URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Submission: On March 26 via automatic, source hackernews

Summary

This website contacted 91 IPs in 6 countries across 57 domains to perform 246 HTTP transactions. The main IP is 50.31.169.131, located in Chicago, United States and belongs to SERVERCENTRAL - Server Central Network, US. The main domain is arstechnica.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 16th 2019. Valid for: 2 years.
This is the only time arstechnica.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 50.31.169.131 23352 (SERVERCEN...)
16 205.234.175.175 30081 (CACHENETW...)
2 95.100.196.33 16625 (AKAMAI-AS)
3 151.139.128.10 20446 (HIGHWINDS3)
1 2a00:1450:400... 15169 (GOOGLE)
1 151.101.0.239 54113 (FASTLY)
1 95.100.198.179 16625 (AKAMAI-AS)
2 52.4.39.251 14618 (AMAZON-AES)
1 3 52.31.44.252 16509 (AMAZON-02)
1 10 2a00:1450:400... 15169 (GOOGLE)
1 91.228.74.164 27281 (QUANTCAST)
1 46.228.164.13 56396 (TURN)
4 2a03:2880:f01... 32934 (FACEBOOK)
1 13.35.253.13 16509 (AMAZON-02)
1 35.190.92.63 15169 (GOOGLE)
1 35.161.216.48 16509 (AMAZON-02)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
3 52.1.219.33 14618 (AMAZON-AES)
1 3 104.121.166.105 16625 (AKAMAI-AS)
1 13.35.254.197 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a03:2880:f11... 32934 (FACEBOOK)
1 34.199.66.245 14618 (AMAZON-AES)
1 2600:9000:204... 16509 (AMAZON-02)
2 52.44.76.10 14618 (AMAZON-AES)
2 54.174.217.231 14618 (AMAZON-AES)
14 34.235.240.97 14618 (AMAZON-AES)
1 52.19.121.121 16509 (AMAZON-02)
2 63.140.41.50 15224 (OMNITURE)
1 1 66.117.28.86 15224 (OMNITURE)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2 35.190.59.101 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
2 99.86.1.198 16509 (AMAZON-02)
2 13.35.253.95 16509 (AMAZON-02)
1 95.100.198.4 16625 (AKAMAI-AS)
1 52.30.183.205 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 143.204.214.107 16509 (AMAZON-02)
2 52.204.40.232 14618 (AMAZON-AES)
1 34.197.233.194 14618 (AMAZON-AES)
2 99.86.3.46 16509 (AMAZON-02)
2 3 2a05:f500:10:... 14413 (LINKEDIN)
1 1 2a05:f500:10:... 14413 (LINKEDIN)
8 104.103.102.169 16625 (AKAMAI-AS)
1 35.190.40.172 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
2 8 216.58.208.34 15169 (GOOGLE)
7 23.58.216.21 16625 (AKAMAI-AS)
2 2606:4700::68... 13335 (CLOUDFLAR...)
10 13.35.254.32 16509 (AMAZON-02)
1 50.31.142.51 22075 (AS-OUTBRAIN)
2 35.201.67.47 15169 (GOOGLE)
1 2600:9000:204... 16509 (AMAZON-02)
4 52.72.158.71 14618 (AMAZON-AES)
2 2a00:1450:400... 15169 (GOOGLE)
1 2600:9000:204... 16509 (AMAZON-02)
2 34.216.81.97 16509 (AMAZON-02)
2 2 185.33.223.206 29990 (ASN-APPNEXUS)
7 34.215.123.63 16509 (AMAZON-02)
1 2 54.72.175.179 ()
2 2 185.64.189.110 62713 (AS-PUBMATIC)
1 1 193.0.160.128 ()
1 13.35.254.41 ()
1 13.35.253.9 ()
3 2a00:1450:400... ()
2 13.35.254.94 ()
1 34.199.180.208 ()
1 178.250.2.130 ()
1 13.35.253.129 ()
1 54.82.158.121 ()
1 151.101.2.2 ()
2 52.94.218.7 ()
8 20 152.195.39.114 ()
6 213.19.162.61 ()
4 88.221.165.92 ()
6 52.2.117.76 ()
3 2a00:1450:400... ()
1 13.35.254.131 ()
1 2a00:1450:400... ()
1 13.35.254.113 ()
9 54.165.0.24 ()
2 13.35.253.78 ()
3 13.35.253.82 ()
1 52.27.154.203 ()
2 35.153.236.75 ()
4 95.100.199.29 ()
1 2606:4700::68... 13335 (CLOUDFLAR...)
4 104.17.192.78 13335 (CLOUDFLAR...)
2 2606:4700::68... 13335 (CLOUDFLAR...)
2 35.174.111.199 14618 (AMAZON-AES)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 13.35.254.100 16509 (AMAZON-02)
1 54.77.130.155 16509 (AMAZON-02)
2 178.250.0.165 44788 (ASN-CRITE...)
246 91
Apex Domain
Subdomains
Transfer
37 condenastdigital.com
pixel.condenastdigital.com
infinityid.condenastdigital.com
4d.condenastdigital.com
capture.condenastdigital.com
22 KB
22 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
dwgyu36up6iuz.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
1 MB
20 advertising.com
adserver-us.adtech.advertising.com
5 KB
16 arstechnica.net
cdn.arstechnica.net
637 KB
11 ad.gt
a.ad.gt
p.ad.gt
ids.ad.gt
pixels.ad.gt
21 KB
10 doubleclick.net
stats.g.doubleclick.net
securepubads.g.doubleclick.net
cm.g.doubleclick.net
pubads.g.doubleclick.net
92 KB
9 evidon.com
c.evidon.com
iabmap.evidon.com
36 KB
9 google-analytics.com
www.google-analytics.com
21 KB
8 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
65 KB
7 skimresources.com
s.skimresources.com
r.skimresources.com
p.skimresources.com
t.skimresources.com
17 KB
6 moatads.com
z.moatads.com
v4.moatads.com
px.moatads.com
266 KB
6 rubiconproject.com
fastlane.rubiconproject.com
9 KB
5 googlesyndication.com
pagead2.googlesyndication.com
tpc.googlesyndication.com
63 KB
5 google.com
ampcid.google.com
www.google.com
adservice.google.com
1 KB
5 demdex.net
dpm.demdex.net
condenast.demdex.net
9 KB
5 cnevids.com
api.cnevids.com
player.cnevids.com
56 KB
4 polarcdn-pentos.com
polarcdn-pentos.com
789 B
4 casalemedia.com
as-sec.casalemedia.com
3 KB
4 betrad.com
l.betrad.com
480 B
4 linkedin.com
px.ads.linkedin.com
www.linkedin.com
3 KB
4 amazon-adsystem.com
c.amazon-adsystem.com
aax.amazon-adsystem.com
23 KB
4 googletagservices.com
www.googletagservices.com
98 KB
4 google.de
ampcid.google.de
www.google.de
adservice.google.de
564 B
4 facebook.net
connect.facebook.net
120 KB
3 googleapis.com
imasdk.googleapis.com
106 KB
3 polarcdn-terrax.com
polarcdn-terrax.com
18 KB
3 consensu.org
api.skimlinks.mgr.consensu.org
vendorlist.consensu.org
evidon.mgr.consensu.org
16 KB
3 parsely.com
srv-2019-03-26-20.config.parsely.com
srv-2019-03-26-20.pixel.parsely.com
1 KB
3 scorecardresearch.com
sb.scorecardresearch.com
1 KB
3 medtargetsystem.com
www.medtargetsystem.com
95 KB
3 bounceexchange.com
tag.bounceexchange.com
assets.bounceexchange.com
98 KB
3 arstechnica.com
arstechnica.com
sstats.arstechnica.com
15 KB
2 criteo.com
bidder.criteo.com
426 B
2 plrsrvcs.com
bw-prod.plrsrvcs.com
2 KB
2 pubmatic.com
image2.pubmatic.com
995 B
2 adsrvr.org
match.adsrvr.org
981 B
2 adnxs.com
secure.adnxs.com
2 KB
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
121 KB
2 facebook.com
www.facebook.com
243 B
2 outbrain.com
widgets.outbrain.com
odb.outbrain.com
48 KB
2 adobedtm.com
assets.adobedtm.com
42 KB
1 polarcdn.com
static.polarcdn.com
111 KB
1 2mdn.net
s0.2mdn.net
10 KB
1 rlcdn.com
api.rlcdn.com
50 B
1 rkdms.com
mid.rkdms.com
399 B
1 criteo.net
static.criteo.net
25 KB
1 rfihub.com
p.rfihub.com
886 B
1 arsdev.net
cdn.accelerator.arsdev.net
305 B
1 zqtk.net
segment-data.zqtk.net
902 B
1 indexww.com
js-sec.indexww.com
38 KB
1 everesttech.net
cm.everesttech.net
527 B
1 quantcount.com
rules.quantcount.com
2 KB
1 licdn.com
snap.licdn.com
5 KB
1 sail-horizon.com
ak.sail-horizon.com
41 KB
1 turn.com
d.turn.com
698 B
1 quantserve.com
secure.quantserve.com
6 KB
1 googletagmanager.com
www.googletagmanager.com
61 KB
246 57
Domain Requested by
29 capture.condenastdigital.com arstechnica.com
20 adserver-us.adtech.advertising.com 8 redirects arstechnica.com
16 cdn.arstechnica.net arstechnica.com
11 dwgyu36up6iuz.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
9 www.google-analytics.com 1 redirects www.googletagmanager.com
www.google-analytics.com
arstechnica.com
8 c.evidon.com assets.adobedtm.com
c.evidon.com
arstechnica.com
7 ids.ad.gt arstechnica.com
6 images.outbrainimg.com arstechnica.com
6 fastlane.rubiconproject.com js-sec.indexww.com
5 dp8hsntg6do36.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
5 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
arstechnica.com
4 polarcdn-pentos.com static.polarcdn.com
4 as-sec.casalemedia.com js-sec.indexww.com
4 d2c8v52ll5s99u.cloudfront.net player.cnevids.com
imasdk.googleapis.com
d2c8v52ll5s99u.cloudfront.net
4 l.betrad.com arstechnica.com
4 www.googletagservices.com cdn.arstechnica.net
securepubads.g.doubleclick.net
4 4d.condenastdigital.com pixel.condenastdigital.com
cdn.arstechnica.net
4 connect.facebook.net arstechnica.com
connect.facebook.net
d2c8v52ll5s99u.cloudfront.net
3 z.moatads.com securepubads.g.doubleclick.net
d2c8v52ll5s99u.cloudfront.net
3 tpc.googlesyndication.com securepubads.g.doubleclick.net
3 imasdk.googleapis.com player.cnevids.com
imasdk.googleapis.com
3 polarcdn-terrax.com cdn.mediavoice.com
static.polarcdn.com
arstechnica.com
3 px.ads.linkedin.com 2 redirects arstechnica.com
3 player.cnevids.com cdn.arstechnica.net
player.cnevids.com
3 infinityid.condenastdigital.com pixel.condenastdigital.com
cdn.arstechnica.net
d2c8v52ll5s99u.cloudfront.net
3 sb.scorecardresearch.com 1 redirects arstechnica.com
www.googletagmanager.com
3 www.medtargetsystem.com arstechnica.com
www.medtargetsystem.com
3 dpm.demdex.net 1 redirects arstechnica.com
2 bidder.criteo.com static.criteo.net
2 v4.moatads.com arstechnica.com
2 bw-prod.plrsrvcs.com static.polarcdn.com
arstechnica.com
2 srv-2019-03-26-20.pixel.parsely.com arstechnica.com
2 aax.amazon-adsystem.com c.amazon-adsystem.com
2 image2.pubmatic.com 2 redirects
2 cm.g.doubleclick.net 2 redirects
2 match.adsrvr.org 1 redirects js-sec.indexww.com
2 secure.adnxs.com 2 redirects
2 p.ad.gt a.ad.gt
arstechnica.com
2 pagead2.googlesyndication.com securepubads.g.doubleclick.net
arstechnica.com
2 t.skimresources.com s.skimresources.com
2 adservice.google.com www.googletagservices.com
imasdk.googleapis.com
2 assets.bounceexchange.com tag.bounceexchange.com
assets.bounceexchange.com
2 c.amazon-adsystem.com cdn.arstechnica.net
c.amazon-adsystem.com
2 p.skimresources.com arstechnica.com
2 r.skimresources.com 1 redirects arstechnica.com
2 www.google.de arstechnica.com
2 www.google.com 2 redirects
2 stats.g.doubleclick.net 2 redirects
2 sstats.arstechnica.com arstechnica.com
2 condenast.demdex.net arstechnica.com
2 www.facebook.com arstechnica.com
connect.facebook.net
2 d1z2jf7jlzjs58.cloudfront.net arstechnica.com
d1z2jf7jlzjs58.cloudfront.net
2 api.cnevids.com cdn.arstechnica.net
2 assets.adobedtm.com arstechnica.com
assets.adobedtm.com
1 px.moatads.com
1 pubads.g.doubleclick.net d2c8v52ll5s99u.cloudfront.net
1 static.polarcdn.com securepubads.g.doubleclick.net
1 pixels.ad.gt p.ad.gt
1 s0.2mdn.net imasdk.googleapis.com
1 odb.outbrain.com widgets.outbrain.com
1 api.rlcdn.com js-sec.indexww.com
1 mid.rkdms.com js-sec.indexww.com
1 static.criteo.net js-sec.indexww.com
1 evidon.mgr.consensu.org c.evidon.com
1 p.rfihub.com 1 redirects
1 vendorlist.consensu.org c.evidon.com
1 iabmap.evidon.com c.evidon.com
1 log.outbrainimg.com widgets.outbrain.com
1 plugin.mediavoice.com cdn.mediavoice.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 adservice.google.de www.googletagservices.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 www.linkedin.com 1 redirects
1 cdn.accelerator.arsdev.net cdn.arstechnica.net
1 cdn.mediavoice.com cdn.arstechnica.net
1 segment-data.zqtk.net cdn.arstechnica.net
1 js-sec.indexww.com cdn.arstechnica.net
1 cm.everesttech.net 1 redirects
1 ampcid.google.de www.google-analytics.com
1 rules.quantcount.com secure.quantserve.com
1 srv-2019-03-26-20.config.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 ampcid.google.com www.google-analytics.com
1 snap.licdn.com arstechnica.com
1 a.ad.gt www.googletagmanager.com
1 tag.bounceexchange.com arstechnica.com
1 ak.sail-horizon.com www.googletagmanager.com
1 d.turn.com arstechnica.com
1 secure.quantserve.com www.googletagmanager.com
1 widgets.outbrain.com cdn.arstechnica.net
1 pixel.condenastdigital.com cdn.arstechnica.net
1 www.googletagmanager.com arstechnica.com
1 s.skimresources.com arstechnica.com
1 arstechnica.com
246 93
Subject Issuer Validity Valid
*.arstechnica.com
Sectigo RSA Domain Validation Secure Server CA
2019-01-16 -
2021-01-15
2 years crt.sh
*.cachefly.net
GlobalSign Organization Validation CA - SHA256 - G2
2018-09-14 -
2019-09-29
a year crt.sh
assets.adobedtm.com
DigiCert SHA2 High Assurance Server CA
2019-03-04 -
2020-03-11
a year crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.google-analytics.com
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
condenast.com
GlobalSign CloudSSL CA - SHA256 - G3
2019-02-22 -
2019-09-07
6 months crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.cnevids.com
Trusted Secure Certificate Authority 5
2017-01-10 -
2020-01-10
3 years crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2018-10-16 -
2019-10-21
a year crt.sh
*.turn.com
DigiCert SHA2 Secure Server CA
2019-01-25 -
2020-03-31
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-03-08 -
2019-06-06
3 months crt.sh
ak.sail-horizon.com
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
tag.bounceexchange.com
Thawte RSA CA 2018
2018-08-13 -
2020-08-12
2 years crt.sh
*.ad.gt
Amazon
2018-08-03 -
2019-09-03
a year crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2016-02-16 -
2019-04-17
3 years crt.sh
medtargetsystem.com
Amazon
2018-11-23 -
2019-12-23
a year crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.cloudfront.net
DigiCert Global CA G2
2018-10-08 -
2019-10-09
a year crt.sh
*.google.com
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
*.config.parsely.com
Amazon
2019-02-27 -
2020-03-27
a year crt.sh
*.conde.io
Amazon
2018-05-22 -
2019-06-22
a year crt.sh
sstats.arstechnica.com
DigiCert SHA2 High Assurance Server CA
2019-03-03 -
2020-06-05
a year crt.sh
www.google.de
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
c.amazon-adsystem.com
Amazon
2018-12-18 -
2019-11-21
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-01-09 -
2020-03-09
a year crt.sh
*.zqtk.net
COMODO RSA Domain Validation Secure Server CA
2018-08-09 -
2020-08-24
2 years crt.sh
ssl962336.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-01-25 -
2019-12-11
a year crt.sh
*.accelerator.arsdev.net
Amazon
2018-08-14 -
2019-09-14
a year crt.sh
*.bounceexchange.com
Amazon
2018-08-21 -
2019-09-21
a year crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2017-06-06 -
2019-06-11
2 years crt.sh
*.evidon.com
DigiCert ECC Secure Server CA
2019-02-01 -
2020-05-02
a year crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2018-08-15 -
2019-10-23
a year crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
ssl446800.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-10-26 -
2019-05-04
6 months crt.sh
l.betrad.com
Go Daddy Secure Certificate Authority - G2
2017-04-25 -
2019-06-24
2 years crt.sh
vendorlist.consensu.org
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
*.googleapis.com
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
evidon.mgr.consensu.org
Amazon
2018-09-20 -
2019-10-20
a year crt.sh
*.criteo.net
DigiCert SHA2 Secure Server CA
2018-11-08 -
2019-12-19
a year crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2017-02-15 -
2019-04-19
2 years crt.sh
*.rkdms.com
Entrust Certification Authority - L1K
2017-10-09 -
2020-10-30
3 years crt.sh
*.rlcdn.com
Go Daddy Secure Certificate Authority - G2
2017-05-08 -
2019-06-21
2 years crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-02-28 -
2019-09-07
6 months crt.sh
aax-eu.amazon-adsystem.com
Amazon
2018-12-12 -
2019-12-10
a year crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
tpc.googlesyndication.com
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
*.doubleclick.net
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
*.pixel.parsely.com
Amazon
2019-02-27 -
2020-03-27
a year crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
ssl962736.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-12-19 -
2019-12-11
a year crt.sh
ssl887612.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-03-21 -
2019-09-27
6 months crt.sh
ssl880796.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-02-20 -
2019-08-29
6 months crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2018-04-27 -
2019-04-27
a year crt.sh
*.criteo.com
DigiCert SHA2 Secure Server CA
2018-11-05 -
2020-01-03
a year crt.sh

This page contains 9 frames:

Primary Page: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Frame ID: FED6158FF07B32991921DAFDF664DC1D
Requests: 209 HTTP requests in this frame

Frame: https://condenast.demdex.net/dest5.html?d_nsid=0
Frame ID: 836BC8454879550914627A78D801761D
Requests: 1 HTTP requests in this frame

Frame: https://assets.bounceexchange.com/assets/bounce/local_storage_frame10.min.html
Frame ID: 5FA149CB7D60E9B93BFD9EC11F947C95
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: 15F417BE843F3CC4798AC7C65504FAFF
Requests: 1 HTTP requests in this frame

Frame: https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com&_sid=9a48abb9-8103-4848-9d36-5abfef114ea0&_vid=b1d8df26-d483-4d01-90f6-150d170d5e9d&_ak=119-556-B0E9F642&_flash=false&_th=1553630943|1553630943|1
Frame ID: 635631FA5C9E06D4F3FADF9FF53CD38C
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: FC51843FBD8109A372307F0AC723E043
Requests: 30 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.288.0_en.html
Frame ID: EEB8CD6B3C352FFB2C4F0898910BF44E
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20190320/r20110914/client/ext/m_window_focus_non_hydra.js
Frame ID: ED38162E87ECF11FDF017B51DB04FC29
Requests: 7 HTTP requests in this frame

Frame: https://static.polarcdn.com/creative/creative.js
Frame ID: BEDA1BB797B1D4283773136E8E599DBF
Requests: 12 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^bouncex$/i

Overall confidence: 100%
Detected patterns
  • env /^criteo/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i
  • env /^google_ad_/i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i
  • env /^google_tag_manager$/i

Overall confidence: 100%
Detected patterns
  • env /^moment$/i

Overall confidence: 100%
Detected patterns
  • env /^(?:OutbrainPermaLink|OB_releaseVer)$/i

Overall confidence: 100%
Detected patterns
  • env /^PARSELY$/i

Overall confidence: 100%
Detected patterns
  • env /^quantserve$/i

Overall confidence: 100%
Detected patterns
  • env /^s_(?:account|objectID|code|INST)$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

246
Requests

99 %
HTTPS

26 %
IPv6

57
Domains

93
Subdomains

91
IPs

6
Countries

3623 kB
Transfer

9309 kB
Size

9
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 42
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1553630943456&ns_c=UTF-8&c8=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1553630943456&ns_c=UTF-8&c8=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&c9=
Request Chain 58
  • https://cm.everesttech.net/cm/dd?d_uuid=89416840437891243151553249337284938108 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XJqG3wAAD99oaTx0
Request Chain 60
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j73&tid=UA-31997-1&cid=1490859193.1553630944&jid=1099697110&gjid=1450493192&_gid=937842907.1553630944&_u=aGBAgUAjAAQC~&z=1655488746 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1490859193.1553630944&jid=1099697110&_v=j73&z=1655488746 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1490859193.1553630944&jid=1099697110&_v=j73&z=1655488746&slf_rd=1&random=991177287
Request Chain 61
  • https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22huawei.com%22%2C%22microsoft.com%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%7D HTTP 302
  • https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&persistence=1&xguid=01D6XSXPET8DYQAJAZB4WMSXGC&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22huawei.com%22%2C%22microsoft.com%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%7D&checksum=168db696a088d4d2a09add8810c6b51831f38242b7f85cd17df5351435625c6e
Request Chain 77
  • https://px.ads.linkedin.com/collect/?time=1553630943699&pid=895394&url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&fmt=js&s=1 HTTP 302
  • https://px.ads.linkedin.com/collect/?time=1553630943699&pid=895394&url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&fmt=js&s=1&cookiesTest=true HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%2F%3Ftime%3D1553630943699%26pid%3D895394%26url%3Dhttps%253A%252F%252Farstechnica.com%252Fgadgets%252F2019%252F03%252Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%252F%26fmt%3Djs%26s%3D1%26cookiesTest%3Dtrue%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect/?time=1553630943699&pid=895394&url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&fmt=js&s=1&cookiesTest=true&liSync=true
Request Chain 124
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&adnxs_id=$UID HTTP 302
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3Dfbe706c0-8779-4f63-8e5c-aa1e36fe7df4%26adnxs_id%3D%24UID HTTP 302
  • https://ids.ad.gt/api/v1/match?id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&adnxs_id=6747529858904683189
Request Chain 125
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4 HTTP 302
  • https://ids.ad.gt/api/v1/t_match?tdid=a2a0d053-9f20-4361-8335-f0eae23971b0&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
Request Chain 126
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4 HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm=&google_sc=&google_ula=450542624&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&google_tc= HTTP 302
  • https://ids.ad.gt/api/v1/g_match?id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&google_gid=CAESEE4d3K0vy2rEo0XemT_3vVQ&google_cver=1&google_ula=450542624,0
Request Chain 127
  • https://dpm.demdex.net/ibs:dpid=348447&dpuuid=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&redir=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fadb_match%3Fadb%3D%24%7BDD_UUID%7D%26id%3Dfbe706c0-8779-4f63-8e5c-aa1e36fe7df4 HTTP 302
  • https://ids.ad.gt/api/v1/adb_match?adb=89416840437891243151553249337284938108&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
Request Chain 128
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3Dfbe706c0-8779-4f63-8e5c-aa1e36fe7df4 HTTP 302
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3Dfbe706c0-8779-4f63-8e5c-aa1e36fe7df4 HTTP 302
  • https://ids.ad.gt/api/v1/pbm_match?pbm=20741A22-A102-4528-90D4-2D0AC71E756C&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
Request Chain 129
  • https://p.rfihub.com/cm?pub=38725&userid=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&in=1&forward=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fszm_match%3Fszm%3D{userid}%26id%3Dfbe706c0-8779-4f63-8e5c-aa1e36fe7df4 HTTP 302
  • https://ids.ad.gt/api/v1/szm_match?szm=1871878965271686333&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
Request Chain 152
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI
Request Chain 153
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553630950;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N
Request Chain 162
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4
Request Chain 163
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2
Request Chain 232
  • https://www.google-analytics.com/r/collect?v=1&_v=j73&a=330064377&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&ul=en-us&de=UTF-8&dt=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aGhAAUI7AAQC~&jid=489360921&gjid=423533018&cid=1352067928.1553630946&tid=UA-87198801-1&_gid=1239304015.1553630949&_r=1&cd1=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&cd2=none&cd4=arstechnica.com&cd5=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cd6=Passive%20Tagger&cd7=f42107bfef912f171434ed39b3867993&cd9=359494&cd3=57&z=26504377 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-87198801-1&cid=1352067928.1553630946&jid=489360921&_gid=1239304015.1553630949&gjid=423533018&_v=j73&z=26504377 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=1352067928.1553630946&jid=489360921&_v=j73&z=26504377 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=1352067928.1553630946&jid=489360921&_v=j73&z=26504377&slf_rd=1&random=2354416319
Request Chain 241
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1A058f76b6-5003-11e9-9f85-0e26dff468d2;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI
Request Chain 242
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1A058f43a8-5003-11e9-aa89-0e29dff1dd1c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2
Request Chain 243
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553630950;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1A058f768e-5003-11e9-863e-0ec32bfb0148;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N
Request Chain 244
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1A058fb112-5003-11e9-8b50-0e02c97b506c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4

