URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-...
Submission: On September 12 via api from FR

Summary

This website contacted 74 IPs in 8 countries across 59 domains to perform 372 HTTP transactions. The main IP is 2606:4700::6811:7863, located in United States and belongs to CLOUDFLARENET, US. The main domain is www.darkreading.com.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on July 4th 2020. Valid for: a year.
This is the only time www.darkreading.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 11 2606:4700::68... 13335 (CLOUDFLAR...)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
13 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
5 2606:4700:303... 13335 (CLOUDFLAR...)
53 2606:4700:303... 13335 (CLOUDFLAR...)
1 151.101.113.131 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
1 2 216.58.212.162 15169 (GOOGLE)
2 99.86.2.87 16509 (AMAZON-02)
9 151.101.112.157 54113 (FASTLY)
2 2600:9000:205... 16509 (AMAZON-02)
1 2606:2800:233... 15133 (EDGECAST)
1 2 2.16.186.152 20940 (AKAMAI-ASN1)
13 143.204.212.151 16509 (AMAZON-02)
2 2606:4700:303... 13335 (CLOUDFLAR...)
4 34.248.119.134 16509 (AMAZON-02)
5 2a00:1450:400... 15169 (GOOGLE)
1 18 2a00:1450:400... 15169 (GOOGLE)
2 15.236.9.100 16509 (AMAZON-02)
1 1 66.117.28.86 15224 (OMNITURE)
18 216.58.206.2 15169 (GOOGLE)
1 4 104.111.238.139 16625 (AKAMAI-AS)
4 2a03:2880:f01... 32934 (FACEBOOK)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
13 2a00:1450:400... 15169 (GOOGLE)
2 2620:1ec:c11:... 8068 (MICROSOFT...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2 2600:9000:205... 16509 (AMAZON-02)
1 143.204.215.21 16509 (AMAZON-02)
45 104.111.216.96 16625 (AKAMAI-AS)
1 143.204.215.26 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 35.157.88.25 16509 (AMAZON-02)
2 3 185.33.221.13 29990 (ASN-APPNEX)
2 3.229.100.58 14618 (AMAZON-AES)
4 2a03:2880:f11... 32934 (FACEBOOK)
3 8 34.248.181.236 16509 (AMAZON-02)
1 54.194.147.18 16509 (AMAZON-02)
2 99.86.2.56 16509 (AMAZON-02)
42 143.204.215.89 16509 (AMAZON-02)
2 2.18.232.7 16625 (AKAMAI-AS)
4 143.204.215.93 16509 (AMAZON-02)
1 95.100.78.166 16625 (AKAMAI-AS)
3 2a00:1450:400... 15169 (GOOGLE)
1 2620:103::192... 19994 (RACKSPACE)
1 2a02:26f0:10c... 20940 (AKAMAI-ASN1)
20 2606:2800:134... 15133 (EDGECAST)
1 2 142.0.160.13 7160 (NETDYNAMICS)
2 2 209.167.231.17 7160 (NETDYNAMICS)
2 142.0.173.134 7160 (NETDYNAMICS)
1 2a00:1450:400... 15169 (GOOGLE)
10 3.123.194.7 16509 (AMAZON-02)
3 104.84.57.75 20940 (AKAMAI-ASN1)
2 4 35.244.174.68 15169 (GOOGLE)
3 2606:2800:233... 15133 (EDGECAST)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 5 104.111.214.206 16625 (AKAMAI-AS)
1 2600:9000:205... 16509 (AMAZON-02)
1 3.216.229.66 14618 (AMAZON-AES)
15 18 34.249.88.231 16509 (AMAZON-02)
1 1 104.244.42.8 13414 (TWITTER)
2 2 52.28.239.147 16509 (AMAZON-02)
1 2 3.126.56.137 16509 (AMAZON-02)
1 2 104.111.215.135 16625 (AKAMAI-AS)
1 69.173.144.138 26667 (RUBICONPR...)
1 2 64.202.112.95 23352 (SERVERCEN...)
1 185.64.189.110 62713 (AS-PUBMATIC)
1 1 2a00:1288:f03... 10310 (YAHOO-1)
1 141.226.228.48 200478 (TABOOLA-AS)
1 2 52.29.22.19 16509 (AMAZON-02)
1 2 18.196.212.47 16509 (AMAZON-02)
1 2 34.98.64.218 15169 (GOOGLE)
1 34.202.64.133 14618 (AMAZON-AES)
2 2 52.30.187.36 16509 (AMAZON-02)
2 2 99.80.128.92 16509 (AMAZON-02)
2 3 3.124.210.90 16509 (AMAZON-02)
372 74
Apex Domain
Subdomains
Transfer
53 celtra.com
ads.celtra.com
cache-ssl.celtra.com
track.celtra.com
370 KB
53 deusm.com
img.deusm.com
668 KB
46 moatads.com
z.moatads.com
geo.moatads.com
px.moatads.com
809 KB
23 twimg.com
cdn.syndication.twimg.com
pbs.twimg.com
ton.twimg.com
252 KB
22 adroll.com
s.adroll.com
d.adroll.com
26 KB
22 doubleclick.net
securepubads.g.doubleclick.net
googleads.g.doubleclick.net
stats.g.doubleclick.net
cm.g.doubleclick.net
116 KB
19 googlesyndication.com
cd88e5cedaac5a5053d54fc7d036fb0f.safeframe.googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
700 KB
13 boltdns.net
cf-images.us-east-1.prod.boltdns.net
61 KB
13 twimgs.com
twimgs.com
189 KB
13 darkreading.com
www.darkreading.com
trk.darkreading.com
47 KB
10 googletagservices.com
www.googletagservices.com
272 KB
10 twitter.com
platform.twitter.com
syndication.twitter.com
110 KB
9 ml314.com
ml314.com
in.ml314.com
16 KB
6 teads.tv
a.teads.tv
s8t.teads.tv
t.teads.tv
196 KB
6 google.com
www.google.com
adservice.google.com
1 KB
6 bibblio.org
cdn.bibblio.org
api.bibblio.org
20 KB
5 techweb.com
images.reg.techweb.com
ins.techweb.com
ng.techweb.com
67 KB
5 ubm-us.net
i.ubm-us.net
dsimg.ubm-us.net
58 KB
4 rlcdn.com
idsync.rlcdn.com
883 B
4 eloqua.com
s657486201.t.eloqua.com
s2150.t.eloqua.com
2 KB
4 facebook.com
www.facebook.com
415 B
4 facebook.net
connect.facebook.net
227 KB
4 scorecardresearch.com
sb.scorecardresearch.com
3 KB
4 demdex.net
dpm.demdex.net
ubm.demdex.net
3 KB
4 flipboard.com
cdn.flipboard.com
fpn.flipboard.com
6 KB
3 eyeota.net
ps.eyeota.net
2 KB
3 yahoo.com
ups.analytics.yahoo.com
ads.yahoo.com
2 KB
3 google-analytics.com
www.google-analytics.com
48 KB
3 adnxs.com
ib.adnxs.com
3 KB
3 dpmsrv.com
s.dpmsrv.com
a.dpmsrv.com
87 KB
2 crwdcntrl.net
sync.crwdcntrl.net
1007 B
2 adsrvr.org
match.adsrvr.org
927 B
2 openx.net
us-u.openx.net
479 B
2 bidswitch.net
x.bidswitch.net
1003 B
2 3lift.com
eb2.3lift.com
738 B
2 outbrain.com
sync.outbrain.com
832 B
2 casalemedia.com
dsum-sec.casalemedia.com
2 KB
2 advertising.com
pixel.advertising.com
816 B
2 lightreading.com
img.lightreading.com
30 KB
2 gstatic.com
www.gstatic.com
fonts.gstatic.com
147 KB
2 bing.com
bat.bing.com
8 KB
2 google.de
adservice.google.de
www.google.de
1 KB
2 omtrdc.net
ubmtech.d3.sc.omtrdc.net
565 B
2 ubembed.com
6600d6d98e534115970f9529a45f3195.js.ubembed.com
assets.ubembed.com
47 KB
1 taboola.com
sync.taboola.com
219 B
1 pubmatic.com
simage2.pubmatic.com
885 B
1 rubiconproject.com
pixel.rubiconproject.com
798 B
1 consensu.org
d.adroll.mgr.consensu.org
137 B
1 chartbeat.net
ping.chartbeat.net
168 B
1 chartbeat.com
static.chartbeat.com
14 KB
1 ytimg.com
s.ytimg.com
33 KB
1 youtube.com
www.youtube.com
1 KB
1 en25.com
img.en25.com
3 KB
1 everesttech.net
cm.everesttech.net
554 B
1 linkedin.com
platform.linkedin.com
55 KB
1 googleadservices.com
www.googleadservices.com
12 KB
1 googletagmanager.com
www.googletagmanager.com
36 KB
1 googleapis.com
fonts.googleapis.com
669 B
1 bootstrapcdn.com
maxcdn.bootstrapcdn.com
7 KB
372 59
Domain Requested by
53 img.deusm.com www.darkreading.com
42 cache-ssl.celtra.com ads.celtra.com
www.darkreading.com
37 px.moatads.com www.darkreading.com
19 pbs.twimg.com www.darkreading.com
platform.twitter.com
18 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
www.darkreading.com
17 d.adroll.com 14 redirects
13 tpc.googlesyndication.com securepubads.g.doubleclick.net
www.darkreading.com
tpc.googlesyndication.com
13 cf-images.us-east-1.prod.boltdns.net www.darkreading.com
13 twimgs.com www.darkreading.com
img.deusm.com
11 www.darkreading.com 1 redirects www.darkreading.com
10 track.celtra.com www.darkreading.com
10 www.googletagservices.com www.darkreading.com
securepubads.g.doubleclick.net
9 platform.twitter.com www.darkreading.com
platform.twitter.com
8 ml314.com 3 redirects z.moatads.com
ml314.com
8 z.moatads.com securepubads.g.doubleclick.net
5 s.adroll.com 1 redirects www.darkreading.com
s.adroll.com
5 pagead2.googlesyndication.com www.darkreading.com
securepubads.g.doubleclick.net
5 www.google.com dsimg.ubm-us.net
securepubads.g.doubleclick.net
www.darkreading.com
4 idsync.rlcdn.com 2 redirects www.darkreading.com
4 api.bibblio.org cdn.bibblio.org
4 www.facebook.com www.darkreading.com
connect.facebook.net
4 connect.facebook.net www.darkreading.com
connect.facebook.net
4 sb.scorecardresearch.com 1 redirects www.darkreading.com
3 ps.eyeota.net 2 redirects
3 ton.twimg.com platform.twitter.com
ton.twimg.com
3 t.teads.tv www.darkreading.com
3 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
3 ib.adnxs.com 2 redirects
3 dpm.demdex.net twimgs.com
www.darkreading.com
3 i.ubm-us.net www.darkreading.com
2 sync.crwdcntrl.net 2 redirects
2 match.adsrvr.org 2 redirects
2 us-u.openx.net 1 redirects
2 x.bidswitch.net 1 redirects
2 eb2.3lift.com 1 redirects
2 sync.outbrain.com 1 redirects
2 dsum-sec.casalemedia.com 1 redirects
2 ups.analytics.yahoo.com 1 redirects
2 pixel.advertising.com 2 redirects
2 cm.g.doubleclick.net 2 redirects
2 trk.darkreading.com www.darkreading.com
2 s2150.t.eloqua.com 2 redirects
2 s657486201.t.eloqua.com 1 redirects www.darkreading.com
2 a.teads.tv securepubads.g.doubleclick.net
s8t.teads.tv
2 img.lightreading.com www.darkreading.com
2 a.dpmsrv.com www.darkreading.com
2 fpn.flipboard.com 1 redirects www.darkreading.com
2 bat.bing.com www.darkreading.com
2 ubmtech.d3.sc.omtrdc.net twimgs.com
www.darkreading.com
2 ins.techweb.com www.darkreading.com
ins.techweb.com
2 images.reg.techweb.com 1 redirects www.darkreading.com
2 cdn.flipboard.com www.darkreading.com
2 cdn.bibblio.org www.darkreading.com
2 dsimg.ubm-us.net www.darkreading.com
1 in.ml314.com ml314.com
1 sync.taboola.com
1 ads.yahoo.com 1 redirects
1 simage2.pubmatic.com
1 pixel.rubiconproject.com
1 syndication.twitter.com 1 redirects
1 d.adroll.mgr.consensu.org 1 redirects
1 ping.chartbeat.net
1 static.chartbeat.com www.darkreading.com
1 s.ytimg.com www.youtube.com
1 www.youtube.com www.darkreading.com
1 stats.g.doubleclick.net www.google-analytics.com
1 cdn.syndication.twimg.com platform.twitter.com
1 s8t.teads.tv a.teads.tv
1 ng.techweb.com img.deusm.com
1 img.en25.com www.darkreading.com
1 geo.moatads.com z.moatads.com
1 ads.celtra.com www.darkreading.com
1 www.google.de www.darkreading.com
1 assets.ubembed.com 6600d6d98e534115970f9529a45f3195.js.ubembed.com
1 s.dpmsrv.com www.darkreading.com
1 fonts.gstatic.com fonts.googleapis.com
1 www.gstatic.com www.google.com
1 ubm.demdex.net twimgs.com
1 googleads.g.doubleclick.net www.googleadservices.com
1 cd88e5cedaac5a5053d54fc7d036fb0f.safeframe.googlesyndication.com securepubads.g.doubleclick.net
1 adservice.google.com securepubads.g.doubleclick.net
1 adservice.google.de securepubads.g.doubleclick.net
1 cm.everesttech.net 1 redirects
1 platform.linkedin.com www.darkreading.com
1 www.googleadservices.com www.darkreading.com
1 www.googletagmanager.com www.darkreading.com
1 6600d6d98e534115970f9529a45f3195.js.ubembed.com www.darkreading.com
1 fonts.googleapis.com www.darkreading.com
1 maxcdn.bootstrapcdn.com www.darkreading.com
372 89
Subject Issuer Validity Valid
darkreading.com
Cloudflare Inc ECC CA-3
2020-07-04 -
2021-07-04
a year crt.sh
*.bootstrapcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-09-14 -
2020-10-13
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-07-29 -
2021-07-29
a year crt.sh
upload.video.google.com
GTS CA 1O1
2020-08-26 -
2020-11-18
3 months crt.sh
z.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2020-09-02 -
2021-04-23
8 months crt.sh
*.google-analytics.com
GTS CA 1O1
2020-08-26 -
2020-11-18
3 months crt.sh
www.googleadservices.com
GTS CA 1O1
2020-08-26 -
2020-11-18
3 months crt.sh
cdn.bibblio.org
Amazon
2020-06-20 -
2021-07-20
a year crt.sh
platform.twitter.com
DigiCert SHA2 High Assurance Server CA
2020-08-13 -
2021-08-18
a year crt.sh
*.flipboard.com
DigiCert SHA2 High Assurance Server CA
2019-11-02 -
2021-11-15
2 years crt.sh
platform.linkedin.com
DigiCert SHA2 Secure Server CA
2019-10-10 -
2021-10-14
2 years crt.sh
images.reg.techweb.com
RapidSSL RSA CA 2018
2020-01-25 -
2021-01-24
a year crt.sh
*.prod.boltdns.net
Amazon
2019-12-19 -
2021-01-19
a year crt.sh
techweb.com
Cloudflare Inc ECC CA-3
2020-07-03 -
2021-07-03
a year crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
www.google.com
GTS CA 1O1
2020-08-26 -
2020-11-18
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-08-26 -
2020-11-18
3 months crt.sh
*.d3.sc.omtrdc.net
DigiCert SHA2 High Assurance Server CA
2020-02-28 -
2022-03-04
2 years crt.sh
sb.scorecardresearch.com
DigiCert Secure Site ECC CA-1
2020-07-17 -
2021-06-02
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-07-21 -
2020-10-12
3 months crt.sh
*.google.de
GTS CA 1O1
2020-08-26 -
2020-11-18
3 months crt.sh
*.google.com
GTS CA 1O1
2020-08-26 -
2020-11-18
3 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-08-26 -
2020-11-18
3 months crt.sh
www.bing.com
Microsoft IT TLS CA 2
2019-04-30 -
2021-04-30
2 years crt.sh
*.gstatic.com
GTS CA 1O1
2020-08-26 -
2020-11-18
3 months crt.sh
*.dpmsrv.com
Amazon
2020-06-15 -
2021-07-15
a year crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2020-01-17 -
2021-03-17
a year crt.sh
assets.ubembed.com
Amazon
2020-04-04 -
2021-05-04
a year crt.sh
www.google.de
GTS CA 1O1
2020-08-26 -
2020-11-18
3 months crt.sh
celtra.com
Amazon
2020-04-09 -
2021-05-09
a year crt.sh
*.ml314.com
Amazon
2020-02-17 -
2021-03-17
a year crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
*.lightreading.com
Amazon
2019-12-30 -
2021-01-30
a year crt.sh
teads.tv
Let's Encrypt Authority X3
2020-09-01 -
2020-11-30
3 months crt.sh
api.bibblio.org
Amazon
2019-11-05 -
2020-12-05
a year crt.sh
*.en25.com
DigiCert SHA2 Secure Server CA
2020-08-13 -
2021-11-12
a year crt.sh
ng.techweb.com
Let's Encrypt Authority X3
2020-07-28 -
2020-10-26
3 months crt.sh
s8t.teads.tv
DigiCert SHA2 Secure Server CA
2019-10-17 -
2021-01-15
a year crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
*.t.eloqua.com
DigiCert SHA2 Secure Server CA
2020-03-09 -
2022-04-08
2 years crt.sh
trk.darkreading.com
RapidSSL RSA CA 2018
2020-03-03 -
2021-03-03
a year crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2020-04-14 -
2021-04-23
a year crt.sh
*.adroll.com
DigiCert SHA2 Secure Server CA
2020-01-29 -
2021-04-29
a year crt.sh
*.chartbeat.com
Thawte RSA CA 2018
2020-06-01 -
2021-06-02
a year crt.sh
*.chartbeat.net
Thawte RSA CA 2018
2019-12-16 -
2020-12-30
a year crt.sh
adroll.mgr.consensu.org
Amazon
2019-11-06 -
2020-12-06
a year crt.sh
ups.analytics.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-05-27 -
2020-11-23
6 months crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2020-03-02 -
2021-04-01
a year crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
*.outbrain.com
Thawte RSA CA 2018
2019-10-29 -
2021-11-23
2 years crt.sh
*.pubmatic.com
Sectigo RSA Organization Validation Secure Server CA
2019-02-22 -
2021-02-21
2 years crt.sh
*.taboola.com
DigiCert SHA2 Secure Server CA
2020-08-11 -
2021-12-31
a year crt.sh
*.3lift.com
Amazon
2020-07-04 -
2021-08-05
a year crt.sh
*.bidswitch.net
Sectigo RSA Domain Validation Secure Server CA
2020-04-23 -
2022-05-04
2 years crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
*.openx.net
GeoTrust RSA CA 2018
2020-06-18 -
2021-08-17
a year crt.sh
*.eyeota.net
Let's Encrypt Authority X3
2020-08-31 -
2020-11-29
3 months crt.sh

