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:19d::37 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
f33b943eaaa424b7038bbc9d20d680946ff4dbe8d7edeab76e530f7e50322883
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:06 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Vary
Accept-Encoding
Content-Type
application/javascript
Expires
Wed, 04 Dec 2019 20:36:52 GMT
Cache-Control
public, no-transform, max-age=43200
Connection
keep-alive
Content-Length
9244
X-UA-Compatible
IE=edge
mscc-0.4.1.min.js
c.s-microsoft.com/mscc/statics/
3 KB
2 KB
Script
General
Full URL
https://c.s-microsoft.com/mscc/statics/mscc-0.4.1.min.js
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:284::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
c87516d7dd7077edd467f5b7b085b035cd4803ecf049670ab19de004e270aba8

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
last-modified
Mon, 10 Sep 2018 17:42:12 GMT
content-md5
XpofSqMdSqYPb4maLkXO+A==
access-control-allow-origin
*
etag
0x8D61744BD6EA9B6
vary
Accept-Encoding
access-control-allow-methods
GET,POST
content-type
text/javascript;charset=utf-8
status
200
x-ms-request-id
9fc6c4bd-001e-003f-1afe-49a444000000
x-ms-version
2009-09-19
content-length
1588
launch-ENc0cbffaf0f8248c3a934a56818d7737e.min.js
assets.adobedtm.com/
122 KB
26 KB
Script
General
Full URL
https://assets.adobedtm.com/launch-ENc0cbffaf0f8248c3a934a56818d7737e.min.js
Requested by
Host: query.prod.cms.rt.microsoft.com
URL: https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE1r2ij?ver=1.0.0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.88 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-88.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
6e6f9e1f8ac55da2ecd65a4f79760ee609d55790d54dcd457e0945195447df24

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
last-modified
Wed, 27 Nov 2019 21:04:13 GMT
server
AkamaiNetStorage
etag
"e1cc54d0eb6d42aef1e36be97f0457e2:1574888653.906279"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
26595
expires
Wed, 04 Dec 2019 20:22:06 GMT
mwfmdl2-v3.54.woff
www.microsoft.com/mwf/_h/v3.54/mwf.app/fonts/
26 KB
26 KB
Font
General
Full URL
https://www.microsoft.com/mwf/_h/v3.54/mwf.app/fonts/mwfmdl2-v3.54.woff
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
22b4df5c33045b645cafa45b04685f4752e471a2e933bff5bf14324d87deee12
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/west-european/shell/_scrf/css/themes=default.device=uplevel_web_pc/1d-2c4d46/9e-cf5a91/90-9e88ea/95-51d6a5/91-33a458/34-92be61/5f-45ce81/c0-271f35?ver=2.0
Origin
https://www.microsoft.com

Response headers

ms-operation-id
588b128e7354724d8b7117f3dc123198
date
Wed, 04 Dec 2019 19:22:06 GMT
x-content-type-options
nosniff
x-rtag
RT
p3p
CP="CAO CONi OTR OUR DEM ONL"
status
200
x-activity-id
cae7e3f7-cff9-4bc5-a8aa-1b308dd93b6c
tls_version
tls1.2
ms-cv
jbPaQc8zYE2JpeqB.0
content-length
26288
x-xss-protection
1; mode=block
last-modified
Fri, 01 Nov 2019 08:35:05 GMT
x-az
{did:92e7dc58ca2143cfb2c818b047cc5cd1, rid: OneDeployContainer, sn: marketingsites-prod-odnortheurope, dt: 2018-05-03T20:14:23.4188992Z, bt: 2019-10-26T07:31:04.0000000Z}
strict-transport-security
max-age=31536000
access-control-allow-methods
HEAD,GET,POST,PATCH,PUT,OPTIONS
content-type
application/font-woff
access-control-allow-origin
*
cache-control
public, max-age=28645823
x-appversion
1.0.7237.42332
expires
Sat, 31 Oct 2020 08:32:29 GMT
latest.woff2
c.s-microsoft.com/static/fonts/segoe-ui/west-european/Semibold/
29 KB
29 KB
Font
General
Full URL
https://c.s-microsoft.com/static/fonts/segoe-ui/west-european/Semibold/latest.woff2
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:284::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
d87d0a7a7fe2c36d1dc093bfe56e9b81b311988789dbd3b65abf811d551ef02f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://assets.onestore.ms/cdnfiles/external/mwf/short/v1/latest/css/mwf-west-european-default.min.css?ver=4.9.9
Origin
https://www.microsoft.com