246 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
41 KB
14 KB
Document
General
Full URL
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Chicago, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
a017be8a847e3561da7badd20778e18a5a6ec095c3867d080a3c497600d4579e
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
arstechnica.com
:scheme
https
:path
/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
server
nginx
date
Tue, 26 Mar 2019 20:09:02 GMT
content-type
text/html; charset=UTF-8
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
x-ars-server
web207
content-encoding
gzip
main-e28793ce68.css
cdn.arstechnica.net/wp-content/themes/ars/assets/css/
332 KB
69 KB
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
bff87041c749a5f66e9f85f96bcb1b6e2a75d8efb198a6a5aa15ea76d5167333

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1553550286:cacheN.fra2-01:H
status
200
content-length
70273
x-cf-tsc
1553550289
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:36 GMT
server
CFS 0215
x-cff
B
etag
W/"5c994930-53022"
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
matebookxpro5-800x533.jpg
cdn.arstechnica.net/wp-content/uploads/2018/04/
62 KB
62 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2018/04/matebookxpro5-800x533.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
211103712746d65779eb314e4989dd6653df95ec675a9dfc13984fd389b96b83

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
63590
x-cf-tsc
1553606446
x-cf2
H
last-modified
Mon, 02 Apr 2018 19:26:34 GMT
server
CFS 0215
x-cff
B
etag
"5ac283ea-f866"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
4062
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
main-0b86b72968.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
647 KB
211 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-0b86b72968.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
23d8dfcdcc3e8dd8f7707db900c001ecc5dc7b90dbc550b4686e862d6fe32be7

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
215315
x-cf-tsc
1553550253
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:36 GMT
server
CFS 0215
x-cff
B
etag
W/"5c994930-a1a82"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
ars-3b01442aaa.ads.us.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
3 KB
2 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/ars-3b01442aaa.ads.us.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
64d2d3dc68f59fec33141b38317ceb57a980c650041004016ebeddb7dc609a28

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
1589
x-cf-tsc
1553012890
x-cf2
H
last-modified
Tue, 19 Mar 2019 16:26:54 GMT
server
CFS 0215
x-cff
B
etag
W/"5c91184e-de9"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/
75 KB
23 KB
Script
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.196.33 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-196-33.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
40543640eb6187832a2bd4f777b1a85f6d1aa283cd708bd29f5ef8114816e740

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
last-modified
Mon, 11 Mar 2019 16:42:01 GMT
server
Apache
etag
"726cdd0e62ef73225b0e432fa2506ff4:1552322521"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
23575
expires
Tue, 26 Mar 2019 21:09:03 GMT
100098X1555750.skimlinks.js
s.skimresources.com/js/
38 KB
14 KB
Script
General
Full URL
https://s.skimresources.com/js/100098X1555750.skimlinks.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
655916103649434bbea00fb4053058cb0dc601e3d2a8461e9f56068ec7517185

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
last-modified
Tue, 12 Mar 2019 15:24:24 GMT
server
AmazonS3
x-amz-request-id
0BE5BA086FB5C580
etag
"e7d6b2634620fbc19b5c91d575bd15fd"
x-hw
1553630943.cds019.pa1.hn,1553630943.cds024.pa1.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
14476
x-amz-id-2
Cf0bs0aySNqR3thfzxm5gPeH+VpIeqX5S2skVQkupHXiuUssbEz+cHTtJpUesdIYABqUTKo0aaY=
services.min.js
cdn.arstechnica.net/cns/
149 KB
43 KB
Script
General
Full URL
https://cdn.arstechnica.net/cns/services.min.js?1553630400
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5ae42b31cd43c4d1a536b9bd53a19693d4bc8447c48051724b26de65f8f89ed7

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
x-cf3
M
x-amz-request-id
35D4145F1856E91B
x-cf1
14961:fD.fra2:co:1553189295:cacheN.fra2-01:H
status
200
content-length
43882
x-amz-id-2
wBX6Zdb7S11+dELGaezU1Yf3Qve+e3Ht2d5Y3bdXctQ0Qb8v+XEVcEdNQ3G/TpeAU6Oe/MijaEg=
x-served-by
cache-mdw17350-MDW
cf4ttl
43200.000
x-cf2
H
last-modified
Thu, 21 Mar 2019 17:17:45 GMT
server
CFS 0215
x-timer
S1553189296.663753,VS0,VE1
x-cff
B
etag
"cf723245057e5def17c0d107b3eac5e6"
vary
Accept-Encoding
x-amz-version-id
uOg6df7ZtzAAIyH5AMJ.kfvRiYpzffwE
access-control-allow-origin
*
expires
Tue, 21 May 2019 20:09:03 GMT
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
content-type
text/javascript
x-cf-tsc
1553189295
x-cache-hits
1
gtm.js
www.googletagmanager.com/
246 KB
61 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81a::2008 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager (scaffolding) /
Resource Hash
3f0ddf19affbff4eabd00a0619d68d3a54dc15802aec7e920693cacf95231155
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
br
last-modified
Tue, 26 Mar 2019 19:45:30 GMT
server
Google Tag Manager (scaffolding)
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
62146
x-xss-protection
0
expires
Tue, 26 Mar 2019 20:09:03 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
357 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
economica-bold-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
25 KB
25 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-bold-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5315cf641e62ac7de4a82e6003cc1bd1ff09218400d8ff5286c951e25aee966b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
25592
x-cf-tsc
1553022833
x-cf2
H
last-modified
Mon, 18 Mar 2019 17:09:49 GMT
server
CFS 0215
x-cff
B
etag
"5c8fd0dd-63f8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
10481
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
economica-regular-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-regular-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24264
x-cf-tsc
1553035718
x-cf2
H
last-modified
Mon, 18 Mar 2019 17:09:49 GMT
server
CFS 0215
x-cff
B
etag
"5c8fd0dd-5ec8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
23366
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
truncated
/
279 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ecbfb541946a9a9437190a21d98e1c7ab7d863837d7d038a9a1e053c649c8ba

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
400 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
700 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
841 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
p.bright-14.jpg
cdn.arstechnica.net/wp-content/uploads/2016/05/
48 KB
49 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2016/05/p.bright-14.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
4b9e4cbb8c50e6efe7ff3b415a77436dde1f5e53f58898bba943877e69c6690c

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
49630
x-cf-tsc
1553026403
x-cf2
H
last-modified
Tue, 10 May 2016 18:23:38 GMT
server
CFS 0215
x-cff
B
etag
"5732272a-c1de"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
42962
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
channel-ars-be7bb52ba9.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
5 KB
5 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/channel-ars-be7bb52ba9.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
08ed3bf6e73a999bafb422b878fb05b87269b00a65230c9457ce75aee10b873e

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
4809
x-cf-tsc
1553039781
x-cf2
H
last-modified
Tue, 19 Mar 2019 16:26:54 GMT
server
CFS 0215
x-cff
B
etag
"5c91184e-12c9"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
26314
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
18 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
opensans-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18824
x-cf-tsc
1553032610
x-cf2
H
last-modified
Mon, 18 Mar 2019 17:09:49 GMT
server
CFS 0215
x-cff
B
etag
"5c8fd0dd-4988"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
20257
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
bitter-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24212
x-cf-tsc
1553035718
x-cf2
H
last-modified
Mon, 18 Mar 2019 17:09:49 GMT
server
CFS 0215
x-cff
B
etag
"5c8fd0dd-5e94"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
23366
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
bitter-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22872
x-cf-tsc
1553035718
x-cf2
H
last-modified
Mon, 18 Mar 2019 17:09:49 GMT
server
CFS 0215
x-cff
B
etag
"5c8fd0dd-5958"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
23366
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
opensans-semibold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18972
x-cf-tsc
1553039781
x-cf2
H
last-modified
Tue, 19 Mar 2019 16:26:54 GMT
server
CFS 0215
x-cff
B
etag
"5c91184e-4a1c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
opensans-semibolditalic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibolditalic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
59201950b83489808587827b4050ffe0597992825daa88c227476cdbbf8ca282

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
20872
x-cf-tsc
1553032610
x-cf2
H
last-modified
Tue, 19 Mar 2019 16:26:54 GMT
server
CFS 0215
x-cff
B
etag
"5c91184e-5188"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
19039
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
opensans-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
19516
x-cf-tsc
1553039781
x-cf2
H
last-modified
Tue, 19 Mar 2019 16:26:54 GMT
server
CFS 0215
x-cff
B
etag
"5c91184e-4c3c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
26709
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
bitter-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22104
x-cf-tsc
1553039337
x-cf2
H
last-modified
Tue, 19 Mar 2019 16:26:54 GMT
server
CFS 0215
x-cff
B
etag
"5c91184e-5658"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
26265
accept-ranges
bytes
expires
Tue, 21 May 2019 20:09:03 GMT
sparrow.min.js
pixel.condenastdigital.com/
38 KB
14 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553630400
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.239 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e53759cbefbca7ac3585c5a7586b03a20b664142fa2bb668ba1d11213c97f423

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:03 GMT
Content-Encoding
gzip
Age
95665
Via
1.1 varnish, 1.1 varnish
X-Cache
HIT, HIT
X-Cache-Hits
3, 8092
Connection
keep-alive
Content-Length
13219
x-amz-id-2
xd1+yeEFTU9q2brJ2F7DjIW+4XlI5g+WcyXrwk3x6llRKqsAjUEQ2JZsBiTSzr75ABhMkGX0ZR8=
X-Served-By
cache-iad2141-IAD, cache-hhn1522-HHN
Last-Modified
Mon, 28 Jan 2019 17:44:57 GMT
Server
AmazonS3
X-Timer
S1553630943.361412,VS0,VE0
ETag
"4beefaddd4ac53cdf6e84d0d370b0aa1"
Vary
Accept-Encoding
x-amz-request-id
3CF8D054D39F1709
Access-Control-Allow-Origin
*
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
Expires
Mon, 28 Jan 2019 23:44:56 GMT
outbrain.js
widgets.outbrain.com/
111 KB
39 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1553630943377
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-0b86b72968.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.198.179 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-179.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
d2784ee662b361e2959faa93d676dcaeecbebc8c84f21062f2bd18de88522af4

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:03 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Mar 2019 08:20:13 GMT
Server
Apache
ETag
"a3763076e85e68856a038df82025d9e0:1553588413"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
39153
video_groups
api.cnevids.com/v1/
4 KB
1 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups?filters={%22channel_key%22:%22arstechnica%22}&pagesize=20&endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-0b86b72968.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.4.39.251 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-4-39-251.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
725c7bc55a612ac24f0381c6f089d535113081cab5b492b540c0911ea36945ad
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:03 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
647
X-XSS-Protection
1; mode=block
X-Request-Id
f13f4fda-8339-4cea-9159-a3bd929a364c
X-Runtime
0.002161
X-Backend-Node
10.110.44.187
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"e727b365d6016ae37e9891cea625ca48"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
id
dpm.demdex.net/
5 KB
2 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.3.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1553630943434
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.44.252 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-44-252.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
cb169d5350f5317c09d047418b2890d60edb46dd22416e514c854fd9108df807

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v025-078077550.edge-irl1.demdex.com 5.50.0.20190319164038 6ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
MfQDKgx0TgU=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
1473
Expires
Thu, 01 Jan 1970 00:00:00 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
3e552578c7d450b023f2cd9d28f830be4335c3acc6c4ab6dadda0769f09e5f22
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 16 Jan 2019 20:01:45 GMT
server
Golfe2
age
1327
date
Tue, 26 Mar 2019 19:46:56 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
17543
expires
Tue, 26 Mar 2019 21:46:56 GMT
quant.js
secure.quantserve.com/
12 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.164 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:03 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26-Mar-2019 20:09:03 GMT
Server
QS
ETag
M0-e2b9884a
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5456
Expires
Tue, 02 Apr 2019 20:09:03 GMT
PageName=gadgets,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=undefined
d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/
253 B
698 B
Script
General
Full URL
https://d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/PageName=gadgets,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_CBC
Server
46.228.164.13 , United Kingdom, ASN56396 (TURN, GB),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b2387b6dfdf7d7b69adb0a2b8e0d8399783430550051638e7bd9832a05ed9d32

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:02 GMT
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Server
Apache-Coyote/1.1
Content-Type
text/javascript;charset=UTF-8
Content-Length
253
P3P
policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
fbevents.js
connect.facebook.net/en_US/
52 KB
15 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
6bb981959d783d83df88b9aa48738948c9a8a22c1a31b8cb5305d3e338ebf9a7
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
15216
x-xss-protection
0
pragma
public
x-fb-debug
5cBGylshmzCy1l8lkPcKs2QKEGIxPFwKIlyokRApR6APzzqa0rViIAoM6eB9nN9jzRvjvFCZ9Sd/ed+8CLehkg==
date
Tue, 26 Mar 2019 20:09:03 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
spm.v1.min.js
ak.sail-horizon.com/spm/
113 KB
41 KB
Script
General
Full URL
https://ak.sail-horizon.com/spm/spm.v1.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.13 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-13.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
2b28cdf399d9796384093bf46f595eb50e50e11a89a3fef6ce58cfe54f9d5d7b

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
last-modified
Tue, 19 Mar 2019 18:26:45 GMT
server
Apache
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript
status
200
cache-control
max-age=600; must-revalidate
accept-ranges
bytes
content-length
41637
via
1.1 560d8d35213ac925f8d05c5730db1582.cloudfront.net (CloudFront)
x-amz-cf-id
d_wiuum6GAiFt_jX3DQ0Y4LH2zqR82yJEhhDvDMTzwTA7SoKpkPNtg==
i.js
tag.bounceexchange.com/2806/
10 KB
3 KB
Script
General
Full URL
https://tag.bounceexchange.com/2806/i.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.92.63 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
63.92.190.35.bc.googleusercontent.com
Software
fasthttp /
Resource Hash
ee228cc1043e9a252abae50ab7a47bdc4e311652a08576b48a221dbde47e17ed

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:02 GMT
content-encoding
gzip
server
fasthttp
etag
0fc63dc71f8759
content-type
text/plain; charset=utf-8
status
200
cache-control
no-cache, must-revalidate
x-region
europe-west3
alt-svc
clear
content-length
3462
via
1.1 google
57
a.ad.gt/api/v1/u/matches/
3 KB
2 KB
Script
General
Full URL
https://a.ad.gt/api/v1/u/matches/57
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.161.216.48 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-161-216-48.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
492df754968fb96672981cd0774d7cc61b84652860b95c4d2380456fe18c0fa5

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
Content-Encoding
gzip
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
1280
Content-Type
text/html; charset=utf-8
insight.min.js
snap.licdn.com/li.lms-analytics/
15 KB
5 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:296::25ea , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
bc9cef10d07e8da3ce80181de07a056414731f86e0dc12e2c81d652b28ac770b

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:03 GMT
Content-Encoding
gzip
Last-Modified
Mon, 03 Dec 2018 23:03:30 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=33113
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
4571
beacon.js
www.medtargetsystem.com/javascript/
358 KB
95 KB
Script
General
Full URL
https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.1.219.33 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-1-219-33.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
67ec12406ea525980dbd2dff31f737a7d318e0e09dd2e6f25ecb57d847f27f08

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:03 GMT
Content-Encoding
gzip
Last-Modified
Fri, 22 Mar 2019 16:13:36 GMT
Server
Apache/2.4.7 (Ubuntu)
ETag
"599d3-584b12311cc00-gzip"
Vary
X-Forwarded-Proto,Accept-Encoding
Content-Type
application/javascript
transfer-encoding
chunked
Connection
keep-alive
Accept-Ranges
bytes
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1553630943456&ns_c=UTF-8&c8=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack%20%7C%20Ars%20Technica&c7=...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1553630943456&ns_c=UTF-8&c8=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack%20%7C%20Ars%20Technica&c7...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1553630943456&ns_c=UTF-8&c8=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&c9=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.121.166.105 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-121-166-105.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:03 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1553630943456&ns_c=UTF-8&c8=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&c9=
Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:03 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.197 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-197.fra6.r.cloudfront.net
Software
nginx /
Resource Hash
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
public
Date
Mon, 25 Mar 2019 21:21:10 GMT
Content-Encoding
gzip
Last-Modified
Fri, 07 Mar 2014 00:45:07 GMT
Server
nginx
Age
82078
ETag
"53191693-19c1"
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 f038e7175be9761825b2eefc2b0a832e.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
Connection
keep-alive
X-Amz-Cf-Id
VlFt30K9_p3aYBeVyA7_IkCrp2NNYgiZMjZIOpO4ir_It66FF33rig==
Expires
Tue, 26 Mar 2019 21:21:02 GMT
228464857488266
connect.facebook.net/signals/config/
186 KB
45 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/228464857488266?v=2.8.42&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
0d369a4962db29ff3eba4cdccfe2713ddcb91f0014dc05adc721396f357bb49e
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
45966
x-xss-protection
0
pragma
public
x-fb-debug
nC5j7W60ltLWNjf1Ze/CNAb1oDy4Yi3QgfImPSHj216ojHTGbLUzj8IzHCd30NxHkkmepoaJjko9ZHT10FLdmw==
date
Tue, 26 Mar 2019 20:09:03 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
927 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 19:16:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
3152
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
856
x-xss-protection
1; mode=block
expires
Tue, 26 Mar 2019 20:16:31 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
435 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:806::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
1; mode=block
/
www.facebook.com/tr/
44 B
243 B
Image
General
Full URL
https://www.facebook.com/tr/?id=228464857488266&ev=PageView&dl=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&rl=&if=false&ts=1553630943549&cd[SiteSection]=gadgets&cd[PageTags]=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cd[Brand]=Pitchfork&sw=1600&sh=1200&v=2.8.42&r=stable&ec=0&o=30&fbp=fb.1.1553630943549.440032371&it=1553630943501&coo=false&rqm=GET
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Tue, 26 Mar 2019 20:09:03 GMT
arstechnica.com
srv-2019-03-26-20.config.parsely.com/config/
387 B
805 B
Script
General
Full URL
https://srv-2019-03-26-20.config.parsely.com/config/arstechnica.com
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.199.66.245 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-199-66-245.compute-1.amazonaws.com
Software
/ Express
Resource Hash
a2fe997c50b946c6d422efd1d349b1754176df0a808817ccf3a80220ccba0a27

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
Cache-Control
private, no-cache
Connection
keep-alive
X-Powered-By
Express
ETag
W/"183-6uhtX1NPVmOoABQwV3kATQ"
Content-Length
387
Content-Type
text/javascript; charset=utf-8
rules-p-Jjy-Cyr1NZGRz.js
rules.quantcount.com/
4 KB
2 KB
Script
General
Full URL
https://rules.quantcount.com/rules-p-Jjy-Cyr1NZGRz.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:5600:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
efdbd8582066a12cf45115f1e150d2a8de06bf6b14db3feca98b116efeb9e0bb

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 19:26:04 GMT
content-encoding
gzip
last-modified
Mon, 19 Mar 2018 22:18:17 GMT
server
AmazonS3
age
2591
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=3600
x-amz-cf-id
X471Fx3-mjuIHGg46Hv_H9Bkn2LUR9S8UUONLLqqslDTeSsa4oR_lA==
via
1.1 3283735112d0a322451d32ef038129c9.cloudfront.net (CloudFront)
publisher:getClientId
ampcid.google.de/v1/
3 B
175 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
1; mode=block
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1553630943594
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.44.76.10 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-44-76-10.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
9bd7d072025eac5042b6c533b503c7a5b8101b4fa387373d399cf723fa37f3a3

Request headers

Accept
text/plain
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.174.217.231 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-174-217-231.compute-1.amazonaws.com
Software
/
Resource Hash
0e330d790693d3fe53cc78823d860cdd23b8e8ce510361cdab0cf37eb16c079a