This page contains 19 frames:

Primary Page: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Frame ID: E45A4D12D4C2C252C7758A2AF5B454E3
Requests: 239 HTTP requests in this frame

Frame: https://ubm.demdex.net/dest5.html?d_nsid=0
Frame ID: E7ADB3B9CD8639982B1E9D8F8D74BA85
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssvmj5HwSgXoiSgUtqkbDaN7OKYeW9TuCrUref2mfyVCrjd3jERGu3Hzw5l_O4-rKamzmp-7h35bIpZjgCQl7sdjOLZUGbKLGg-Z2FhOQUU2IZTNT8I7j9lwIlzhZulwELrFJsct-MjTykoEZ3OevwbznKrD0iZ-DRFOFCHBnoymlsp272jCHywjzy-6kZwrxlR4LPzhD5OzCGlcy_VTIjl6wnhjS6z5gvCD92l-sX0u4TbHNYcXmGURS3_x-9JYhKNzDCEGKXHY94djLdiHhtKQxw3TbyJV1TmqzMzZsZOMOCA8V3Ceg&sai=AMfl-YRfydnbUOjp79LCD0vDDqN06Y5OZDsrsuHKCVaFGF1hHEXGgnaRTtm4C-qehrrU2Vs9PINfZqZMRxq8VWzNn2-IqCq_sqOSKSIicxsSYRAylecvz0neAvjwhCMtEc8&sig=Cg0ArKJSzDNdybk3gLZ9EAE&urlfix=1&adurl=
Frame ID: 50B2F776EB3CBFE025DAFA93DC64AEAC
Requests: 14 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssFSN76ym6srm9zN1os5vcsQ7P6wthAi1mZUBuH8JH4vn1Gaz85gxlxcnVrMq2Sq59yc0rN7TphTo4ZKnNT3vz-4evH4tgZDvyYC1OOYnljuKkElcCteOtDFtST9KEr7HBw-j58lVMWkKZkIi8zbaVK5gdSuuMId4uRyXKrZBimUffYlNxslgic_V9mv8PMgdsS1kjjHCHU9E5cWob4XipdKgUHQ2_yWzgQEMXK2BKQy8E90066eBAxpoUfK3m6Y6U-Iuwb4F9nf2pJLqXlOWBsQOEFFXf3TtHaAn3NFvlJfBdT6A&sai=AMfl-YTqILr4BqcQjChh2HjukFQT0dr3AocHz0SolAyzmqJr9sbaWOX0fimEzz9PT0UbEe3nq8Mw6vMluFuMl0xt02lrbZpi-N7PQ1PA18bni8_mIRFlq2xu9WlQaH7ijmQ&sig=Cg0ArKJSzEVZ98ILS4kJEAE&adurl=
Frame ID: F25EE075A2E2FABBD1E78DD072B4CB98
Requests: 8 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuEQDmQcjlRneltAUuCPNQjb9pyuSq-GOjwlXDpiwTvoxCtPqo200_fAJoKw9nGAiS6XLcl378GX0AJNFhYFS5vQeXzLRjagH9gaTxzICnTeDj1VxNQVGzDA_NGQJg6zgz6VRRYNLhqw0mZfj-tVu6e5OwA-EIhdwCRTwgC5cIFHgW_BuyRe6vaEq9N7spqv9kHzDYkCxjawOCB02Xh71IhQ1erALrJTYq8Qa2w51n2FbniRBo1YVMBiq30DOwcIO_xMuDW1k3xgwR0j7pM8ZpBlPURyYwtWZ686t8BJAnYLe-f&sai=AMfl-YRHRw0HMPErvdSkNc_NFodaM5JJ8gHr-Zz4aYug552qG11wWDGhGJu1yDLSCMUfUJr8Bg4UVl49EDbzsgsSdhs7N5V_HjP94dXrcVrOv3W274O7qoIMdPCirNczFqw&sig=Cg0ArKJSzIH-dg57wWk1EAE&urlfix=1&adurl=
Frame ID: B01474654610558EAA67E15426FA560E
Requests: 5 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu8WMc57GfM-agH-xBPcq2sdwSKS4SCPyIfegDBu9ZkJ9etyzqcpW33kVERuebuBv8DRKfoODB1P8s3DoKp-LfHmO_ANuxWEu6_p_Iqo2vWibJHIIEDRVfd2hq79PaDJUbynAD7I2GHh6iGLbdeum9b48z726NYW_rvcun_OMEO5bGFF2VYoL72aIBUuUOUX3ljDeJ8Jhs1t2bv_NRJ5M3Q4U_VqosJ8733-Q-AK088o5w_KCI0CTp-fzsVo_5Qmb1kcfwd2wjZ5i7LGT2EwDXolByn0XHVJgRWdKiKtHY4&sai=AMfl-YTy-4PcMnjPlb8rw6NmviQBe1PJVQ8jy-7GAb04EOPg9lIfcgZRxFqTK4V9BPNGT4dguCFt32OTNWeVvx6gbu0S7WOlZedj75iE4LJcRkPGyAv-3lKUMwWd0iaOtQ8&sig=Cg0ArKJSzGXx8XRD2fM2EAE&adurl=
Frame ID: 3D5ED9A5B283EC4FE6E24DE2B716A876
Requests: 8 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstrNiBON8ltZL6gN9bm2JgEOXU0_w-1WHiUZg_pWnN1aFZoLE9gCXGWunEFktgQzNHpOWRegwxcbmMtwSqpycIJ0A3Z0piDW5TYMJBbCwF-uU4cGYkdsdKWVKFp_-fnuCk3rjUS5oxG5SruNhImSGUEOTUNjrvpvawEY_F3OYVssz_Bheaa9DmFTMV77I32HmU1Ok1-WcnOHwGlSILssrnTLq02I5wxx3votTnjghgvDpLnw6Iw1ZOhNe4mZpoWEyDGkpdZTbuee9YGKyib8IFwPYONI7p_ar5PdAUMpqLd&sai=AMfl-YSX2BPWU_8kV6fuf9cSNUjji6_y5rTJf6cmRMyRtLLLQSiDn2YYwyO_oEKIl9Pfs8CdHhpAeZ36M4tLnpDPkD2P1Zb_dhGKaySbhtqO3Xwz2KqVqWLJJfpfqCiwaP0&sig=Cg0ArKJSzMI40JNlR4DHEAE&urlfix=1&adurl=
Frame ID: 5AFF53B186294425618F4ED2F9C16CC5
Requests: 9 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsspZfBtHrKtBv_kFsjjpywtH4pcN8yHkgZ6FZu2revLDyQNOgdJedvz0ewxsPOtOAnz1-KSWnaNYxwpOOIv-Yx18eNQ1OLAyU_wQjPaZcyBOhOwhP_yctINV135kSADCXbVM2IzYahBBj2hyH8H1hEa1jJdAyV0gcjkQ_jdMNK39hGcBIGYGDXaMjZI4TPiKUJziuu3Nw55zO2b_mw2hv2OY8v_dmI7JgoMaXM95w9rtJuBEO4DfHSCDrbLxB0W01CDHPWxpDxHnTyW6e6TjcLWCOgoUoYJUx8Pwn9k_qzt&sai=AMfl-YQOYDB9NkVIA_8g4oe4tZKPAN3ebbpaT-Ttgg6VY7xAsy-w0Tp8hPk6wwpm1SQkiaq_1wOvUtXCZt1DIZdx17EuFn1rb49-mT1BUTjeiN6Vcl72OyiXAXTys-EucMU&sig=Cg0ArKJSzJm54-EB-fq2EAE&adurl=
Frame ID: 8F765C2E90196C17B222A300558FD4A2
Requests: 9 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuuKuGFFGOJ0CqjWjOF1dZ-w5BCNK26U3TCf_zGSRWXc-CLaWqa87co5HbWwRMxRKiC7gkz-xFcB6G0ROWx3bjmFrfLmxLNZMOSfzHH1huV7tXVysCNe1HnvFZ81p4Nild9yoPD_njr4RFL20B_gXqZlyQ9zZp4YFf2s3l3o8gVjjLkMfEhylZwSqrTw-71Wf_Hy-12lXc3VUn2WwSKcOYpQ26D6_sooYV0Ry9d3iGtZMio7d-_e0P0kIrHnGTMHDzVVxthZATrmGN7247NoY6G0k6LNwK--DFDtRV1sVUU&sai=AMfl-YQ30pRzo9-2GsPxGKKLqyt5abT5aRA9kEGP35RSbEt6c9XiY7gHWVxoRJv4PkqEUmwGvOjEXL1zYKdPPvUiZzTchciRAJnyx1Lrvcl2AUDxeZfuXJMQ0esmslUGMs4&sig=Cg0ArKJSzK7q3mqc7WmHEAE&adurl=
Frame ID: 20EFE17F7939DDF5543F69CBED9E7BA3
Requests: 8 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvME4gjSHNWz0uLl8ZjEm7zgZ37u5Pv8Mq9gnBiidHBLqSk-kYJ3gp-239_ZP200S1nTZ_2KvLPIG-RcgmqyJbqBr9TvyGtlCVh0Okaec6QXpMoh32d0mHui6MODT5D3N8T0OR3wf49jhVMorK6g6KNN0P71gWa6H5AjPZUsckOxmg_V1c7Qs5aU-xAV6QGCnsM6tKRK_FnQ5Wuz6LUmaWbpCt76BGW1LlFcKiD0yJ69GfDbXfXGmwjQwjb0SIFT3Gyasi2HfGPjU9bXpPaLVJpiRjTz-Cp1RMLzTcNjtI&sai=AMfl-YT8lfKCewr1x7iQmdM2mNwLBCNClnjcwaYFTGT7QTL6N6X1Y0oL0F7vTzO2jQxZKDqL0Oj8lOGtP61wUEDQK7jRGXHC-fl3O3k2C6NWikUkJDqI0L9A_UsKLEatPJk&sig=Cg0ArKJSzIbsQLLsraAYEAE&urlfix=1&adurl=
Frame ID: 5E5C46B2A91FD85A669F2F536574F1DA
Requests: 6 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.2d7d9a6d04538bf11c7b23641e75738c.html?origin=https%3A%2F%2Fwww.darkreading.com
Frame ID: 900964E1192C5C5BDAA0A0D9184DA647
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df2ed3882e73d32c%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff3793adc736afdc%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
Frame ID: AF626556F21281FFBF6F39CD7657B4E6
Requests: 1 HTTP requests in this frame

Frame: https://ins.techweb.com/beacon/record.do?a=68841bbbf037b3bd9eda236cfd0edcb96932f665438d7b833aaa994d869277ac&u=https%253A%252F%252Fwww.darkreading.com%252Fperimeter%252Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%252Fd%252Fd-id%252F1331490&t=P
Frame ID: 99EB3C1CC5CFD70F67B154B109B0B657
Requests: 1 HTTP requests in this frame

Frame: https://ng.techweb.com/authds/login/login.jsp?type=iframe&cdsocket_client=https://www.darkreading.com/cdsocket_proxy.html
Frame ID: F03E91E70E23F9667EE083253A18528E
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/tweet_button.2d7d9a6d04538bf11c7b23641e75738c.en.html
Frame ID: C541C8C6AD4D4D88FFD75F4052746F2B
Requests: 1 HTTP requests in this frame

Frame: https://pbs.twimg.com/card_img/1304510119238131714/SsZoGjxt?format=png&name=144x144_2
Frame ID: 1C4C10BB49FFD227782600F3E71815E3
Requests: 26 HTTP requests in this frame

Frame: https://cache-ssl.celtra.com/api/fonts/google/Lato:400/2_webfont.woff2?subset=ACDEIOPRSTUVW
Frame ID: 93EA30DF0964663386A6239E392120BB
Requests: 44 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/210/runner.html
Frame ID: F3C980A0A2CF10EF3CEC58B571F02497
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: 084CC59C3C7E1C7CAF7C5CF08F501305
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • script /ubembed\.com/i

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • script /\/\/platform\.twitter\.com\/widgets\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