Response headers

date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Mon, 28 Oct 2019 18:13:12 GMT
access-control-allow-origin
*
etag
"2bad5cbb8dd51:0"
access-control-allow-methods
GET,POST
content-type
font/woff2
status
200
cache-control
public, max-age=315668
accept-ranges
bytes
content-length
29388
expires
Sun, 08 Dec 2019 11:03:14 GMT
latest.woff2
c.s-microsoft.com/static/fonts/segoe-ui/west-european/normal/
33 KB
34 KB
Font
General
Full URL
https://c.s-microsoft.com/static/fonts/segoe-ui/west-european/normal/latest.woff2
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:284::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
4f7f4afe26e71fa9ca1dac4a43b557a554a46f53251d849f07ed08a04829d74b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://assets.onestore.ms/cdnfiles/external/mwf/short/v1/latest/css/mwf-west-european-default.min.css?ver=4.9.9
Origin
https://www.microsoft.com

Response headers

date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Mon, 28 Oct 2019 18:13:11 GMT
access-control-allow-origin
*
etag
"225db5cbb8dd51:0"
access-control-allow-methods
GET,POST
content-type
font/woff2
status
200
cache-control
public, max-age=200347
accept-ranges
bytes
content-length
34052
expires
Sat, 07 Dec 2019 03:01:13 GMT
latest.woff2
c.s-microsoft.com/static/fonts/segoe-ui/west-european/Bold/
29 KB
30 KB
Font
General
Full URL
https://c.s-microsoft.com/static/fonts/segoe-ui/west-european/Bold/latest.woff2
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:284::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
1232bbdbc5d205f3c5a40efa5ed92839c79e7879d5168445cc47645bb93f7d1b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://assets.onestore.ms/cdnfiles/external/mwf/short/v1/latest/css/mwf-west-european-default.min.css?ver=4.9.9
Origin
https://www.microsoft.com

Response headers

date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Mon, 28 Oct 2019 18:13:11 GMT
access-control-allow-origin
*
etag
"a6bb35cbb8dd51:0"
access-control-allow-methods
GET,POST
content-type
font/woff2
status
200
cache-control
public, max-age=202154
accept-ranges
bytes
content-length
30132
expires
Sat, 07 Dec 2019 03:31:20 GMT
latest.woff2
c.s-microsoft.com/static/fonts/segoe-ui/west-european/Light/
27 KB
27 KB
Font
General
Full URL
https://c.s-microsoft.com/static/fonts/segoe-ui/west-european/Light/latest.woff2
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:284::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
fe8a1047376498c80a157d13555e42a92ad480fcb0bcc9de51ad1930fbeb7f91

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://assets.onestore.ms/cdnfiles/external/mwf/short/v1/latest/css/mwf-west-european-default.min.css?ver=4.9.9
Origin
https://www.microsoft.com

Response headers

date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Mon, 28 Oct 2019 18:13:11 GMT
access-control-allow-origin
*
etag
"c4af95cbb8dd51:0"
access-control-allow-methods
GET,POST
content-type
font/woff2
status
200
cache-control
public, max-age=293511
accept-ranges
bytes
content-length
27168
expires
Sun, 08 Dec 2019 04:53:57 GMT
latest.woff2
c.s-microsoft.com/static/fonts/segoe-ui/west-european/Semilight/
28 KB
28 KB
Font
General
Full URL
https://c.s-microsoft.com/static/fonts/segoe-ui/west-european/Semilight/latest.woff2
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:284::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
6ba0d1a726f1887bd61727b308ed0be0e73edba17d4ad11b91ab19b632e078f6

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://assets.onestore.ms/cdnfiles/external/mwf/short/v1/latest/css/mwf-west-european-default.min.css?ver=4.9.9
Origin
https://www.microsoft.com

Response headers

date
Wed, 04 Dec 2019 19:22:06 GMT
last-modified
Mon, 28 Oct 2019 18:13:12 GMT
access-control-allow-origin
*
etag
"9031355cbb8dd51:0"
access-control-allow-methods
GET,POST
content-type
font/woff2
status
200
cache-control
public, max-age=325400
accept-ranges
bytes
content-length
28908
expires
Sun, 08 Dec 2019 13:45:26 GMT
_log
uhf.microsoft.com/
0
128 B
Image
General
Full URL
https://uhf.microsoft.com/_log?o=mscc&s=Microsoft.OneRenderFramework.Core&m=show&nv=aspnet-3.1.3&sv=0.1.2
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:286::2b57 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 04 Dec 2019 19:22:06 GMT
access-control-allow-origin
*
content-type
text/html
status
204
cache-control
max-age=0, no-cache, no-store
content-length
0
expires
Wed, 04 Dec 2019 19:22:06 GMT
admin-ajax.php
www.microsoft.com/security/blog/wp-admin/
58 B
912 B
XHR
General
Full URL
https://www.microsoft.com/security/blog/wp-admin/admin-ajax.php
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/wp-includes/js/jquery/jquery.js?ver=1.12.4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:18b::356e , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
c02f7dbcbf49114dec273e763bca1199ed3126242c464c0262893752c1c9281b
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN, SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
*/*
Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Origin
https://www.microsoft.com
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