Request headers

Accept
text/plain
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A03.596Z&_t=library_sparrow&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3900&pSw=1600&pSh=1200&uID=340b81bb-06c3-43a9-b1ca-89d0e2e707ab&uNw=1&uUq=1&sID=b66d442b-1402-497d-9cfb-d792185ce8b3&pID=25328402-7074-4d97-a219-f3ec94fc274b&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&requestStart=676.7399981617928&requestEnd=739.4549995660782&init=963.0699977278709&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:03 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A03.604Z&_t=loaded&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3900&pSw=1600&pSh=1200&uID=340b81bb-06c3-43a9-b1ca-89d0e2e707ab&sID=b66d442b-1402-497d-9cfb-d792185ce8b3&pID=25328402-7074-4d97-a219-f3ec94fc274b&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns&cns=2_26_0&feature_get_entries=true&feature_performance_now=true&cns_metrics=1_1_0&cns_metrics_sparrow=1_2_0&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:04 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/
67 KB
19 KB
Script
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.196.33 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-196-33.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
de4de18224e2109f2f8ff4ce9a40cb51c6a36724b2df68e8bd6080b8ee3a02d0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
last-modified
Mon, 11 Mar 2019 16:42:01 GMT
server
Apache
etag
"06a88b0424fa26cefa8da4fc4967b294:1552322522"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
19132
expires
Tue, 26 Mar 2019 21:09:03 GMT
Cookie set dest5.html
condenast.demdex.net/ Frame 836B
0
0
Document
General
Full URL
https://condenast.demdex.net/dest5.html?d_nsid=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.19.121.121 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-19-121-121.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
condenast.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Accept-Encoding
gzip, deflate, br
Cookie
demdex=89416840437891243151553249337284938108
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Fri, 22 Mar 2019 09:59:45 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=89416840437891243151553249337284938108;Path=/;Domain=.demdex.net;Expires=Sun, 22-Sep-2019 20:09:03 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
fe1YlQ68Q2A=
Content-Length
2764
Connection
keep-alive
id
sstats.arstechnica.com/
49 B
551 B
XHR
General
Full URL
https://sstats.arstechnica.com/id?d_visid_ver=3.3.0&d_fieldgroup=A&mcorgid=F7093025512D2B690A490D44%40AdobeOrg&mid=89606590598156487701568336487103858085&ts=1553630943633
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
70cc3cddd340b5369cb03b2b52f1f2c51c1542e5af793050b6bc1056d817775e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Origin
https://arstechnica.com
Accept-Encoding
gzip, deflate, br
Host
sstats.arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded
Accept
*/*
Cache-Control
no-cache
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Cookie
AMP_TOKEN=%24RETRIEVING; _fbp=fb.1.1553630943549.440032371; sID=b66d442b-1402-497d-9cfb-d792185ce8b3
Connection
keep-alive
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Tue, 26 Mar 2019 20:09:03 GMT
X-Content-Type-Options
nosniff
Server
Omniture DC/2.0.0
xserver
www105
Vary
Origin
X-C
ms-6.6.0
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/x-javascript
Keep-Alive
timeout=15
Content-Length
49
X-XSS-Protection
1; mode=block
ibs:dpid=411&dpuuid=XJqG3wAAD99oaTx0
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=89416840437891243151553249337284938108
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XJqG3wAAD99oaTx0
42 B
769 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XJqG3wAAD99oaTx0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.44.252 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-44-252.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v025-0e65112c3.edge-irl1.demdex.com 5.50.0.20190319164038 4ms
Pragma
no-cache
X-TID
nlBWbRhIT3w=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Date
Tue, 26 Mar 2019 20:09:03 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XJqG3wAAD99oaTx0
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
collect
www.google-analytics.com/
35 B
102 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j73&a=330064377&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&dr=%2F&dp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&ul=en-us&de=UTF-8&dt=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aGBAgUAjAAQC~&jid=1099697110&gjid=1450493192&cid=1490859193.1553630944&tid=UA-31997-1&_gid=937842907.1553630944&gtm=2wg3i1NLXNPCQ&cg1=article%7Creport&cg2=gadgets&cg3=gadgets&cd1=GTM-NLXNPCQ&cd2=81&cd4=&cd6=Tue%20Mar%2026%202019%2020%3A09%3A03%20GMT%2B0000%20(Coordinated%20Universal%20Time)&cd7=1553630943440.tdaxh7xc&cd8=0&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_13_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F67.0.3396.87%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=Tag%20Name%3A%20GA%20-%20Pageview%20-%20Core%20Pageview%20-%20All%20Pages&cd20=none&cd25=Peter%20Bright&cd26=1481405&cd27=838&cd28=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cd29=web&cd32=2019-03-26T19%3A03%3A08%2B00%3A00&cd34=2019-03-26T19%3A01%3A21%2B00%3A00&cd35=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cd36=web&cd43=Ars%20Technica&cd45=Adblock%20Enabled%20-%20false&cd62=https%3A%2F%2Farstechnica.com%2F%3Fp%3D1481405&cd63=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cd65=&cd72=1.0.0&cd92=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cd93=gadgets&cd97=-1303530583&cd98=article%7Creport&cd103=&cd3=1490859193.1553630944&z=1909009558
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 09 Mar 2019 00:50:18 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
1538325
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j73&tid=UA-31997-1&cid=1490859193.1553630944&jid=1099697110&gjid=1450493192&_gid=937842907.1553630944&_u=aGBAgUAjAAQC~&z=1655488746
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1490859193.1553630944&jid=1099697110&_v=j73&z=1655488746
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1490859193.1553630944&jid=1099697110&_v=j73&z=1655488746&slf_rd=1&random=991177287
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1490859193.1553630944&jid=1099697110&_v=j73&z=1655488746&slf_rd=1&random=991177287
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:808::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:03 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:03 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1490859193.1553630944&jid=1099697110&_v=j73&z=1655488746&slf_rd=1&random=991177287
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-...
  • https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&persistence=1&xguid=01D6XSXPET8DYQAJAZB4WMSXGC&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstech...
175 B
471 B
Script
General
Full URL
https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&persistence=1&xguid=01D6XSXPET8DYQAJAZB4WMSXGC&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22huawei.com%22%2C%22microsoft.com%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%7D&checksum=168db696a088d4d2a09add8810c6b51831f38242b7f85cd17df5351435625c6e
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
70cddc4e5dff14ed1bd101acd0707d90f30a450293850156cf6609cb9b163205
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
via
1.1 google
x-content-type-options
nosniff
server
openresty/1.11.2.5
access-control-allow-origin
https://arstechnica.com
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
200
access-control-allow-credentials
true
content-type
application/javascript
alt-svc
clear

Redirect headers

date
Tue, 26 Mar 2019 20:09:03 GMT
via
1.1 google
server
openresty/1.11.2.5
access-control-allow-origin
https://arstechnica.com
location
//r.skimresources.com/api/?callback=skimlinksBeaconCallback&persistence=1&xguid=01D6XSXPET8DYQAJAZB4WMSXGC&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22huawei.com%22%2C%22microsoft.com%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%7D&checksum=168db696a088d4d2a09add8810c6b51831f38242b7f85cd17df5351435625c6e
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
302
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
167
px.gif
p.skimresources.com/
43 B
476 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=3.671212966965135
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
age
0
status
200
x-guploader-uploadid
AEnB2UpilG43XjCDjKpeXDIPfV6BtIHaOzzYsRa96CTjgIzGk7HsKqIn8SpdENRl30mFzMi1p-CXSCpj8bxMxXprqjBU8XZcjw
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1553630943.cds019.pa1.hn,1553630943.cds025.pa1.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
108 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=3.671212966965135
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
age
0
status
200
x-guploader-uploadid
AEnB2UpilG43XjCDjKpeXDIPfV6BtIHaOzzYsRa96CTjgIzGk7HsKqIn8SpdENRl30mFzMi1p-CXSCpj8bxMxXprqjBU8XZcjw
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1553630943.cds019.pa1.hn,1553630943.cds025.pa1.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
gpt.js
www.googletagservices.com/tag/js/
44 KB
11 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553630400
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
9c61fde7548776902bd465299ae74d221c8446f1e0aac734585f7fd1dc7481ec
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"118 / 289 of 1000 / last-modified: 1553623255"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
11538
x-xss-protection
1; mode=block
expires
Tue, 26 Mar 2019 20:09:03 GMT
apstag.js
c.amazon-adsystem.com/aax2/
66 KB
19 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553630400
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.1.198 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-86-1-198.fra6.r.cloudfront.net
Software
Server /
Resource Hash
06042f6ac2063c8e23fcce2c7c64449bae470d34c4d46f97e145242158ef15f3

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 16:37:19 GMT
Content-Encoding
gzip
Server
Server
Age
12703
ETag
179e41b046d5f974d2586d066c70d87e
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 163be08bc1bc44818353c4fd88655bee.cloudfront.net (CloudFront)
Cache-Control
public, max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
X-Amz-Cf-Id
xFO2VZuiBX66k4qoF4eLuKIX-WNkB_arsE15eToljOugu7Zu7xkUTA==
arstechnica.js
player.cnevids.com/interlude/
107 KB
27 KB
Script
General
Full URL
https://player.cnevids.com/interlude/arstechnica.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553630400
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.95 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-95.fra6.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
8df213c73bbbd6e8fecf23b6ea1767f4d18b8ba480f5f9f5d6b4b2847d8b949e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:08:06 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Age
57
X-Cache
Hit from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
26963
X-XSS-Protection
1; mode=block
X-Request-Id
3ca7c9d3-f6af-4a5b-ae3f-7a360f651778
X-Runtime
0.013717
X-Backend-Node
10.110.120.110
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"dc33b3d6e6e3336a0aec42a92cbbfabb"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
CAP8G76N_9lT3OPISX9mW09dIx8tKC7GaHQCloiUSQzVGrWDiYePtQ==
htw-condenast.js
js-sec.indexww.com/ht/
173 KB
38 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/htw-condenast.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553630400
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.198.4 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-4.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
7e3b9033f4ca4eb837497a36031a4c27e6905bd8a0554f81a43faaa63981ec1f

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Mar 2019 19:35:28 GMT
Server
Apache
ETag
"7615c3-2b41b-585046c656e4e"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=1870
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
38322
Expires
Tue, 26 Mar 2019 20:40:14 GMT
conde-nast
segment-data.zqtk.net/
631 B
902 B
Script
General
Full URL
https://segment-data.zqtk.net/conde-nast?url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553630400
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.183.205 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-30-183-205.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
59a645e26478946493c6905ac6136af30059be238d7f31608ea0f71524cfcd0b

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:03 GMT
Last-Modified
Tue, 26 Mar 2019 19:04:17 GMT
Server
nginx/1.10.3 (Ubuntu)
Connection
keep-alive
Content-Type
application/javascript; charset=UTF-8
Content-Length
631
Expires
Thu, 28 Mar 2019 19:04:17 GMT
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
5 KB
2 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553630400
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:d983 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
cf-cache-status
HIT
status
200
content-type
text/javascript
content-length
2018
via
1.1 varnish
server
cloudflare
cache-control
max-age=21600
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
1134704456 1134188191
x-country
DE
cf-ipcountry
DE
accept-ranges
bytes
cf-ray
4bdbc2975906c2ba-FRA
https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F
cdn.accelerator.arsdev.net/h/
12 B
305 B
Script
General
Full URL
https://cdn.accelerator.arsdev.net/h/https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F?callback=arsData
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553630400
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.107 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-107.fra53.r.cloudfront.net
Software
nginx/1.4.6 (Ubuntu) / PHP/5.5.9-1ubuntu4.9
Resource Hash
18c4dfbdcbf664e92468c3a09814db7f114f9b393613e2cb077d81565d496f8d

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:08:30 GMT
via
1.1 78c402b74e65ae12b398b6b957ab229e.cloudfront.net (CloudFront)
server
nginx/1.4.6 (Ubuntu)
age
168
x-powered-by
PHP/5.5.9-1ubuntu4.9
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
max-age=300, public
x-amz-cf-id
kMDe8EmExT7A0-8MJmUXjAkyd-DUCtmlWSDqpBVHs83YgEjoFxS9Ww==
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553630400
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.204.40.232 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-204-40-232.compute-1.amazonaws.com
Software
/
Resource Hash
0e330d790693d3fe53cc78823d860cdd23b8e8ce510361cdab0cf37eb16c079a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1553630943668
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553630400
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.197.233.194 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-197-233-194.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
04ae308f5ef8ca362c629894dbd272bebf9c874531c827cc9977600e997d9c14

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A03.670Z&_t=library_service&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3900&pSw=1600&pSh=1200&uID=340b81bb-06c3-43a9-b1ca-89d0e2e707ab&sID=b66d442b-1402-497d-9cfb-d792185ce8b3&pID=25328402-7074-4d97-a219-f3ec94fc274b&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&init=675.6500005722046&requestEnd=608.2599982619286&requestStart=595.5599993467331&device=desktop&cns=2_26_0&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:04 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A03.674Z&_t=page_created&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3900&pSw=1600&pSh=1200&uID=340b81bb-06c3-43a9-b1ca-89d0e2e707ab&sID=b66d442b-1402-497d-9cfb-d792185ce8b3&pID=25328402-7074-4d97-a219-f3ec94fc274b&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&content_uri=gadgets&image_avg_surface=426400&image_count=1&image_surface=426400&server=production&vp_height=1200&vp_width=1585&channel=gadgets&slots_count=6&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:04 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ded8aafe08adcc23835de89f62fbee0b98184f32296c7679ab5b5a358f044f63

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
ijs_all_modules_bf32caf66e60eb9fb30478dd078c775e.js
assets.bounceexchange.com/assets/smart-tags/versioned/
418 KB
95 KB
Script
General
Full URL
https://assets.bounceexchange.com/assets/smart-tags/versioned/ijs_all_modules_bf32caf66e60eb9fb30478dd078c775e.js
Requested by
Host: tag.bounceexchange.com
URL: https://tag.bounceexchange.com/2806/i.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.3.46 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-86-3-46.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f9c00891e3610734e027319f079f01728b6bb3a940f27497def8bdddb4f51e35

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 25 Mar 2019 18:06:14 GMT
content-encoding
gzip
last-modified
Mon, 25 Mar 2019 15:31:28 GMT
server
AmazonS3
age
93770
etag
"60e6bfc2133b4ba1d0a297515e31bf03"
x-cache
Hit from cloudfront
x-amz-version-id
JlYN.mR0oLd2ob0qjjiSHc5orutF7tOC
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-type
application/javascript
content-length
96508
via
1.1 a350f357b825293e306b1b0a2cb490c1.cloudfront.net (CloudFront)
x-amz-cf-id
1i5HPArVOd4gemUtctpdhHTvHw7Q-qUx2NNp05Zi_T1eSOu5jguwtA==
/
px.ads.linkedin.com/collect/
Redirect Chain
  • https://px.ads.linkedin.com/collect/?time=1553630943699&pid=895394&url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&...
  • https://px.ads.linkedin.com/collect/?time=1553630943699&pid=895394&url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&...
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%2F%3Ftime%3D1553630943699%26pid%3D895394%26url%3Dhttps%253A%252F%252Farstechnica.com%252Fgadgets%252F2019%25...
  • https://px.ads.linkedin.com/collect/?time=1553630943699&pid=895394&url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&...
0
87 B
Script
General
Full URL
https://px.ads.linkedin.com/collect/?time=1553630943699&pid=895394&url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&fmt=js&s=1&cookiesTest=true&liSync=true
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9105 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
server
Play
vary
Accept-Encoding
x-li-fabric
prod-lva1
status
200
x-li-proto
http/2
x-li-pop
prod-efr5
content-type
application/javascript
content-length
20
x-li-uuid
bqwi7hSbjxVATmY2XisAAA==

Redirect headers

date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
302
x-li-pop
prod-efr5
content-length
20
x-li-uuid
/yLQtRabjxXAJ6o1DysAAA==
pragma
no-cache
server
Play
x-frame-options
sameorigin
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
vary
Accept-Encoding
strict-transport-security
max-age=2592000
x-li-fabric
prod-lva1
location
https://px.ads.linkedin.com/collect/?time=1553630943699&pid=895394&url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&fmt=js&s=1&cookiesTest=true&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
evidon-sitenotice-tag.js
c.evidon.com/sitenotice/
40 KB
11 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
dff46486a11e8e9c5785ce5d037c4e9e507511c5cb404a044602c68a777b0e7b

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
10669
last-modified
Wed, 20 Mar 2019 19:57:18 GMT
server
Apache
etag
"a0688cb77159ce22f4bcb1519b8859fc:1553111839"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 27 Mar 2019 20:09:04 GMT
country.js
c.evidon.com/geo/
260 B
456 B
Script
General
Full URL
https://c.evidon.com/geo/country.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
f9784f57729f84391b084eed9e944e048f771129d65e9b58f34095fdfba86473

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
last-modified
Wed, 30 May 2018 22:23:16 GMT
server
Apache
access-control-allow-origin
*
etag
"c1e367d098d326049811561575dbda4a:1527718996"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
status
200
access-control-max-age
86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
content-length
165
snthemes.js
c.evidon.com/sitenotice/4419/
57 KB
4 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/4419/snthemes.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cfcdfbf144964c03b23e6e63abfeeeb923eedda0c421f6279bad5040ef5a3dd1

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
3254
last-modified
Thu, 26 Jul 2018 15:49:16 GMT
server
Apache
etag
"4f337c9f26cb2f12ef4d5d50fc716fc2:1532620156"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 27 Mar 2019 20:09:04 GMT
settings.js
c.evidon.com/sitenotice/4419/arstechnica/
18 KB
4 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/4419/arstechnica/settings.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
34cdcc2da3ff2a7234554eb850346c12c2c61cefaf60396542af6e9d3108ca0d

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
3798
last-modified
Fri, 15 Mar 2019 18:36:13 GMT
server
Apache
etag
"603795c9b87c0cb44fec11cd75462ca2:1552674973"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 27 Mar 2019 20:09:04 GMT
iab
api.skimlinks.mgr.consensu.org/
772 B
636 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
s47451808708618
sstats.arstechnica.com/b/ss/conde-arstechnica/1/JS-1.4.1-D7QN/
43 B
616 B
Image
General
Full URL
https://sstats.arstechnica.com/b/ss/conde-arstechnica/1/JS-1.4.1-D7QN/s47451808708618?AQB=1&ndh=1&pf=1&t=26%2F2%2F2019%2020%3A9%3A3%202%200&D=D%3D&mid=89606590598156487701568336487103858085&aamlh=6&ce=UTF-8&ns=condenast&pageName=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&g=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&c.&visCheck=89606590598156487701568336487103858085&.c&cc=USD&ch=Tech&events=event2%2Cevent28&aamb=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&v2=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&l2=defender-atp%7Chuawei%7Cmatebook%7Cmicrosoft-3%7Csecurity%7Cwindows%7Ctype%3A%20report&c3=D%3Dv3&v3=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&c4=D%3Dv4&v4=1481405&c5=D%3Dv5&v5=report&c6=D%3Dv6&v6=Tech&c7=D%3Dv7&v7=Tech%2Fundefined&c11=D%3Dv11&v11=4%3A09%20PM%7CTuesday&c16=not%20logged%20in&v16=not%20logged%20in&c17=1&v17=1&c23=D%3Dv23&v23=New&c32=D%3Dv32&v32=1&c44=D%3Dv44&v44=null&c50=defender-atp%7Chuawei%7Cmatebook%7Cmicrosoft-3%7Csecurity%7Cwindows%7Ctype%3A%20report&c51=D%3Dv51&v51=desktop%20layout%3A1600x1200&c55=D%3Dv55&v55=Peter%20Bright&c56=D%3Dv56&v56=0.8&c60=D%3Dv60&v60=838&c61=D%3Dv61&v61=1h%7C0d&c62=D%3Dv62&v62=2019-03-26T19%3A03%3A08%2B00%3A00&c65=D%3Dv65&v65=null&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate, br
Host
sstats.arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Cookie
_fbp=fb.1.1553630943549.440032371; sID=b66d442b-1402-497d-9cfb-d792185ce8b3; AMP_TOKEN=%24NOT_FOUND; _ga=GA1.2.1490859193.1553630944; _gid=GA1.2.937842907.1553630944; _dc_gtm_UA-31997-1=1; session_seen_posts=0; seen_posts=; s_depth=1; s_vnum_m=1554076800794%26vn%3D1; sinvisit_m=true; s_ppn=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F; s_nr=1553630943794-New; s_cc=true; bounceClientVisit2806v=N4IgNgDiBcIBYBcEQM4FIDMBBNAmAYnvgIYBOKCApgMZwB2AltcQHTUD2AtkQObEAmPSgnQFcABgCMATiLiMROOwDuAWk5NS7FOwBmCVbvYBXOv1XFVcY8WWUGq-qQYA3SqVUI4xA+wiU6SnMUAE8KSk4UVWMIT3YLJGJqAGsiEAAaEFIYEBAAXyA
Connection
keep-alive
Cache-Control
no-cache
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
X-Content-Type-Options
nosniff
X-C
ms-6.6.0
P3P
CP="This is not a P3P policy"
Connection
Keep-Alive
Content-Length
43
X-XSS-Protection
1; mode=block
Pragma
no-cache
Last-Modified
Wed, 27 Mar 2019 20:09:04 GMT
Server
Omniture DC/2.0.0
xserver
www161
ETag
"3336397047353901056-6034085814810475782"
Vary
*
Content-Type
image/gif
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Keep-Alive
timeout=15
Expires
Mon, 25 Mar 2019 20:09:04 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
1; mode=block
pubads_impl_2019032001.js
securepubads.g.doubleclick.net/gpt/
158 KB
57 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032001.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.208.34 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s12-in-f2.1e100.net
Software
sffe /
Resource Hash
bdc8bcb85e1e7788db0d066b2d3123a1a7f1d64bc65e63ed8db5d96e01296e25
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 20 Mar 2019 17:54:52 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
58516
x-xss-protection
1; mode=block
expires
Tue, 26 Mar 2019 20:09:04 GMT
YXJzdGVjaG5pY2EuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
476 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/YXJzdGVjaG5pY2EuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1553630943377
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=6225
Date
Tue, 26 Mar 2019 20:09:05 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Tue, 26 Mar 2019 21:52:50 GMT
5b27ec85625710471a000011
api.cnevids.com/v1/video_groups/
18 KB
5 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups/5b27ec85625710471a000011?endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-0b86b72968.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.4.39.251 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-4-39-251.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
393f71867721358a94f202350efa2c5b8fc9f25c300b92798379dc758fea4c07
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:03 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
4028
X-XSS-Protection
1; mode=block
X-Request-Id
9b1db6cb-dc08-43ae-aa83-02af76a0930a
X-Runtime
0.002522
X-Backend-Node
10.110.126.151
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"04e0a30e8ce91de7a12ffb2ac16c766f"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.1.198 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-86-1-198.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6d6f482982f8f1a1814e279ff50df4ccc301533ca9655e4d080d6b90ec69d69e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Date
Tue, 26 Mar 2019 19:07:14 GMT
Content-Encoding
gzip
Vary
Origin
Age
3710
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Fri, 24 Aug 2018 07:13:51 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Via
1.1 9bca546700a965c9c77ef5b8dbe65cc4.cloudfront.net (CloudFront)
Cache-Control
public, max-age=86400
X-Amz-Cf-Id
k9Y1_4MIS7Y1ZFCj8Xgi4uXb80oAmFeLMbkA5FqsVva8thdlg8t0_w==
plugin.js
plugin.mediavoice.com/
317 KB
119 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:d983 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
adee5f627c6a30d27376f99ebb0d5388f022112ea899a213652597299dc06529

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
cf-cache-status
HIT
cf-ray
4bdbc298dedbc2ba-FRA
status
200
content-length
120844
via
1.1 varnish
x-varnish
2050069612 2050069606
last-modified
Wed, 13 Mar 2019 20:51:14 GMT
server
cloudflare
etag
W/"5c896d42-4f467"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Wed, 27 Mar 2019 05:09:04 GMT
condenastcorporate
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/
181 B
578 B
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bd131d59efb6aa6a2d98ce4af498a811c84f74148129e140ff5a76904ca9f74

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

timing-allow-origin
*
date
Tue, 26 Mar 2019 20:09:03 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"4ed41fc03a3c3b67ac78af86ee19d7f1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country
cache-control
max-age=86400
x-country
DE
cf-ray
4bdbc297d80ac29c-FRA
local_storage_frame10.min.html
assets.bounceexchange.com/assets/bounce/ Frame 5FA1
0
0
Document
General
Full URL
https://assets.bounceexchange.com/assets/bounce/local_storage_frame10.min.html
Requested by
Host: assets.bounceexchange.com
URL: https://assets.bounceexchange.com/assets/smart-tags/versioned/ijs_all_modules_bf32caf66e60eb9fb30478dd078c775e.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.3.46 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-86-3-46.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
assets.bounceexchange.com
:scheme
https
:path
/assets/bounce/local_storage_frame10.min.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/

Response headers

status
200
content-type
text/html
content-length
995
date
Mon, 10 Dec 2018 18:23:34 GMT
last-modified
Thu, 06 Dec 2018 22:10:11 GMT
etag
"55fccc7bc73db2181e976f1ccec90e2c"
cache-control
max-age=31536000
content-encoding
gzip
x-amz-version-id
iR64T.LKj_uq4qI1dcEGfT66vRlvUKzS
accept-ranges
bytes
server
AmazonS3
age
9164731
x-cache
Hit from cloudfront
via
1.1 a350f357b825293e306b1b0a2cb490c1.cloudfront.net (CloudFront)
x-amz-cf-id
c8gDW_Cjbmj_LTEwDE4Fk7vyqQN_FDBWVpKLg-coEeBI4hfTE5b35Q==
5b031d7a841c4b39e0000013.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady65474957
player.cnevids.com/script/video/
60 KB
19 KB
Script
General
Full URL
https://player.cnevids.com/script/video/5b031d7a841c4b39e0000013.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady65474957
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-0b86b72968.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.95 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-95.fra6.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
dfe53e8015597df85aa5958949ea4e5276c7af4f560c01c27581e5f0907e6a12
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
19111
X-XSS-Protection
1; mode=block
X-Request-Id
ffe64063-ed44-4021-bf87-8ac27751ce81
X-Runtime
0.010537
X-Backend-Node
10.110.120.110
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"3afc51ed99f0e2540c6540ed31608eba"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 82e9051d8d41080bd3028731e0e8677f.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
3z0FoVnAOt-FW7JcmujsChZC63poqabmlRyZYOjQb-BT98CbQIIgpA==
arstechnica_megabots-born-to-smash-anything-in-their-path.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1526931343/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1526931343/arstechnica_megabots-born-to-smash-anything-in-their-path.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
b577055e927a94b842ec53fc28f8a4187844e16edd60abaaaf2ee337e213911b