372
Requests

100 %
HTTPS

40 %
IPv6

59
Domains

89
Subdomains

74
IPs

8
Countries

4742 kB
Transfer

11458 kB
Size

29
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 54
  • http://images.reg.techweb.com/EloquaImages/clients/UBMTechweb/%7Bc4ea0bb7-059e-4ef6-a860-71a7f500d0da%7D_InteropITX18_Logo-HorizDates_Color383.fw.png HTTP 301
  • https://images.reg.techweb.com/EloquaImages/clients/UBMTechweb/%7Bc4ea0bb7-059e-4ef6-a860-71a7f500d0da%7D_InteropITX18_Logo-HorizDates_Color383.fw.png
Request Chain 87
  • https://www.darkreading.com/client_pathlog.asp?p=%2Fdarkreading%2Fsection%2F314&f=%2Fdarkreading%2Fsection%2F314%2F1331490&rndserial=13317 HTTP 302
  • https://img.deusm.com/images/spacer.gif
Request Chain 95
  • https://cm.everesttech.net/cm/dd?d_uuid=42419473348105527500426479216929987933 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=X1x7xgAABiUdTlL0
Request Chain 120
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490 HTTP 307
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fperimeter%25252Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%25252Fd%25252Fd-id%25252F1331490&rh=https%253A%252F%252Fwww.darkreading.com%252Fperimeter%252Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%252Fd%252Fd-id%252F1331490
Request Chain 155
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005435&ns__t=1599896518534&ns_c=windows-1252&cv=3.5&c8=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1599896518534&ns_c=windows-1252&cv=3.5&c8=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&c9=&cs_ak_ss=1
Request Chain 175
  • https://ib.adnxs.com/getuid?https://a.dpmsrv.com/dpmpxl/index.php?id=$UID&q%3DxImp%26v%3D1.x%26cl%3D55%26pixelIndex%3D0%26r%3D512369%26tzOffset%3D-120%26url%3Dhttps%253A%252F%252Fwww.darkreading.com%252Fperimeter%252Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%252Fd%252Fd-id%252F1331490&_=1599896518742 HTTP 307
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fa.dpmsrv.com%2Fdpmpxl%2Findex.php%3Fid%3D%24UID%26q%253DxImp%2526v%253D1.x%2526cl%253D55%2526pixelIndex%253D0%2526r%253D512369%2526tzOffset%253D-120%2526url%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fperimeter%25252Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%25252Fd%25252Fd-id%25252F1331490%26_%3D1599896518742 HTTP 302
  • https://a.dpmsrv.com/dpmpxl/index.php?id=875984478630338109&q=xImp&v=1.x&cl=55&pixelIndex=0&r=512369&tzOffset=-120&url=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&_=1599896518742
Request Chain 220
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=678&firstPartyCookieDomain=trk.darkreading.com HTTP 302
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=678&firstPartyCookieDomain=trk.darkreading.com&elqCookie=1
Request Chain 221
  • https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=2150&ref2=elqNone&tzo=-60&ms=678&optin=disabled&firstPartyCookieDomain=trk.darkreading.com HTTP 302
  • https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=-60&ms=678&optin=disabled&elq1pcGUID=4FF7DA052C6D402F905F9FC4C2674140
Request Chain 240
  • https://cm.g.doubleclick.net/pixel?google_nid=datapoint_dmp&google_cm&ap_id=875984478630338109&pixelIndex=0&_=1599896518743 HTTP 302
  • https://a.dpmsrv.com/dpmpxl/index.php?q=dfp&ap_id=875984478630338109&pixelIndex=0&_=1599896518743&google_gid=CAESEI0Cn5WE8ZewTgVc2O43SPQ&google_cver=1
Request Chain 334
  • https://s.adroll.com/j/exp/TQSV74R4GVCSJITSZC2MCP/index.js HTTP 302
  • https://s.adroll.com/j/exp/index.js
Request Chain 336
  • https://d.adroll.mgr.consensu.org/consent/iabcheck/TQSV74R4GVCSJITSZC2MCP?_s=46b9b64d1430571a6a8ab806b98ceaf7&_b=2 HTTP 302
  • https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=46b9b64d1430571a6a8ab806b98ceaf7&_b=2
Request Chain 337
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html
Request Chain 340
  • https://d.adroll.com/pixel/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&pv=82330499651.56851&cookie=&adroll_s_ref=&keyw=&name=darkreading_network_perimeter HTTP 302
  • https://s.adroll.com/pixel/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG/5J7UL5ZX3NAI7FWSGVCHLY.js
Request Chain 344
  • https://d.adroll.com/cm/aol/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP HTTP 302
  • https://pixel.advertising.com/ups/55980/sync?uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&_origin=1&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA HTTP 302
  • https://pixel.advertising.com/ups/55980/sync?uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&_origin=1&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&verify=true HTTP 302
  • https://ups.analytics.yahoo.com/ups/55980/sync?uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&_origin=1&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&apid=UP725bf9b8-f4cb-11ea-b7c4-06c05e201bd2 HTTP 302
  • https://ups.analytics.yahoo.com/ups/55980/sync?uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&_origin=1&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&apid=UP725bf9b8-f4cb-11ea-b7c4-06c05e201bd2&verify=true
Request Chain 345
  • https://d.adroll.com/cm/index/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP HTTP 302
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&expiration=1631432522 HTTP 302
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&expiration=1631432522&C=1
Request Chain 346
  • https://d.adroll.com/cm/n/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP HTTP 302
  • https://pixel.rubiconproject.com/tap.php?v=194538&nid=3644&put=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&expires=365
Request Chain 347
  • https://d.adroll.com/cm/outbrain/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP HTTP 302
  • https://sync.outbrain.com/cookie-sync?p=adroll&uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU HTTP 302
  • https://sync.outbrain.com/cookie-sync?p=adroll&uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&rdrctExp=true
Request Chain 348
  • https://d.adroll.com/cm/pubmatic/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP HTTP 302
  • https://simage2.pubmatic.com/AdServer/Pug?vcode=bz0yJnR5cGU9MSZqcz0xJmNvZGU9MzMwNiZ0bD01MjU2MDA&piggybackCookie=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&gdpr=0&gdpr_consent=BOOoKswOOoKswA2ABBENAkwAAAAXyACACYAIIA
Request Chain 349
  • https://d.adroll.com/cm/r/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP HTTP 302
  • https://ads.yahoo.com/cms/v1?esig=1~bf4e7dc4546a90c08591652d78a230d3f2ef5733&nwid=10001032567&sigv=1&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA HTTP 302
  • https://d.adroll.com/cm/r/in?xid=E0&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA
Request Chain 350
  • https://d.adroll.com/cm/taboola/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP HTTP 302
  • https://sync.taboola.com/sg/adroll-network/1/rtb-h?taboola_hm=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
Request Chain 351
  • https://d.adroll.com/cm/triplelift/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP HTTP 302
  • https://eb2.3lift.com/xuid?mid=4714&xuid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&dongle=c85e HTTP 302
  • https://eb2.3lift.com/xuid?ld=1&mid=4714&xuid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&dongle=c85e&gdpr=1&cmp_cs=&us_privacy=
Request Chain 352
  • https://d.adroll.com/cm/b/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP HTTP 302
  • https://x.bidswitch.net/sync?dsp_id=44&user_id=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?dsp_id=44&user_id=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
Request Chain 353
  • https://d.adroll.com/cm/x/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP HTTP 302
  • https://ib.adnxs.com/setuid?entity=172&code=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
Request Chain 354
  • https://d.adroll.com/cm/l/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP HTTP 302
  • https://idsync.rlcdn.com/377928.gif?partner_uid=4e22a1e2be3b7fc35f18cda930df87ee
Request Chain 355
  • https://d.adroll.com/cm/o/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP HTTP 302
  • https://us-u.openx.net/w/1.0/sd?id=537103138&val=4e22a1e2be3b7fc35f18cda930df87ee HTTP 302
  • https://us-u.openx.net/w/1.0/sd?cc=1&id=537103138&val=4e22a1e2be3b7fc35f18cda930df87ee
Request Chain 356
  • https://d.adroll.com/cm/g/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&xid_ch=f&advertisable=TQSV74R4GVCSJITSZC2MCP&google_nid=adroll2 HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_sc&google_nid=artb&google_hm=TiKh4r47f8NfGM2pMN-H7g HTTP 302
  • https://d.adroll.com/cm/g/in
Request Chain 360
  • https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=50&siteid=2150&DLKey=f09b5473ef7642a085c28ad29c30c1d2&DLLookup=&ms=678&firstPartyCookieDomain=trk.darkreading.com HTTP 302
  • https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=50&siteid=2150&DLKey=f09b5473ef7642a085c28ad29c30c1d2&DLLookup=&ms=678&elq1pcGUID=5A4262F0D50A44CD91C15F0B89656D92
Request Chain 362
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3613068792951734300 HTTP 307
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTMzYxMzA2ODc5Mjk1MTczNDMwMBAAGg0Iyvfx-gUSBQjoBxAAQgBKAA HTTP 307
  • https://ml314.com/csync.ashx?fp=eae4789221e9de171f6c360da42e2a0a079ddae9e624ba1c9df7aa84be186c7ff4cb09cee1a4f8eb&person_id=3613068792951734300&eid=50082
Request Chain 363
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=51d79ff1-32ab-4ec7-ab0c-4f1b79fc6b17 HTTP 302
  • https://ml314.com/csync.ashx?fp=51d79ff1-32ab-4ec7-ab0c-4f1b79fc6b17&person_id=3613068792951734300&eid=53819
Request Chain 364
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3613068792951734300 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3613068792951734300 HTTP 302
  • https://ml314.com/csync.ashx?fp=e9c55ae2f9bff1287e3cd8c1b2689be&eid=50146&person_id=3613068792951734300
Request Chain 365
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif HTTP 302
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif HTTP 302
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=295y2cDZ7ulhrmQcX9I6ci6DbyJbDkNuSh_ipJOHpuVw&gdpr=0&gdpr_consent=&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil%26referrer_pid%3Dr8hrb20 HTTP 302
  • https://ml314.com/csync.ashx?fp=295y2cDZ7ulhrmQcX9I6ci6DbyJbDkNuSh_ipJOHpuVw&person_id=3613068792951734300&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil%26referrer_pid%3dr8hrb20 HTTP 302
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil&referrer_pid=r8hrb20

372 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request 1331490
www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/
152 KB
27 KB
Document
General
Full URL
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
83fcd002defdabf28ad5c9cb014be00f4c4e0bd59a2f8abcc119658382ae61c2
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

:method
GET
:authority
www.darkreading.com
:scheme
https
:path
/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
date
Sat, 12 Sep 2020 07:41:57 GMT
content-type
text/html
set-cookie
__cfduid=d71d6ceff2d0c7497b57eae4fb45407251599896516; expires=Mon, 12-Oct-20 07:41:56 GMT; path=/; domain=.darkreading.com; HttpOnly; SameSite=Lax darkreading_lastvisit=9/12/2020 3:41:56 AM; expires=Wed, 12-Sep-2035 07:41:56 GMT; path=/; HttpOnly darkreading_lastvisit=9/12/2020 3:41:56 AM; expires=Wed, 12-Sep-2035 07:41:56 GMT; path=/; HttpOnly cplChannelTagID=; path=/; secure darkreading%2Dmeter=1331490; expires=Sun, 13-Sep-2020 04:00:00 GMT; path=/ darkreading%5Fvisits=2; expires=Wed, 12-Sep-2035 04:00:00 GMT; path=/ gatewayChecked=; path=/; secure
vary
Accept-Encoding
cache-control
private
x-pingback
http://www.staging.new.informationweek.com/xmlrpc.asp
x-powered-by
ASP.NET
strict-transport-security
max-age=63072000; includeSubDomains
cf-cache-status
DYNAMIC
cf-request-id
0522dc8f150000befbd71f1200000001
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
5d17fd2b5eadbefb-FRA
content-encoding
br
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/
30 KB
7 KB
Stylesheet
General
Full URL
https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac19::1:b:1b , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 12 Dec 2018 18:35:20 GMT
status
200
etag
"1544639720"
vary
Accept-Encoding
x-cache
HIT
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=31536000
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
timing-allow-origin
*
content-length
7050
common-footer.css
twimgs.com/nojitter/css/
9 KB
2 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/common-footer.css?
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3eea91bd1f33507891a2909689d21be3a6e0fb1b688037c2a7d59c042503d910

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 09 Jan 2020 06:37:35 GMT
server
cloudflare
age
5
etag
W/"23cf-59baf3e93a9c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
5d17fd315cd80742-FRA
cf-request-id
0522dc92da00000742c0859200000001
css
fonts.googleapis.com/
2 KB
669 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto+Slab:700
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
95ef5b080ecf0e2726835bafef2613d3fd328832e84f81da38c5f4f26dab8755
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 12 Sep 2020 06:47:14 GMT
server
ESF
date
Sat, 12 Sep 2020 07:41:57 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 12 Sep 2020 07:41:57 GMT
darkreading.css
twimgs.com/nojitter/css/
17 KB
3 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/darkreading.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cf167be72549318f78f8c03d0d93b923f8e8e290acec47b870a1cede920e859b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Thu, 27 Apr 2017 09:38:14 GMT
server
cloudflare
etag
W/"45f8-54e22b7428d80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
5d17fd315cde0742-FRA
cf-request-id
0522dc92da00000742c085a200000001
pano-framework.css
www.darkreading.com/styles/
87 KB
7 KB
Stylesheet
General
Full URL
https://www.darkreading.com/styles/pano-framework.css?v1.27
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
e76d2d771deceb87567b67f968ef2196915e110c0027ade297fab2209965fd30
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
vary
Accept-Encoding
cf-cache-status
HIT
age
5002
x-powered-by
ASP.NET
status
200
cf-request-id
0522dc92bd0000befbd71fd200000001
last-modified
Tue, 08 Sep 2020 12:59:16 GMT
server
cloudflare
etag
W/"29fd78dbdf85d61:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=63072000; includeSubDomains
content-type
text/css
expires
Sat, 12 Sep 2020 09:41:57 GMT
cache-control
public, max-age=7200
cf-polished
origSize=135704
cf-ray
5d17fd312991befb-FRA
cf-bgj
minify
styles.css
www.darkreading.com/styles/
260 B
296 B
Stylesheet
General
Full URL
https://www.darkreading.com/styles/styles.css?v7
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
10a6e0f0427a05104050292e8d62b3d01062f9422701e267df74958d0cc2eef7
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
vary
Accept-Encoding
cf-cache-status
HIT
age
5002
x-powered-by
ASP.NET
status
200
cf-request-id
0522dc92bd0000befbd71fe200000001
last-modified
Mon, 03 Apr 2017 14:07:01 GMT
server
cloudflare
etag
W/"d632e39083acd21:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=63072000; includeSubDomains
content-type
text/css
expires
Sat, 12 Sep 2020 09:41:57 GMT
cache-control
public, max-age=7200
cf-polished
origSize=292
cf-ray
5d17fd312993befb-FRA
cf-bgj
minify
dr_nativead.css
i.ubm-us.net/oas/nativead/css/
2 KB
964 B
Stylesheet
General
Full URL
https://i.ubm-us.net/oas/nativead/css/dr_nativead.css?v3
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::ac43:c629 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f5932acd6c5f2796f354dedc5e8dfe30e206787365186bbf0f9789d083472a75

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
HIT
age
6495
cf-polished
origSize=2145
status
200
cf-request-id
0522dc92da00002b95750bf200000001
last-modified
Wed, 06 Feb 2019 18:48:56 GMT
server
cloudflare
etag
W/"861-5813e2d913600"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=14400
cf-ray
5d17fd315a532b95-FRA
cf-bgj
minify
nativead.js
i.ubm-us.net/oas/nativead/js/
1 KB
528 B
Script
General
Full URL
https://i.ubm-us.net/oas/nativead/js/nativead.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::ac43:c629 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
984cd1fa5dd20c2b1b8fd77b6bb876a3a211cdf14aaaed6bc1481e3c98027544

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 30 Jul 2015 14:31:41 GMT
server
cloudflare
age
60547
cf-polished
origSize=1373
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
5d17fd315a542b95-FRA
cf-request-id
0522dc92db00002b95750c0200000001
cf-bgj
minify
dr_nativead.js
i.ubm-us.net/oas/nativead/js/
8 KB
1 KB
Script
General
Full URL
https://i.ubm-us.net/oas/nativead/js/dr_nativead.js?v3
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::ac43:c629 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b309c9c4a6c27c7cfc64ab2bc7f545e8d7b41a795c46202ab2a9c633f7128287

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Fri, 06 Oct 2017 16:50:20 GMT
server
cloudflare
cf-polished
origSize=8434
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
5d17fd315a552b95-FRA
cf-request-id
0522dc92db00002b95750c1200000001
cf-bgj
minify
respond.min.js
www.darkreading.com/script/
4 KB
2 KB
Script
General
Full URL
https://www.darkreading.com/script/respond.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
cf7bdb0487590885c13a3cc0a2a1450b3ac649a465de267af12f552be8bcb5fe
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
HIT
age
5002
x-powered-by
ASP.NET
status
200
strict-transport-security
max-age=63072000; includeSubDomains
cf-request-id
0522dc92bd0000befbd71ff200000001
last-modified
Mon, 22 Sep 2014 21:04:30 GMT
server
cloudflare
etag
W/"03ccda8d6cf1:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
5d17fd312994befb-FRA
expires
Sat, 12 Sep 2020 09:41:57 GMT
jquery.mobile.custom.min.js
www.darkreading.com/script/
8 KB
3 KB
Script
General
Full URL
https://www.darkreading.com/script/jquery.mobile.custom.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
b4cf7d6d50b6a36f070f6c49e975198a9a8930838695b64e480bf1f6199f0572
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
HIT
age
5002
x-powered-by
ASP.NET
status
200
cf-request-id
0522dc92bd0000befbd7200200000001
last-modified
Mon, 22 Sep 2014 21:04:30 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
etag
W/"03ccda8d6cf1:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
5d17fd312995befb-FRA
expires
Sat, 12 Sep 2020 09:41:57 GMT
complete.js
twimgs.com/nojitter/js/
45 KB
9 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/complete.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8420f59cd348cf0e10e05482724523ad6b83f88467bbfacf6826eaadd3a03985