x-edgeconnect-origin-mex-latency
614
content-security-policy
upgrade-insecure-requests
x-content-type-options
nosniff
x-rtag
RT
status
200
tls_version
tls1.2
content-length
58
x-xss-protection
1; mode=block
pragma
no-cache
nr-enabled
1
referrer-policy
strict-origin-when-cross-origin
wpe-backend
apache
x-frame-options
SAMEORIGIN, SAMEORIGIN
date
Wed, 04 Dec 2019 19:22:07 GMT
strict-transport-security
max-age=31536000
content-type
application/json; charset=UTF-8
x-wpe-loopback-upstream-addr
127.0.0.1:6783
cache-control
no-cache, must-revalidate, max-age=0, no-store
x-robots-tag
noindex
expires
Wed, 11 Jan 1984 05:00:00 GMT
meBoot.min.js
mem.gfx.ms/scripts/me/MeControl/10.19284.2/en-US/
125 KB
27 KB
Script
General
Full URL
https://mem.gfx.ms/scripts/me/MeControl/10.19284.2/en-US/meBoot.min.js
Requested by
Host: mem.gfx.ms
URL: https://mem.gfx.ms/meversion?partner=MSSecurity&market=en-us&uhf=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:19d::37 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
13ab7308f48b491c4de1fa8b0bd82339690b3cfc504d00d2a4bee2864dfad145
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:06 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Sat, 12 Oct 2019 08:12:32 GMT
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
27111
X-UA-Compatible
IE=edge
RCe273b42c34d5427cb02b2d6cd022cac2-source.min.js
assets.adobedtm.com/5ef092d1efb5/2537c33769cb/5479392a2ed0/
1 KB
757 B
Script
General
Full URL
https://assets.adobedtm.com/5ef092d1efb5/2537c33769cb/5479392a2ed0/RCe273b42c34d5427cb02b2d6cd022cac2-source.min.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/launch-ENc0cbffaf0f8248c3a934a56818d7737e.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.88 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-88.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
5f2f1728807dfd2796e654fc1b30ff5fcc18a6b5a0c8ba5c1a8d1a2f1336a055

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
last-modified
Wed, 27 Nov 2019 21:04:15 GMT
server
AkamaiNetStorage
etag
"6758b4a17179211cff3237127efa8c24:1574888654.965778"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
512
expires
Wed, 04 Dec 2019 20:22:06 GMT
RCe56af646359c4e659c7fca74ee3b2ab0-source.min.js
assets.adobedtm.com/5ef092d1efb5/2537c33769cb/5479392a2ed0/
2 KB
1 KB
Script
General
Full URL
https://assets.adobedtm.com/5ef092d1efb5/2537c33769cb/5479392a2ed0/RCe56af646359c4e659c7fca74ee3b2ab0-source.min.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/launch-ENc0cbffaf0f8248c3a934a56818d7737e.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.88 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-88.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
8620aa33023c11e39308f1026af1de5e1f3ce43e8128412ba186fca92b3ab6e3

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
last-modified
Wed, 27 Nov 2019 21:04:15 GMT
server
AkamaiNetStorage
etag
"6758b4a17179211cff3237127efa8c24:1574888654.965778"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
883
expires
Wed, 04 Dec 2019 20:22:06 GMT
RC609c6a62e6764307915e122757d5274b-source.min.js
assets.adobedtm.com/5ef092d1efb5/2537c33769cb/5479392a2ed0/
74 KB
19 KB
Script
General
Full URL
https://assets.adobedtm.com/5ef092d1efb5/2537c33769cb/5479392a2ed0/RC609c6a62e6764307915e122757d5274b-source.min.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/launch-ENc0cbffaf0f8248c3a934a56818d7737e.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.88 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-88.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
ad67d506d31532a55003e63f26fcfd5ee193265747dc828c329b948330124866