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 07 Mar 2019 19:03:24 GMT
Via
1.1 varnish, 1.1 e7e7960d7731a7583cedd8f1ff1aca38.cloudfront.net (CloudFront)
Age
1710879
Edge-Cache-Tag
569839514353085132285751987890345809929,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15869
X-Served-By
cache-hhn1532-HHN
Last-Modified
Fri, 06 Jul 2018 19:56:45 GMT
Server
cloudinary
X-Timer
S1540169913.972757,VS0,VE141
ETag
"d5f1fa792bbca4be804bc969dcf7db43"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
0j-Q516wTM94-oQqoYNBHsQ_7mCgbD-3aMv0uMx-N03Xr39faOi9Qw==
X-Cache-Hits
0
arstechnica_first-look-xbox-adaptive-controller.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1526498352/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1526498352/arstechnica_first-look-xbox-adaptive-controller.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
dce92d04fbed4ddd2818e9294233f43b5b18fa36d52ca2a1197b91a07a90a3d0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 07 Mar 2019 19:03:24 GMT
Via
1.1 varnish, 1.1 e7e7960d7731a7583cedd8f1ff1aca38.cloudfront.net (CloudFront)
Age
2448011
Edge-Cache-Tag
346112889942931501135879799755528728110,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10261
X-Request-Id
1943973b203e6d4e
X-Served-By
cache-fra19137-FRA
Last-Modified
Fri, 06 Jul 2018 19:56:42 GMT
Server
cloudinary
X-Timer
S1533334805.734310,VS0,VE1
ETag
"101ee40510f65a5364b974a292765482"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
hiMsqO4FZ-rNDbQulJTwZj77_OTz_v6R1bIKCtImTnQCw4jh4BywXg==
X-Cache-Hits
1
wired_5-levels-4.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1529933985/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1529933985/wired_5-levels-4.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
f2270d3738e32653170a1a5aa6ce4865f519f6f9cc7c94c81ce901569044347e

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 09 Mar 2019 00:11:42 GMT
Via
1.1 varnish, 1.1 e7e7960d7731a7583cedd8f1ff1aca38.cloudfront.net (CloudFront)
Age
1540734
Edge-Cache-Tag
429797844017701262431075366561926221521,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14467
X-Request-Id
d024eaa12fad4557
X-Served-By
cache-fra19130-FRA
Last-Modified
Fri, 06 Jul 2018 19:56:45 GMT
Server
cloudinary
X-Timer
S1541180794.628266,VS0,VE1
ETag
"3c223a00bee60e9e108119a6f92a56e5"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
oav5jmoISYLSRLmAJZVMJUbtizvNPd-2dZgibUU6Nzq4CkRwc1mKCQ==
X-Cache-Hits
1
arstechnica_kids-try-2.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1526922071/
11 KB
12 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1526922071/arstechnica_kids-try-2.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
74e6f981b8b49af0323f0b5bdbc8399ffbd7c15f1fd047e2e0787bb050ee67dc

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 07 Mar 2019 19:03:24 GMT
Via
1.1 varnish, 1.1 e7e7960d7731a7583cedd8f1ff1aca38.cloudfront.net (CloudFront)
Age
1710879
Edge-Cache-Tag
534317149339935905520344723461171397212,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10983
X-Served-By
cache-fra19148-FRA
Last-Modified
Fri, 06 Jul 2018 19:56:45 GMT
Server
cloudinary
X-Timer
S1541180794.628746,VS0,VE139
ETag
"270368c34e1708c2006a66073406f364"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
jJkkFtKPP1-oP1iE2mCczQX-RDkpOA4YZx5ks-fWqUtgMiuiU1ssBQ==
X-Cache-Hits
0
wired_expert-explains-one-concept-in-5-levels-of-difficulty-blockchain.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1511810813/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1511810813/wired_expert-explains-one-concept-in-5-levels-of-difficulty-blockchain.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
9664537951dcb4580bae564d7f88764f4b029da8a261701b87088daee7a8c94c

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 09 Mar 2019 00:11:42 GMT
Via
1.1 varnish, 1.1 e7e7960d7731a7583cedd8f1ff1aca38.cloudfront.net (CloudFront)
Age
1540784
Edge-Cache-Tag
495972121451084591632566863662534489863,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10012
X-Request-Id
3f3c43256ccb5b77
X-Served-By
cache-fra19123-FRA
Last-Modified
Fri, 06 Jul 2018 19:56:45 GMT
Server
cloudinary
X-Timer
S1539540842.727582,VS0,VE1
ETag
"412e100440abad3a53678dd7fad646c1"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
-N4_iJHVIAt9b4bTOJRPQJ9N0t9KJMatlYi_m0BPg1U0B6f8Oim7MQ==
X-Cache-Hits
1
arstechnica_microsoft-surface-review.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1500593640/
12 KB
12 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1500593640/arstechnica_microsoft-surface-review.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
8d267db2300b8e32a93d523257de0d0c682331cd98c7e59c2af975551990ec92

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 09 Mar 2019 00:11:43 GMT
Via
1.1 varnish, 1.1 e7e7960d7731a7583cedd8f1ff1aca38.cloudfront.net (CloudFront)
Age
1916140
Edge-Cache-Tag
536675349820553379998381050468257911342,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
11969
X-Served-By
cache-hhn1525-HHN
Last-Modified
Fri, 22 Jun 2018 20:55:52 GMT
Server
cloudinary
X-Timer
S1539526682.109560,VS0,VE161
ETag
"b1583391826b161c16abae8b6d8a90c2"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
D_mSqDFkR4gezBb4uwfcMP1Jw1YUi1_5qZ26dcOn_tvoFaaUAphdAQ==
X-Cache-Hits
0
arstechnica_best-wearable-tech-of-2017.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1496775864/
13 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1496775864/arstechnica_best-wearable-tech-of-2017.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
f9005e0bc66b4637535b09be10356488207c6741d9cf428510105a434164e554

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 09 Mar 2019 00:11:43 GMT
Via
1.1 varnish, 1.1 e7e7960d7731a7583cedd8f1ff1aca38.cloudfront.net (CloudFront)
Age
1540734
Edge-Cache-Tag
549333829877868283348717431707793081913,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13810
X-Request-Id
83fc561070710dde
X-Served-By
cache-fra19124-FRA
Last-Modified
Fri, 22 Jun 2018 20:55:52 GMT
Server
cloudinary
X-Timer
S1539648889.717830,VS0,VE1
ETag
"3d020d9551ffca0b1c2cb5880fb72962"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
Yrtv3tfr3I1wW8Kpsby8twAjIl6fWRnzq1MTObOXtcsheQ21zo0DOQ==
X-Cache-Hits
1
arstechnica_gear-gadgets-the-moov-hr-sweat-heart-rate-monitor-in-a-headband.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1487958545/
6 KB
7 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1487958545/arstechnica_gear-gadgets-the-moov-hr-sweat-heart-rate-monitor-in-a-headband.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
34e23d411643b08763f3052d5cb276a0fb01c7d6f7f2a28c248c71f86fce65ab

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 09 Mar 2019 00:11:43 GMT
Via
1.1 varnish, 1.1 e7e7960d7731a7583cedd8f1ff1aca38.cloudfront.net (CloudFront)
Age
1540734
Edge-Cache-Tag
490847114835558711369846084577321823794,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
5973
X-Served-By
cache-fra19130-FRA
Last-Modified
Fri, 22 Jun 2018 20:55:52 GMT
Server
cloudinary
X-Timer
S1539908015.205658,VS0,VE1
ETag
"52f4379a4d3cb27ee136b4a5a4615526"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
5LrR66LVlojRCVM2W7XWwgDIQyN7SY3XVDhwIkNFT8zitJG8FGaMMA==
X-Cache-Hits
1
truncated
/
408 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c21029f21dc145723d40362da85504ee5a5bd33f5db6636beae3a01c7aba1fa2

Request headers

Response headers

Content-Type
image/svg+xml;charset=utf-8
user
4d.condenastdigital.com/
46 B
410 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=d04e26cc-3996-4a2d-82f9-40f758a4e1aa
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.174.217.231 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-174-217-231.compute-1.amazonaws.com
Software
/
Resource Hash
a83589f571179a08e9cc5ff1056b7e96d6de4ac7105e9aa8aee33a85b7885c58

Request headers

Accept
text/plain
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
/
www.facebook.com/tr/ Frame 15F4
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
2432
pragma
no-cache
cache-control
no-cache
origin
https://arstechnica.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
accept-encoding
gzip, deflate, br
cookie
fr=0Z66A8V6NCDu6p8ea..Bcmobf...1.0.Bcmobf.
Origin
https://arstechnica.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/

Response headers

status
200
content-type
text/plain
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-length
0
server
proxygen-bolt
date
Tue, 26 Mar 2019 20:09:04 GMT
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1553630944064&sessionId=36068d70-5a65-76d1-d68d-bde4414a43d9&url=arstechnica.com&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1553630943377
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.31.142.51 Chicago, United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
chi.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:05 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
7b1198d6839b1b7db33302c4694f3d36
Content-Length
4
Expires
0
en.js
c.evidon.com/sitenotice/4419/translations/
72 KB
4 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/4419/translations/en.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
7713f8cd92d4d6de8f561a9974209f8532e11b1db64d9a20efb50cf995609db0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
3963
last-modified
Tue, 14 Aug 2018 17:59:16 GMT
server
Apache
etag
"130e50d48e15fc5162f9707b91233f47:1534269556"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 27 Mar 2019 20:09:04 GMT
track.php
t.skimresources.com/api/
22 B
409 B
XHR
General
Full URL
https://t.skimresources.com/api/track.php
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 Ann Arbor, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:04 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
warning
299 - "Deprecated API"
alt-svc
clear
content-length
22
link
t.skimresources.com/api/
22 B
92 B
XHR
General
Full URL
https://t.skimresources.com/api/link
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 Ann Arbor, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:04 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
warning
299 - "Deprecated API"
alt-svc
clear
content-length
22
iabevidonmapping.js
iabmap.evidon.com/
6 KB
3 KB
Script
General
Full URL
https://iabmap.evidon.com/iabevidonmapping.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:c00:10:27b4:f500:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c12cfe3245b034d5354184f739ae0b54bcfd061434643d69446737fb395eaf15

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 08:12:11 GMT
content-encoding
gzip
last-modified
Mon, 18 Mar 2019 18:46:52 GMT
server
AmazonS3
age
43026
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
MtDfv3_jninsOKenEFcJYCHFSbdVkerTKgtxf4zKMeU9MMc1WEloNA==
via
1.1 4d1cbe225c5d30aa78ec9a6fa1ba4211.cloudfront.net (CloudFront)
evidon-cmp.js
c.evidon.com/sitenotice/
23 KB
7 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-cmp.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
6444118d84f1e81114a8f2fe394aa7b0edf6bf86668577a67d04e4f7e6bd5718

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
6782
last-modified
Wed, 20 Mar 2019 19:57:19 GMT
server
Apache
etag
"696b5da2be219aa209cb3f50d4818f0e:1553111842"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 27 Mar 2019 20:09:04 GMT
evidon-banner.js
c.evidon.com/sitenotice/
8 KB
3 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-banner.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
4b51cad50779921c134fe5f8a46df29da7bdedf5f643c331d192b6057af97992

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
2538
last-modified
Wed, 20 Mar 2019 19:57:19 GMT
server
Apache
etag
"41298c7c9394582aaf744ce4397a8521:1553111841"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 27 Mar 2019 20:09:04 GMT
1
l.betrad.com/site/v3/4419/3803/3/1/2/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/4419/3803/3/1/2/1?consent=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.72.158.71 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-72-158-71.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
icong1.png
c.evidon.com/pub/
506 B
822 B
Image
General
Full URL
https://c.evidon.com/pub/icong1.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.103.102.169 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-102-169.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
47ecf8e24654258186de2aabeeb592dc0c1f3d071b0f5b48622be67a9fd60c98

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
529
last-modified
Thu, 02 Jun 2011 18:30:38 GMT
server
Apache
etag
"e06dbc187b21a416c4ef0da5a3fd3829:1307039438"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
20312
l.betrad.com/site/v3/4419/3803/3/1/2/1/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/4419/3803/3/1/2/1/20312?consent=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.72.158.71 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-72-158-71.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
20312
l.betrad.com/site/v3/4419/3803/3/2/2/1/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/4419/3803/3/2/2/1/20312?consent=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.72.158.71 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-72-158-71.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
Cookie set /
www.medtargetsystem.com/beacon/portal/ Frame 6356
0
0
Document
General
Full URL
https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com&_sid=9a48abb9-8103-4848-9d36-5abfef114ea0&_vid=b1d8df26-d483-4d01-90f6-150d170d5e9d&_ak=119-556-B0E9F642&_flash=false&_th=1553630943|1553630943|1
Requested by
Host: www.medtargetsystem.com
URL: https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.1.219.33 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-1-219-33.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash

Request headers

Host
www.medtargetsystem.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Tue, 26 Mar 2019 20:09:04 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Pragma
no-cache
Server
Apache/2.4.7 (Ubuntu)
Set-Cookie
DMDSESSID=27mvd648j2jcv8fiv2abqef3d4; path=/; HttpOnly
Vary
X-Forwarded-Proto,Accept-Encoding
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
6419
Connection
keep-alive
collect.gif
www.medtargetsystem.com/analytics/
0
245 B
Image
General
Full URL
https://www.medtargetsystem.com/analytics/collect.gif?e=1&aid=&vid=b1d8df26-d483-4d01-90f6-150d170d5e9d&sid=9a48abb9-8103-4848-9d36-5abfef114ea0&vh=1&vt=1553630943&pt=1553630943&u=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&r=&t=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack%20%7C%20Ars%20Technica&p=1621.25&pm=&ab=&ak=119-556-B0E9F642
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.1.219.33 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-1-219-33.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
Server
Apache/2.4.7 (Ubuntu)
Connection
keep-alive
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
0
Vary
X-Forwarded-Proto
Content-Type
text/html; charset=UTF-8
user
4d.condenastdigital.com/
46 B
408 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=c0db920e-f77a-4afa-98ea-909a7d44a476
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553630400
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.204.40.232 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-204-40-232.compute-1.amazonaws.com
Software
/
Resource Hash
5587ca07a3abb6d36bf26c1a27ee06fd432dea496a7030e45f9dfacee2424d7e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
show_companion_ad.js
pagead2.googlesyndication.com/pagead/
163 KB
61 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_companion_ad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:808::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
a0f9b8cbe08fe2889a7e5dfc215431f6d5a9cf77896591f25dfc314a6699af5a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:02:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
376
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
62383
x-xss-protection
1; mode=block
server
cafe
etag
13127605249145156564
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Tue, 26 Mar 2019 21:02:48 GMT
vendorlist.json
vendorlist.consensu.org/
77 KB
15 KB
XHR
General
Full URL
https://vendorlist.consensu.org/vendorlist.json
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2047:5800:1:af78:4c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
206f0eabacd22ac264d69e707b23dbf1d62c7a71fec411fb1705d41d10f3d3b8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

x-amz-version-id
_fia.YnZ1x5w_3lCYfgDlmWXHJCpA74h
content-encoding
gzip
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
85417
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 21 Mar 2019 16:00:22 GMT
server
AmazonS3
date
Mon, 25 Mar 2019 20:25:27 GMT
access-control-max-age
86400
access-control-allow-methods
GET
content-type
application/json; charset=utf-8
via
1.1 ae3e6ab763f755c867a3b493d306312c.cloudfront.net (CloudFront)
cache-control
max-age=259200
x-amz-cf-id
imJ_Lc_BA0erhiDiD9odUiby3J1Mg9DW0_lCTFN09LEjGEtqvVL49Q==
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A04.309Z&_t=pageview&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=340b81bb-06c3-43a9-b1ca-89d0e2e707ab&sID=b66d442b-1402-497d-9cfb-d792185ce8b3&pID=25328402-7074-4d97-a219-f3ec94fc274b&uDt=desktop&_o=ars-technica&_c=general&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:04 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
20312
l.betrad.com/site/v3/4419/3803/3/4/2/1/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/4419/3803/3/4/2/1/20312?consent=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.72.158.71 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-72-158-71.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Tue, 26 Mar 2019 20:09:04 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
57
p.ad.gt/api/v1/p/passive/f42107bfef912f171434ed39b3867993/fbe706c0-8779-4f63-8e5c-aa1e36fe7df4/
50 KB
14 KB
Script
General
Full URL
https://p.ad.gt/api/v1/p/passive/f42107bfef912f171434ed39b3867993/fbe706c0-8779-4f63-8e5c-aa1e36fe7df4/57
Requested by
Host: a.ad.gt
URL: https://a.ad.gt/api/v1/u/matches/57
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.216.81.97 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-216-81-97.us-west-2.compute.amazonaws.com
Software
nginx/1.10.1 / Express
Resource Hash
51091196c57817c5b677e42def73e5fb2f79a9c941a01d7458d2d24dcc7aa982

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:08 GMT
Content-Encoding
gzip
Server
nginx/1.10.1
X-Powered-By
Express
ETag
W/"c95d-ZpLtgQSZO/vxvwt8J92t89hyBd0"
Access-Control-Allow-Methods
GET, POST, OPTIONS
Content-Type
text/html; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Connection
keep-alive
Access-Control-Allow-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Content-Length
13174
match
ids.ad.gt/api/v1/
Redirect Chain
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&adnxs_id=$UID
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3Dfbe706c0-8779-4f63-8e5c-aa1e36fe7df4%26adnxs_id%3D%24UID
  • https://ids.ad.gt/api/v1/match?id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&adnxs_id=6747529858904683189
43 B
597 B
Image
General
Full URL
https://ids.ad.gt/api/v1/match?id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&adnxs_id=6747529858904683189
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:07 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Wed, 27 Mar 2019 08:09:07 GMT

Redirect headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:07 GMT
AN-X-Request-Uuid
7f1256b1-4c50-4365-89f8-0b0c9e7f4b1d
Content-Type
text/html; charset=utf-8
Server
nginx/1.13.4
Location
https://ids.ad.gt/api/v1/match?id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&adnxs_id=6747529858904683189
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
X-Proxy-Origin
83.143.245.181; 83.143.245.181; 301.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.73:80
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
t_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
  • https://ids.ad.gt/api/v1/t_match?tdid=a2a0d053-9f20-4361-8335-f0eae23971b0&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
43 B
588 B
Image
General
Full URL
https://ids.ad.gt/api/v1/t_match?tdid=a2a0d053-9f20-4361-8335-f0eae23971b0&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:06 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Wed, 27 Mar 2019 08:09:06 GMT

Redirect headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:04 GMT
x-aspnet-version
4.0.30319
location
https://ids.ad.gt/api/v1/t_match?tdid=a2a0d053-9f20-4361-8335-f0eae23971b0&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
302
cache-control
private,no-cache, must-revalidate
content-type
text/html
content-length
259
g_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm=&google_sc=&google_ula=450542624&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&google_tc=
  • https://ids.ad.gt/api/v1/g_match?id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&google_gid=CAESEE4d3K0vy2rEo0XemT_3vVQ&google_cver=1&google_ula=450542624,0
43 B
605 B
Image
General
Full URL
https://ids.ad.gt/api/v1/g_match?id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&google_gid=CAESEE4d3K0vy2rEo0XemT_3vVQ&google_cver=1&google_ula=450542624,0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:06 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Wed, 27 Mar 2019 08:09:06 GMT

Redirect headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:04 GMT
server
HTTP server (unknown)
location
https://ids.ad.gt/api/v1/g_match?id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&google_gid=CAESEE4d3K0vy2rEo0XemT_3vVQ&google_cver=1&google_ula=450542624,0
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
302
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
357
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
adb_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://dpm.demdex.net/ibs:dpid=348447&dpuuid=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&redir=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fadb_match%3Fadb%3D%24%7BDD_UUID%7D%26id%3Dfbe706c0-8779-4f63-8e5c-aa1e3...
  • https://ids.ad.gt/api/v1/adb_match?adb=89416840437891243151553249337284938108&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
43 B
609 B
Image
General
Full URL
https://ids.ad.gt/api/v1/adb_match?adb=89416840437891243151553249337284938108&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:06 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Wed, 27 Mar 2019 08:09:06 GMT

Redirect headers

Pragma
no-cache
X-TID
LQ/uMHzVQug=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://ids.ad.gt/api/v1/adb_match?adb=89416840437891243151553249337284938108&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
pbm_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3Dfbe706c0-8779-4f63-8e5c-aa1e36fe7df4
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3Dfbe706c0-8779-4f63-8e5c-aa1e36fe7df4
  • https://ids.ad.gt/api/v1/pbm_match?pbm=20741A22-A102-4528-90D4-2D0AC71E756C&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
43 B
607 B
Image
General
Full URL
https://ids.ad.gt/api/v1/pbm_match?pbm=20741A22-A102-4528-90D4-2D0AC71E756C&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:08 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Wed, 27 Mar 2019 08:09:08 GMT

Redirect headers

Location
https://ids.ad.gt/api/v1/pbm_match?pbm=20741A22-A102-4528-90D4-2D0AC71E756C&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
Date
Tue, 26 Mar 2019 20:09:07 GMT
X-Cnection
close
Server
Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.1e-fips mod_fastcgi/2.4.6
Content-Length
439
Content-Type
text/html; charset=iso-8859-1
szm_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://p.rfihub.com/cm?pub=38725&userid=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4&in=1&forward=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fszm_match%3Fszm%3D{userid}%26id%3Dfbe706c0-8779-4f63-8e5c-aa1e36fe7df4
  • https://ids.ad.gt/api/v1/szm_match?szm=1871878965271686333&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
43 B
590 B
Image
General
Full URL
https://ids.ad.gt/api/v1/szm_match?szm=1871878965271686333&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:07 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Wed, 27 Mar 2019 08:09:07 GMT

Redirect headers

Location
https://ids.ad.gt/api/v1/szm_match?szm=1871878965271686333&id=fbe706c0-8779-4f63-8e5c-aa1e36fe7df4
Server
Jetty(9.0.6.v20130930)
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
ptrack-v1.2.0-engagedtime-slots.js
d1z2jf7jlzjs58.cloudfront.net/code/
39 KB
15 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/code/ptrack-v1.2.0-engagedtime-slots.js
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.41 Seattle, United States, ASN (),
Reverse DNS
server-13-35-254-41.fra6.r.cloudfront.net
Software
nginx /
Resource Hash
f77676385ed899908297ac3d793b6f79b7a342438ba59b9878678c42a8a7ffa1