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 06:04:53 GMT
server
cloudflare
age
2029
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
5d17fd315ce90742-FRA
cf-request-id
0522dc92da00000742c085e200000001
jquery.mobile-1.4.5.js
img.deusm.com/darkreading/JQuery_Library/
256 KB
62 KB
Script
General
Full URL
https://img.deusm.com/darkreading/JQuery_Library/jquery.mobile-1.4.5.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a456c328bbb88fc991a5ddb80db492ec9e179a3ef443d50bf80b3fbbb5e8a7f7

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Tue, 17 Mar 2020 04:33:16 GMT
server
cloudflare
etag
W/"71b34-5a1056f31db00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=465716
cf-ray
5d17fd315e95c29a-FRA
cf-request-id
0522dc92db0000c29ac63da200000001
cf-bgj
minify
Jquery_3.4.1.js
img.deusm.com/darkreading/JQuery_Library/
140 KB
39 KB
Script
General
Full URL
https://img.deusm.com/darkreading/JQuery_Library/Jquery_3.4.1.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d50d436889f46d5b9455690493e877e02ad30ea4dca963ffcaa3024c45c1d58c

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Mon, 16 Mar 2020 04:36:27 GMT
server
cloudflare
etag
W/"47090-5a0f15cbce8c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=290960
cf-ray
5d17fd315e96c29a-FRA
cf-request-id
0522dc92db0000c29ac63db200000001
cf-bgj
minify
darkreading.js
img.deusm.com/darkreading/JQuery_Library/
20 KB
3 KB
Script
General
Full URL
https://img.deusm.com/darkreading/JQuery_Library/darkreading.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
74a584aafb20fa5524e8005c8f236bb47119e12225ac0d9e30d6c6ae69354808

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Mon, 16 Mar 2020 04:36:15 GMT
server
cloudflare
etag
W/"6a97-5a0f15c05cdc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=27287
cf-ray
5d17fd315e99c29a-FRA
cf-request-id
0522dc92db0000c29ac63dc200000001
cf-bgj
minify
VisitorAPI.js
twimgs.com/custom/library.gtecevent.com/assets/
45 KB
14 KB
Script
General
Full URL
https://twimgs.com/custom/library.gtecevent.com/assets/VisitorAPI.js?ormzkk
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ed2c6c0fb3151dc9d40120a17446f07d8873a8b6e08b071bbed82cd6de9b78ba

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 16 Jan 2020 23:35:09 GMT
server
cloudflare
age
80207
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
5d17fd315cec0742-FRA
cf-request-id
0522dc92da00000742c0860200000001
at.js
twimgs.com/custom/library.gtecevent.com/assets/
106 KB
32 KB
Script
General
Full URL
https://twimgs.com/custom/library.gtecevent.com/assets/at.js?ormzkk
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cd8ddec509daf284f644926ce4a94e2cf5a3cefa41c7c18f2358b6cca80a4a3f

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 16 Jan 2020 23:34:58 GMT
server
cloudflare
age
80980
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
5d17fd315ceb0742-FRA
cf-request-id
0522dc92da00000742c085f200000001
informa-iribbon.css
img.deusm.com/darkreading/
2 KB
1 KB
Stylesheet
General
Full URL
https://img.deusm.com/darkreading/informa-iribbon.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1ae4b8548f250831a2443bd449af625f6331b7c72e1f408789642a3050596d45

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Thu, 25 Apr 2019 07:05:41 GMT
server
cloudflare
etag
W/"cea-58755722bdb40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cf-polished
origSize=3306
cf-ray
5d17fd315e94c29a-FRA
cf-request-id
0522dc92db0000c29ac63d9200000001
cf-bgj
minify
informa-iribbon.js
img.deusm.com/darkreading/
489 B
311 B
Script
General
Full URL
https://img.deusm.com/darkreading/informa-iribbon.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fb295c2a72d39784b18a1d2d5b0c9976807f7cf010fe730b86d43bc55b0ae251

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Thu, 25 Apr 2019 07:05:52 GMT
server
cloudflare
etag
W/"229-5875572d3b400"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=553
cf-ray
5d17fd315e9ac29a-FRA
cf-request-id
0522dc92db0000c29ac63dd200000001
cf-bgj
minify
cookie_banner.js
www.darkreading.com/script/
1 KB
597 B
Script
General
Full URL
https://www.darkreading.com/script/cookie_banner.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
c5882768d33bf8778b8c12ec81466d13a9c4e1c797d5cc1686f3f2564ab1983d
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
vary
Accept-Encoding
cf-cache-status
HIT
age
5001
x-powered-by
ASP.NET
status
200
cf-request-id
0522dc92bd0000befbd7201200000001
last-modified
Fri, 11 Sep 2020 12:50:57 GMT
server
cloudflare
etag
W/"6df494313a88d61:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=63072000; includeSubDomains
content-type
application/x-javascript
expires
Sat, 12 Sep 2020 09:41:57 GMT
cache-control
public, max-age=7200
cf-polished
origSize=1698
cf-ray
5d17fd312997befb-FRA
cf-bgj
minify
/
6600d6d98e534115970f9529a45f3195.js.ubembed.com/
484 B
763 B
Script
General
Full URL
https://6600d6d98e534115970f9529a45f3195.js.ubembed.com/
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.113.131 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
f03881c2d6e064d809abaadf7eabe69ee8b1e58812b308022f6811c4ef004d63

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
br
x-backend-region
eu_west_1
age
5280
x-amz-apigw-id
SvUN_HgFjoEFoHw=
etag
aaab40e12ca91eabbcb0f8f10bd5715a-v0.178.1
vary
Accept-Encoding, Referer
x-cache
Miss from cloudfront, HIT
content-type
application/json
status
200
cache-control
max-age=0, must-revalidate
x-amz-cf-pop
FRA6-C1
accept-ranges
none
access-control-allow-origin
*
jplayer.blue.monday.css
twimgs.com/nojitter/css/
12 KB
3 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/jplayer.blue.monday.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0a4f12795a11d0957a7e476cdd2516967e3e00f54841456fbd8c0dd607984d92

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Fri, 05 May 2017 07:28:28 GMT
server
cloudflare
etag
W/"2f89-54ec1d5e89f00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
5d17fd315ce00742-FRA
cf-request-id
0522dc92da00000742c085b200000001
style.css
twimgs.com/nojitter/css/
912 B
416 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/style.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3a08be5766c0e198ba8171f7decd09065c08a5c850276325cc1792f25e7b356e

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Fri, 05 May 2017 07:30:36 GMT
server
cloudflare
etag
W/"390-54ec1dd89bf00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
5d17fd315ce50742-FRA
cf-request-id
0522dc92da00000742c085c200000001
ubm-widget-style.css
dsimg.ubm-us.net/ubm-widget/css/
29 KB
5 KB
Stylesheet
General
Full URL
https://dsimg.ubm-us.net/ubm-widget/css/ubm-widget-style.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::ac43:c629 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6414656f939f73a463499bd2c5a8f75793658adf6e05d0e4cd61d1ba36636b94

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Wed, 11 Apr 2018 16:31:21 GMT
server
cloudflare
etag
W/"7393-569952b4c0840"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-polished
origSize=29587
cf-ray
5d17fd315acc3240-FRA
cf-request-id
0522dc92da000032404f96a200000001
cf-bgj
minify
ubm-widget-min.js
dsimg.ubm-us.net/ubm-widget/js/
192 KB
50 KB
Script
General
Full URL
https://dsimg.ubm-us.net/ubm-widget/js/ubm-widget-min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::ac43:c629 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ffcaeef328a1e67717f714997426aaf936e4b9d378a5fbe1bd2a063dfeb50750

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Wed, 11 Apr 2018 17:29:33 GMT
server
cloudflare
etag
W/"2fe99-56995fb6fbbe3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
5d17fd315acf3240-FRA
cf-request-id
0522dc92db000032404f96b200000001
ng_forms.js
www.darkreading.com/script/
23 KB
5 KB
Script
General
Full URL
https://www.darkreading.com/script/ng_forms.js?v7.9
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
7d23c140b5d7396d35b446f636c1bb8220accc6834abe5f51d7355fca8d91144
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
vary
Accept-Encoding
cf-cache-status
HIT
age
4026
x-powered-by
ASP.NET
status
200
cf-request-id
0522dc92bf0000befbd7202200000001
last-modified
Wed, 09 Oct 2019 11:57:33 GMT
server
cloudflare
etag
W/"28b83cbc987ed51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=63072000; includeSubDomains
content-type
application/x-javascript
expires
Sat, 12 Sep 2020 09:41:57 GMT
cache-control
public, max-age=7200
cf-polished
origSize=31823
cf-ray
5d17fd313998befb-FRA
cf-bgj
minify
widget-extra.css
twimgs.com/nojitter/css/
443 B
330 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/widget-extra.css?v1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
61494fd1b573b217034bef7e22044bda91962797d68efada6726910d32bb995b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
cf-cache-status
REVALIDATED
last-modified
Wed, 13 Sep 2017 07:28:37 GMT
server
cloudflare
etag
W/"1bb-5590d1ba81340"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
5d17fd315ce60742-FRA
cf-request-id
0522dc92da00000742c085d200000001
gtm.js
www.googletagmanager.com/
107 KB
36 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-WJ9RHF7
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
6ecf902cb7a30237dbc77619bb3060783188435f25d7c9e5c0343a513f7e92eb
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
br
vary
Accept-Encoding
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
36888
x-xss-protection
0
last-modified
Sat, 12 Sep 2020 06:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Sat, 12 Sep 2020 07:41:58 GMT
conversion.js
www.googleadservices.com/pagead/
29 KB
12 KB
Script
General
Full URL
https://www.googleadservices.com/pagead/conversion.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.212.162 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s01-in-f2.1e100.net
Software
cafe /
Resource Hash
6ad80c3d7e4bdaf43e39825ca84c4af13ddcf0b6869284c3f781e9708757d06c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
11417
x-xss-protection
0
server
cafe
etag
18319899054604527704
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Sat, 12 Sep 2020 07:41:57 GMT
adblockDetector.js
www.darkreading.com/prestitial/
110 B
212 B
Script
General
Full URL
https://www.darkreading.com/prestitial/adblockDetector.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
1399c38bd120b5ec5548085f61949d402a8bbf05a3831e0ff11a5f1345269046
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
br
vary
Accept-Encoding
cf-cache-status
HIT
age
5002
x-powered-by
ASP.NET
status
200
cf-request-id
0522dc93270000befbd7205200000001
last-modified
Mon, 20 May 2019 09:07:27 GMT
server
cloudflare
etag
W/"46cb5f72ebed51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=63072000; includeSubDomains
content-type
application/x-javascript
expires
Sat, 12 Sep 2020 09:41:57 GMT
cache-control
public, max-age=7200
cf-polished
origSize=118
cf-ray
5d17fd31d9e9befb-FRA
cf-bgj
minify
iwk-it-network-dr.gif
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/iwk-it-network-dr.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d6df7d1f2b9c65c06c5ae1e798650b6c388f26f6852b8814f942557d712b9745

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Wed, 02 Nov 2016 13:53:05 GMT
server
cloudflare
etag
"abc-54051c29ab240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
5d17fd369ec5c29a-FRA
content-length
2748
cf-request-id
0522dc961f0000c29ac601a200000001
DR_mobile_User_nav.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_mobile_User_nav.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b02cdb496b954e874c4b87d48eb1ea16f088258786ed0d2f0771acc3d01649e

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
etag
"5be-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ec6c29a-FRA
content-length
1470
cf-request-id
0522dc961f0000c29ac601b200000001
spacer.gif
img.deusm.com/images/
49 B
171 B
Image
General
Full URL
https://img.deusm.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 13 Oct 2000 01:54:07 GMT
server
cloudflare
etag
"31-3737c29f20dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
5d17fd369ec7c29a-FRA
content-length
49
cf-request-id
0522dc961f0000c29ac601c200000001
DR_search.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_search.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dafb72bcf008c9b9754482b88e8ba8b8e854f1a69483f0753b1c3f12101c1a9f

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
etag
"7e9-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ec8c29a-FRA
content-length
2025
cf-request-id
0522dc961f0000c29ac601d200000001
DR_mobile_SM.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_mobile_SM.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bfc1797e85a0565d0cfba1621eac801dc5ebd78a02f45e0ab8de5c6c2eb3f987

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
etag
"864-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ecac29a-FRA
content-length
2148
cf-request-id
0522dc96200000c29ac601e200000001
DR-sections-nav.png
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-sections-nav.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4f89a03faa36f0b6eeb92b9a8f0b8d2f9d3e564ba8bf13bb169bf05b126ca81e

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
etag
"9aa-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ecbc29a-FRA
content-length
2474
cf-request-id
0522dc96200000c29ac601f200000001
mobile_close.jpg
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/mobile_close.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b5c543f59d71e1e4f6b51c896febf86975206dcf9e34757f475b125d64d16ea6

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Thu, 13 Mar 2014 12:44:20 GMT
server
cloudflare
etag
"638-4f47c4fdf5100"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
5d17fd369ecdc29a-FRA
content-length
1592
cf-request-id
0522dc96200000c29ac6020200000001
cf-bgj
h2pri
DR_logo_314x49.png
img.deusm.com/darkreading/
7 KB
7 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_logo_314x49.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0615fb751c4db849533b1e432f05428e307591466902876f8ab30d7873b7f38b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Mon, 15 Oct 2018 10:02:43 GMT
server
cloudflare
etag
"1b78-5784189c2b6f8"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ecfc29a-FRA
content-length
7032
cf-request-id
0522dc96200000c29ac6021200000001
DR_Newsletters.png
img.deusm.com/darkreading/
4 KB
4 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_Newsletters.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
33194e1b282eaf349b01b68de4fee20452ff6877b4b82605d5c68c5132444f96

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Wed, 18 Sep 2019 13:04:00 GMT
server
cloudflare
etag
"fec-592d378715000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ed2c29a-FRA
content-length
4076
cf-request-id
0522dc96200000c29ac6022200000001
bib-related-content.min.css
cdn.bibblio.org/rcm/4.9/
22 KB
4 KB
Stylesheet
General
Full URL
https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
99.86.2.87 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-2-87.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
fa30597c8340ed18b045cc801a2dfb2e1185f9ca5ea02753e5935e64df5aa4c5

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 11 Sep 2020 09:07:45 GMT
content-encoding
gzip
last-modified
Fri, 20 Mar 2020 10:35:36 GMT
server
AmazonS3
age
81253
etag
"81695cfb2a7f57aed84745a9848ba3df"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
status
200
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
p6R0tUqzLR9HFOQZ3ObtkhVtxt9P_6QfmasLEfzTc7R3PaAcw0qN0Q==
via
1.1 7fcb41b117930690c299be9cec4a977a.cloudfront.net (CloudFront)
bib-related-content.min.js
cdn.bibblio.org/rcm/4.9/
45 KB
11 KB
Script
General
Full URL
https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
99.86.2.87 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-2-87.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
5b21d495e672a89a4d8dc047b17ab94531525297644c1a4340a2bc3f26ab782f

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 11 Sep 2020 09:07:45 GMT
content-encoding
gzip
last-modified
Fri, 20 Mar 2020 10:35:37 GMT
server
AmazonS3
age
81253
etag
"1274153c15863a39c136e9954d12299d"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
MUjryIxivS62o7EaXgoKk7Ckwt2c-v7Mc6vc7OEShPadXb3cyLwIDQ==
via
1.1 7fcb41b117930690c299be9cec4a977a.cloudfront.net (CloudFront)
Jai-Vijayan.jpg
img.deusm.com/informationweek/
11 KB
11 KB
Image
General
Full URL
https://img.deusm.com/informationweek/Jai-Vijayan.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2e9b6fed568a85ee88f1eb2aa1d51cb2073d907cbb0109a5dd703f0b1e5651d6

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Mon, 29 Sep 2014 13:34:14 GMT
server
cloudflare
age
3252
etag
"2c67-5043452972180"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
5d17fd369ed3c29a-FRA
content-length
11367
cf-request-id
0522dc96200000c29ac6023200000001
cf-bgj
h2pri
editor-TW.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-TW.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
32821e69d091e71a62b9dbefcd09516c2133b50c50a3f8d597207d9cab5d59b8