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
last-modified
Wed, 27 Nov 2019 21:04:15 GMT
server
AkamaiNetStorage
etag
"6758b4a17179211cff3237127efa8c24:1574888654.965778"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
19170
expires
Wed, 04 Dec 2019 20:22:06 GMT
RCf4d5a6b020184421bd20da64431bd00c-source.min.js
assets.adobedtm.com/5ef092d1efb5/2537c33769cb/5479392a2ed0/
1 KB
825 B
Script
General
Full URL
https://assets.adobedtm.com/5ef092d1efb5/2537c33769cb/5479392a2ed0/RCf4d5a6b020184421bd20da64431bd00c-source.min.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/launch-ENc0cbffaf0f8248c3a934a56818d7737e.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.88 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-88.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
19b0d1470aa5dbcfd66f7c2b919d6c4ffbbcd895c2ad1b5c609acf4a4b19b5af

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
last-modified
Wed, 27 Nov 2019 21:04:15 GMT
server
AkamaiNetStorage
etag
"6758b4a17179211cff3237127efa8c24:1574888654.965778"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
579
expires
Wed, 04 Dec 2019 20:22:06 GMT
RC28553343ff05437083fb511b81b7a31c-source.min.js
assets.adobedtm.com/5ef092d1efb5/2537c33769cb/5479392a2ed0/
50 KB
10 KB
Script
General
Full URL
https://assets.adobedtm.com/5ef092d1efb5/2537c33769cb/5479392a2ed0/RC28553343ff05437083fb511b81b7a31c-source.min.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/launch-ENc0cbffaf0f8248c3a934a56818d7737e.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.88 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-88.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
996d8ad221ebc8764e8bd0dc55ba83947f6cd393c4c265ab921ad6883ffc5b3d

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
last-modified
Wed, 27 Nov 2019 21:04:15 GMT
server
AkamaiNetStorage
etag
"6758b4a17179211cff3237127efa8c24:1574888654.965778"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
10085
expires
Wed, 04 Dec 2019 20:22:06 GMT
truncated
/
360 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
593dbe4f1db37a6da9d5f732bc4bb17eb419e2c9e42bd4b3d897bca85fa131b2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
jsll-4.js
az725175.vo.msecnd.net/scripts/
54 KB
18 KB
Script
General
Full URL
https://az725175.vo.msecnd.net/scripts/jsll-4.js
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.19.160 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8F78) /
Resource Hash
e6bbfa4af18fb4f0e9c8a31d6654eac92d0f82dc895c6e5f49b54a8de51e5923

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
content-md5
Dy7dMa7nsOSUbofNz/X23A==
x-cache
HIT
status
200
content-length
18058
x-ms-lease-status
unlocked
last-modified
Thu, 14 Mar 2019 00:43:49 GMT
server
ECAcc (frc/8F78)
etag
0x8D6A8161FD3B925
vary
Accept-Encoding
content-type
text/javascript; charset="utf-8"
x-ms-request-id
685050aa-301e-000f-4cd7-aa22dd000000
cache-control
public, max-age=1800, immutable
x-ms-version
2009-09-19
t.js
web.vortex.data.microsoft.com/collect/v1/
274 B
953 B
Script
General
Full URL
https://web.vortex.data.microsoft.com/collect/v1/t.js?ver=%272.1%27&name=%27Ms.Webi.PageView%27&time=%272019-12-04T19%3A22%3A06.433Z%27&os=%27MacOS%27&appId=%27JS%3AsecurityBlog%27&-ver=%271.0%27&-impressionGuid=%27f08fae71-a02e-410d-a765-48deded7856a%27&-pageName=%27Undefined%27&-uri=%27https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2017%2F01%2F26%2Fphishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments%2F%27&-resHeight=1200&-resWidth=1600&-pageTags=%27%7B%22metaTags%22%3A%7B%7D%7D%27&-behavior=0&*baseType=%27Ms.Content.PageView%27&*cookieEnabled=true&*isJs=true&*title=%27Phishers%20unleash%20simple%20but%20effective%20social%20engineering%20techniques%20using%20PDF%20attachments%20-%20Microsoft%20Security%27&*isLoggedIn=false&*flashInstalled=false&ext-javascript-ver=%271.1%27&ext-javascript-libVer=%274.2.14%27&ext-javascript-domain=%27www.microsoft.com%27&ext-javascript-userConsent=false&$mscomCookies=false
Requested by
Host: az725175.vo.msecnd.net
URL: https://az725175.vo.msecnd.net/scripts/jsll-4.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
40.77.226.250 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
/
Resource Hash
b366579bf9c02a7ba0a6b37b46cf80f53a69aa1b19a2510dac008869be8d6e90
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 04 Dec 2019 19:22:05 GMT
X-Content-Type-Options
nosniff
P3P
CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
Cache-Control
no-cache, no-store
MS-CV
NQewDDfJpEykE+am2cZLFg.0
Content-Type
application/javascript
Content-Length
274
Expires
0
v1
web.vortex.data.microsoft.com/collect/
0
0
Other
General
Full URL
https://web.vortex.data.microsoft.com/collect/v1?$mscomCookies=false&ext-javascript-msfpc=%27GUID%3De4eb9fb4a9654b82b6d0aa659a0e796e%26HASH%3De4eb%26LV%3D201912%26V%3D4%26LU%3D1575487326530%27
Requested by
Host: az725175.vo.msecnd.net
URL: https://az725175.vo.msecnd.net/scripts/jsll-4.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
40.77.226.250 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Origin
https://www.microsoft.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.microsoft.com
Access-Control-Allow-Headers
Accept, Authorization, Content-Type, Origin, X-Xbl-Contract-Version, X-Xbl-Device-Type, Xbl-Authz-Actor-10, WithCredentials
Access-Control-Allow-Credentials
true
RC02a99f79d83643db96d68f21ab6d4c4e-source.min.js
assets.adobedtm.com/5ef092d1efb5/2537c33769cb/5479392a2ed0/
2 KB
1 KB
Script
General
Full URL
https://assets.adobedtm.com/5ef092d1efb5/2537c33769cb/5479392a2ed0/RC02a99f79d83643db96d68f21ab6d4c4e-source.min.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/launch-ENc0cbffaf0f8248c3a934a56818d7737e.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.88 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-88.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
3bc7b48d45ef44968dc37c7969e0d52c215b5b96e8e1a987bd2e8aba558d4941

