jameskettle.com
Open in
urlscan Pro
138.68.117.124
Public Scan
Submission: On August 30 via manual from BR — Scanned from GB
Summary
TLS certificate: Issued by R3 on August 9th 2023. Valid for: 3 months.
This is the only time jameskettle.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 138.68.117.124 138.68.117.124 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
jameskettle.com
jameskettle.com |
7 KB |
1 | 1 |
Domain | Requested by | |
---|---|---|
1 | jameskettle.com | |
1 | 1 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jameskettle.com R3 |
2023-08-09 - 2023-11-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://jameskettle.com/
Frame ID: FA4F0189ADD49D29372E59F17E50778A
Requests: 1 HTTP requests in this frame
91 Outgoing links
These are links going to different origins than the main page.
Title: (full bio)
Search URL Search Domain Scan URL
Title: Twitter
Search URL Search Domain Scan URL
Title: Bluesky
Search URL Search Domain Scan URL
Title: Mastodon
Search URL Search Domain Scan URL
Title: LinkedIn
Search URL Search Domain Scan URL
Title: PortSwigger
Search URL Search Domain Scan URL
Title: Smashing the State Machine: The True Potential of Web Race Conditions
Search URL Search Domain Scan URL
Title: Browser-Powered Desync Attacks: A New Frontier in Request Smuggling
Search URL Search Domain Scan URL
Title: recording
Search URL Search Domain Scan URL
Title: HTTP Desync Attacks: Request Smuggling Reborn
Search URL Search Domain Scan URL
Title: recording
Search URL Search Domain Scan URL
Title: HTTP/2: The Sequel is Always Worse
Search URL Search Domain Scan URL
Title: recording
Search URL Search Domain Scan URL
Title: HTTP Request Smuggler
Search URL Search Domain Scan URL
Title: HTTP/3 Connection Contamination
Search URL Search Domain Scan URL
Title: Making HTTP header injection critical with response queue poisoning
Search URL Search Domain Scan URL
Title: Practical Web Cache Poisoning: Redefining 'Unexploitable'
Search URL Search Domain Scan URL
Title: recording
Search URL Search Domain Scan URL
Title: Web Cache Entanglement: Novel Pathways to Poisoning
Search URL Search Domain Scan URL
Title: recording
Search URL Search Domain Scan URL
Title: Responsible denial of service with web cache poisoning
Search URL Search Domain Scan URL
Title: Bypassing Web Cache Poisoning Countermeasures
Search URL Search Domain Scan URL
Title: Backslash Powered Scanner: Automating Human Intuition
Search URL Search Domain Scan URL
Title: recording
Search URL Search Domain Scan URL
Title: Hunting Asynchronous Vulnerabilities
Search URL Search Domain Scan URL
Title: recording
Search URL Search Domain Scan URL
Title: Turbo Intruder: Embracing the billion-request attack
Search URL Search Domain Scan URL
Title: recording
Search URL Search Domain Scan URL
Title: Param Miner
Search URL Search Domain Scan URL
Title: ActiveScan++
Search URL Search Domain Scan URL
Title: recording
Search URL Search Domain Scan URL
Title: Cracking the Lens: Targeting HTTP's Hidden Attack-Surface
Search URL Search Domain Scan URL
Title: recording
Search URL Search Domain Scan URL
Title: Exploiting CORS Misconfigurations for Bitcoins and Bounties
Search URL Search Domain Scan URL
Title: recording
Search URL Search Domain Scan URL
Title: Server-Side Template Injection
Search URL Search Domain Scan URL
Title: recording
Search URL Search Domain Scan URL
Title: CSV Formula Injection
Search URL Search Domain Scan URL
Title: Practical HTTP Host header attacks
Search URL Search Domain Scan URL
Title: Hunting Evasive Vulnerabilities - Finding Flaws that Others Miss
Search URL Search Domain Scan URL
Title: So you want to become a web security researcher?