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
age
4424
etag
"60d-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ed5c29a-FRA
content-length
1549
cf-request-id
0522dc96200000c29ac6024200000001
editor-IN.png
img.deusm.com/informationweek/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-IN.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e5cc2027e2da5b3d553fba6a4d2d7276aafa604001e9b0321e18d1fd62b03b3f

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
age
2026
etag
"5b7-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ed6c29a-FRA
content-length
1463
cf-request-id
0522dc96200000c29ac6025200000001
editor-RSS.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-RSS.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a8f4fa7376444ffe05d0f7b296439401fb9729bdee84d760ee6286e7b663c753

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
age
5845
etag
"6fa-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ed7c29a-FRA
content-length
1786
cf-request-id
0522dc96200000c29ac6026200000001
editor-email.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-email.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
190f689e0f479324a217a5ea88c1acc132b66d24b16559052d59b892ff5dcba2

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:40 GMT
server
cloudflare
age
5845
etag
"70f-4eb2828a58d00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ed8c29a-FRA
content-length
1807
cf-request-id
0522dc96200000c29ac6027200000001
DR-comment.png
img.deusm.com/darkreading/
1011 B
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
63484bd691450c081b848e5159315bfcd02720741d3f72a69717643d6630e578

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 21 Feb 2014 14:56:02 GMT
server
cloudflare
etag
"3f3-4f2ebd20ac480"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ed9c29a-FRA
content-length
1011
cf-request-id
0522dc96200000c29ac6028200000001
thumbs-up.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/thumbs-up.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9111d9514a49ad97e7c6d5fd97a00f3232b73537e9155726f32f123eb69b5a

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 14 Mar 2014 16:09:21 GMT
server
cloudflare
etag
"607-4f4934ae90e40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369edcc29a-FRA
content-length
1543
cf-request-id
0522dc96200000c29ac6029200000001
thumbs-down.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/thumbs-down.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b19f14d674857362b6e10d0dcb1703b149d9dda6f350d1737562fc36e4e67a81

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Wed, 20 Nov 2013 19:20:31 GMT
server
cloudflare
etag
"624-4eba0acaa9dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369eddc29a-FRA
content-length
1572
cf-request-id
0522dc96200000c29ac602a200000001
email-decode.min.js
www.darkreading.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/
1 KB
871 B
Script
General
Full URL
https://www.darkreading.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
gzip
vary
Accept-Encoding
last-modified
Wed, 09 Sep 2020 14:39:45 GMT
server
cloudflare
etag
W/"5f58e931-4d7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
cache-control
max-age=172800, public
cf-ray
5d17fd354ba5befb-FRA
cf-request-id
0522dc954f0000befbd720c200000001
expires
Mon, 14 Sep 2020 07:41:57 GMT
widgets.js
platform.twitter.com/
95 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
a761b426004caba495cdac2c93ce7dd306c47bc4d7bdc63c4840c3d8182396a9

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-cache
HIT, HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
28881
x-served-by
cache-bwi5139-BWI, cache-hhn4057-HHN
last-modified
Tue, 01 Sep 2020 20:40:54 GMT
etag
"a58136137a93f33c1d165df7d4d973f8+gzip"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=1800
accept-ranges
bytes
tw-cdn
FT
flipboard_srsw.png
cdn.flipboard.com/badges/
322 B
751 B
Image
General
Full URL
https://cdn.flipboard.com/badges/flipboard_srsw.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2057:8e00:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
44fc0a3d10c47ae5aa6c77c76b4b8f81aa08022ca464ef235005ddd86570eb5b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 11 Sep 2020 16:47:00 GMT
via
1.1 a7dcca466407f1871feceef50bc84272.cloudfront.net (CloudFront)
last-modified
Wed, 07 Feb 2018 22:03:59 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
atime:1518040945/ctime:1518040834/gid:20/gname:staff/md5:37351783e1813119a3e0710c16137273/mode:33152/mtime:1518064798/uid:502/uname:jlee
age
53699
etag
"37351783e1813119a3e0710c16137273"
x-cache
Hit from cloudfront
content-type
image/png
status
200
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
322
x-amz-cf-id
XtacDXq0KTwTsVSePreg1I9Je8t964fa926ZOcR58FNkm7y3gvDBZw==
flbuttons.min.js
cdn.flipboard.com/web/buttons/js/
7 KB
4 KB
Script
General
Full URL
https://cdn.flipboard.com/web/buttons/js/flbuttons.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2057:8e00:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8e7ad8de87781f6ad65b36a7d3243b44d80dc182df6af076484a2bec85051550

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 01:00:17 GMT
content-encoding
gzip
last-modified
Wed, 11 Oct 2017 00:24:00 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:502/gname:staff/uname:alee/gid:20/mode:33188/mtime:1507680760/atime:1507680783/md5:ec6e4306e5e274d25c4f9afde663da81/ctime:1507680760
age
24102
etag
W/"ec6e4306e5e274d25c4f9afde663da81"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
Wk06ly-_uA53eom_LM7lH-d5M6iRqllVW2wPbyA9dan6sgY4s2SouA==
via
1.1 a7dcca466407f1871feceef50bc84272.cloudfront.net (CloudFront)
in.js
platform.linkedin.com/
181 KB
55 KB
Script
General
Full URL
https://platform.linkedin.com/in.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:66b5:799a:7cd3:f74d:7071 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8F0A) /
Resource Hash
ca496980f053a2645d65d70105e801b4c84c81febf062416c2e25ddc7c5ad191

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-cdn-client-ip-version
IPV6
x-cdn
ECST
age
984
x-cache
HIT
status
200
x-cdn-proto
HTTP2
content-length
55598
x-li-uuid
uSMAB4P4MxbwhcvG5yoAAA==
server
ECAcc (frc/8F0A)
last-modified
Sat, 12 Sep 2020 07:25:34 GMT
x-li-pop
prod-edc2
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
accept-ranges
bytes
x-li-proto
http/1.1
x-li-fabric
prod-lva1
expires
Sat, 12 Sep 2020 08:25:34 GMT
%7Bc4ea0bb7-059e-4ef6-a860-71a7f500d0da%7D_InteropITX18_Logo-HorizDates_Color383.fw.png
images.reg.techweb.com/EloquaImages/clients/UBMTechweb/
Redirect Chain
  • http://images.reg.techweb.com/EloquaImages/clients/UBMTechweb/%7Bc4ea0bb7-059e-4ef6-a860-71a7f500d0da%7D_InteropITX18_Logo-HorizDates_Color383.fw.png
  • https://images.reg.techweb.com/EloquaImages/clients/UBMTechweb/%7Bc4ea0bb7-059e-4ef6-a860-71a7f500d0da%7D_InteropITX18_Logo-HorizDates_Color383.fw.png
64 KB
64 KB
Image
General
Full URL
https://images.reg.techweb.com/EloquaImages/clients/UBMTechweb/%7Bc4ea0bb7-059e-4ef6-a860-71a7f500d0da%7D_InteropITX18_Logo-HorizDates_Color383.fw.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.16.186.152 , Ascension Island, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
a2-16-186-152.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a022504d0450c9b28dba2f831f2ccf963c36e72fcee41446a0b003237fd0f63e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
Last-Modified
Thu, 08 Feb 2018 20:48:48 GMT
ETag
"2cdff371ea1d31:0"
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
no-cache, no-store
Date
Sat, 12 Sep 2020 07:41:58 GMT
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
image/png
Content-Length
65137
Expires
Sat, 12 Sep 2020 07:41:58 GMT

Redirect headers

Location
https://images.reg.techweb.com/EloquaImages/clients/UBMTechweb/%7Bc4ea0bb7-059e-4ef6-a860-71a7f500d0da%7D_InteropITX18_Logo-HorizDates_Color383.fw.png
Date
Sat, 12 Sep 2020 07:41:58 GMT
Server
AkamaiGHost
Connection
keep-alive
Content-Length
0
DR-user.jpg
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-user.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d4b95126382745e9e07d76812e3bbc8d6de2cfa6356c586f930ece7d4acb8052

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Tue, 04 Mar 2014 15:58:18 GMT
server
cloudflare
age
5863
etag
"97d-4f3c9f8faba80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
5d17fd369edfc29a-FRA
content-length
2429
cf-request-id
0522dc96200000c29ac602b200000001
cf-bgj
h2pri
Robert-Lemos.png
img.deusm.com/darkreading/authors/
45 KB
46 KB
Image
General
Full URL
https://img.deusm.com/darkreading/authors/Robert-Lemos.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
87cdbacb358e421a482bc1a52dc9cfc04a9f6d8dfe86c7c6c66bcde013792850

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Wed, 12 Dec 2018 13:37:24 GMT
server
cloudflare
etag
"b5d4-57cd34c52ed00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ee1c29a-FRA
content-length
46548
cf-request-id
0522dc96200000c29ac602c200000001
Gregory-Touhill.png
img.deusm.com/darkreading/authors/
27 KB
27 KB
Image
General
Full URL
https://img.deusm.com/darkreading/authors/Gregory-Touhill.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1d68962c84c8ee34a23605fce201c391a597b5fb16be8763e17d35d46f11228c

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Tue, 01 Sep 2020 11:29:32 GMT
server
cloudflare
etag
"6a3c-5ae3ed5385f00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ee3c29a-FRA
content-length
27196
cf-request-id
0522dc96200000c29ac602d200000001
Arti-Lalwani.png
img.deusm.com/darkreading/authors/
25 KB
25 KB
Image
General
Full URL
https://img.deusm.com/darkreading/authors/Arti-Lalwani.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6d8663ec95d798834ad4c4dae5c578d5ea48f582f973fe1182df3e4ab2ec2b11

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Wed, 26 Aug 2020 20:27:02 GMT
server
cloudflare
etag
"62ef-5adcda46c1180"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ee4c29a-FRA
content-length
25327
cf-request-id
0522dc96200000c29ac602e200000001
NL-icon.png
img.deusm.com/informationweek/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/informationweek/NL-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d8b7ea5cc75abc79d502a95c5ccac8f97aa82fd8c13acc74c84c754eb86cc4c3

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 08 Nov 2013 15:09:43 GMT
server
cloudflare
etag
"a27-4eaabc5a3dbc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ee6c29a-FRA
content-length
2599
cf-request-id
0522dc96200000c29ac602f200000001
video-arrow_left_off.gif
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/video-arrow_left_off.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9f61400081191bf755c967c186a8fd356b02010fac3412f84cf83d5dfe10dd5d

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 14 Mar 2014 16:02:37 GMT
server
cloudflare
etag
"53e-4f49332d48140"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
5d17fd369ee7c29a-FRA
content-length
1342
cf-request-id
0522dc96200000c29ac6030200000001
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/fa726b0a-898c-4556-9c4e-8513ab3eb45d/11ab51b4-e776-4639-97c3-07e5210bfd9d/160x90/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/fa726b0a-898c-4556-9c4e-8513ab3eb45d/11ab51b4-e776-4639-97c3-07e5210bfd9d/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
fdb0066a030a45bd44f17d459c6369901b3fa648c94de3afa0f824d87dfd1527

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 03:45:31 GMT
Via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
Age
14187
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
3558
X-Amz-Cf-Id
TFPog4qmRElcIC9W7zJp3Fu4rmxlBv3KYXoLTiJN8oiD2Hz5tYbulg==
comment.png
img.deusm.com/informationweek/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/informationweek/comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4f65ccd30d1c95588b51035a804dd49090d7fbe6c2829a576a31d1b6a3e0f86b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Wed, 20 Nov 2013 19:22:53 GMT
server
cloudflare
etag
"446-4eba0b5215d40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ee8c29a-FRA
content-length
1094
cf-request-id
0522dc96200000c29ac6031200000001
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/2fe20654-2cfe-4555-8102-d79cc405847e/0e955e8e-0506-45e1-b715-3062ef29198b/160x90/match/
5 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/2fe20654-2cfe-4555-8102-d79cc405847e/0e955e8e-0506-45e1-b715-3062ef29198b/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
6dd394ad8df7d5e2ed0f220ff18451f281ccc907cae0d25d233c51533ad8887f

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 02:15:25 GMT
Via
1.1 b073c20359d711b751afd124dda34076.cloudfront.net (CloudFront)
Age
19593
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
4738
X-Amz-Cf-Id
GxZWXeLO_dJEvowykEQ6pkJPMT92aES2OukdhOZ5epdWl7Qk5hg8Qg==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c601c055-fcb3-4a63-98f8-d1882e680cbc/32d6c778-320c-47c4-91cf-4508cb0d5c40/160x90/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c601c055-fcb3-4a63-98f8-d1882e680cbc/32d6c778-320c-47c4-91cf-4508cb0d5c40/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
01b4ebef3b601f246d0adbff5259fabbe7c8e0311f1169b495f0bb2b862db981

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 01:59:12 GMT
Via
1.1 997f66fda0069dac50a85c7a4fa51b7e.cloudfront.net (CloudFront)
Age
20566
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
3439
X-Amz-Cf-Id
unkdlI3pkcFN1SovoIw_VRBL3x1L1LBSa4jlRpF-1n5kZ3XBh83T3g==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/a7f317ff-8706-4af7-9f0e-9e2417e9af2d/29fd1a56-9d84-4424-bebd-e25a67a974d3/160x90/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/a7f317ff-8706-4af7-9f0e-9e2417e9af2d/29fd1a56-9d84-4424-bebd-e25a67a974d3/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
eb12eaa9c690d06187a7099545a6bf52318a2364411fc9c4ec73e7fa4ecbb0f9

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 04:15:35 GMT
Via
1.1 78c402b74e65ae12b398b6b957ab229e.cloudfront.net (CloudFront)
Age
12383
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
4223
X-Amz-Cf-Id
GEgklo9dqPmZFen26OQsjw4N6PHrLia5aww2FIj-XsGzavhc74p0OQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/7d8fd3f5-736a-4751-9741-c63476a1c55f/9e10932e-22cf-4161-8f97-7ded08968b25/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/7d8fd3f5-736a-4751-9741-c63476a1c55f/9e10932e-22cf-4161-8f97-7ded08968b25/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
2ec7b8d3c38a996f67dd4e580c975ece3e9d936d4267167d12604a59a5ff2c87

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 04:15:34 GMT
Via
1.1 18e87eada05046c231b7f49230fa6dc4.cloudfront.net (CloudFront)
Age
12384
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
3768
X-Amz-Cf-Id
GcC2uifHH51ebYktd5G3k1ylEIRc9vIMPOmbpobcvFD9X5IRFuu1qA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/3afccae7-9c97-4434-b702-84e95b2c9e9b/213e62f9-b1ab-4368-a58c-5bf046478bff/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/3afccae7-9c97-4434-b702-84e95b2c9e9b/213e62f9-b1ab-4368-a58c-5bf046478bff/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
c670b28572ed7804386b274eb1ddafbc0253a1aff515b0d15805c57c26bcee64

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 05:39:12 GMT
Via
1.1 4809763494a078a525dc1a2dff5ddf6c.cloudfront.net (CloudFront)
Age
7366
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
3870
X-Amz-Cf-Id
ozd_R4YVRMbv2e-OTjrKOVnJHUzNjD_O98sB6oYnMfqAKTq5biiuwg==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/1d764395-3566-4875-8962-a175d38af9e5/main/160x90/2m58s368ms/match/
5 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/1d764395-3566-4875-8962-a175d38af9e5/main/160x90/2m58s368ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
f598a8748bf3e022bb3b431e6a0ad2b735d99b41288d56361dc9ce63b4e4d285

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 03:50:38 GMT
Via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
Age
13880
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
4640
X-Amz-Cf-Id
nDTi_GOsoD3PQMauOwIDeUL1e4ixtb0DmSGYD1j-EgYH-POc4nIlgQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/96082f18-026e-44fb-abf1-f81e163dc2f2/cb35f38f-1826-419f-a5e0-7e1971f4c1c6/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/96082f18-026e-44fb-abf1-f81e163dc2f2/cb35f38f-1826-419f-a5e0-7e1971f4c1c6/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
71c805ad1e5135a1d4dd9fccaa913bbdaf94cc3608d9619e5b546c1b865a2c16

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 04:15:34 GMT
Via
1.1 b073c20359d711b751afd124dda34076.cloudfront.net (CloudFront)
Age
12384
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
3939
X-Amz-Cf-Id
Ebph_tATt4-Ngy2tCW-L0mQ9Ul3caB3PvdI8zHhxegm4-LGkkC7Gkw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/25c39f65-9707-4f3a-9f06-88fccdd69a43/main/160x90/4m39s829ms/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/25c39f65-9707-4f3a-9f06-88fccdd69a43/main/160x90/4m39s829ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
20cbcc1c3a0b7c92033adbeb8f6f8b0cb03067db48a19f7116b40e8f2fbf8b3a