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 19:22:06 GMT
content-encoding
gzip
last-modified
Wed, 27 Nov 2019 21:04:15 GMT
server
AkamaiNetStorage
etag
"6758b4a17179211cff3237127efa8c24:1574888654.965778"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
810
expires
Wed, 04 Dec 2019 20:22:06 GMT
me.srf
login.live.com/ Frame ABBD
0
0
Document
General
Full URL
https://login.live.com/me.srf?wa=wsignin1.0&wreply=https%3A%2F%2Fwww.microsoft.com&uaid=653b3232-7dca-4d1b-2d86-3e88854bf68a&partnerId=mssecurity
Requested by
Host: mem.gfx.ms
URL: https://mem.gfx.ms/scripts/me/MeControl/10.19284.2/en-US/meBoot.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
40.90.22.187 San Jose, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Microsoft-IIS/10.0 /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
login.live.com
:scheme
https
:path
/me.srf?wa=wsignin1.0&wreply=https%3A%2F%2Fwww.microsoft.com&uaid=653b3232-7dca-4d1b-2d86-3e88854bf68a&partnerId=mssecurity
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/

Response headers

status
200
cache-control
no-cache, no-store
pragma
no-cache
content-type
text/html; charset=utf-8
content-encoding
gzip
expires
Wed, 04 Dec 2019 19:21:06 GMT
vary
Accept-Encoding
server
Microsoft-IIS/10.0
p3p
CP="DSP CUR OTPi IND OTRi ONL FIN"
set-cookie
uaid=653b32327dca4d1b2d863e88854bf68a; domain=login.live.com; Secure; path=/; HttpOnly MSPRequ=id=N&lt=1575487326&co=1; domain=login.live.com; Secure; path=/; HttpOnly
referrer-policy
strict-origin-when-cross-origin
ppserver
PPV: 30 H: BY1PPF3791C4B4F V: 0
x-content-type-options
nosniff
strict-transport-security
max-age=31536000
x-xss-protection
1; mode=block
date
Wed, 04 Dec 2019 19:22:06 GMT
content-length
4069
meCore.min.js
mem.gfx.ms/scripts/me/MeControl/10.19284.2/en-US/
85 KB
14 KB
Script
General
Full URL
https://mem.gfx.ms/scripts/me/MeControl/10.19284.2/en-US/meCore.min.js
Requested by
Host: mem.gfx.ms
URL: https://mem.gfx.ms/meversion?partner=MSSecurity&market=en-us&uhf=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:19d::37 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
a666ee5c412b03f970cd2c16fdddb343b0966c57416e9edcc0e7f13cae71b3b6
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:06 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Sat, 12 Oct 2019 08:12:32 GMT
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
13497
X-UA-Compatible
IE=edge
v1
web.vortex.data.microsoft.com/collect/
0
0
Other
General
Full URL
https://web.vortex.data.microsoft.com/collect/v1?$mscomCookies=false&ext-javascript-msfpc=%27GUID%3De4eb9fb4a9654b82b6d0aa659a0e796e%26HASH%3De4eb%26LV%3D201912%26V%3D4%26LU%3D1575487326530%27
Requested by
Host: az725175.vo.msecnd.net
URL: https://az725175.vo.msecnd.net/scripts/jsll-4.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
40.77.226.250 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Origin
https://www.microsoft.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.microsoft.com
Access-Control-Allow-Headers
Accept, Authorization, Content-Type, Origin, X-Xbl-Contract-Version, X-Xbl-Device-Type, Xbl-Authz-Actor-10, WithCredentials
Access-Control-Allow-Credentials
true