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
public
Date
Thu, 07 Feb 2019 00:07:57 GMT
Content-Encoding
gzip
Last-Modified
Thu, 03 Jan 2019 22:59:57 GMT
Server
nginx
Age
4132870
ETag
W/"5c2e93ed-9c5a"
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 49140b838a62cd29e30f20e39a82dad0.cloudfront.net (CloudFront)
Cache-Control
max-age=315360000, public
Connection
keep-alive
X-Amz-Cf-Id
uZbQF9ZwoGmjPu3EGHERn03e0G0Zqz12HYpo7pWXzYX_pG4FGfLSaQ==
Expires
Thu, 31 Dec 2037 23:55:55 GMT
embed-api.json
player.cnevids.com/
6 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=5b031d7a841c4b39e0000013&embedLocation=arstechnica
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5b031d7a841c4b39e0000013.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady65474957
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.9 Seattle, United States, ASN (),
Reverse DNS
server-13-35-253-9.fra6.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
290d75805cfb433a2bc472ef21ddbae4593d223443cb388bf7df75ece73e788d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Access-Control-Allow-Origin
*
X-Cache
Miss from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
2045
X-XSS-Protection
1; mode=block
X-Request-Id
67b6dede-f172-436f-b831-d09f4c4e00c3
X-Runtime
0.006418
X-Backend-Node
10.110.120.110
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"e7d5861f33c5a8a056a6a54850b61954"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 49140b838a62cd29e30f20e39a82dad0.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
jEgmTsLtHpS_o5D1k0ZCrtIkkVOd-VxXU4cIyUAsc0JL5pAsv7cikg==
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame FC51
242 KB
83 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5b031d7a841c4b39e0000013.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady65474957
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:808::200a , Ireland, ASN (),
Reverse DNS
Software
sffe /
Resource Hash
7665f7e22b40f0474a766a1798bb11d800a02004572942891a55eef9ca7f8fe8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
84939
x-xss-protection
1; mode=block
expires
Tue, 26 Mar 2019 20:09:07 GMT
gpt_proxy.js
imasdk.googleapis.com/js/sdkloader/
61 KB
22 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/gpt_proxy.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5b031d7a841c4b39e0000013.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady65474957
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:808::200a , Ireland, ASN (),
Reverse DNS
Software
sffe /
Resource Hash
c342b36e2462015f6967edf60246d97443669401230c2bd2f18a05b0f44bb9eb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 19:55:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 26 Mar 2019 15:55:42 GMT
server
sffe
age
826
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
22750
x-xss-protection
0
expires
Tue, 26 Mar 2019 20:10:21 GMT
player-style-93d3ac933e3b2a7c0bd52030be8ef0af.css
d2c8v52ll5s99u.cloudfront.net/player/ Frame FC51
74 KB
12 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-93d3ac933e3b2a7c0bd52030be8ef0af.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5b031d7a841c4b39e0000013.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady65474957
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.94 Seattle, United States, ASN (),
Reverse DNS
server-13-35-254-94.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
4cc07db5e979ec8fc492f1cd9d88391360460adc0d8ce6ae568d50cc084da3e0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 16:48:56 GMT
Content-Encoding
gzip
Last-Modified
Wed, 06 Feb 2019 15:32:39 GMT
Server
AmazonS3
Age
3554412
ETag
"4acddbd24b10301fdc4909837b98a5bf"
X-Cache
Hit from cloudfront
Content-Type
text/css; charset=utf-8
Via
1.1 92ab13182d4b89ed20b3b5c10adc4f23.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
11327
X-Amz-Cf-Id
fZuyvksuItvtFtszcNeWj3ow7-JkEvuCNoyaBbQbNyUGQ_9zSPT_Rw==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
main-25c8c30ecbcc2fb3159f.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame FC51
910 KB
226 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5b031d7a841c4b39e0000013.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady65474957
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.94 Seattle, United States, ASN (),
Reverse DNS
server-13-35-254-94.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f20653985c279bd6b89e5555e0473a24faa0c5c3a868a04650f6489f29922861

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 08 Mar 2019 17:15:39 GMT
Content-Encoding
gzip
Last-Modified
Fri, 08 Mar 2019 17:09:43 GMT
Server
AmazonS3
Age
1565609
ETag
"45faf96c38edc781907b6d80e1478cdb"
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 92ab13182d4b89ed20b3b5c10adc4f23.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
231213
X-Amz-Cf-Id
Ypm976dpYWGuYwBI8pD5quBY0XGNAI-HzupxhWEjohoQTqoAZlzrOw==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

Response headers

Content-Type
image/png
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A04.367Z&_t=library_gpt&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=340b81bb-06c3-43a9-b1ca-89d0e2e707ab&sID=b66d442b-1402-497d-9cfb-d792185ce8b3&pID=25328402-7074-4d97-a219-f3ec94fc274b&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&init=1734.6099987626076&requestEnd=1182.609997689724&requestStart=1033.280000090599&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:07 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
truncated
/
1 KB
0
Media
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
60ddc774c7b5fd0c01d169321a444da403d60c0042f6bee01b0c96f6e1535fda

Request headers

Response headers

Content-Type
video/mp4
getcookie
evidon.mgr.consensu.org/iab/
169 B
382 B
Script
General
Full URL
https://evidon.mgr.consensu.org/iab/getcookie
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.199.180.208 Ashburn, United States, ASN (),
Reverse DNS
ec2-34-199-180-208.compute-1.amazonaws.com
Software
/
Resource Hash
9b133863146a5f391e8cee0842cafc7498ae89b6f79edbecfc842055342c1fe2

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:11 GMT
access-control-allow-origin
*
x-amzn-requestid
0511897c-5003-11e9-86e0-63b876ae83d4
content-type
text/javascript
status
200
x-amzn-trace-id
Root=1-5c9a86e7-76f1b27f579d4894475697ef;Sampled=0
x-amz-apigw-id
XKoEHHWEIAMFi4w=
content-length
169
publishertag.js
static.criteo.net/js/ld/
83 KB
25 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
178.250.2.130 , France, ASN (),
Reverse DNS
Software
nginx /
Resource Hash
b0e82f9ce6c1510f32a8e18c9581ba6573b6988dabdd3f2ed6c1ba08eff85cb9

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:08 GMT
Content-Encoding
gzip
Last-Modified
Thu, 07 Mar 2019 13:26:35 GMT
Server
nginx
ETag
W/"5c811c0b-14ca7"
Transfer-Encoding
chunked
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=86400, public
Connection
keep-alive
Timing-Allow-Origin
*
Expires
Wed, 27 Mar 2019 20:09:08 GMT
rid
match.adsrvr.org/track/
109 B
524 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183973
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.72.175.179 Dublin, Ireland, ASN (),
Reverse DNS
ec2-54-72-175-179.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ff80b59e0c101a4bb400a80202008362c73c9843f78d1f8c4a366db2e0179c5b

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Tue, 26 Mar 2019 20:09:04 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Thu, 25 Apr 2019 20:09:04 GMT
ids
mid.rkdms.com/
0
399 B
XHR
General
Full URL
https://mid.rkdms.com/ids?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.129 Seattle, United States, ASN (),
Reverse DNS
server-13-35-253-129.fra6.r.cloudfront.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

identity
api.rlcdn.com/api/
0
50 B
XHR
General
Full URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.82.158.121 Ashburn, United States, ASN (),
Reverse DNS
ec2-54-82-158-121.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

status
202
date
Tue, 26 Mar 2019 20:09:11 GMT
content-length
0
get
odb.outbrain.com/utils/
16 KB
9 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=http%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&srcUrl=http%3A%2F%2Ffeeds.arstechnica.com%2Farstechnica%2Findex%2F&settings=true&recs=true&widgetJSId=JS_1&key=NANOWDGT01&idx=0&version=01020505&apv=false&sig=eVm7iiuL&format=vjapi&rand=98507&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&va=true&cmpStat=1&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1553630943377
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN (),
Reverse DNS
Software
/
Resource Hash
a631ae5e81ff87b7a06451e590a4489580be636d8d565a8a5308efff4c4077ee
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, HHN, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-served-by
cache-jfk8148-JFK, cache-hhn1530-HHN
pragma
no-cache
x-timer
S1553630948.238193,VS0,VE136
date
Tue, 26 Mar 2019 20:09:08 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
104.156.90.48
accept-ranges
bytes, bytes
x-cache-hits
0, 0
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A04.688Z&_t=slot_staged&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=340b81bb-06c3-43a9-b1ca-89d0e2e707ab&sID=b66d442b-1402-497d-9cfb-d792185ce8b3&pID=25328402-7074-4d97-a219-f3ec94fc274b&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=28427.066666666666&image_count=15&image_surface=426406&server=production&vp_height=1200&vp_width=1585&created=2047.875002026558&staged=2055.3649961948395&pageload_to_staged=2055.3649961948395&channel=gadgets&ctx_template=article&id=1553630944680md0clobpilwqwfafd3xwk0syds1bvx&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x193&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=post_nav&CNS_init=675.6500005722046&CNS_init_to_staged=1379.714995622635&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:08 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A04.699Z&_t=slot_staged&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=340b81bb-06c3-43a9-b1ca-89d0e2e707ab&sID=b66d442b-1402-497d-9cfb-d792185ce8b3&pID=25328402-7074-4d97-a219-f3ec94fc274b&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=28427.066666666666&image_count=15&image_surface=426406&server=production&vp_height=1200&vp_width=1585&created=2050.535000860691&staged=2065.829999744892&pageload_to_staged=2065.829999744892&channel=gadgets&ctx_template=article&id=15536309446834mfiyefjzi3nttov7fxxqwfnpsffb8&instance=0&name=siderail_0&position_fold=atf&position_xy=145x0&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=siderail&CNS_init=675.6500005722046&CNS_init_to_staged=1390.1799991726875&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:08 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A04.709Z&_t=slot_staged&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=340b81bb-06c3-43a9-b1ca-89d0e2e707ab&sID=b66d442b-1402-497d-9cfb-d792185ce8b3&pID=25328402-7074-4d97-a219-f3ec94fc274b&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=28427.066666666666&image_count=15&image_surface=426406&server=production&vp_height=1200&vp_width=1585&created=2051.5849962830544&staged=2076.475001871586&pageload_to_staged=2076.475001871586&channel=gadgets&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=436x0&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=native_xrail&CNS_init=675.6500005722046&CNS_init_to_staged=1400.8250012993813&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A04.715Z&_t=slot_staged&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=340b81bb-06c3-43a9-b1ca-89d0e2e707ab&sID=b66d442b-1402-497d-9cfb-d792185ce8b3&pID=25328402-7074-4d97-a219-f3ec94fc274b&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=28427.066666666666&image_count=15&image_surface=426406&server=production&vp_height=1200&vp_width=1585&created=2052.429996430874&staged=2082.4100002646446&pageload_to_staged=2082.4100002646446&channel=gadgets&ctx_template=article&id=1553630944685znzkfboxluc4s9kgnu2gq8khjoood2&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=out_of_page&CNS_init=675.6500005722046&CNS_init_to_staged=1406.75999969244&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
bid
aax.amazon-adsystem.com/e/dtb/
47 B
344 B
XHR
General
Full URL
https://aax.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pid=8238117467271553630943872&cb=2542836874651553630944748&ws=1600x1200&v=7.27.00&t=2000&slots=%5B%7B%22sd%22%3A%22cns_ads_1553630944680mD0ClObpILWQWfafd3xWk0SydS1bvX_post_nav_0_container%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%7D%5D&pj=%7B%22apse%22%3A%7B%22chunkRequests%22%3Afalse%2C%22shouldSampleLatency%22%3Afalse%7D%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.94.218.7 Dublin, Ireland, ASN (),
Reverse DNS
Software
Server /
Resource Hash
8b2e04ea320c9d880b6cc64946ff8a95f5ac7d9934ffbb8631a2140e45178cda

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
Server
Server
Vary
User-Agent
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
47
bid
aax.amazon-adsystem.com/e/dtb/
47 B
344 B
XHR
General
Full URL
https://aax.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pid=8238117467271553630943872&cb=4760125707781553630944750&ws=1600x1200&v=7.27.00&t=2000&slots=%5B%7B%22sd%22%3A%22cns_ads_15536309446834MFIyEfJZi3nttOV7FXXqWFNPSFfb8_siderail_0_container%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%7D%5D&pj=%7B%22apse%22%3A%7B%22chunkRequests%22%3Afalse%2C%22shouldSampleLatency%22%3Afalse%7D%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.94.218.7 Dublin, Ireland, ASN (),
Reverse DNS
Software
Server /
Resource Hash
bfde97f99f0334506a0dd433fb980e7b7145705941fde0d96efef8fd51cd78a7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Date
Tue, 26 Mar 2019 20:09:04 GMT
Server
Server
Vary
User-Agent
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
47
ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN (),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1553630950;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553630950;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553630950;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN (),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553630950;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553630950;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
235 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=2&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=custom&rand=0.518008441001917
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN (),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
8574a7703d8859104e2cdf9209aeb18047a427c70471d36602f80fcfc1c3ed3a

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:06 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=0, max=8
Content-Length
235
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
240 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=57&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=custom&rand=0.08381536040779092
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN (),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
0ff4921ffa010d2d341c144f1a3c622b9d6ed198955fb88d873d74973f5821f0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:06 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=0, max=8
Content-Length
240
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
240 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=55&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=custom&rand=0.586245542261143
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN (),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
7b5692f8b1ec9ad55a9544076ac91ec5415bb420336e836b94c5df14270e3c84

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:06 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=0, max=8
Content-Length
240
Expires
Wed, 17 Sep 1975 21:32:10 GMT
cygnus
as-sec.casalemedia.com/
66 B
945 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=175689&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A78948268%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%221%22%2C%22siteID%22%3A%22175689%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%222%22%2C%22siteID%22%3A%22175690%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%223%22%2C%22siteID%22%3A%22175691%22%7D%2C%22id%22%3A%223%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%22a2a0d053-9f20-4361-8335-f0eae23971b0%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-03-26T20%3A09%3A04%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
88.221.165.92 , European Union, ASN (),
Reverse DNS
a88-221-165-92.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
7bf9256c071c907c411f3db1aa3fc5a6014444eaeb1a9891e9dadb341779080b

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:11 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Tue, 26 Mar 2019 20:09:11 GMT
cygnus
as-sec.casalemedia.com/
66 B
945 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=175689&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A77256641%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2210%22%2C%22siteID%22%3A%22175698%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2211%22%2C%22siteID%22%3A%22175699%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A1050%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2212%22%2C%22siteID%22%3A%22175700%22%7D%2C%22id%22%3A%223%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%22a2a0d053-9f20-4361-8335-f0eae23971b0%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-03-26T20%3A09%3A04%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
88.221.165.92 , European Union, ASN (),
Reverse DNS
a88-221-165-92.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
182f5da7035702da9fa2309298862f4304c2617899378a6497c425b6797683b7

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:11 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Tue, 26 Mar 2019 20:09:11 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
236 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=15&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=custom&rand=0.21585587942699802
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN (),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
517369e1a6960aeae15c847f0f21313090d929fce23eaa4fc5d762008cad4c7e

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:06 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=0, max=10
Content-Length
236
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
236 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=10&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=custom&rand=0.12457490196580623
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN (),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
401614a22f71b70172d3a7897729f76db094fd82040262e16213b0863497248b

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:06 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=0, max=1
Content-Length
236
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
240 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=54&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=custom&rand=0.7481550093410381
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN (),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
49890c5287555bfd385c791789eeda325f64c6103fac47616528b339b475f30e

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:06 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=0, max=10
Content-Length
240
Expires
Wed, 17 Sep 1975 21:32:10 GMT
ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN (),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN (),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A05.699Z&_t=slot_requested&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=6420ed74-7da6-43b9-9785-9ff5eb53eb7b&uNw=1&uUq=1&pID=d7228d0f-9e7b-4af7-977f-acb13fb3963a&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=28427.066666666666&image_count=15&image_surface=426406&server=production&vp_height=1200&vp_width=1585&created=2047.875002026558&staged=2055.3649961948395&pageload_to_staged=2055.3649961948395&channel=gadgets&ctx_template=article&id=1553630944680md0clobpilwqwfafd3xwk0syds1bvx&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x193&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=post_nav&CNS_init=675.6500005722046&suffix=dart&CNS_init_to_staged=1379.714995622635&inViewport=2063.324995338917&pageLoad_to_in_viewport=1387.6749947667122&isRefresh=true&is_first_Request=true&requested=3066.32000207901&pageLoad_to_requested=3066.32000207901&CNS_init_to_requested=2390.6700015068054&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=175689&u=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
88.221.165.92 , European Union, ASN (),
Reverse DNS
a88-221-165-92.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:06 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Tue, 26 Mar 2019 20:09:06 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A05.718Z&_t=slot_requested&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=6420ed74-7da6-43b9-9785-9ff5eb53eb7b&sID=7384eef8-2428-4f2b-b97b-bd9e505c8db6&pID=d7228d0f-9e7b-4af7-977f-acb13fb3963a&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=28427.066666666666&image_count=15&image_surface=426406&server=production&vp_height=1200&vp_width=1585&created=2050.535000860691&staged=2065.829999744892&pageload_to_staged=2065.829999744892&channel=gadgets&ctx_template=article&id=15536309446834mfiyefjzi3nttov7fxxqwfnpsffb8&instance=0&name=siderail_0&position_fold=atf&position_xy=145x0&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=siderail&CNS_init=675.6500005722046&suffix=dart&CNS_init_to_staged=1390.1799991726875&inViewport=2075.9700015187263&pageLoad_to_in_viewport=1400.3200009465218&isRefresh=true&requested=3085.6849998235703&pageLoad_to_requested=3085.6849998235703&CNS_init_to_requested=2410.0349992513657&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A05.739Z&_t=slot_requested&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=6420ed74-7da6-43b9-9785-9ff5eb53eb7b&sID=7384eef8-2428-4f2b-b97b-bd9e505c8db6&pID=d7228d0f-9e7b-4af7-977f-acb13fb3963a&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=28427.066666666666&image_count=15&image_surface=426406&server=production&vp_height=1200&vp_width=1585&created=2051.5849962830544&staged=2076.475001871586&pageload_to_staged=2076.475001871586&channel=gadgets&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=436x0&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=native_xrail&CNS_init=675.6500005722046&suffix=dart&CNS_init_to_staged=1400.8250012993813&inViewport=2081.675000488758&pageLoad_to_in_viewport=1406.0249999165535&isRefresh=true&requested=3106.0499995946884&pageLoad_to_requested=3106.0499995946884&CNS_init_to_requested=2430.399999022484&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=175689&u=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
88.221.165.92 , European Union, ASN (),
Reverse DNS
a88-221-165-92.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:06 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Tue, 26 Mar 2019 20:09:06 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A05.746Z&_t=slot_requested&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=6420ed74-7da6-43b9-9785-9ff5eb53eb7b&sID=7384eef8-2428-4f2b-b97b-bd9e505c8db6&pID=d7228d0f-9e7b-4af7-977f-acb13fb3963a&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=28427.066666666666&image_count=15&image_surface=426406&server=production&vp_height=1200&vp_width=1585&created=2052.429996430874&staged=2082.4100002646446&pageload_to_staged=2082.4100002646446&channel=gadgets&ctx_template=article&id=1553630944685znzkfboxluc4s9kgnu2gq8khjoood2&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=out_of_page&CNS_init=675.6500005722046&suffix=dart&CNS_init_to_staged=1406.75999969244&inViewport=2090.5149951577187&pageLoad_to_in_viewport=1414.864994585514&isRefresh=true&requested=3113.7949973344803&pageLoad_to_requested=3113.7949973344803&CNS_init_to_requested=2438.1449967622757&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
ads
securepubads.g.doubleclick.net/gampad/
16 KB
6 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4361623938668070&correlator=2349250846448500&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&hxva=1&scor=3174757690848456&eid=21061743%2C21061864%2C21062860&vrg=2019032001&tfcd=0&guci=1.2.0.0.2.2.0.0&plat=1%3A32776%2C2%3A32776%2C8%3A32776&sc=1&sfv=1-0-32&iu_parts=3379%2Cconde.ars%2Cinterstitial%2Cgadgets%2Carticle%2C1%2Chero%2Crail%2C2&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5%2C0%2F1%2F6%2F3%2F4%2F5%2C0%2F1%2F7%2F3%2F4%2F5%2C0%2F1%2F7%2F3%2F4%2F8&prev_iu_szs=1x1%2C728x90%7C970x60%7C970x250%7C930x400%7C930x370%7C970x90%7C970x420%7C9x1%7C9x3%7C9x9%7C1200x370%2C300x250%7C300x600%7C300x1050%2C300x140&fsbs=1%2C1%2C1%2C1&ists=8&ppid=d04e26cc39964a2d82f940f758a4e1aa&prev_scp=ctx_slot_name%3D_out_of_page_0%26ctx_slot_instance%3D_out_of_page_0%26ctx_slot_type%3D_out_of_page%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%7Cctx_slot_name%3Dpost_nav_0%26amznbid%3D2%26amznp%3D2%26ctx_slot_instance%3Dpost_nav_0%26ctx_slot_type%3Dpost_nav%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%7Cctx_slot_name%3Dsiderail_0%26amznbid%3D2%26amznp%3D2%26ctx_slot_instance%3Dsiderail_0%26ctx_slot_type%3Dsiderail%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%7Cctx_slot_name%3Dnative_xrail_0%26ctx_slot_instance%3Dnative_xrail_0%26ctx_slot_type%3Dnative_xrail%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0&eri=1&cust_params=env_device_type%3Ddesktop%26env_server%3Dproduction%26rdt_device_template%3Ddesktop_article%26cnt_tags%3Ddefender-atp%252Chuawei%252Cmatebook%252Cmicrosoft-3%252Csecurity%252Cwindows%26usr_bkt_pv%3D8%26ctx_cns_version%3D2_26_0%26vnd_prx_segments%3D300003%252C131130%252C121100%252C131100%252C131137%252C112200%252C210001%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cwmhp4i%252Cv8lc56%252C_lE36k6Liu9_%26vnd_4d_ctx_topics%3DALLBRANDS_70%252CALLBRANDS_7%252CALLBRANDS_63%252CALLBRANDS_38%252CALLBRANDS_31%252CALLBRANDS_283%252CALLBRANDS_274%252CALLBRANDS_258%252CALLBRANDS_167%252CALLBRANDS_134%252CALLBRANDS_64%252CALLBRANDS_57%252CALLBRANDS_28%252CALLBRANDS_244%252CALLBRANDS_21%252CALLBRANDS_192%26vnd_4d_ctx_topic_sc%3D0.4475254806911286%252C0.4475254806911286%252C0.4475254806911286%252C0.4475254806911286%252C0.4475254806911286%252C0.4475254806911286%252C0.4475254806911286%252C0.4475254806911286%252C0.4475254806911286%252C0.4475254806911286%252C0.19952305475193796%252C0.19952305475193796%252C0.19952305475193796%252C0.19952305475193796%252C0.19952305475193796%252C0.19952305475193796%26vnd_4d_ctx_entities%3Dmicrosoft%252Chuawei%252Cwindows%252Cpage%2520layout%252Capc%252Cfirst%2520thing%2520first%252Cmalware%252Cdefender%2520atp%252Cdoublepulsar%252Csuperuser%252Cpeter%2520bright%252Cnsa%252Cnational%2520security%2520agency%252Cutc%252Cuser%2520mode%252Cheuristic%252Ccond%25C3%25A9%2520nast%252Cars%2520orbital%2520transmission%252Ccnmn%2520collection%252Cmedia%2520group%26vnd_4d_ctx_ent_sc%3D1%252C0.9831827323785822%252C0.8063344270624606%252C0.703473159672751%252C0.685091634795918%252C0.5382437614608746%252C0.5200157508772634%252C0.4798840421173328%252C0.4535975895064453%252C0.452890490945612%252C0.43821108865821873%252C0.4336596196947853%252C0.40946308318188646%252C0.40613532157335536%252C0.39723514062027737%252C0.3945599554364367%252C0.3467761262543764%252C0.31017586527250884%252C0.25356101132624925%252C0.25338583329919845%26vnd_4d_ctx_keywords%3Dmicrosoft%252Chuawei%252Cwindows%252Csystem%252Cpage%2520layout%252Capc%252Cdriver%252Cprocess%252Coperation%252Cdoublepulsar-type%2520backdoor%252Cfirst%2520thing%2520first%252Clearning-based%2520algorithm%252Cmalware%252Cpcmanager%2520software%252Cdefender%2520atp%252Cattack%252Cpermission%252Cwatchdog%252Cdoublepulsar%252Csuperuser%26vnd_4d_ctx_kw_sc%3D1%252C0.9831827323785822%252C0.8063344270624606%252C0.7413712011904477%252C0.703473159672751%252C0.685091634795918%252C0.6636270523240011%252C0.6569130456407869%252C0.6345796013090864%252C0.5577925986776301%252C0.5382437614608746%252C0.5283724294047889%252C0.5200157508772634%252C0.5048878667903249%252C0.4798840421173328%252C0.4777217542831158%252C0.4761730471933642%252C0.4638761801937298%252C0.4535975895064453%252C0.452890490945612%26vnd_4d_pid%3D25328402-7074-4d97-a219-f3ec94fc274b%26vnd_4d_xid%3Dc0db920e-f77a-4afa-98ea-909a7d44a476%26vnd_4d_sid%3Db66d442b-1402-497d-9cfb-d792185ce8b3%26ctx_template%3Darticle%26ctx_page_slug%3Dhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%26ctx_page_channel%3Dgadgets&cookie_enabled=1&bc=15&lmt=1553630945&dt=1553630945879&dlt=1553630943116&idt=1160&frm=20&biw=1585&bih=1200&oid=3&adxs=0%2C193%2C1063%2C1063&adys=0%2C80%2C370%2C786&adks=3558982418%2C1293899614%2C3786540068%2C3778155696&ucis=1%7C2%7C3%7C4&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&dssz=74&icsg=35229469245440&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x-1%7C1200x90%7C300x250%7C300x0&msz=0x-1%7C1200x90%7C300x250%7C300x140&blev=1&bisch=1&ga_vid=1352067928.1553630946&ga_sid=1553630946&ga_hid=330064377&fws=4%2C4%2C4%2C4
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.208.34 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s12-in-f2.1e100.net
Software
cafe /
Resource Hash
38a15912f9626404ad586330374fb74b60b1889b64716780369d8ba78417a327
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

date
Tue, 26 Mar 2019 20:09:06 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
6353
x-xss-protection
1; mode=block
google-lineitem-id
-2,4830169578,-2,4736014287
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2,138247271585,-2,138237302059
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019032001.js
securepubads.g.doubleclick.net/gpt/
68 KB
25 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.208.34 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s12-in-f2.1e100.net
Software
sffe /
Resource Hash
73aa8ed17343a31465bb84462a14f0b11a7e3b0ee0c75963cb56aa3efd0ae37a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 20 Mar 2019 17:54:52 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
25995
x-xss-protection
1; mode=block
expires
Tue, 26 Mar 2019 20:09:09 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-32/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-32/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:819::2001 , Ireland, ASN (),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