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 03:01:11 GMT
Via
1.1 997f66fda0069dac50a85c7a4fa51b7e.cloudfront.net (CloudFront)
Age
16847
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
4586
X-Amz-Cf-Id
-HKRDCC7ppgT-ODOgf0Hzh3cdpWJ3fr7CZBT5St08-E1XtwJQi4B9w==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d0e7fead-2e5a-4562-a430-556e3516311c/e5ff9746-37c2-40c4-bb2d-10e4ec8d3ad3/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d0e7fead-2e5a-4562-a430-556e3516311c/e5ff9746-37c2-40c4-bb2d-10e4ec8d3ad3/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
9bb134ceb966cd6cbccfec7ab7dcb2fede6b0a5705e991030c0c248670d99168

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 00:17:59 GMT
Via
1.1 78c402b74e65ae12b398b6b957ab229e.cloudfront.net (CloudFront)
Age
26639
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
4103
X-Amz-Cf-Id
waSBPO8CkNTsMbVspb2BZHO1xFUIqGcSvYAS0Aw64OWKB8BkLBW_zw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c0da3834-c2d6-4c82-bef6-4ccdef7da688/911a7f6c-fc39-413a-bb28-272f6702ab8e/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c0da3834-c2d6-4c82-bef6-4ccdef7da688/911a7f6c-fc39-413a-bb28-272f6702ab8e/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
731e7bf0e3b7c8fb1978a6c04ba3940b77ce5166bd55dcc2c710baa011c517c6

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 01:35:04 GMT
Via
1.1 18e87eada05046c231b7f49230fa6dc4.cloudfront.net (CloudFront)
Age
22014
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
3945
X-Amz-Cf-Id
_cQFLRvxbZph3yIqgQ9FaOipPnG6shXZFMhgL3JCXZiR6ZyX_wmTtA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d28d35f7-16e0-4c08-9500-8257f224764a/0c968b04-c649-44ca-96b7-867f99c5e6b4/160x90/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d28d35f7-16e0-4c08-9500-8257f224764a/0c968b04-c649-44ca-96b7-867f99c5e6b4/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
de309132f417ea1f43ee235841b11e40081e1ea204cbbf29b9c896dc3350dd64

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 04:27:43 GMT
Via
1.1 4809763494a078a525dc1a2dff5ddf6c.cloudfront.net (CloudFront)
Age
11655
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
4390
X-Amz-Cf-Id
Hmg23O4-DaQkmNjmfHFd0CoPiN1DuV6sf-4TYsgAwSvneQWtULli9g==
video-arrow_right_on.gif
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/video-arrow_right_on.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c7d1ee4f5a608fa05b8f9c6cbd47e3eab7516facc3380d704b7332805877afff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 14 Mar 2014 15:55:19 GMT
server
cloudflare
etag
"9f7-4f49318b927c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
5d17fd369ee9c29a-FRA
content-length
2551
cf-request-id
0522dc96200000c29ac6032200000001
Klossner-Aug2020-cartoon.jpg
img.deusm.com/darkreading/MarilynCohodas/
374 KB
375 KB
Image
General
Full URL
https://img.deusm.com/darkreading/MarilynCohodas/Klossner-Aug2020-cartoon.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dca7bdda94eda64db8d112c477c6ac925e80ff17777ae330fd4bf390f39bf83f

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Thu, 13 Aug 2020 12:26:53 GMT
server
cloudflare
etag
"5d963-5acc16b55bd40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
5d17fd369eebc29a-FRA
content-length
383331
cf-request-id
0522dc96200000c29ac6033200000001
td_landing-page_081220.gif
twimgs.com/custom_content/DigitalIssue/
30 KB
30 KB
Image
General
Full URL
https://twimgs.com/custom_content/DigitalIssue/td_landing-page_081220.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7e934bead283231bbf24a114f2db8e95cc45a9e286a191cfaa9672d23b6a0e57

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Aug 2020 15:34:02 GMT
server
cloudflare
age
35309
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
5d17fd3698150742-FRA
content-length
30967
cf-request-id
0522dc962000000742c08c2200000001
survey_jspage.asp
www.darkreading.com/
4 KB
1 KB
Script
General
Full URL
https://www.darkreading.com/survey_jspage.asp?survey_id=130&cbust=76757
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
9531f64ef8f04e686e8e6c7ee20bc76387ea9684ece0a49e6b17df8fdf3ce746
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
br
cf-cache-status
DYNAMIC
server
cloudflare
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/html
status
200
cache-control
private
strict-transport-security
max-age=63072000; includeSubDomains
cf-ray
5d17fd366c68befb-FRA
cf-request-id
0522dc96000000befbd7210200000001
randori-special-report-coverpage.jpg
twimgs.com/custom_content/
64 KB
65 KB
Image
General
Full URL
https://twimgs.com/custom_content/randori-special-report-coverpage.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
92dd2340c0b1093f3720f56d609515bdc7ea3519bc998186d4dea577758bc459

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Aug 2020 19:36:37 GMT
server
cloudflare
age
5862
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
5d17fd3698170742-FRA
content-length
66015
cf-request-id
0522dc962000000742c08c3200000001
DR-bug.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-bug.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f30d5c0433d74c8224a2343a3c6c08468015909c22315b8693f9bdee33f48217

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 21 Feb 2014 14:56:01 GMT
server
cloudflare
etag
"5d2-4f2ebd1fb8240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369eecc29a-FRA
content-length
1490
cf-request-id
0522dc96200000c29ac6034200000001
Social-FB.png
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-FB.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fbb475f48d03815474a554d3c16599917c2fabf811e3fe2772aeabeee474aa8f

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 11 Oct 2019 04:28:57 GMT
server
cloudflare
etag
"9a2-5949af4d49440"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369eeec29a-FRA
content-length
2466
cf-request-id
0522dc96200000c29ac6035200000001
Social-Twitter.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-Twitter.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0f762bf1a58c917c1ad50006bfcd192ab55b2d01a857b7c08b6c40e3af878695

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 11 Oct 2019 12:05:31 GMT
server
cloudflare
etag
"a2c-594a155a3d8c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd36aef3c29a-FRA
content-length
2604
cf-request-id
0522dc96270000c29ac6037200000001
Social-LI.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-LI.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4bbed2de83df27dc8130644101bce3dd9ddd1c178815e42bcb49118b4a73593c

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 11 Oct 2019 12:05:08 GMT
server
cloudflare
etag
"a0b-594a15444e500"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd36aef4c29a-FRA
content-length
2571
cf-request-id
0522dc96270000c29ac6038200000001
Social-Flip.png
img.deusm.com/darkreading/
825 B
950 B
Image
General
Full URL
https://img.deusm.com/darkreading/Social-Flip.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
973ccce3f58b175a9e021c76978726083cc7e5cbed75cd0ff09ff83919934d15

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Wed, 16 Oct 2019 04:56:12 GMT
server
cloudflare
etag
"339-594ffeb7d9300"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd36aef5c29a-FRA
content-length
825
cf-request-id
0522dc96270000c29ac6039200000001
Social-RSS.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-RSS.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a0761aa1289035f3d20430d55e475043a8fa40deff221715e31068905d561753

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 11 Oct 2019 12:05:19 GMT
server
cloudflare
etag
"a73-594a154ecbdc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd36aef6c29a-FRA
content-length
2675
cf-request-id
0522dc96270000c29ac603a200000001
Whitelogo.png
twimgs.com/nojitter/img/
7 KB
7 KB
Image
General
Full URL
https://twimgs.com/nojitter/img/Whitelogo.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a8041ba3d02102bd99dcead4dcc9882c484902362927cfd598e389e930f68ceb

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Thu, 09 Jan 2020 05:04:54 GMT
server
cloudflare
age
60548
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
5d17fd3698180742-FRA
content-length
7304
cf-request-id
0522dc962000000742c08c4200000001
ubm-tech-global-app-measurement.js
twimgs.com/custom/library.gtecevent.com/assets/
55 KB
20 KB
Script
General
Full URL
https://twimgs.com/custom/library.gtecevent.com/assets/ubm-tech-global-app-measurement.js?ormzkk
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
37a0bbeac143b190eb553c9e8ebf42b7f85b1acba06883855eda085fdf155c4b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 16 Jan 2020 23:35:21 GMT
server
cloudflare
age
8572
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
5d17fd36980e0742-FRA
cf-request-id
0522dc961e00000742c08c1200000001
spacer.gif
img.deusm.com/images/
Redirect Chain
  • https://www.darkreading.com/client_pathlog.asp?p=%2Fdarkreading%2Fsection%2F314&f=%2Fdarkreading%2Fsection%2F314%2F1331490&rndserial=13317
  • https://img.deusm.com/images/spacer.gif
49 B
265 B
Image
General
Full URL
https://img.deusm.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Oct 2000 01:54:07 GMT
server
cloudflare
age
0
etag
"31-3737c29f20dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
5d17fd3afde3c29a-FRA
content-length
49
cf-request-id
0522dc98db0000c29ac6094200000001

Redirect headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
DYNAMIC
server
cloudflare
status
302
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=63072000; includeSubDomains
content-type
text/html
location
https://img.deusm.com/images/spacer.gif
cache-control
private
cf-ray
5d17fd369c82befb-FRA
cf-request-id
0522dc96200000befbd7211200000001
lightreading_rating_dot_10x7.gif
img.deusm.com/lightreading/
49 B
169 B
Image
General
Full URL
https://img.deusm.com/lightreading/lightreading_rating_dot_10x7.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Wed, 25 Sep 2013 21:21:36 GMT
server
cloudflare
etag
"31-4e73bd694b800"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
5d17fd36aef7c29a-FRA
content-length
49
cf-request-id
0522dc96270000c29ac603b200000001
twitter_intevol_18x18.gif
img.deusm.com/darkreading/
619 B
831 B
Image
General
Full URL
https://img.deusm.com/darkreading/twitter_intevol_18x18.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ebe3a0272a317857bf566a0deec42181bf0e89d280bb3143bba14da1ae1ddb10

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 09 Feb 2018 10:56:35 GMT
server
cloudflare
etag
"26b-564c561c21ec0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
5d17fd36aef9c29a-FRA
content-length
619
cf-request-id
0522dc96270000c29ac603c200000001
beacon-min.js
ins.techweb.com/beacon/js/
6 KB
2 KB
Script
General
Full URL
https://ins.techweb.com/beacon/js/beacon-min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:89d7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a290ede885635a3f7bb2b8e630bf795f15dde146fea32520b775bee1b2926ff3

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

cf-ray
5d17fd36cea30601-FRA
date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 23 Mar 2017 17:04:42 GMT
server
cloudflare
age
3775
etag
W/"6108-1490288682000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
p3p
CP='IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT'
status
200
cache-control
max-age=14400
content-type
application/javascript
cf-request-id
0522dc9638000006010b3af200000001
id
dpm.demdex.net/
362 B
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.1.2&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=77FB1CFE532B22840A490D45%40AdobeOrg&d_nsid=0&ts=1599896517881
Requested by
Host: twimgs.com
URL: https://twimgs.com/custom/library.gtecevent.com/assets/VisitorAPI.js?ormzkk
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.248.119.134 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-248-119-134.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
97386a4fc7c65d0524406aa101de0a85f9ffc9818eb7f9375f96c64d196fe495
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v081-05c144fcd.edge-irl1.demdex.com 5.78.0.20200908113611 2ms (+0ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Encoding
gzip
X-TID
2zxiRhbYQYU=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.darkreading.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
298
Expires
Thu, 01 Jan 1970 00:00:00 GMT
api.js
www.google.com/recaptcha/
791 B
578 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?onload=rcCallback&render=explicit
Requested by
Host: dsimg.ubm-us.net
URL: https://dsimg.ubm-us.net/ubm-widget/js/ubm-widget-min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
dff56217b36beb3f039af3fe14b507c4ec6600ee9f7ef7182c5ddae190406da9
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
cross-origin-resource-policy
cross-origin
content-security-policy
frame-ancestors 'self'
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
486
x-xss-protection
1; mode=block
expires
Sat, 12 Sep 2020 07:41:58 GMT
gpt.js
www.googletagservices.com/tag/js/
55 KB
19 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c9a1566a9237b6b7b03584c403452894df53d094784c5245d0d81ba353a03ce1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"630 / 430 of 1000 / last-modified: 1599862360"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
18748
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:57 GMT
id
ubmtech.d3.sc.omtrdc.net/
2 B
321 B
XHR
General
Full URL
https://ubmtech.d3.sc.omtrdc.net/id?d_visid_ver=3.1.2&d_fieldgroup=A&mcorgid=77FB1CFE532B22840A490D45%40AdobeOrg&mid=37598059817171331490799608459952513966&ts=1599896517947
Requested by
Host: twimgs.com
URL: https://twimgs.com/custom/library.gtecevent.com/assets/VisitorAPI.js?ormzkk
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
15.236.9.100 Paris, France, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-15-236-9-100.eu-west-3.compute.amazonaws.com
Software
jag /
Resource Hash
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

status
200
date
Sat, 12 Sep 2020 07:41:57 GMT
x-content-type-options
nosniff
server
jag
xserver
anedge-5bd4cfd76-pqp2q
vary
Origin
x-c
master-1347.Ibe097b.M0-443
p3p
CP="This is not a P3P policy"
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache, no-store, max-age=0, no-transform, private
access-control-allow-credentials
true
content-type
application/x-javascript;charset=utf-8
content-length
2
x-xss-protection
1; mode=block
ibs:dpid=411&dpuuid=X1x7xgAABiUdTlL0
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=42419473348105527500426479216929987933
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=X1x7xgAABiUdTlL0
42 B
915 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=X1x7xgAABiUdTlL0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.248.119.134 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-248-119-134.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v081-092cb036d.edge-irl1.demdex.com 5.78.0.20200908113611 1ms (+0ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-TID
ffsM+etcRhA=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Date
Sat, 12 Sep 2020 07:41:57 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=X1x7xgAABiUdTlL0
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
pubads_impl_2020090701.js
securepubads.g.doubleclick.net/gpt/
262 KB
92 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
sffe /
Resource Hash
22bbb6b40bd42c0475a9a999d1a60f7e16760777f89b418722efdfb9f9532996
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 07 Sep 2020 08:38:19 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
94141
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.238.139 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-238-139.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a256529bd5b1b8846f8d2536ce7581fb6cea4479992f222d01535903dff48d79

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 07:41:58 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
884
Expires
Sun, 13 Sep 2020 07:41:58 GMT
fbevents.js
connect.facebook.net/en_US/
135 KB
34 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
097afea517679d2e0b986d77cb3fe7808026882b52ca074a050e03e7a4a6996b
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
34302
x-xss-protection
0
pragma
public
x-fb-debug
drPxa0a0frhxTRjtFdY6h5uoYIedvmKOKlTIQwTGq8jLXwLGdDXwsgOGwtPRO2nVOXXd8bApxMB77dCwuu8Zdw==
x-fb-trip-id
664085054
x-frame-options
DENY
date
Sat, 12 Sep 2020 07:41:58 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
background-pattern.png
img.deusm.com/darkreading/
493 B
698 B
Image
General
Full URL
https://img.deusm.com/darkreading/background-pattern.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/styles/pano-framework.css?v1.27
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
98fb88ec226feae902fb7f98528a41db7abd7de155a6d7b65658c6ab7f2b95f4

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 21 Feb 2014 14:56:01 GMT
server
cloudflare
etag
"1ed-4f2ebd1fb8240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd369ec3c29a-FRA
content-length
493
cf-request-id
0522dc961f0000c29ac6019200000001
iribbon-logo.gif
twimgs.com/nojitter/gama/
2 KB
2 KB
Image
General
Full URL
https://twimgs.com/nojitter/gama/iribbon-logo.gif
Requested by
Host: img.deusm.com
URL: https://img.deusm.com/darkreading/informa-iribbon.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681f:40b2 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f3bd482cd3ec17583f25ad0819d1ccbcd0cdcb0fe26f8d87b7f30fd61b3dc640