v1
web.vortex.data.microsoft.com/collect/
0
0
Other
General
Full URL
https://web.vortex.data.microsoft.com/collect/v1?$mscomCookies=false&ext-javascript-msfpc=%27GUID%3De4eb9fb4a9654b82b6d0aa659a0e796e%26HASH%3De4eb%26LV%3D201912%26V%3D4%26LU%3D1575487326530%27
Requested by
Host: az725175.vo.msecnd.net
URL: https://az725175.vo.msecnd.net/scripts/jsll-4.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
40.77.226.250 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Origin
https://www.microsoft.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.microsoft.com
Access-Control-Allow-Headers
Accept, Authorization, Content-Type, Origin, X-Xbl-Contract-Version, X-Xbl-Device-Type, Xbl-Authz-Actor-10, WithCredentials
Access-Control-Allow-Credentials
true
insight.min.js
snap.licdn.com/li.lms-analytics/
3 KB
2 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:10c:382::25ea , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:07 GMT
Content-Encoding
gzip
Last-Modified
Mon, 07 Oct 2019 16:41:31 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=22713
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1576
addthis_widget.js
s7.addthis.com/js/300/
349 KB
113 KB
Script
General
Full URL
https://s7.addthis.com/js/300/addthis_widget.js
Requested by
Host: www.microsoft.com
URL: https://www.microsoft.com/security/blog/wp-includes/js/jquery/jquery.js?ver=1.12.4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.21.36.164 , France, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-21-36-164.deploy.static.akamaitechnologies.com
Software
nginx/1.15.8 /
Resource Hash
7c20e3e201e3d7c6821e907def1257deb544eb08578c7129b96d53bbf62d34e4
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=15724800; includeSubDomains
content-encoding
gzip
last-modified
Wed, 30 Oct 2019 19:35:04 GMT
server
nginx/1.15.8
etag
W/"5db9e5e8-57446"
vary
Accept-Encoding
x-distribution
99
content-type
application/javascript
status
200
cache-control
public, max-age=600
date
Wed, 04 Dec 2019 19:22:07 GMT
x-host
s7.addthis.com
content-length
114924
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=7850&url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2017%2F01%2F26%2Fphishers-unleash-simple-but-effective-social-engineering-techniques-...
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D7850%26url%3Dhttps%253A%252F%252Fwww.microsoft.com%252Fsecurity%252Fblog%252F2017...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=7850&url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2017%2F01%2F26%2Fphishers-unleash-simple-but-effective-social-engineering-techniques-...
0
88 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=7850&url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2017%2F01%2F26%2Fphishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments%2F&time=1575487327099&liSync=true
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9105 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 19:22:07 GMT
content-encoding
gzip
server
Play
vary
Accept-Encoding
x-li-fabric
prod-lva1
status
200
x-li-proto
http/2
x-li-pop
prod-efr5
content-type
application/javascript
content-length
20
x-li-uuid
C0qgfGBB3RVwSlZHqCsAAA==