7c76266d-720d-4dbe-86da-fc1dc20ac1f0
https://arstechnica.com/ Frame FC51
31 B
0
Other
General
Full URL
blob:https://arstechnica.com/7c76266d-720d-4dbe-86da-fc1dc20ac1f0
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Length
31
Content-Type
application/javascript
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/ Frame FC51
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.131 Seattle, United States, ASN (),
Reverse DNS
server-13-35-254-131.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-93d3ac933e3b2a7c0bd52030be8ef0af.css
Origin
https://arstechnica.com

Response headers

Date
Tue, 26 Mar 2019 20:09:10 GMT
Content-Encoding
gzip
X-Cache
RefreshHit from cloudfront
Access-Control-Max-Age
3000
Connection
keep-alive
Content-Length
29632
Via
1.1 2f471134491a4de5cfcaef646caf9dde.cloudfront.net (CloudFront)
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
QxXP9zmIf1HuVYNNG0SdfzsLxaL_3PaTbou4USQXi9UMdHacRf1KMw==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.288.0_en.html
imasdk.googleapis.com/js/core/ Frame EEB8
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.288.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:808::200a , Ireland, ASN (),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.288.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
183530
date
Thu, 21 Mar 2019 19:53:28 GMT
expires
Fri, 20 Mar 2020 19:53:28 GMT
last-modified
Thu, 21 Mar 2019 19:18:25 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
1; mode=block
cache-control
public, max-age=31536000
age
432939
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame FC51
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:809::2006 , Ireland, ASN (),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
1; mode=block
expires
Tue, 26 Mar 2019 20:09:09 GMT
integrator.js
adservice.google.com/adsid/ Frame FC51
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
1; mode=block
fbevents.js
connect.facebook.net/en_US/ Frame FC51
52 KB
15 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
6bb981959d783d83df88b9aa48738948c9a8a22c1a31b8cb5305d3e338ebf9a7
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
15216
x-xss-protection
0
pragma
public
x-fb-debug
5cBGylshmzCy1l8lkPcKs2QKEGIxPFwKIlyokRApR6APzzqa0rViIAoM6eB9nN9jzRvjvFCZ9Sd/ed+8CLehkg==
date
Tue, 26 Mar 2019 20:09:09 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame FC51
38 KB
11 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.113 Seattle, United States, ASN (),
Reverse DNS
server-13-35-254-113.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:08:27 GMT
Content-Encoding
gzip
Last-Modified
Wed, 24 May 2017 18:19:15 GMT
Server
AmazonS3
Age
43
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 df86e917220bc08caa68b0eb8ddabe91.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
FbzqjbIjTZ6VjvXs3ntCsfM4OYSfnTRyTx-nW5DEMwP77HXJe07n8g==
collect
www.google-analytics.com/r/
35 B
131 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
infinityid
infinityid.condenastdigital.com/ Frame FC51
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/infinityid
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.44.76.10 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-44-76-10.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
b87109d869fcd0787d8429a72d696ed443b289a41ea2a24ae0411848deb917e8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Date
Tue, 26 Mar 2019 20:09:07 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
track
capture.condenastdigital.com/ Frame FC51
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-26T20%3A09%3A07.682Z&_c=&_t=Player%20Requested&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/ Frame FC51
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-26T20%3A09%3A07.756Z&_c=gptError&_t=gptData&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22Cannot%20read%20property%20%270%27%20of%20undefined%22%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225b031d7a841c4b39e0000013%22%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/ Frame FC51
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-26T20%3A09%3A07.883Z&_c=Performance&_t=adj_player_download_time&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=http%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fmegabots-born-to-smash-anything-in-their-path&cId=5b031d7a841c4b39e0000013&cKe=science%20and%20technology%2Ctechnology&cPd=2018-05-21T19%3A25%3A00%2B00%3A00&cTi=MegaBots%3A%20Born%20to%20Smash%20Anything%20in%20Their%20Path&mDu=105&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pWw=540&pWh=303.75&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22guid%22%3A%22e08ccf41-c2bd-b2d1-c113-651288d8466%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3380.25%2C%22playerType%22%3A%22video-continuous%22%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22tabStatus%22%3A%22active%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%7D&_v=3225.4099994897842&adId=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN (),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_megabots-born-to-smash-anything-in-their-path.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1526931343/ Frame FC51
74 KB
75 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1526931343/arstechnica_megabots-born-to-smash-anything-in-their-path.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
9f408325b29088ddf2fbe1992fbd905190edf51ab6005e81aabbf2f61e31576d

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 08 Mar 2019 07:46:36 GMT
Via
1.1 varnish, 1.1 e7e7960d7731a7583cedd8f1ff1aca38.cloudfront.net (CloudFront)
Age
1599790
Edge-Cache-Tag
569839514353085132285751987890345809929,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
75752
X-Served-By
cache-fra19122-FRA
Last-Modified
Mon, 21 May 2018 19:37:37 GMT
Server
cloudinary
X-Timer
S1531303889.251389,VS0,VE0
ETag
"8d3f9138316849c4a14ec442bbb7a8a0"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
yD4N-gQ_-H71Vs3Y5MGTxKJkTn8kqJ_H89jH5gvdxjP7uRpbaJnF7Q==
X-Cache-Hits
2
d72bf490-85c6-43e6-a595-10aa249d74a6thumbs.mp4
dp8hsntg6do36.cloudfront.net/5b031d7a841c4b39e0000013/ Frame FC51
128 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5b031d7a841c4b39e0000013/d72bf490-85c6-43e6-a595-10aa249d74a6thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.78 Seattle, United States, ASN (),
Reverse DNS
server-13-35-253-78.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Range
bytes=0-
chrome-proxy
frfr

Response headers

Date
Mon, 25 Mar 2019 20:19:26 GMT
Via
1.1 d5fb859c39a16d7f218b4c7fb1528ad6.cloudfront.net (CloudFront)
Last-Modified
Mon, 21 May 2018 19:31:06 GMT
Server
AmazonS3
Age
85784
ETag
"912307f78e9bc758034519f0d5f9d454"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-456667/456668
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
456668
X-Amz-Cf-Id
AAtYnraW9FFVE4mN9jT2BZvhGgGrjRsdSmtQd5vpjm5oLqD1i9SW-g==
d72bf490-85c6-43e6-a595-10aa249d74a6thumbs.mp4
dp8hsntg6do36.cloudfront.net/5b031d7a841c4b39e0000013/ Frame FC51
64 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5b031d7a841c4b39e0000013/d72bf490-85c6-43e6-a595-10aa249d74a6thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.78 Seattle, United States, ASN (),
Reverse DNS
server-13-35-253-78.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Range
bytes=0-
chrome-proxy
frfr

Response headers

Date
Mon, 25 Mar 2019 20:19:26 GMT
Via
1.1 a56d6b55603697d6c44b19d4f907baaa.cloudfront.net (CloudFront)
Last-Modified
Mon, 21 May 2018 19:31:06 GMT
Server
AmazonS3
Age
85784
ETag
"912307f78e9bc758034519f0d5f9d454"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-456667/456668
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
456668
X-Amz-Cf-Id
9UKBhcX0c-8EDsJBb-j7T-2A9P5lmDgbIyuPV_HYrEXHxzWO9Zqzew==
track
capture.condenastdigital.com/ Frame FC51
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-26T20%3A09%3A07.970Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=http%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fmegabots-born-to-smash-anything-in-their-path&cId=5b031d7a841c4b39e0000013&cKe=science%20and%20technology%2Ctechnology&cPd=2018-05-21T19%3A25%3A00%2B00%3A00&cTi=MegaBots%3A%20Born%20to%20Smash%20Anything%20in%20Their%20Path&mDu=105&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pWw=540&pWh=303.75&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22guid%22%3A%22e08ccf41-c2bd-b2d1-c113-651288d8466%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3380.25%2C%22playerType%22%3A%22video-continuous%22%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22tabStatus%22%3A%22active%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%7D&adId=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN (),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
76784aad-9747-4e8a-9a9b-4eea6c37b27b
https://arstechnica.com/ Frame FC51
5 KB
0
Other
General
Full URL
blob:https://arstechnica.com/76784aad-9747-4e8a-9a9b-4eea6c37b27b
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Length
5463
Content-Type
application/javascript
d72bf490-85c6-43e6-a595-10aa249d74a6manifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/5b031d7a841c4b39e0000013/ Frame FC51
918 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5b031d7a841c4b39e0000013/d72bf490-85c6-43e6-a595-10aa249d74a6manifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.82 Seattle, United States, ASN (),
Reverse DNS
server-13-35-253-82.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
652ac5054e1b63b55ca6e292f513c10d98cc0892e9bc639190572c3f7317d009

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Date
Mon, 25 Mar 2019 20:19:26 GMT
Via
1.1 df86e917220bc08caa68b0eb8ddabe91.cloudfront.net (CloudFront)
Vary
Origin
Age
85783
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
918
Last-Modified
Mon, 21 May 2018 19:30:45 GMT
Server
AmazonS3
ETag
"359c428f4c1f47b1a76f07140c974982"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Accept-Ranges
bytes
X-Amz-Cf-Id
Gf0lnXIm3GGnhdpIf6zEJzuYtAqW45GhFOQs8-opGr8dGBgfx3ulwQ==
d72bf490-85c6-43e6-a595-10aa249d74a6file-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/5b031d7a841c4b39e0000013/ Frame FC51
2 KB
807 B
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5b031d7a841c4b39e0000013/d72bf490-85c6-43e6-a595-10aa249d74a6file-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.82 Seattle, United States, ASN (),
Reverse DNS
server-13-35-253-82.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
b4cda94671b08ecf18a41329c1adc3ceda7ec9944931eeb2bd6a839baaaaa765

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Date
Mon, 25 Mar 2019 20:19:27 GMT
Content-Encoding
gzip
Last-Modified
Mon, 21 May 2018 19:31:33 GMT
Server
AmazonS3
Age
85782
Vary
Origin
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
X-Amz-Cf-Id
lLjU1aJ6kkJnBQC_Uk0KplDYqUuCW0en7gOI_4-r6bQDQVjq6xXy8A==
Via
1.1 df86e917220bc08caa68b0eb8ddabe91.cloudfront.net (CloudFront)
82a2eaa8-37bf-4266-985e-593ff3de63b2
https://arstechnica.com/ Frame FC51
64 KB
0
Other
General
Full URL
blob:https://arstechnica.com/82a2eaa8-37bf-4266-985e-593ff3de63b2
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3445bd22374e7449265ec9c8ae91ba255148fb1583701f636792dc933befa73b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Length
65790
Content-Type
application/javascript
d72bf490-85c6-43e6-a595-10aa249d74a6file-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/5b031d7a841c4b39e0000013/ Frame FC51
587 KB
575 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5b031d7a841c4b39e0000013/d72bf490-85c6-43e6-a595-10aa249d74a6file-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.82 Seattle, United States, ASN (),
Reverse DNS
server-13-35-253-82.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
df115a031f49b983897c4092a53cf6c8044afdb7b073fd3f670f2b82a9d17575

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Date
Mon, 25 Mar 2019 20:19:28 GMT
Content-Encoding
gzip
Last-Modified
Mon, 21 May 2018 19:31:34 GMT
Server
AmazonS3
Age
85781
Vary
Origin
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
X-Amz-Cf-Id
ihWBQ7XHfZbKyu9-3tkYSEq6iihf-cs-KJpAFeZ1PoyJz0ozx7LIlw==
Via
1.1 df86e917220bc08caa68b0eb8ddabe91.cloudfront.net (CloudFront)
eyJpdSI6IjZlNTMwMzZiMDg5OWEyZWY3NDU5NTg0NTg4ODU4M2Q3MzI5M2NiNzY0ZWVlZmMxMGJlZWNlNDFjZWYyOGMzODAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
3 KB
4 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjZlNTMwMzZiMDg5OWEyZWY3NDU5NTg0NTg4ODU4M2Q3MzI5M2NiNzY0ZWVlZmMxMGJlZWNlNDFjZWYyOGMzODAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1bef4225ffc59fb3b04d8c9f7867f9ab36ac8b2a8be09195a78c9a232f4f05d7
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 12 Mar 2019 21:41:56 GMT
Date
Tue, 26 Mar 2019 20:09:09 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2239079
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
3428
eyJpdSI6ImQ3YzBjYWZhOWE2NjFmYTI1MzU2NDQyYTA0MTkzNGY0OWIzN2VhYjBhZmVhMzE0NDBiZGYzMjk4MGUxNjZhYTAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
12 KB
12 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImQ3YzBjYWZhOWE2NjFmYTI1MzU2NDQyYTA0MTkzNGY0OWIzN2VhYjBhZmVhMzE0NDBiZGYzMjk4MGUxNjZhYTAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
15ec9b92eb3f0f4830cb422100e18e12aaa0ea973f7c033db88ca4f6ae5d27cb
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 07 Mar 2019 16:49:22 GMT
Date
Tue, 26 Mar 2019 20:09:09 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2387117
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
12054
eyJpdSI6ImZlMjRjN2I4MzRiZTI1YWZkMjliYzc0MzJiMzA5NTBmNDc1MmQ2YTViNjg5MzQ3M2E3ZWFhMWRkZGU5NjQ0ODMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
14 KB
15 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImZlMjRjN2I4MzRiZTI1YWZkMjliYzc0MzJiMzA5NTBmNDc1MmQ2YTViNjg5MzQ3M2E3ZWFhMWRkZGU5NjQ0ODMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ecdde76d076e23eecbc61fa8d6123b17d00f8bd2ca902d62a5fde70b1d2e32c1
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Mon, 11 Mar 2019 12:44:24 GMT
Date
Tue, 26 Mar 2019 20:09:10 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1638849
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
14796
eyJpdSI6ImJhZDhlMzRmYTlkODRmZDFmZTViNGU1YzliY2U4YmIxYjk3NTYzMWM4NGZlYjVhYWRlMmMwY2U5NDFmMzNjNjMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
13 KB
13 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImJhZDhlMzRmYTlkODRmZDFmZTViNGU1YzliY2U4YmIxYjk3NTYzMWM4NGZlYjVhYWRlMmMwY2U5NDFmMzNjNjMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
aa37f0a532ade98f06ce63f79714523ac09fa482859e143e6128ec7dda2f728d
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 22 Feb 2019 16:28:26 GMT
Date
Tue, 26 Mar 2019 20:09:10 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=889056
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
13044
eyJpdSI6IjFjNzM1YjFkMzlhMTg4NDBlNTI2YjA1YmEwYTE4MzM0M2VhZTNmOGMxNzYxOWFmYjE4NmUzMzBkN2M4ZWM1YjMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
9 KB
10 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjFjNzM1YjFkMzlhMTg4NDBlNTI2YjA1YmEwYTE4MzM0M2VhZTNmOGMxNzYxOWFmYjE4NmUzMzBkN2M4ZWM1YjMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
935f706ef5018b731606a3edc39e772ef5edb5b59e71742bc6f62e1f45efac35
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 15 Mar 2019 16:15:18 GMT
Date
Tue, 26 Mar 2019 20:09:10 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1514041
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
9524
eyJpdSI6ImVkYjYxODFlYmNiZGRjNmVhODgyMTRhOGI4YjY4YTNkNGZlNDgxNTdlOTllMjY3Yzk3M2EyNmRmM2I3ODE5NDMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
10 KB
11 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImVkYjYxODFlYmNiZGRjNmVhODgyMTRhOGI4YjY4YTNkNGZlNDgxNTdlOTllMjY3Yzk3M2EyNmRmM2I3ODE5NDMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b8c5b7301d2085da2ff7c6b2d29a92107e01176c0300297ebc413662782a19b9
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sun, 17 Mar 2019 07:39:15 GMT
Date
Tue, 26 Mar 2019 20:09:10 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1941329
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
10628
getpixels
pixels.ad.gt/api/v1/
5 KB
2 KB
Script
General
Full URL
https://pixels.ad.gt/api/v1/getpixels?tagger_id=f42107bfef912f171434ed39b3867993&url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&code=none
Requested by
Host: p.ad.gt
URL: https://p.ad.gt/api/v1/p/passive/f42107bfef912f171434ed39b3867993/fbe706c0-8779-4f63-8e5c-aa1e36fe7df4/57
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.27.154.203 Boardman, United States, ASN (),
Reverse DNS
ec2-52-27-154-203.us-west-2.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
746e702acf29abec0770d991897634ddec9bd2d3a1c5bc39c08e7d93a9636bcc

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:10 GMT
Content-Encoding
gzip
Server
nginx/1.12.1
Connection
keep-alive
Content-Length
1465
Content-Type
text/html; charset=utf-8
ecommerce.js
www.google-analytics.com/plugins/ua/
1 KB
831 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/ecommerce.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8e1b84265e633c043720dd0921476c16bc9f75e393e855c9116ca7c3a847b5c7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 19:13:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
3368
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
735
x-xss-protection
1; mode=block
expires
Tue, 26 Mar 2019 20:13:02 GMT
ec.js
www.google-analytics.com/plugins/ua/
3 KB
1 KB
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/ec.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
058ed961bfe422af7bfc65865f4c08531ec8ace995f8a1ec560a46581cb7712c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 19:10:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
3542
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
1296
x-xss-protection
0
expires
Tue, 26 Mar 2019 20:10:08 GMT
conde_nast_xid
ids.ad.gt/api/v1/put/
43 B
286 B
Image
General
Full URL
https://ids.ad.gt/api/v1/put/conde_nast_xid?conde_nast_xid=c0db920e-f77a-4afa-98ea-909a7d44a476
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:13 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Wed, 27 Mar 2019 08:09:13 GMT
f42107bfef912f171434ed39b3867993
p.ad.gt/api/v1/p/tid/dec/s/
0
616 B
Image
General
Full URL
https://p.ad.gt/api/v1/p/tid/dec/s/f42107bfef912f171434ed39b3867993?url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&title=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&image=https%3A%2F%2Fcdn.arstechnica.net%2Fwp-content%2Fuploads%2F2018%2F04%2Fmatebookxpro5-760x380.jpg&type=article&tags=&sn=1&description=Monitoring%20systems%20were%20looking%20for%20attacks%20using%20technique%20popularized%20by%20the%20NSA.
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.216.81.97 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-216-81-97.us-west-2.compute.amazonaws.com
Software
nginx/1.10.1 / Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:10 GMT
Server
nginx/1.10.1
X-Powered-By
Express
ETag
W/"0-2jmj7l5rSw0yVb/vlWAYkK/YBwk"
Access-Control-Allow-Methods
GET, POST, OPTIONS
Content-Type
text/html; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Connection
keep-alive
Access-Control-Allow-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Content-Length
0
/
srv-2019-03-26-20.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2019-03-26-20.pixel.parsely.com/plogger/?rand=1553630948550&plid=76832607&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%220a827bbf-df3a-4634-b50f-7786f105c3d5%22%2C%22parsely_site_uuid%22%3A%22d5d51c19-33a2-4b1c-9679-1ce1877721ab%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&sref=&sts=1553630948547&slts=0&title=How+Microsoft+found+a+Huawei+driver+that+opened+systems+to+attack+%7C+Ars+Technica&date=Tue+Mar+26+2019+20%3A09%3A08+GMT%2B0000+(Coordinated+Universal+Time)&action=pageview&pvid=70891611&u=d5d51c19-33a2-4b1c-9679-1ce1877721ab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.153.236.75 Seattle, United States, ASN (),
Reverse DNS
ec2-35-153-236-75.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:11 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
m_window_focus_non_hydra.js
tpc.googlesyndication.com/pagead/js/r20190320/r20110914/client/ext/ Frame ED38
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20190320/r20110914/client/ext/m_window_focus_non_hydra.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:819::2001 , Ireland, ASN (),
Reverse DNS
Software
cafe /
Resource Hash
4dd51e6b250e15946ca0af835e0511093c82c5678115aac3055645d889a1681a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 20 Mar 2019 12:57:43 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
544288
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
1049
x-xss-protection
1; mode=block
server
cafe
etag
9573447915536422037
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 03 Apr 2019 12:57:43 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame ED38
79 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
23a1c39cfe69cdbeec48c939f896afb87a0bdb415c710802ab33f4b7dd2742ca
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1553539505445926"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
29870
x-xss-protection
1; mode=block
expires
Tue, 26 Mar 2019 20:09:09 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame ED38
287 KB
89 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN (),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
7388f50d11573024cf0aca7117021410484aa11026addd176d184a55d7204662

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:09 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Mar 2019 15:29:41 GMT
Server
AmazonS3
x-amz-request-id
742E7BC3C21F5F73
ETag
"cec6001707cfda367af3855094ffed16"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=48613
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
90640
x-amz-id-2
FEE7m23XKPcBq1q6J3dPAEP7U5bC32lUA4na8uajdjiVqF8HBbihm5SFU/PWj+3dX4UX8yvjq9A=
778489797820282430
tpc.googlesyndication.com/simgad/ Frame ED38
1 KB
1 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/778489797820282430
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:819::2001 , Ireland, ASN (),
Reverse DNS
Software
sffe /
Resource Hash
a8776cd5d9b452db19ebf8c02c4eaabe3dbfa40731a5f0385884650861d457a6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Sat, 09 Mar 2019 03:45:06 GMT
x-content-type-options
nosniff
age
1527845
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
1093
x-xss-protection
1; mode=block
last-modified
Tue, 16 Oct 2018 19:26:10 GMT
server
sffe
content-type
image/gif
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 08 Mar 2020 03:45:06 GMT
osd.js
www.googletagservices.com/activeview/js/current/
77 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c8326bbf2a182bc13eb5c230d0046332d605dc34f217458299cebe30eebeb0cb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1553539505445926"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
29012
x-xss-protection
1; mode=block
expires
Tue, 26 Mar 2019 20:09:11 GMT
creative.js
static.polarcdn.com/creative/ Frame BEDA
290 KB
111 KB
Script
General
Full URL
https://static.polarcdn.com/creative/creative.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:f77e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
873866f0bad20cbbd46d3e780855d040ddb75b721c189626a8c1edb303cc25a6