Request headers

Referer
https://img.deusm.com/darkreading/informa-iribbon.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Fri, 19 Apr 2019 06:59:19 GMT
server
cloudflare
age
63734
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
5d17fd3698190742-FRA
content-length
1931
cf-request-id
0522dc962100000742c08c5200000001
integrator.js
adservice.google.de/adsid/
109 B
890 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.darkreading.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
320 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.darkreading.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
ads
securepubads.g.doubleclick.net/gampad/
83 KB
20 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1580847990478593&correlator=1807245834205599&output=ldjh&impl=fifs&eid=21067406%2C21064169%2C21067375%2C21066706&vrg=2020090701&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200912&iu_parts=2441%2Cdarkreading%2Cnetwork_perimeter_security&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=2x2%2C5x5%2C300x250%7C336x280%7C300x600%7C336x850%2C6x6%2C1x2%2C728x90%7C970x250%2C336x27%2C300x250%7C336x280%7C300x600%7C336x850%2C300x60%2C3x3%2C4x4%2C8x2%2C8x4&prev_scp=pos%3Dwelcome%26testAd%3D%7Cpos%3DTAPunit%26testAd%3D%7Cpos%3Drec1%26testAd%3D%7Cpos%3Dpromo%26testAd%3D%7Cpos%3Dwallpaper%26testAd%3D%7Cpos%3Dtop%26testAd%3D%7Cpos%3Dlogo%26testAd%3D%7Cpos%3Drec2%26testAd%3D%7Cpos%3Deventpromo%26testAd%3D%7Cpos%3Dribbon%26testAd%3D%7Cpos%3Dvideo%26testAd%3D%7Cpos%3Dnative%26testAd%3D%7Cpos%3Dinsight%26testAd%3D&cust_params=kw%3DAdvanced_Threats%252CApplications%252CAttacks%252CAttacks-Breaches%252CEndpoint_Security%26aid%3D1331490&cookie_enabled=1&bc=31&abxe=1&lmt=1599896518&dt=1599896518184&dlt=1599896517299&idt=848&frm=20&biw=1600&bih=1200&oid=3&adxs=0%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9&adys=35%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9&adks=2846549764%2C3972649441%2C273951308%2C2127200994%2C2566487286%2C3643211432%2C3011569967%2C273951311%2C780236207%2C4272952993%2C3192281568%2C2147379362%2C2601634267&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca%7Cb%7Cc%7Cd&ifi=1&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&dssz=39&icsg=64424709290&std=0&csl=80&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1600x1200%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1&msz=1600x2%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1&ga_vid=674484425.1599896518&ga_sid=1599896518&ga_hid=364934958&fws=0%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2&ohw=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0&tt_state=W3siaXNzdWVyT3JpZ2luIjoiaHR0cHM6Ly9hZHNlcnZpY2UuZ29vZ2xlLmNvbSIsInN0YXRlIjowfV0.
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
3b43fbc8252069c5e9b035da27901e2d586444c2c922100308422c48b3556526
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19870
x-xss-protection
0
google-lineitem-id
-2,5324189708,5324189708,-2,5366925059,5366923562,-2,5350135869,-2,-2,42403476,5460721674,5454835618
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2,138307618846,138312214604,-2,138317469203,138316530126,-2,138308935691,-2,-2,138212589663,138322625365,138321086638
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
cd88e5cedaac5a5053d54fc7d036fb0f.safeframe.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://cd88e5cedaac5a5053d54fc7d036fb0f.safeframe.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

/
googleads.g.doubleclick.net/pagead/viewthroughconversion/1007530244/
2 KB
1 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1007530244/?random=1599896518202&cv=9&fst=1599896518202&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=120&u_java=false&u_nplug=0&u_nmime=0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&tiba=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&hn=www.googleadservices.com&rfmt=3&fmt=4
Requested by
Host: www.googleadservices.com
URL: https://www.googleadservices.com/pagead/conversion.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a698bb252d5b3671f5a6e7d52c2f37cfdc799bdc02e434c2afa34dc1ebf03a06
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
1079
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
bat.js
bat.bing.com/
26 KB
8 KB
Script
General
Full URL
https://bat.bing.com/bat.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
5c622f5433cbb6ea1df5c0dd8671e55ef7d1464366074730473c453de50a579b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:57 GMT
content-encoding
gzip
last-modified
Thu, 16 Jul 2020 20:00:00 GMT
x-msedge-ref
Ref A: AF33F11C56A542188F2801F40FF4D2D1 Ref B: FRAEDGE1219 Ref C: 2020-09-12T07:41:58Z
status
200
etag
"0e0bdafab5bd61:0"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
private,max-age=1800
accept-ranges
bytes
content-length
8022
all.js
connect.facebook.net/en_US/
3 KB
2 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
69efca1369951fa732f5396af116c284263e13f5936340b58d7390be708639e5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
xq+DRtMJyBOR332VZq64uw==
status
200
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
1780
etag
"9d4db46d9c984161c7001c5edfed94ac"
x-fb-debug
6r8myVBvyVaq5/qAdxA9NRrc9rKJR1raemgmoFY6PhrI9LF9Z+RftYeH1nam0DF1n4veYRDzPGCaw87YCbf6JA==
x-fb-trip-id
664085054
x-fb-content-md5
e4c032b0872b4260f82100846e4dce82
x-frame-options
DENY
date
Sat, 12 Sep 2020 07:41:58 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=1200,stale-while-revalidate=3600
timing-allow-origin
*
expires
Sat, 12 Sep 2020 07:45:21 GMT
Cookie set dest5.html
ubm.demdex.net/ Frame E7AD
0
0
Document
General
Full URL
https://ubm.demdex.net/dest5.html?d_nsid=0
Requested by
Host: twimgs.com
URL: https://twimgs.com/custom/library.gtecevent.com/assets/VisitorAPI.js?ormzkk
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.248.119.134 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-248-119-134.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Host
ubm.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
demdex=42419473348105527500426479216929987933
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Wed, 09 Sep 2020 13:37:19 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=42419473348105527500426479216929987933;Path=/;Domain=.demdex.net;Expires=Thu, 11-Mar-2021 07:41:58 GMT;Max-Age=15552000;Secure;SameSite=None
Strict-Transport-Security
max-age=31536000; includeSubDomains
Vary
Accept-Encoding, User-Agent
X-TID
Koip7evXRL4=
Content-Length
2785
Connection
keep-alive
recaptcha__en.js
www.gstatic.com/recaptcha/releases/iSHzt4kCrNgSxGUYDFqaZAL9/
336 KB
132 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/iSHzt4kCrNgSxGUYDFqaZAL9/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?onload=rcCallback&render=explicit
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
854f7a7915f240546d3950dd2b067466da13c013d04a3f8c790880c58ec61151
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 08 Sep 2020 15:45:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 07 Sep 2020 04:06:55 GMT
server
sffe
age
316597
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
134800
x-xss-protection
0
expires
Wed, 08 Sep 2021 15:45:21 GMT
rss-icon.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/rss-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7bb0d75d42e3ccf1a9d1a055bcddfbc23003ed3ab75bb0eb49c05ba747bce8c9

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
4236
etag
"649-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd376ff7c29a-FRA
content-length
1609
cf-request-id
0522dc96a00000c29ac6042200000001
tw-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/tw-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
48d211ee8f54e0f314ee98a2b63e6e470b33fb1de29d326c742be16125bda71a

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
4235
etag
"56e-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd376ffac29a-FRA
content-length
1390
cf-request-id
0522dc96a00000c29ac6043200000001
flipboard-icon.png
img.deusm.com/darkreading/
425 B
550 B
Image
General
Full URL
https://img.deusm.com/darkreading/flipboard-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
22c53eeed2c33c21657590793b89fed83648ee555686c0e9ff90b39c1dab406f

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Fri, 30 Nov 2018 12:31:36 GMT
server
cloudflare
age
4235
etag
"1a9-57be0fae8ba00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd376ffbc29a-FRA
content-length
425
cf-request-id
0522dc96a00000c29ac6044200000001
facebook-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/facebook-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4e19e8f9902a8b9ec4840aaf54110d6f502c5fb500303dc605f8776c40f7fb67

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
4234
etag
"4a9-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd376ffcc29a-FRA
content-length
1193
cf-request-id
0522dc96a00000c29ac6045200000001
li-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/li-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
976aabc512994a6ecc5981a85c489d1bb242ba6734b746a964d69db615f72875

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
4233
etag
"54b-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd376ffdc29a-FRA
content-length
1355
cf-request-id
0522dc96a00000c29ac6046200000001
reb-border.png
img.deusm.com/darkreading/
331 B
614 B
Image
General
Full URL
https://img.deusm.com/darkreading/reb-border.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
523296d1a2c9a67ee707b5e0bc582f488e5786ec9b343c7b3da58a0d162d643b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Thu, 03 Nov 2016 06:29:01 GMT
server
cloudflare
age
4229
etag
"14b-5405fac56e540"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd376fffc29a-FRA
content-length
331
cf-request-id
0522dc96a10000c29ac6047200000001
nav-background.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/nav-background.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/styles/pano-framework.css?v1.27
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a6595372db2688a9dfb0991bc6cea16343042dd3caa33483b393d21a77d1c4be

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Sat, 22 Feb 2014 17:43:38 GMT
server
cloudflare
age
4237
etag
"af8-4f30247448680"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd376801c29a-FRA
content-length
2808
cf-request-id
0522dc96a10000c29ac6048200000001
nav-background-edge.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/nav-background-edge.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/styles/pano-framework.css?v1.27
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fd2f3015d1e62a6f24420652afa85f8dbce31636ea8ee86781dc794c243dec68

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
HIT
last-modified
Tue, 11 Jun 2019 06:13:41 GMT
server
cloudflare
age
3072
etag
"aeb-58b0632bf0f40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd376803c29a-FRA
content-length
2795
cf-request-id
0522dc96a10000c29ac6049200000001
BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjoa4Omb2RlV9Su1cai.woff
fonts.gstatic.com/s/robotoslab/v12/
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v12/BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjoa4Omb2RlV9Su1cai.woff
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Roboto+Slab:700
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
670aeadab801545b994fbbdf0379b3e06e37bc709b2283586915fa124ce10693
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://www.darkreading.com
Referer
https://fonts.googleapis.com/css?family=Roboto+Slab:700
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 07 Sep 2020 11:15:59 GMT
x-content-type-options
nosniff
last-modified
Fri, 26 Jun 2020 02:24:04 GMT
server
sffe
age
419159
status
200
content-type
font/woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15368
x-xss-protection
0
expires
Tue, 07 Sep 2021 11:15:59 GMT
__fpn.gif
fpn.flipboard.com/tr/
Redirect Chain
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F133...
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fperimeter%25252Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-crit...
35 B
350 B
Image
General
Full URL
https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fperimeter%25252Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%25252Fd%25252Fd-id%25252F1331490&rh=https%253A%252F%252Fwww.darkreading.com%252Fperimeter%252Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%252Fd%252Fd-id%252F1331490
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2057:9e00:14:85db:2b40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 11 Sep 2020 21:14:24 GMT
via
1.1 21da0a66bafe2c8de8be4a4d8039346b.cloudfront.net (CloudFront)
last-modified
Thu, 12 Oct 2017 18:19:12 GMT
server
AmazonS3
age
37655
etag
"28d6814f309ea289f847c69cf91194c6"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
35
x-amz-cf-id
pRBzZy2HMwVI0ul2LccrGndVVx2iEe5d3dbAalElSRq9j5ZHF4B8QQ==

Redirect headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:58 GMT
via
1.1 21da0a66bafe2c8de8be4a4d8039346b.cloudfront.net (CloudFront)
server
CloudFront
x-amz-cf-pop
FRA6-C1
status
307
x-cache
LambdaGeneratedResponse from cloudfront
location
/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fperimeter%25252Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%25252Fd%25252Fd-id%25252F1331490&rh=https%253A%252F%252Fwww.darkreading.com%252Fperimeter%252Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%252Fd%252Fd-id%252F1331490
cache-control
no-cache, no-store, must-revalidate
content-length
0
x-amz-cf-id
QxxRzlIPvCvhz49P7gPkxhDoq7jVB8lzw8CAF2ZrHMXgNRQ_z5ouQQ==
expires
Thu, 01 Dec 1994 16:00:00 GMT
dpm_8effee409c625e1a2d8f5033631840e6ce1dcb64.min.js
s.dpmsrv.com/
762 KB
86 KB
Script
General
Full URL
https://s.dpmsrv.com/dpm_8effee409c625e1a2d8f5033631840e6ce1dcb64.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.21 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-21.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d90b3087b3f870e77bcd7abb161def87f779505609b1fd6c2d42409eaf6daa34

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 11 Sep 2020 13:17:29 GMT
Content-Encoding
gzip
Last-Modified
Tue, 01 Sep 2020 21:00:19 GMT
Server
AmazonS3
Age
66270
ETag
"09b3c7be56dc60fed71ec7c716f3cc27"
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 997f66fda0069dac50a85c7a4fa51b7e.cloudfront.net (CloudFront)
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Accept-Ranges
bytes
Content-Length
87459
X-Amz-Cf-Id
x8Z859B4WM0BWeL47Edx8crdR9WCqTo8X1X__3cKUtOAtyIr4o1qyQ==
bullet.png
img.deusm.com/informationweek/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/informationweek/bullet.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9e0e2ad3a93ec78d016efee0993b5856ba9b4acafcee3aa4d6f7162f039fcce4

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
cf-cache-status
REVALIDATED
last-modified
Sat, 02 Nov 2013 00:57:26 GMT
server
cloudflare
etag
"41e-4ea272a96e980"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd3808dbc29a-FRA
content-length
1054
cf-request-id
0522dc97000000c29ac605a200000001
view
securepubads.g.doubleclick.net/pcs/ Frame 50B2
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssvmj5HwSgXoiSgUtqkbDaN7OKYeW9TuCrUref2mfyVCrjd3jERGu3Hzw5l_O4-rKamzmp-7h35bIpZjgCQl7sdjOLZUGbKLGg-Z2FhOQUU2IZTNT8I7j9lwIlzhZulwELrFJsct-MjTykoEZ3OevwbznKrD0iZ-DRFOFCHBnoymlsp272jCHywjzy-6kZwrxlR4LPzhD5OzCGlcy_VTIjl6wnhjS6z5gvCD92l-sX0u4TbHNYcXmGURS3_x-9JYhKNzDCEGKXHY94djLdiHhtKQxw3TbyJV1TmqzMzZsZOMOCA8V3Ceg&sai=AMfl-YRfydnbUOjp79LCD0vDDqN06Y5OZDsrsuHKCVaFGF1hHEXGgnaRTtm4C-qehrrU2Vs9PINfZqZMRxq8VWzNn2-IqCq_sqOSKSIicxsSYRAylecvz0neAvjwhCMtEc8&sig=Cg0ArKJSzDNdybk3gLZ9EAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:58 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 50B2
74 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
92a55cb35db6842298c40fdef3e7e6e84a243de080837cb0ec1fba94dea19513
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1599824047903655"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28764
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 50B2
295 KB
100 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
dc865bc599e784873af80d11610e625fece605a29f3b3b0d32dd10c70ca16bbf

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
last-modified
Mon, 24 Aug 2020 20:52:28 GMT
server
AmazonS3
x-amz-request-id
3RAV5SEJCG0T8HAW
etag
"081e99dc04c5a71ab4c56a39ac703934"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
accept-ranges
bytes
content-length
101896
x-amz-id-2
AZpE+X3yS7Ma3fcH5/3ZnJqVRLGCn5t2NC7WkJ8GCYckHlGm2Jj4Ym6USEPRuhMi3POIPT34Bok=
view
securepubads.g.doubleclick.net/pcs/ Frame F25E
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssFSN76ym6srm9zN1os5vcsQ7P6wthAi1mZUBuH8JH4vn1Gaz85gxlxcnVrMq2Sq59yc0rN7TphTo4ZKnNT3vz-4evH4tgZDvyYC1OOYnljuKkElcCteOtDFtST9KEr7HBw-j58lVMWkKZkIi8zbaVK5gdSuuMId4uRyXKrZBimUffYlNxslgic_V9mv8PMgdsS1kjjHCHU9E5cWob4XipdKgUHQ2_yWzgQEMXK2BKQy8E90066eBAxpoUfK3m6Y6U-Iuwb4F9nf2pJLqXlOWBsQOEFFXf3TtHaAn3NFvlJfBdT6A&sai=AMfl-YTqILr4BqcQjChh2HjukFQT0dr3AocHz0SolAyzmqJr9sbaWOX0fimEzz9PT0UbEe3nq8Mw6vMluFuMl0xt02lrbZpi-N7PQ1PA18bni8_mIRFlq2xu9WlQaH7ijmQ&sig=Cg0ArKJSzEVZ98ILS4kJEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:58 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200909/r20110914/client/ Frame F25E
3 KB
2 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200909/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
87adcd951526f566dd8a1eb655a8c4736a3bad8167f6e09a255e54650aeeb655
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 11 Sep 2020 23:35:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
29198
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1330
x-xss-protection
0
server
cafe
etag
15429208973290199181
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Fri, 25 Sep 2020 23:35:20 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame F25E
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
92a55cb35db6842298c40fdef3e7e6e84a243de080837cb0ec1fba94dea19513
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1599824047903655"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28764
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame F25E
295 KB
100 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
dc865bc599e784873af80d11610e625fece605a29f3b3b0d32dd10c70ca16bbf