Redirect headers

date
Wed, 04 Dec 2019 19:22:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
nel
{"report_to":"network-errors","max_age":1296000,"success_fraction":0.00066,"failure_fraction":1,"include_subdomains":true}
status
302
report-to
{"group":"network-errors","max_age":2592000,"endpoints":[{"url":"https://www.linkedin.com/li/rep"}],"include_subdomains":true}
x-li-pop
prod-tln1
content-length
20
x-li-uuid
6hn6dmBB3RXQIUMl0CoAAA==
pragma
no-cache
server
Play
x-frame-options
sameorigin
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
vary
Accept-Encoding
strict-transport-security
max-age=2592000
x-li-fabric
prod-lva1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=7850&url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2017%2F01%2F26%2Fphishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments%2F&time=1575487327099&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js platform.linkedin.com platform-akam.linkedin.com platform-ecst.linkedin.com platform-azur.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
moatframe.js
z.moatads.com/addthismoatframe568911941483/
2 KB
1 KB
Script
General
Full URL
https://z.moatads.com/addthismoatframe568911941483/moatframe.js
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/300/addthis_widget.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
72.247.226.64 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-226-64.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
05090f9390f5bc0cd23fe5f432037cc92d7cbce1ced9bfe8faf3d1c9abae85cd

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 19:22:07 GMT
Content-Encoding
gzip
Last-Modified
Fri, 08 Nov 2019 20:13:52 GMT
Server
AmazonS3
x-amz-request-id
C0B7E130097BC605
ETag
"f14b4e1f799b14f798a195f43cf58376"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=24387
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
948
x-amz-id-2
WMRpIO186SrpMgXAdDxxqtwuB/nVpPpDrif5aSQ8+ORAAGwczaqMUoDLYLjYQOU+EHP09vSgz8E=
_ate.track.config_resp
v1.addthisedge.com/live/boost/ra-5a733b9bbd7faa84/
1 KB
785 B
Script
General
Full URL
https://v1.addthisedge.com/live/boost/ra-5a733b9bbd7faa84/_ate.track.config_resp
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/300/addthis_widget.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.21.36.164 , France, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-21-36-164.deploy.static.akamaitechnologies.com
Software
Jetty(9.4.8.v20180619) /
Resource Hash
6a364177c65b9a7868a5f155612c7a623fe69a55a75da2b0fe7068d865a577c4

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 19:22:07 GMT
content-encoding
gzip
surrogate-key
ra-5a733b9bbd7faa84
server
Jetty(9.4.8.v20180619)
etag
1462142690--gzip
vary
Accept-Encoding
cache-tag
ra-5a733b9bbd7faa84
status
200
cache-control
public, max-age=46, s-maxage=86400
content-disposition
attachment; filename=1.txt
content-type
application/javascript;charset=utf-8
content-length
539
v1
web.vortex.data.microsoft.com/collect/
0
0
Other
General
Full URL
https://web.vortex.data.microsoft.com/collect/v1?$mscomCookies=false&ext-javascript-msfpc=%27GUID%3De4eb9fb4a9654b82b6d0aa659a0e796e%26HASH%3De4eb%26LV%3D201912%26V%3D4%26LU%3D1575487326530%27
Requested by
Host: az725175.vo.msecnd.net
URL: https://az725175.vo.msecnd.net/scripts/jsll-4.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
40.77.226.250 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
Origin
https://www.microsoft.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.microsoft.com
Access-Control-Allow-Headers
Accept, Authorization, Content-Type, Origin, X-Xbl-Contract-Version, X-Xbl-Device-Type, Xbl-Authz-Actor-10, WithCredentials
Access-Control-Allow-Credentials
true
layers.ab5cd98fe1b9a38a4a9f.js
s7.addthis.com/static/
263 KB
76 KB
Script
General
Full URL
https://s7.addthis.com/static/layers.ab5cd98fe1b9a38a4a9f.js
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/300/addthis_widget.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.21.36.164 , France, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-21-36-164.deploy.static.akamaitechnologies.com
Software
nginx/1.15.8 /
Resource Hash
ecc0c4a707efeb061b7de57440221feb21ab08022938aaacee779e98fe809235
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

Referer
https://www.microsoft.com/security/blog/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=15724800; includeSubDomains
content-encoding
gzip
last-modified
Wed, 18 Sep 2019 14:16:17 GMT
server
nginx/1.15.8
etag
W/"5d823c31-41b9f"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86313600
date
Wed, 04 Dec 2019 19:22:07 GMT
x-host
s7.addthis.com
timing-allow-origin
*
content-length
77528