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:09 GMT
content-encoding
gzip
cf-cache-status
HIT
status
200
content-length
112729
via
1.1 varnish
timing-allow-origin
*
x-varnish
430745633 430738062
last-modified
Fri, 22 Mar 2019 17:07:19 GMT
server
cloudflare
cache-control
max-age=10800
etag
W/"5c951647-489d1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
access-control-expose-headers
CF-IPCountry
cf-ipcountry
DE
access-control-allow-credentials
true
accept-ranges
bytes
cf-ray
4bdbc2bafbf063df-FRA
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Tue, 26 Mar 2019 20:09:51 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame BEDA
79 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
23a1c39cfe69cdbeec48c939f896afb87a0bdb415c710802ab33f4b7dd2742ca
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1553539505445926"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
29870
x-xss-protection
1; mode=block
expires
Tue, 26 Mar 2019 20:09:09 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame BEDA
287 KB
89 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN (),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
7388f50d11573024cf0aca7117021410484aa11026addd176d184a55d7204662

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:09 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Mar 2019 15:29:41 GMT
Server
AmazonS3
x-amz-request-id
742E7BC3C21F5F73
ETag
"cec6001707cfda367af3855094ffed16"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=48613
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
90640
x-amz-id-2
FEE7m23XKPcBq1q6J3dPAEP7U5bC32lUA4na8uajdjiVqF8HBbihm5SFU/PWj+3dX4UX8yvjq9A=
track
capture.condenastdigital.com/ Frame FC51
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-26T20%3A09%3A09.363Z&_c=gptError&_t=gptData&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22Cannot%20read%20property%20%270%27%20of%20undefined%22%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225b031d7a841c4b39e0000013%22%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN (),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
view
securepubads.g.doubleclick.net/pcs/ Frame ED38
0
160 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsusl3TrNlO45gjJp8HlOcbU9VrbbHBdIf4mr7_kl1tflkeUB6eLTKKEN3vk2CF212bzVJ8EfBAf-O7GW6FarwnA1AJyNkvdaJACphsNqEmGeqAdvHW0pFKRcO91XVm4EnKao9rs1mqCD452jwVLqqX8f43AKDAyzkDOLCazU7bMky0Cvs-iiPXci6xiDGUJy2FSSPV6J43e8Cl6VpaTJoov0UZrNplE00vNRSJv8M63hPcFjzJZ8TGLUvQbKCCBv2EQks4Aw56X01zH_awWXA&sai=AMfl-YQtOW7vS38ROibY1ev8wb1Jz-38XF8tGZewNATr22AtL37j7IfNoKYpYRipl83jDcTKE03yPASu6k5rdKhjjle7BAL7X2wvnEUFKe8wV089KnUAUyA_Z8aQLMIt1d67OA&sig=Cg0ArKJSzFW4CylsWQnLEAE&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.208.34 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s12-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:11 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
1; mode=block
expires
Tue, 26 Mar 2019 20:09:11 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame BEDA
0
260 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstsrtroXAmPaOGiguNf6NzRj1_PE05Q-S_iJKEBxiUsYhAoIOTXxhYiGZvNNF5eUknN5hrRoCQNLtxaoJS4WHFYUHEhDotGpkBPGH2TTHiO9AAfrQEAIooF8YM3VO1oamV3D0yw1MKG5O3IuRxzgofPbnQIn2W9LNP48HrpFpp43POVDP-Ku1mJl-4V_MIlhuhbbgLwn2HzsV4t5WwSwWSGllOIF49IIPGUBxSCdUrd4zIFjIvY4aczQXCN-F7wpxOS3ZCMS1gLO5zCTYMCmA&sai=AMfl-YTV8U9bzRF94QKdzErAJNH0XTOu62qH4qmpL5ts0LPvlJu2zZMCEydNn5UqgLMQ1L-o1P9GeBGP4IVuuwCcHRS8VUqhHSniZ_8nYJUc8HVrnWC_3F2WPuFHSoQuofhnLg&sig=Cg0ArKJSzEkcKUs-AW29EAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.208.34 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s12-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:11 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
1; mode=block
expires
Tue, 26 Mar 2019 20:09:11 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A09.353Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=e0a3b91d-f555-4280-a731-c5c105741d1c&uNw=1&uUq=1&pID=0e9a7233-4f28-4830-9ebb-51d1d64e7d53&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=18539.478260869564&image_count=23&image_surface=426408&server=production&vp_height=1200&vp_width=1585&created=2052.429996430874&staged=2082.4100002646446&pageload_to_staged=2082.4100002646446&channel=gadgets&ctx_template=article&id=1553630944685znzkfboxluc4s9kgnu2gq8khjoood2&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&request_number=1&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=out_of_page&CNS_init=675.6500005722046&suffix=dart&CNS_init_to_staged=1406.75999969244&inViewport=2090.5149951577187&pageLoad_to_in_viewport=1414.864994585514&isRefresh=true&requested=3113.7949973344803&pageLoad_to_requested=3113.7949973344803&CNS_init_to_requested=2438.1449967622757&rendered=6720.169998705387&creative_type=sized&is_empty=true&request_to_rendered=3606.375001370907&is_first_rendered=true&pageLoad_to_rendered=6720.169998705387&CNS_init_to_rendered=6044.5199981331825&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN (),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A09.357Z&_t=unfriendly_iframe&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=e0a3b91d-f555-4280-a731-c5c105741d1c&pID=0e9a7233-4f28-4830-9ebb-51d1d64e7d53&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=18539.478260869564&image_count=23&image_surface=426408&server=production&vp_height=1200&vp_width=1585&created=2052.429996430874&staged=2082.4100002646446&pageload_to_staged=2082.4100002646446&channel=gadgets&ctx_template=article&id=1553630944685znzkfboxluc4s9kgnu2gq8khjoood2&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&request_number=1&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=out_of_page&CNS_init=675.6500005722046&suffix=dart&CNS_init_to_staged=1406.75999969244&inViewport=2090.5149951577187&pageLoad_to_in_viewport=1414.864994585514&isRefresh=true&requested=3113.7949973344803&pageLoad_to_requested=3113.7949973344803&CNS_init_to_requested=2438.1449967622757&rendered=6720.169998705387&creative_type=sized&is_empty=true&request_to_rendered=3606.375001370907&is_first_rendered=true&pageLoad_to_rendered=6720.169998705387&CNS_init_to_rendered=6044.5199981331825&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN (),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A09.387Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=e0a3b91d-f555-4280-a731-c5c105741d1c&pID=0e9a7233-4f28-4830-9ebb-51d1d64e7d53&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=18539.478260869564&image_count=23&image_surface=426408&server=production&vp_height=1200&vp_width=1585&created=2047.875002026558&staged=2055.3649961948395&pageload_to_staged=2055.3649961948395&channel=gadgets&ctx_template=article&id=1553630944680md0clobpilwqwfafd3xwk0syds1bvx&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x193&request_number=1&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=post_nav&CNS_init=675.6500005722046&suffix=dart&CNS_init_to_staged=1379.714995622635&inViewport=2063.324995338917&pageLoad_to_in_viewport=1387.6749947667122&isRefresh=true&is_first_Request=true&requested=3066.32000207901&pageLoad_to_requested=3066.32000207901&CNS_init_to_requested=2390.6700015068054&rendered=6754.184998571873&advertiser_id=4552798968&creative_id=138247271585&creative_type=sized&line_item_id=4830169578&order_id=2409944368&rendered_size=1x1&request_to_rendered=3687.8649964928627&pageLoad_to_rendered=6754.184998571873&CNS_init_to_rendered=6078.534997999668&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A09.408Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=e0a3b91d-f555-4280-a731-c5c105741d1c&pID=0e9a7233-4f28-4830-9ebb-51d1d64e7d53&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=18539.478260869564&image_count=23&image_surface=426408&server=production&vp_height=1200&vp_width=1585&created=2050.535000860691&staged=2065.829999744892&pageload_to_staged=2065.829999744892&channel=gadgets&ctx_template=article&id=15536309446834mfiyefjzi3nttov7fxxqwfnpsffb8&instance=0&name=siderail_0&position_fold=atf&position_xy=20x0&request_number=1&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=siderail&CNS_init=675.6500005722046&suffix=dart&CNS_init_to_staged=1390.1799991726875&inViewport=2075.9700015187263&pageLoad_to_in_viewport=1400.3200009465218&isRefresh=true&requested=3085.6849998235703&pageLoad_to_requested=3085.6849998235703&CNS_init_to_requested=2410.0349992513657&rendered=6775.255002081394&creative_type=sized&is_empty=true&request_to_rendered=3689.570002257824&pageLoad_to_rendered=6775.255002081394&CNS_init_to_rendered=6099.60500150919&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN (),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A09.453Z&_t=unfriendly_iframe&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=e0a3b91d-f555-4280-a731-c5c105741d1c&pID=0e9a7233-4f28-4830-9ebb-51d1d64e7d53&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=18539.478260869564&image_count=23&image_surface=426408&server=production&vp_height=1200&vp_width=1585&created=2050.535000860691&staged=2065.829999744892&pageload_to_staged=2065.829999744892&channel=gadgets&ctx_template=article&id=15536309446834mfiyefjzi3nttov7fxxqwfnpsffb8&instance=0&name=siderail_0&position_fold=atf&position_xy=20x0&request_number=1&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=siderail&CNS_init=675.6500005722046&suffix=dart&CNS_init_to_staged=1390.1799991726875&inViewport=2075.9700015187263&pageLoad_to_in_viewport=1400.3200009465218&isRefresh=true&requested=3085.6849998235703&pageLoad_to_requested=3085.6849998235703&CNS_init_to_requested=2410.0349992513657&rendered=6775.255002081394&creative_type=sized&is_empty=true&request_to_rendered=3689.570002257824&pageLoad_to_rendered=6775.255002081394&CNS_init_to_rendered=6099.60500150919&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A09.501Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=e0a3b91d-f555-4280-a731-c5c105741d1c&pID=0e9a7233-4f28-4830-9ebb-51d1d64e7d53&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=18539.478260869564&image_count=23&image_surface=426408&server=production&vp_height=1200&vp_width=1585&created=2051.5849962830544&staged=2076.475001871586&pageload_to_staged=2076.475001871586&channel=gadgets&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=436x0&request_number=1&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=native_xrail&CNS_init=675.6500005722046&suffix=dart&CNS_init_to_staged=1400.8250012993813&inViewport=2081.675000488758&pageLoad_to_in_viewport=1406.0249999165535&isRefresh=true&requested=3106.0499995946884&pageLoad_to_requested=3106.0499995946884&CNS_init_to_requested=2430.399999022484&rendered=6868.3149963617325&advertiser_id=1454517775&creative_id=138237302059&creative_type=sized&line_item_id=4736014287&order_id=2338761482&rendered_size=300x140&request_to_rendered=3762.264996767044&pageLoad_to_rendered=6868.3149963617325&CNS_init_to_rendered=6192.664995789528&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN (),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
1663130473914833
connect.facebook.net/signals/config/ Frame FC51
186 KB
45 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.8.42&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
eff461c78fc1534cb3117febd1aa549ea250df165c1276f95b560e50a8ba0d0a
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
45967
x-xss-protection
0
pragma
public
x-fb-debug
Yu0vf9iJydgdUs21zPHulaKts11cSSnmLtYZc8Sqw7n282NHAsdq0ahkV7ruQxGdVcymRrRxFg2LRMbfegceyA==
date
Tue, 26 Mar 2019 20:09:11 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
truncated
/ Frame ED38
218 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f12faad901f05dd0c86eb6caac70a73b364607e4a2d6aaaff45f06c565cad9a1

Request headers

Response headers

Content-Type
image/png
wt
polarcdn-pentos.com/ Frame BEDA
3 B
66 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=1&n=3&p=UNKNOWN&s=1&u=c16ee05e-294e-4339-a258-d8dcf459e56e&v=2%2F716551a&w=1.130.0&y=w&z=v1.6.31&pas=asa-web&pag2=%2F3379%2Fconde.ars%2Frail%2Fgadgets%2Farticle%2F2&pai=8e93c&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&cu=5f69472b4a907ef9722a507271ac53e9&t=arx&parcid=f254d&parid=0d30c&parin=1&partm=0&par=s&maxts=0.015&pvhref=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&_=1553630949666
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:11 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4bdbc2c7f965c763-AMS
wt
polarcdn-pentos.com/ Frame BEDA
3 B
65 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=2&n=3&p=UNKNOWN&s=1&u=c16ee05e-294e-4339-a258-d8dcf459e56e&v=2%2F716551a&w=1.130.0&y=w&z=v1.6.31&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=u&pai=8e93c&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&cu=5f69472b4a907ef9722a507271ac53e9&t=atx&parcid=f254d&parid=6a30e&parin=2&pvhref=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&_=1553630949667
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:11 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4bdbc2c7f968c763-AMS
pl
bw-prod.plrsrvcs.com/bid/ Frame BEDA
0
340 B
XHR
General
Full URL
https://bw-prod.plrsrvcs.com/bid/pl
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:dd0f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
POST
Origin
https://arstechnica.com
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Access-Control-Request-Headers
content-type,x-openrtb-version

Response headers

date
Tue, 26 Mar 2019 20:09:09 GMT
server
cloudflare
access-control-allow-origin
*
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, POST, OPTIONS
status
204
cf-ray
4bdbc2bc1e3cbed0-FRA
access-control-allow-headers
Content-Type, x-openrtb-version
truncated
/ Frame BEDA
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8aef53e795e1f86526fb1b4348ec36f3596554e8a7c58f84482614b9645a0e20

Request headers

Response headers

Content-Type
image/png
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=17&i=CONDECW3&hp=1&cm=4&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1553630949774&de=76903150181&m=0&ar=4d52d3f132-clean&q=5&cb=0&cu=1553630949774&ll=2&lm=0&ln=1&em=0&en=0&d=1454517775%3A2338761482%3A4736014287%3A138237302059&zMoatPS=native_xrail_0&zMoatPT=article&zMoatST=native_xrail&zMoatCNS=2_26_0&zMoatSZ=300x140&zMoatKWPos=Undefined&qs=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&zMoatPlacID=21711241602&bo=21698048816&bp=21711241602&bd=Undefined&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=21711241602&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&zMoatOrigSlicer1=21698048816&zMoatOrigSlicer2=21711241602&gw=condenastdfp9588492144&fd=1&ac=1&it=500&fs=161888&na=236097349&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
35.174.111.199 Seattle, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-174-111-199.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:12 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
pl
bw-prod.plrsrvcs.com/bid/ Frame BEDA
2 KB
2 KB
XHR
General
Full URL
https://bw-prod.plrsrvcs.com/bid/pl
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:dd0f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a29d080e1fe3153dcedb46e0a8bea1656d4794637d91e711239e0289f6fd32e4

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
x-openrtb-version
2.3
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Origin
https://arstechnica.com
Content-Type
application/json

Response headers

date
Tue, 26 Mar 2019 20:09:10 GMT
content-encoding
gzip
x-polar-trace-id
x-polar-response-id
0eceed5794da40dcbb557affc50569cf
status
200
x-polar-h
ddf0e-31
x-polar-t
0.209
pragma
no-cache
server
cloudflare
cache-control
no-cache, no-store, must-revalidate
x-polar-misses
tq
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CF-IPCountry
cf-ipcountry
DE
cf-ray
4bdbc2bc5ec8bed0-FRA
expires
0
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A09.826Z&_t=timespent&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=e0a3b91d-f555-4280-a731-c5c105741d1c&sID=e09dd491-6212-4839-be0e-0f479b026cfd&pID=0e9a7233-4f28-4830-9ebb-51d1d64e7d53&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=general&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&_v=5000&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j73&a=330064377&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-87198801-1&cid=1352067928.1553630946&jid=489360921&_gid=1239304015.1553630949&gjid=423533018&_v=j73&z=26504377
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=1352067928.1553630946&jid=489360921&_v=j73&z=26504377
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=1352067928.1553630946&jid=489360921&_v=j73&z=26504377&slf_rd=1&random=2354416319
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=1352067928.1553630946&jid=489360921&_v=j73&z=26504377&slf_rd=1&random=2354416319
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:808::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=1352067928.1553630946&jid=489360921&_v=j73&z=26504377&slf_rd=1&random=2354416319
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
wt
polarcdn-pentos.com/ Frame BEDA
3 B
592 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=3&n=3&p=UNKNOWN&s=1&u=c16ee05e-294e-4339-a258-d8dcf459e56e&v=2%2F716551a&w=1.130.0&y=w&z=v1.6.31&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.f0f6f563-1aae-412d-98ba-5c5c52c4d03e.0eceed&paensm=n&pai=8e93c&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&cu=5f69472b4a907ef9722a507271ac53e9&t=arx&parcid=f254d&parid=6a30e&parin=2&partm=1&par=s&maxts=0.873&pvhref=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&_=1553630949668
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:11 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4bdbc2c7f967c763-AMS
8702971b45a2498386ed2ab896f26dce
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/ Frame BEDA
16 KB
4 KB
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/8702971b45a2498386ed2ab896f26dce?order=3fcef65aafae4514ba781f951780a01e
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
5d16d951228dab1e1a66e484d8ef6bd18495aec550b7c00d8b2244621b9d32f5

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 26 Mar 2019 20:09:10 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"425ff791c33bd30e97755dd3b5ce1bce"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country
cache-control
max-age=900
x-country
DE
cf-ray
4bdbc2c139fbc29c-FRA
wt
polarcdn-pentos.com/ Frame BEDA
3 B
66 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=4&n=3&p=NA-ARSTECH-11238837&s=1&u=c16ee05e-294e-4339-a258-d8dcf459e56e&v=2%2F716551a&w=1.130.0&y=w&z=v1.6.31&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.f0f6f563-1aae-412d-98ba-5c5c52c4d03e.0eceed&paenli=5a5b264f4c034b919318ff1c7ecb481f&paenlip=eac1cd8c1e8c4664aa3478df950e4142&paeno=3fcef65aafae4514ba781f951780a01e&paenop=7f4349a7f35043aa81ba7c9174871255&paes=fd9a1a7c3cf24f9fb674bbc3a4ebe163&paensm=n&pai=8e93c&d=arstechnica.com&l=Key-native_xrail+%5BXrail%5D&pajs=body&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&pecy=DE&c=4000ae846134490691587b51697a5449&pacexp=62075a929c3b4c5c98d8b61e853ff012&t=i&pasp=6fe1dded4b5f4d1a8a01dfa8492cbdab&pvhref=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&_=1553630949669
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:11 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4bdbc2c7f969c763-AMS
5c8944ec48e3edcb230f1d9d
polarcdn-terrax.com/image/v1.0.0/bin/
13 KB
14 KB
Image
General
Full URL
https://polarcdn-terrax.com/image/v1.0.0/bin/5c8944ec48e3edcb230f1d9d?v=92e5f&w=300
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f65723e25c458fd1537ea3d4e33afec46c3b921790b40a4c8dee7307695c61ce

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 26 Mar 2019 20:09:10 GMT
via
1.1 varnish
cf-cache-status
HIT
cf-ray
4bdbc2c24b85bf0c-FRA
status
200
access-control-max-age
432000
content-length
13382
x-varnish
975387647 975271018
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=432000
accept-ranges
bytes
timing-allow-origin
*
ads
pubads.g.doubleclick.net/gampad/ Frame FC51
1 KB
1 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.ars/player/tech&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=height%3D304%26muted%3D1%26width%3D540&correlator=undefined&description_url=https%3A%2F%2Fthescene.com%2Fwatch%2Farstechnica%2Fmegabots-born-to-smash-anything-in-their-path&vid=5b031d7a841c4b39e0000013&cmsid=1495&ppid=37554812f2024efa9407b5ccedf14ab0
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.208.34 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s12-in-f2.1e100.net
Software
cafe /
Resource Hash
30207bb3f20bb58aa93d89ba4e57b876d87b8bdd2a0a0b736e0947d88bf8d8eb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

date
Tue, 26 Mar 2019 20:09:13 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
618
x-xss-protection
1; mode=block
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame FC51
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-26T20%3A09%3A10.788Z&_c=timedOut&_t=gptData&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22Cannot%20read%20property%20%270%27%20of%20undefined%22%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225b031d7a841c4b39e0000013%22%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN (),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_megabots-born-to-smash-anything-in-their-path.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1526931343/ Frame FC51
74 KB
75 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1526931343/arstechnica_megabots-born-to-smash-anything-in-their-path.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.100 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-100.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
9f408325b29088ddf2fbe1992fbd905190edf51ab6005e81aabbf2f61e31576d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com

Response headers

Date
Fri, 08 Mar 2019 07:46:36 GMT
Via
1.1 varnish, 1.1 21da0a66bafe2c8de8be4a4d8039346b.cloudfront.net (CloudFront)
Age
1599790
Edge-Cache-Tag
569839514353085132285751987890345809929,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
75752
X-Served-By
cache-fra19122-FRA
Last-Modified
Mon, 21 May 2018 19:37:37 GMT
Server
cloudinary
X-Timer
S1531303889.251389,VS0,VE0
ETag
"8d3f9138316849c4a14ec442bbb7a8a0"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
N5YJKiJ2jdUDqfm3AS-18DRBDFjWzkBNMfVQ-pcrVXhWe3gNscMh8Q==
X-Cache-Hits
2
arstechnica_megabots-born-to-smash-anything-in-their-path.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1526931343/ Frame FC51
74 KB
75 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1526931343/arstechnica_megabots-born-to-smash-anything-in-their-path.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
9f408325b29088ddf2fbe1992fbd905190edf51ab6005e81aabbf2f61e31576d

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 08 Mar 2019 07:46:36 GMT
Via
1.1 varnish, 1.1 e7e7960d7731a7583cedd8f1ff1aca38.cloudfront.net (CloudFront)
Age
1599790
Edge-Cache-Tag
569839514353085132285751987890345809929,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
75752
X-Served-By
cache-fra19122-FRA
Last-Modified
Mon, 21 May 2018 19:37:37 GMT
Server
cloudinary
X-Timer
S1531303889.251389,VS0,VE0
ETag
"8d3f9138316849c4a14ec442bbb7a8a0"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
VF7d7kfIsRV1DfAUEn1_U86rlVnl-_LhmNk8-AyQ7exm7sZiuCOxqw==
X-Cache-Hits
2
ADTECH;apid=1A058f76b6-5003-11e9-9f85-0e26dff468d2;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1A058f76b6-5003-11e9-9f85-0e26dff468d2;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1A058f76b6-5003-11e9-9f85-0e26dff468d2;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN (),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1A058f76b6-5003-11e9-9f85-0e26dff468d2;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1A058f76b6-5003-11e9-9f85-0e26dff468d2;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A058f43a8-5003-11e9-aa89-0e29dff1dd1c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1A058f43a8-5003-11e9-aa89-0e29dff1dd1c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1A058f43a8-5003-11e9-aa89-0e29dff1dd1c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN (),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1A058f43a8-5003-11e9-aa89-0e29dff1dd1c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1A058f43a8-5003-11e9-aa89-0e29dff1dd1c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A058f768e-5003-11e9-863e-0ec32bfb0148;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553630950;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1A058f768e-5003-11e9-863e-0ec32bfb0148;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1A058f768e-5003-11e9-863e-0ec32bfb0148;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN (),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1A058f768e-5003-11e9-863e-0ec32bfb0148;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1A058f768e-5003-11e9-863e-0ec32bfb0148;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A058fb112-5003-11e9-8b50-0e02c97b506c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1A058fb112-5003-11e9-8b50-0e02c97b506c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1A058fb112-5003-11e9-8b50-0e02c97b506c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN (),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1A058fb112-5003-11e9-8b50-0e02c97b506c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:11 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1A058fb112-5003-11e9-8b50-0e02c97b506c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A058f43a8-5003-11e9-aa89-0e29dff1dd1c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
495 B
610 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1A058f43a8-5003-11e9-aa89-0e29dff1dd1c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944758;callback=window.headertag.AolHtb.adResponseCallbacks._Ya9fjAL2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN (),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
66ed58b45bb35269c4b3893e1f7bbbf650213ea0fd6fa22d354c10110781899a