Search URL Search Domain Scan URL
Title: How I choose a security research topic
Search URL Search Domain Scan URL
Title: Absolute AppSec
Search URL Search Domain Scan URL
Title: gareth
Search URL Search Domain Scan URL
Title: magic mac
Search URL Search Domain Scan URL
Title: lcamtuf
Search URL Search Domain Scan URL
Title: filedescriptor
Search URL Search Domain Scan URL
Title: agarri
Search URL Search Domain Scan URL
Title: fin1te
Search URL Search Domain Scan URL
Title: ezequiel pereira
Search URL Search Domain Scan URL
Title: homakov
Search URL Search Domain Scan URL
Title: irsdl
Search URL Search Domain Scan URL
Title: .mario
Search URL Search Domain Scan URL
Title: insertScript
Search URL Search Domain Scan URL
Title: sirdarckcat
Search URL Search Domain Scan URL
Title: kkotowicz
Search URL Search Domain Scan URL
Title: ush.it
Search URL Search Domain Scan URL
Title: webstersprodigy
Search URL Search Domain Scan URL
Title: kuza55
Search URL Search Domain Scan URL
Title: neal poole
Search URL Search Domain Scan URL
Title: Top 10 web hacking techniques of 2022
Search URL Search Domain Scan URL
Title: How to turn security research into profit
Search URL Search Domain Scan URL
Title: Top 10 web hacking techniques of 2021
Search URL Search Domain Scan URL
Title: Top 10 web hacking techniques of 2020
Search URL Search Domain Scan URL
Title: Interview on security research with The InfoSec&OSINT show
Search URL Search Domain Scan URL
Title: Non-technical interview on hacking with Easy Prey
Search URL Search Domain Scan URL
Title: Interview on security research with NahamSec
Search URL Search Domain Scan URL
Title: Top 10 web hacking techniques of 2019
Search URL Search Domain Scan URL
Title: Breaking the chains on HTTP Request Smuggler
Search URL Search Domain Scan URL
Title: Cracking reCAPTCHA, Turbo Intruder style
Search URL Search Domain Scan URL
Title: HTTP Desync Attacks: what happened next
Search URL Search Domain Scan URL
Title: Top 10 Web Hacking Techniques of 2018
Search URL Search Domain Scan URL
Title: Top 10 Web Hacking Techniques of 2017
Search URL Search Domain Scan URL
Title: Burp Hacks for Bounty Hunters (video)
Search URL Search Domain Scan URL
Title: BBC Interview
Search URL Search Domain Scan URL
Title: h1-212 Video Interview
Search URL Search Domain Scan URL
Title: h1-212 CTF Writeup
Search URL Search Domain Scan URL
Title: hackxor2 (web application hacking game)
Search URL Search Domain Scan URL
Title: When Security Features Collide
Search URL Search Domain Scan URL
Title: Interview with Bug Bounty Forum
Search URL Search Domain Scan URL
Title: Adapting Burp Extensions for Bespoke Pentesting
Search URL Search Domain Scan URL
Title: How I Accidentally Framed Myself
Search URL Search Domain Scan URL
Title: Abusing OWASP with 'Insufficient Attack Protection'
Search URL Search Domain Scan URL
Title: Interview with HackerOne about PortSwigger's bug bounty
Search URL Search Domain Scan URL
Title: Reviewing bug bounties - a hacker's perspective
Search URL Search Domain Scan URL
Title: Web Storage: the lesser evil for session tokens
Search URL Search Domain Scan URL
Title: Adapting AngularJS Payloads to Exploit Real World Applications
Search URL Search Domain Scan URL
Title: Detecting and exploiting path-relative stylesheet import (PRSSI) vulnerabilities
Search URL Search Domain Scan URL
Title: X-Frame-Options Gotcha
Search URL Search Domain Scan URL
Title: Phrack ebook
Search URL Search Domain Scan URL
Title: hackxor
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
jameskettle.com/ |
20 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
jameskettle.com
138.68.117.124
8ba27742d68dc9adb98a89fb36ba861de835c739a4afcc7a38492a4c9ad196cf