Verdicts & Comments Add Verdict or Comment

105 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| _wpemojiSettings object| twemoji object| wp object| oa function| $ function| jQuery object| mwf object| html5 object| Modernizr object| picturefillCFG function| picturefill object| addthis_config object| microsoftUhfSettings object| onShellReadyToLoad object| wdsMs365EUCC object| WDSMS_SearchWP object| mwfAutoInit function| EventEmitter object| eventie function| imagesLoaded function| getStyleProperty function| getSize function| docReady function| matchesSelector object| fizzyUIUtils function| Outlayer function| Masonry object| wdsWrapBrands object| wdsEmDashFix object| wdsPostFilterToggle object| masonryInit object| WDSSinglePostListMarkupObject object| wdsStickyAudioPlayer object| windowReady object| mscc object| msCommonShell object| onMeControlReadyToLoad object| MSA object| MeControl function| MeControlDefine function| MeControlImport object| jQuery112404344431484307263 object| _satellite boolean| __satelliteLoaded function| oaLoadRuleProd function| oaLoadRule function| oaLoadRuleDev object| utag_cfg_ovrd function| utf_event function| requireEUCompliance function| waitForUTF object| eventTagging object| oaTagging object| util object| oaTaggingStore object| oaSetupProvider object| oaQueueProvider object| oaDataStore boolean| utfLoaded function| getCookie undefined| A undefined| B undefined| GUID undefined| ID undefined| cookie1 undefined| cookie2 undefined| cookie3 object| awa string| behaviorKey undefined| googleCachebuster undefined| fbCachebuster undefined| lin undefined| googleAdsCNE undefined| fbPixel string| _linkedin_partner_id object| _linkedin_data_partner_ids function| lintrk boolean| _already_called_lintrk function| atwpjp string| _atd function| _euc function| _duc object| _atc string| _atr object| addthis string| addthis_pub function| emdot object| _ate object| _adr object| addthis_conf function| addthis_open function| addthis_close function| addthis_sendto object| addthis_share boolean| __@@##MUH object| oattr object| _atw string| addthis_exclude boolean| addthis_use_personalization string| addthis_options_default string| addthis_options_rank string| addthis_options object| __callbacks

6 Cookies

Domain/Path Name / Value
www.microsoft.com/ Name: MSFPC
Value: GUID=e4eb9fb4a9654b82b6d0aa659a0e796e&HASH=e4eb&LV=201912&V=4&LU=1575487326530
.microsoft.com/ Name: MS0
Value: f54e81ccf4bc4c9c92cd60a9c533624b
.microsoft.com/ Name: incap_ses_184_1204013
Value: QkribjznVnNVQdaExbSNAl0H6F0AAAAAlTHHdFvlC+3oTUHy7ymcTg==
.microsoft.com/ Name: MC1
Value: GUID=e4eb9fb4a9654b82b6d0aa659a0e796e&HASH=e4eb&LV=201912&V=4&LU=1575487326530
.microsoft.com/ Name: visid_incap_1204013
Value: 1xC5hpsERUG44+hEwRqgKF0H6F0AAAAAQUIPAAAAAAAimgQou9bcozpGFLJDXQT5
www.microsoft.com/ Name: X-Mapping-fjhppofk
Value: 93D06DBE5987EE64E12CE66A638A6CF5

7 Console Messages

Source Level URL
Text
console-api log URL: https://www.microsoft.com/security/blog/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1(Line 2)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1
console-api log (Line 2)
Message:
Start KWIF
console-api log (Line 2)
Message:
JSLL starts
console-api log (Line 2)
Message:
ID syncs starts
console-api log (Line 2)
Message:
JSLL ends
console-api log (Line 2)
Message:
AAM Visitor Lib starts
console-api log (Line 2)
Message:
ID syncs ends with appid

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy upgrade-insecure-requests
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

assets.adobedtm.com
assets.onestore.ms
az725175.vo.msecnd.net
c.s-microsoft.com
cloudblogs.microsoft.com
img-prod-cms-rt-microsoft-com.akamaized.net
login.live.com
mem.gfx.ms
px.ads.linkedin.com
query.prod.cms.rt.microsoft.com
s7.addthis.com
snap.licdn.com
statics-marketingsites-wcus-ms-com.akamaized.net
uhf.microsoft.com
v1.addthisedge.com
web.vortex.data.microsoft.com
www.linkedin.com
www.microsoft.com
z.moatads.com
107.154.114.97
152.199.19.160
184.30.221.161
2.16.186.32
2.21.36.164
2a02:26f0:10c:382::25ea
2a02:26f0:6c00:18b::356e
2a02:26f0:6c00:19d::37
2a02:26f0:6c00:281::2957
2a02:26f0:6c00:284::356e
2a02:26f0:6c00:286::2b57
2a02:26f0:6c00::210:ba1b
2a05:f500:10:101::b93f:9105
2a05:f500:11:101::b93f:9001
40.77.226.250
40.90.22.187
72.247.225.88
72.247.226.64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