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:12 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
495
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A058f768e-5003-11e9-863e-0ec32bfb0148;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
493 B
608 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1A058f768e-5003-11e9-863e-0ec32bfb0148;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944753;callback=window.headertag.AolHtb.adResponseCallbacks._ERPAtO8N
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN (),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
60d33cbf1c95bd222203c3d635dbb76c2f26770cb64f96b8f76b3eeb97b671b0

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:12 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
493
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A058f76b6-5003-11e9-9f85-0e26dff468d2;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
493 B
608 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1A058f76b6-5003-11e9-9f85-0e26dff468d2;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944752;callback=window.headertag.AolHtb.adResponseCallbacks._6YoVmBWI
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN (),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
8437abffe012500fc540c5ed4b13533835bc0e50456f0ac96b9e541a487f40ea

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:12 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
493
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A058fb112-5003-11e9-8b50-0e02c97b506c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
494 B
656 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1A058fb112-5003-11e9-8b50-0e02c97b506c;cfp=1;rndc=1553630951;cmd=bid;cors=yes;v=2;misc=1553630944757;callback=window.headertag.AolHtb.adResponseCallbacks._XzboKUR4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN (),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
ec1cb03d4e76818d757e1fc97ef0460e51a145518225f4cb002e9b1950ac93ec

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:12 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
494
expires
Mon, 15 Jun 1998 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-26T20%3A09%3A12.255Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cCh=gadgets&cTi=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.4475254806911286%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796%2C%200.19952305475193796&cEnt=microsoft%2C%20huawei%2C%20windows%2C%20page%20layout%2C%20apc%2C%20first%20thing%20first%2C%20malware%2C%20defender%20atp%2C%20doublepulsar%2C%20superuser%2C%20peter%20bright%2C%20nsa%2C%20national%20security%20agency%2C%20utc%2C%20user%20mode%2C%20heuristic%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cnmn%20collection%2C%20media%20group&cEnw=1%2C%200.9831827323785822%2C%200.8063344270624606%2C%200.703473159672751%2C%200.685091634795918%2C%200.5382437614608746%2C%200.5200157508772634%2C%200.4798840421173328%2C%200.4535975895064453%2C%200.452890490945612%2C%200.43821108865821873%2C%200.4336596196947853%2C%200.40946308318188646%2C%200.40613532157335536%2C%200.39723514062027737%2C%200.3945599554364367%2C%200.3467761262543764%2C%200.31017586527250884%2C%200.25356101132624925%2C%200.25338583329919845&cCu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cCl=838&cId=1481405&cPd=2019-03-26T19%3A03%3A08.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRt=direct&pHp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4800&pSw=1600&pSh=1200&uID=4d5a0b61-d392-42d9-8de9-e717b51a3aec&uNw=1&uUq=1&pID=15786b63-9857-4a42-b417-4bb2a06e6cac&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=d04e26cc-3996-4a2d-82f9-40f758a4e1aa&content_uri=gadgets&image_avg_surface=29471&image_count=24&image_surface=707304&server=production&vp_height=1200&vp_width=1585&created=2047.875002026558&staged=2055.3649961948395&pageload_to_staged=2055.3649961948395&channel=gadgets&ctx_template=article&id=1553630944680md0clobpilwqwfafd3xwk0syds1bvx&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x793&request_number=1&tags=defender_atp_huawei_matebook_microsoft_3_security_windows&template=article&type=post_nav&CNS_init=675.6500005722046&suffix=dart&CNS_init_to_staged=1379.714995622635&inViewport=2063.324995338917&pageLoad_to_in_viewport=1387.6749947667122&isRefresh=true&is_first_Request=true&requested=3066.32000207901&pageLoad_to_requested=3066.32000207901&CNS_init_to_requested=2390.6700015068054&rendered=6754.184998571873&advertiser_id=4552798968&creative_id=138247271585&creative_type=sized&line_item_id=4830169578&order_id=2409944368&rendered_size=1x1&request_to_rendered=3687.8649964928627&pageLoad_to_rendered=6754.184998571873&CNS_init_to_rendered=6078.534997999668&is_first_impression_viewable=true&impression_Viewable=9622.515000402927&in_viewport_to_visible_change=7559.190005064011&pageLoad_to_gpt_viewable=9622.515000402927&CNS_init_to_impression_Viewable=8946.864999830723&request_to_impression_Viewable=6556.194998323917&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=microsoft%2Chuawei%2Cwindows%2Csystem%2Cpage%20layout%2Capc%2Cdriver%2Cprocess%2Coperation
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN (),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:12 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
activeview
pagead2.googlesyndication.com/pcs/ Frame ED38
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjss-WR-dNnff704rR1SjhzpABPxjnJ_iTVx9dBd8lmvn4VtBhsCCw6TmuUubp7Jz8kszJZtty4OLYqtVN-ZMEpyJ7T1EM-lxOob_GZeHORc&sig=Cg0ArKJSzAERYSg71jUgEAE&adk=1293899614&tt=-1&bs=1585%2C1200&mtos=1011,1011,1011,1011,1011&tos=1011,0,0,0,0&p=125,793,126,794&mcvt=1011&rs=3&ht=0&tfs=130&tls=1141&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1553630949404&rpt=1744&isd=0&msd=0&lm=2&oseid=3&xdi=0&ps=1585%2C4781&ss=1600%2C1200&pt=-1&deb=1-2-2-13-13-30-31-11&tvt=1120&r=v&id=osdim&vs=4&uc=13&upc=11&tgt=DIV&cl=1&cec=5&clc=0&cac=0&cd=1x5&v=20190325
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:808::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:12 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/r/
35 B
103 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 26 Mar 2019 20:09:13 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/ Frame FC51
280 KB
87 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN (),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
bb6ba64ed1b727bf14a5944ae042fddf5e6a3e664ce79562029a9fd95d7df3dd

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Mar 2019 15:26:22 GMT
Server
AmazonS3
x-amz-request-id
B7EC06CCAE139DFE
ETag
"02523d5d072002d276c9c8e517dca27c"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=48629
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88194
x-amz-id-2
sRT+z0Ck6OC3Nmre0ZSO6cEbdmA9QJhcR5lGV8CQySPRTt74jbQzvM63bq4ODzSl4C63JrPvc14=
track
capture.condenastdigital.com/ Frame FC51
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-26T20%3A09%3A13.920Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=http%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fmegabots-born-to-smash-anything-in-their-path&cId=5b031d7a841c4b39e0000013&cKe=science%20and%20technology%2Ctechnology&cPd=2018-05-21T19%3A25%3A00%2B00%3A00&cTi=MegaBots%3A%20Born%20to%20Smash%20Anything%20in%20Their%20Path&cTy=%2F3379%2Fconde.ars%2Fplayer%2Ftech&mDu=105&pHr=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&pWw=540&pWh=303.75&xid=37554812-f202-4efa-9407-b5ccedf14ab0&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22guid%22%3A%22e08ccf41-c2bd-b2d1-c113-651288d8466%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3380.25%2C%22playerType%22%3A%22video-continuous%22%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22tabStatus%22%3A%22active%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%7D&videoViews=1&adId=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 26 Mar 2019 20:09:14 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
cs.js
sb.scorecardresearch.com/c2/6035094/
0
400 B
Script
General
Full URL
https://sb.scorecardresearch.com/c2/6035094/cs.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.121.166.105 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-121-166-105.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:14 GMT
Content-Encoding
gzip
Last-Modified
Fri, 08 Apr 2011 23:11:26 GMT
ETag
"d41d8cd98f00b204e9800998ecf8427e:1349196464"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=259200
Connection
keep-alive
Content-Length
20
Expires
Fri, 29 Mar 2019 20:09:14 GMT
collect
www.google-analytics.com/
35 B
123 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j73&a=330064377&t=event&ni=1&_s=1&dl=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&dr=%2F&dp=%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&ul=en-us&de=UTF-8&dt=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=scroll%20tracking&ea=vertical%20scroll%20tracking&el=scroll%3A%2025&_u=aGjAAUI7AAQC~&jid=&gjid=&cid=1352067928.1553630946&tid=UA-31997-1&_gid=1984109114.1553630954&gtm=2wg3i1NLXNPCQ&cg1=article%7Creport&cg2=gadgets&cg3=gadgets&cd1=GTM-NLXNPCQ&cd2=81&cd4=&cd6=Tue%20Mar%2026%202019%2020%3A09%3A14%20GMT%2B0000%20(Coordinated%20Universal%20Time)&cd7=1553630954037.4a1iogoi&cd8=0&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_13_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F67.0.3396.87%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=GA%20-%20Event%20-%20Vertical%20Scroll%20Tracking&cd20=none&cd24=1&cd25=Peter%20Bright&cd26=1481405&cd27=838&cd28=How%20Microsoft%20found%20a%20Huawei%20driver%20that%20opened%20systems%20to%20attack&cd29=web&cd32=2019-03-26T19%3A03%3A08%2B00%3A00&cd34=2019-03-26T19%3A01%3A21%2B00%3A00&cd35=defender%20atp%7CHuawei%7Cmatebook%7Cmicrosoft%7Csecurity%7CWindows&cd36=web&cd43=Ars%20Technica&cd45=Adblock%20Enabled%20-%20false&cd62=https%3A%2F%2Farstechnica.com%2F%3Fp%3D1481405&cd63=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cd65=&cd72=1.0.0&cd92=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&cd93=gadgets&cd98=article%7Creport&cd103=&cd3=1352067928.1553630946&z=1766717774
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 09 Mar 2019 00:50:18 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
1538336
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDEVIDEOCONTENT1&hp=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=8&f=0&j=&o=3&t=1553630954063&de=43472284583&m=0&ar=4d52d3f132-clean&q=8&cb=0&cu=1553630954063&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=MegaBots_%20Born%20to%20Smash%20Anything%20in%20Their%20Path%3A%2F3379%2Fconde.ars%2Fplayer%2Ftech%3Aundefined%3Aundefined&zMoatVideoId=5b031d7a841c4b39e0000013&zMoatAP=-&qs=1&zMoatDomain=arstechnica.com&zMoatSubdomain=arstechnica.com&gw=condenastjsvideocontent160527792519&fd=1&ac=1&it=500&fs=161888&na=470874644&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN (),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:14 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 26 Mar 2019 20:09:14 GMT
event
condenast.demdex.net/
5 KB
6 KB
XHR
General
Full URL
https://condenast.demdex.net/event?_ts=1553630954111
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.77.130.155 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-77-130-155.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
e16743119a71d4e3d39add25350c3b4ea0e7203ccc3ffa704ee3e08a4b9b2bd4

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v025-03ba320bc.edge-irl1.demdex.com 5.50.0.20190319164038 16ms
Pragma
no-cache
X-TID
QfYwwZgsSA0=
Vary
Origin
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
5135
Expires
Thu, 01 Jan 1970 00:00:00 GMT
cdb
bidder.criteo.com/
0
213 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=65&profileId=154&cb=51006733359
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
178.250.0.165 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Access-Control-Allow-Origin
https://arstechnica.com
Date
Tue, 26 Mar 2019 20:09:17 GMT
Access-Control-Allow-Credentials
true
Server
Finatra
Timing-Allow-Origin
*
Vary
Origin
cdb
bidder.criteo.com/
0
213 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=65&profileId=154&cb=83828250347
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
178.250.0.165 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Access-Control-Allow-Origin
https://arstechnica.com
Date
Tue, 26 Mar 2019 20:09:17 GMT
Access-Control-Allow-Credentials
true
Server
Finatra
Timing-Allow-Origin
*
Vary
Origin
/
srv-2019-03-26-20.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2019-03-26-20.pixel.parsely.com/plogger/?rand=1553630959050&plid=76832607&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%220a827bbf-df3a-4634-b50f-7786f105c3d5%22%2C%22parsely_site_uuid%22%3A%22d5d51c19-33a2-4b1c-9679-1ce1877721ab%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&sref=&sts=1553630959050&slts=0&date=Tue+Mar+26+2019+20%3A09%3A19+GMT%2B0000+(Coordinated+Universal+Time)&action=heartbeat&inc=5&tt=4900&pvid=70891611&u=d5d51c19-33a2-4b1c-9679-1ce1877721ab
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.153.236.75 Seattle, United States, ASN (),
Reverse DNS
ec2-35-153-236-75.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 20:09:19 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=11&i=CONDECW3&hp=1&cm=4&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=&o=3&t=1553630949774&de=76903150181&m=0&ar=4d52d3f132-clean&q=10&cb=0&cu=1553630949774&ll=2&lm=0&ln=1&em=0&en=0&d=1454517775%3A2338761482%3A4736014287%3A138237302059&zMoatPS=native_xrail_0&zMoatPT=article&zMoatST=native_xrail&zMoatCNS=2_26_0&zMoatSZ=300x140&zMoatKWPos=Undefined&qs=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2019%2F03%2Fhow-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack%2F&zMoatPlacID=21711241602&bo=21698048816&bp=21711241602&bd=Undefined&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=21711241602&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&zMoatOrigSlicer1=21698048816&zMoatOrigSlicer2=21711241602&gw=condenastdfp9588492144&fd=1&ac=1&it=500&fs=161888&na=681054529&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
35.174.111.199 Seattle, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-174-111-199.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 26 Mar 2019 20:09:19 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT

Verdicts & Comments Add Verdict or Comment

181 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| ars object| digitalData object| cns object| dataLayer object| BOOMR_mq object| google_tag_manager object| Twig object| Arrive function| FPCountdown function| $ function| jQuery function| moment function| UAParser function| purl function| twig function| EvEmitter function| imagesLoaded function| easydropdown function| m function| transitionEnd string| $queryString function| arsVideoModulePlayerReady65474957 function| e object| visitor function| Visitor object| s_c_il number| s_c_in function| DIL object| dilInstance string| referrer object| urlParams string| queryString string| fullUrl object| myParam string| GoogleAnalyticsObject function| ga object| _qevents object| __adIq_Config string| b object| h object| _aam_dataLayer undefined| userId boolean| _aam_spa function| fbq function| _fbq function| getVisitNumCustom number| d string| _linkedin_partner_id object| _linkedin_data_partner_ids object| AIM function| __cmp object| SparrowCache function| Sparrow object| google_tag_data object| gaplugins object| PARSELY object| __core-js_shared__ function| quantserve function| __qc object| ezt object| _qoptions object| Sailthru boolean| sparrowInitialize object| _4d object| _sparrow object| _satellite object| gaGlobal object| gaData object| __SKIM_JS_GLOBAL__ function| skimlinksBeaconCallback function| skimlinksBeaconSecondaryCallback function| skimlinksBeaconAuxCallback object| googletag function| moatCondeListener object| apstag object| headertag object| CN function| arsData object| _cne object| PolarConde object| bouncex function| _bizo_local_logger function| _bizo_fire_partners boolean| _bizo_main_already_called string| hash function| s_doPlugins function| s_getLoadTime function| AppMeasurement function| s_gi function| s_pgicq object| s string| s_loadT number| s_objectID number| s_giq object| evidon number| vb object| s_i_conde-arstechnica object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater object| core object| NATIVEADS object| NATIVEADS_QUEUE function| reload_campaigns function| setBounceCookie function| getBounceCookie function| setBounceVisitCookie function| getBounceVisitCookie function| clearBounceCookie object| _0xc36e function| _0xec36 object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill function| docReady object| GPT_jstiming undefined| google_measure_js_timing boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id object| NATIVEADS_STORE object| Criteo function| headertag_render object| rubicontag function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| googleCompanionsServicePresent function| googleGetCompanionAdSlots function| googleSetCompanionAdContents function| google_show_companion_ad function| google_show_companion_ad_in_slot function| google_get_companion_slot_params function| google_companion_error function| google_companion_loaded function| google_increment_num_ad_mouseovers string| google_ad_output string| google_ad_client string| google_flash_version boolean| google_webgl_support string| google_ad_section string| google_country number| google_unique_id object| google_reactive_ads_global_state function| mb object| closure_lm_206142 object| google object| criteo_pubtag string| au_audience_code string| audigent_visitor_id object| __google_ad_urls boolean| google_osd_loaded boolean| google_onload_fired object| closure_lm_639077 object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 string| key object| aupixels function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb number| google_global_correlator function| arrive function| unbindArrive function| leave function| unbindLeave

9 Cookies

Domain/Path Name / Value
.demdex.net/ Name: demdex
Value: 11769479564855402293779856335424768837
.arstechnica.com/ Name: _ga
Value: GA1.2.1352067928.1553630946
arstechnica.com/ Name: GED_PLAYLIST_ACTIVITY
Value: W3sidSI6InVKL0wiLCJ0c2wiOjE1NTM2MzA5NTQsIm52IjowLCJ1cHQiOjE1NTM2MzA5NDQsImx0IjoxNTUzNjMwOTQ0fV0.
.arstechnica.com/ Name: sID
Value: bba76ae8-49e9-4489-af08-edee511db684
.arstechnica.com/ Name: _gat_UA-31997-1
Value: 1
.arstechnica.com/ Name: _gid
Value: GA1.2.1984109114.1553630954
arstechnica.com/ Name: pID
Value: 15786b63-9857-4a42-b417-4bb2a06e6cac
arstechnica.com/ Name: CN_su
Value: d7c63877-76be-4b04-9ca2-631033e0db28
arstechnica.com/ Name: CN_sp
Value: 4d5a0b61-d392-42d9-8de9-e717b51a3aec

13 Console Messages

Source Level URL
Text
console-api warning URL: https://player.cnevids.com/interlude/arstechnica.js(Line 2)
Message:
CNE Player: no interlude for "gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack" ("No available slot found.")
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
Evidon -- evidon-notice-link not found on page, cant display the consent link.
console-api log URL: https://js-sec.indexww.com/ht/htw-condenast.js(Line 3)
Message:
digiTrustUser not defined
console-api log URL: https://js-sec.indexww.com/ht/htw-condenast.js(Line 3)
Message:
digiTrustUser not defined
console-api log URL: https://js-sec.indexww.com/ht/htw-condenast.js(Line 3)
Message:
digiTrustUser not defined
console-api log URL: https://js-sec.indexww.com/ht/htw-condenast.js(Line 3)
Message:
digiTrustUser not defined
console-api log URL: https://js-sec.indexww.com/ht/htw-condenast.js(Line 3)
Message:
digiTrustUser not defined
console-api log URL: https://js-sec.indexww.com/ht/htw-condenast.js(Line 3)
Message:
digiTrustUser not defined
console-api warning URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js(Line 12)
Message:
TypeError: Cannot read property 'getItem' of null
console-api warning URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js(Line 12)
Message:
PLAYER lineItem error?:
console-api warning URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js(Line 12)
Message:
PLAYER lineItem error?:
console-api warning URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-25c8c30ecbcc2fb3159f.js(Line 12)
Message:
PLAYER lineItem error?:
console-api warning URL: https://connect.facebook.net/en_US/fbevents.js(Line 25)
Message:
[Facebook Pixel] - Duplicate Pixel ID: 228464857488266.

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

4d.condenastdigital.com
a.ad.gt
aax.amazon-adsystem.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
ak.sail-horizon.com
ampcid.google.com
ampcid.google.de
api.cnevids.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
arstechnica.com
as-sec.casalemedia.com
assets.adobedtm.com
assets.bounceexchange.com
bidder.criteo.com
bw-prod.plrsrvcs.com
c.amazon-adsystem.com
c.evidon.com
capture.condenastdigital.com
cdn.accelerator.arsdev.net
cdn.arstechnica.net
cdn.mediavoice.com
cm.everesttech.net
cm.g.doubleclick.net
condenast.demdex.net
connect.facebook.net
d.turn.com
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dpm.demdex.net
dwgyu36up6iuz.cloudfront.net
evidon.mgr.consensu.org
fastlane.rubiconproject.com
iabmap.evidon.com
ids.ad.gt
image2.pubmatic.com
images.outbrainimg.com
imasdk.googleapis.com
infinityid.condenastdigital.com
js-sec.indexww.com
l.betrad.com
log.outbrainimg.com
match.adsrvr.org
mid.rkdms.com
odb.outbrain.com
p.ad.gt
p.rfihub.com
p.skimresources.com
pagead2.googlesyndication.com
pixel.condenastdigital.com
pixels.ad.gt
player.cnevids.com
plugin.mediavoice.com
polarcdn-pentos.com
polarcdn-terrax.com
pubads.g.doubleclick.net
px.ads.linkedin.com
px.moatads.com
r.skimresources.com
rules.quantcount.com
s.skimresources.com
s0.2mdn.net
sb.scorecardresearch.com
secure.adnxs.com
secure.quantserve.com
securepubads.g.doubleclick.net
segment-data.zqtk.net
snap.licdn.com
srv-2019-03-26-20.config.parsely.com
srv-2019-03-26-20.pixel.parsely.com
sstats.arstechnica.com
static.criteo.net
static.polarcdn.com
stats.g.doubleclick.net
t.skimresources.com
tag.bounceexchange.com
tcheck.outbrainimg.com
tpc.googlesyndication.com
v4.moatads.com
vendorlist.consensu.org
widgets.outbrain.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.linkedin.com
www.medtargetsystem.com
z.moatads.com
104.103.102.169
104.121.166.105
104.17.192.78
13.35.253.129
13.35.253.13
13.35.253.78
13.35.253.82
13.35.253.9
13.35.253.95
13.35.254.100
13.35.254.113
13.35.254.131
13.35.254.197
13.35.254.32
13.35.254.41
13.35.254.94
143.204.214.107
151.101.0.239
151.101.2.2
151.139.128.10
152.195.39.114
178.250.0.165
178.250.2.130
185.33.223.206
185.64.189.110
193.0.160.128
205.234.175.175
213.19.162.61
216.58.208.34
23.58.216.21
2600:9000:2047:5600:6:44e3:f8c0:93a1
2600:9000:2047:5800:1:af78:4c0:93a1
2600:9000:2047:c00:10:27b4:f500:93a1
2606:4700::6811:4032
2606:4700::6811:4132
2606:4700::6811:dd0f
2606:4700::6813:d983
2606:4700::6813:f77e
2a00:1450:4001:806::200e
2a00:1450:4001:808::2002
2a00:1450:4001:808::2003
2a00:1450:4001:808::200a
2a00:1450:4001:809::2006
2a00:1450:4001:819::2001
2a00:1450:4001:81a::2008
2a00:1450:4001:81f::2004
2a00:1450:4001:820::2002
2a00:1450:4001:821::2002
2a00:1450:4001:821::200e
2a00:1450:400c:c08::9c
2a02:26f0:6c00:296::25ea
2a03:2880:f01c:216:face:b00c:0:3
2a03:2880:f11c:8083:face:b00c:0:25de
2a05:f500:10:101::b93f:9101
2a05:f500:10:101::b93f:9105
34.197.233.194
34.199.180.208
34.199.66.245
34.215.123.63
34.216.81.97
34.235.240.97
35.153.236.75
35.161.216.48
35.174.111.199
35.190.40.172
35.190.59.101
35.190.92.63
35.201.67.47
46.228.164.13
50.31.142.51
50.31.169.131
52.1.219.33
52.19.121.121
52.2.117.76
52.204.40.232
52.27.154.203
52.30.183.205
52.31.44.252
52.4.39.251
52.44.76.10
52.72.158.71
52.94.218.7
54.165.0.24
54.174.217.231
54.72.175.179
54.77.130.155
54.82.158.121
63.140.41.50
66.117.28.86
88.221.165.92
91.228.74.164
95.100.196.33
95.100.198.179
95.100.198.4
95.100.199.29
99.86.1.198
99.86.3.46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