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
last-modified
Mon, 24 Aug 2020 20:52:28 GMT
server
AmazonS3
x-amz-request-id
3RAV5SEJCG0T8HAW
etag
"081e99dc04c5a71ab4c56a39ac703934"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
accept-ranges
bytes
content-length
101896
x-amz-id-2
AZpE+X3yS7Ma3fcH5/3ZnJqVRLGCn5t2NC7WkJ8GCYckHlGm2Jj4Ym6USEPRuhMi3POIPT34Bok=
10313124205650561801
tpc.googlesyndication.com/simgad/ Frame F25E
24 KB
24 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/10313124205650561801
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6ff62abf29a6565c5cb35d63fe841adc82c3f786aafd7472ade313f823721e98
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 08 Sep 2020 11:35:42 GMT
x-content-type-options
nosniff
age
331576
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
24090
x-xss-protection
0
last-modified
Wed, 08 Jul 2020 13:01:21 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 08 Sep 2021 11:35:42 GMT
osd.js
www.googletagservices.com/activeview/js/current/
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
568c4d6160efabb5b61ed1d2add90083e6bef67fc9964a27310c8a135b1e077d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1599824047903655"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
27476
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
bundle.js
assets.ubembed.com/universalscript/releases/v0.178.1/
162 KB
46 KB
Script
General
Full URL
https://assets.ubembed.com/universalscript/releases/v0.178.1/bundle.js
Requested by
Host: 6600d6d98e534115970f9529a45f3195.js.ubembed.com
URL: https://6600d6d98e534115970f9529a45f3195.js.ubembed.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.26 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-26.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
df25786bc3951d78d0f763a2a75a1f33b01b8ae2a5157831d2cf4d0348c2ede7

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 02 May 2020 23:46:50 GMT
content-encoding
gzip
last-modified
Wed, 11 Dec 2019 22:14:50 GMT
server
AmazonS3
age
11433309
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
x-amz-cf-id
V6P4b6moyQ0OGwxo5jwOqjJaegMSyUpeuIl0EZfvD45pTP7PqB7wJA==
via
1.1 997f66fda0069dac50a85c7a4fa51b7e.cloudfront.net (CloudFront)
view
securepubads.g.doubleclick.net/pcs/ Frame B014
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuEQDmQcjlRneltAUuCPNQjb9pyuSq-GOjwlXDpiwTvoxCtPqo200_fAJoKw9nGAiS6XLcl378GX0AJNFhYFS5vQeXzLRjagH9gaTxzICnTeDj1VxNQVGzDA_NGQJg6zgz6VRRYNLhqw0mZfj-tVu6e5OwA-EIhdwCRTwgC5cIFHgW_BuyRe6vaEq9N7spqv9kHzDYkCxjawOCB02Xh71IhQ1erALrJTYq8Qa2w51n2FbniRBo1YVMBiq30DOwcIO_xMuDW1k3xgwR0j7pM8ZpBlPURyYwtWZ686t8BJAnYLe-f&sai=AMfl-YRHRw0HMPErvdSkNc_NFodaM5JJ8gHr-Zz4aYug552qG11wWDGhGJu1yDLSCMUfUJr8Bg4UVl49EDbzsgsSdhs7N5V_HjP94dXrcVrOv3W274O7qoIMdPCirNczFqw&sig=Cg0ArKJSzIH-dg57wWk1EAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:58 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame B014
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
92a55cb35db6842298c40fdef3e7e6e84a243de080837cb0ec1fba94dea19513
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1599824047903655"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28764
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame B014
295 KB
100 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
dc865bc599e784873af80d11610e625fece605a29f3b3b0d32dd10c70ca16bbf

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
last-modified
Mon, 24 Aug 2020 20:52:28 GMT
server
AmazonS3
x-amz-request-id
3RAV5SEJCG0T8HAW
etag
"081e99dc04c5a71ab4c56a39ac703934"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
accept-ranges
bytes
content-length
101896
x-amz-id-2
AZpE+X3yS7Ma3fcH5/3ZnJqVRLGCn5t2NC7WkJ8GCYckHlGm2Jj4Ym6USEPRuhMi3POIPT34Bok=
view
securepubads.g.doubleclick.net/pcs/ Frame 3D5E
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu8WMc57GfM-agH-xBPcq2sdwSKS4SCPyIfegDBu9ZkJ9etyzqcpW33kVERuebuBv8DRKfoODB1P8s3DoKp-LfHmO_ANuxWEu6_p_Iqo2vWibJHIIEDRVfd2hq79PaDJUbynAD7I2GHh6iGLbdeum9b48z726NYW_rvcun_OMEO5bGFF2VYoL72aIBUuUOUX3ljDeJ8Jhs1t2bv_NRJ5M3Q4U_VqosJ8733-Q-AK088o5w_KCI0CTp-fzsVo_5Qmb1kcfwd2wjZ5i7LGT2EwDXolByn0XHVJgRWdKiKtHY4&sai=AMfl-YTy-4PcMnjPlb8rw6NmviQBe1PJVQ8jy-7GAb04EOPg9lIfcgZRxFqTK4V9BPNGT4dguCFt32OTNWeVvx6gbu0S7WOlZedj75iE4LJcRkPGyAv-3lKUMwWd0iaOtQ8&sig=Cg0ArKJSzGXx8XRD2fM2EAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:58 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200909/r20110914/client/ Frame 3D5E
3 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200909/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
87adcd951526f566dd8a1eb655a8c4736a3bad8167f6e09a255e54650aeeb655
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 11 Sep 2020 23:35:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
29198
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1330
x-xss-protection
0
server
cafe
etag
15429208973290199181
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Fri, 25 Sep 2020 23:35:20 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 3D5E
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
92a55cb35db6842298c40fdef3e7e6e84a243de080837cb0ec1fba94dea19513
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1599824047903655"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28764
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
l
www.google.com/ads/measurement/ Frame 3D5E
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaRyO7W2kErgEezzaRF7lFMBrMrcbdOOEnJQ2o7Ge3lkCOOq1-3Kxg_R2NYCB3GcOXsJMIyG
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:814::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 3D5E
295 KB
100 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
dc865bc599e784873af80d11610e625fece605a29f3b3b0d32dd10c70ca16bbf

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
last-modified
Mon, 24 Aug 2020 20:52:36 GMT
server
AmazonS3
x-amz-request-id
340D45A9577B06E9
etag
"081e99dc04c5a71ab4c56a39ac703934"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
accept-ranges
bytes
content-length
101896
x-amz-id-2
Zvu75UdOWmU4juLyHPhyw25AtrmdqMAsggVlpW06cfuEZ0jCSyfPkOwh+GWEs42K6IeqKjdyLHM=
14179621541502530401
tpc.googlesyndication.com/simgad/ Frame 3D5E
90 KB
90 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/14179621541502530401
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
cd199b07e569b1eaaa2cfb7140e1db1bebbc6f1e87c9d8c8dbe1fdc61fb0696e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 10 Sep 2020 20:45:08 GMT
x-content-type-options
nosniff
age
125810
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
92228
x-xss-protection
0
last-modified
Thu, 20 Aug 2020 18:04:04 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 10 Sep 2021 20:45:08 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 5AFF
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstrNiBON8ltZL6gN9bm2JgEOXU0_w-1WHiUZg_pWnN1aFZoLE9gCXGWunEFktgQzNHpOWRegwxcbmMtwSqpycIJ0A3Z0piDW5TYMJBbCwF-uU4cGYkdsdKWVKFp_-fnuCk3rjUS5oxG5SruNhImSGUEOTUNjrvpvawEY_F3OYVssz_Bheaa9DmFTMV77I32HmU1Ok1-WcnOHwGlSILssrnTLq02I5wxx3votTnjghgvDpLnw6Iw1ZOhNe4mZpoWEyDGkpdZTbuee9YGKyib8IFwPYONI7p_ar5PdAUMpqLd&sai=AMfl-YSX2BPWU_8kV6fuf9cSNUjji6_y5rTJf6cmRMyRtLLLQSiDn2YYwyO_oEKIl9Pfs8CdHhpAeZ36M4tLnpDPkD2P1Zb_dhGKaySbhtqO3Xwz2KqVqWLJJfpfqCiwaP0&sig=Cg0ArKJSzMI40JNlR4DHEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:58 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 5AFF
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
92a55cb35db6842298c40fdef3e7e6e84a243de080837cb0ec1fba94dea19513
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1599824047903655"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28764
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 5AFF
295 KB
100 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
dc865bc599e784873af80d11610e625fece605a29f3b3b0d32dd10c70ca16bbf

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
last-modified
Mon, 24 Aug 2020 20:52:28 GMT
server
AmazonS3
x-amz-request-id
3RAV5SEJCG0T8HAW
etag
"081e99dc04c5a71ab4c56a39ac703934"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
accept-ranges
bytes
content-length
101896
x-amz-id-2
AZpE+X3yS7Ma3fcH5/3ZnJqVRLGCn5t2NC7WkJ8GCYckHlGm2Jj4Ym6USEPRuhMi3POIPT34Bok=
view
securepubads.g.doubleclick.net/pcs/ Frame 8F76
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsspZfBtHrKtBv_kFsjjpywtH4pcN8yHkgZ6FZu2revLDyQNOgdJedvz0ewxsPOtOAnz1-KSWnaNYxwpOOIv-Yx18eNQ1OLAyU_wQjPaZcyBOhOwhP_yctINV135kSADCXbVM2IzYahBBj2hyH8H1hEa1jJdAyV0gcjkQ_jdMNK39hGcBIGYGDXaMjZI4TPiKUJziuu3Nw55zO2b_mw2hv2OY8v_dmI7JgoMaXM95w9rtJuBEO4DfHSCDrbLxB0W01CDHPWxpDxHnTyW6e6TjcLWCOgoUoYJUx8Pwn9k_qzt&sai=AMfl-YQOYDB9NkVIA_8g4oe4tZKPAN3ebbpaT-Ttgg6VY7xAsy-w0Tp8hPk6wwpm1SQkiaq_1wOvUtXCZt1DIZdx17EuFn1rb49-mT1BUTjeiN6Vcl72OyiXAXTys-EucMU&sig=Cg0ArKJSzJm54-EB-fq2EAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:58 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200909/r20110914/client/ Frame 8F76
3 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200909/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
87adcd951526f566dd8a1eb655a8c4736a3bad8167f6e09a255e54650aeeb655
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 11 Sep 2020 23:35:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
29198
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1330
x-xss-protection
0
server
cafe
etag
15429208973290199181
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Fri, 25 Sep 2020 23:35:20 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 8F76
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
92a55cb35db6842298c40fdef3e7e6e84a243de080837cb0ec1fba94dea19513
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1599824047903655"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28764
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
l
www.google.com/ads/measurement/ Frame 8F76
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaQlZIYcrQjYeDTnaLfBmH1MzOih3ABCq77oIXKjH_C0qY0KuAC22gxlqUK0iO3Xppt-rfc-
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:814::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 8F76
295 KB
100 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
dc865bc599e784873af80d11610e625fece605a29f3b3b0d32dd10c70ca16bbf

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
last-modified
Mon, 24 Aug 2020 20:52:28 GMT
server
AmazonS3
x-amz-request-id
3RAV5SEJCG0T8HAW
etag
"081e99dc04c5a71ab4c56a39ac703934"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
accept-ranges
bytes
content-length
101896
x-amz-id-2
AZpE+X3yS7Ma3fcH5/3ZnJqVRLGCn5t2NC7WkJ8GCYckHlGm2Jj4Ym6USEPRuhMi3POIPT34Bok=
16304094160278446494
tpc.googlesyndication.com/simgad/ Frame 8F76
64 KB
64 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/16304094160278446494
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f77ad10a049dc9fdbb57aa36aad65ec6e0702349a1525f18ed065bad0997c443
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 10 Sep 2020 13:28:17 GMT
x-content-type-options
nosniff
age
152021
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
65154
x-xss-protection
0
last-modified
Thu, 21 May 2020 21:43:51 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 10 Sep 2021 13:28:17 GMT
832000476880185
connect.facebook.net/signals/config/
524 KB
132 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/832000476880185?v=2.9.24&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
31d6a6f1d85f1a1f717b72079a1b5f534284429b0ab88da33bb6eec38fa5b890
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
134953
x-xss-protection
0
pragma
public
x-fb-debug
Dc4S8LtEipM+vxjhBK0jtRVQqxQVBSK6bBtDNW7Aa6xNHwZ9Bf9KeVCuwZU037e4KFsqaFxIJAqx2VVUzTgYuQ==
x-fb-trip-id
664085054
x-frame-options
DENY
date
Sat, 12 Sep 2020 07:41:58 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
/
www.google.com/pagead/1p-user-list/1007530244/
42 B
297 B
Image
General
Full URL
https://www.google.com/pagead/1p-user-list/1007530244/?random=1599896518202&cv=9&fst=1599894000000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=120&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&tiba=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&fmt=3&is_vtc=1&random=1466347975&resp=GooglemKTybQhCsO&rmt_tld=0&ipr=y
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:814::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:58 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/1007530244/
42 B
560 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/1007530244/?random=1599896518202&cv=9&fst=1599894000000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=120&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&tiba=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&fmt=3&is_vtc=1&random=1466347975&resp=GooglemKTybQhCsO&rmt_tld=1&ipr=y
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:58 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
all.js
connect.facebook.net/en_US/
194 KB
59 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js?hash=727f0c2b22092f3569f64ec9b92bfd1d&ua=modern_es6
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
f46875e915b2916fcfb3fc2f62a3eabf7ce5340e87a39507c03cd29668451ed6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Origin
https://www.darkreading.com
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
UZHCFaD2tV2d+LkAOzsJ7g==
status
200
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
59869
etag
"3a3eb42bc76953eb3b4ed783ecaf5a4d"
x-fb-debug
5qPsCO+KOJxKtAuJZato3MXVWoj5Y24eg3nFRkJiHZMYxWQOtFfV1+QkrFQVjw/H3te8aF0KINHfXKef9snheA==
x-fb-trip-id
664085054
x-fb-content-md5
5cd12aaa4ba9b489a867254c7a0ba647
x-frame-options
DENY
date
Sat, 12 Sep 2020 07:41:58 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
timing-allow-origin
*
expires
Sun, 12 Sep 2021 06:48:54 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005435&ns__t=1599896518534&ns_c=windows-1252&cv=3.5&c8=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&c7=https%3A%2F%2Fwww.darkreading....
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1599896518534&ns_c=windows-1252&cv=3.5&c8=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&c7=https%3A%2F%2Fwww.darkreading...
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1599896518534&ns_c=windows-1252&cv=3.5&c8=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&c9=&cs_ak_ss=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.238.139 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-238-139.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:41:58 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1599896518534&ns_c=windows-1252&cv=3.5&c8=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&c9=&cs_ak_ss=1
Pragma
no-cache
Date
Sat, 12 Sep 2020 07:41:58 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
DR-hot-topics-comment.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-hot-topics-comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/styles/pano-framework.css?v1.27
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9182e8a1e20a5437d2f311b096b2a98a33d54e94d4d9d6d01c5db3861460d04e

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 21 Feb 2014 14:56:02 GMT
server
cloudflare
etag
"4a5-4f2ebd20ac480"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd390a7bc29a-FRA
content-length
1189
cf-request-id
0522dc97a30000c29ac6063200000001
0
bat.bing.com/action/
0
147 B
Image
General
Full URL
https://bat.bing.com/action/0?ti=5476211&Ver=2&mid=9b60368f-6d0c-1aea-9ec7-4e6d22184e12&sid=235434001c7d6509b0643cf22a6eea9d&vid=5f7d7bd9fd0b0a8ca952f11169da5ab1&vids=1&pi=0&lg=en-US&sw=1600&sh=1200&sc=24&tl=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&p=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&r=&evt=pageLoad&msclkid=N&sv=1&rn=25454
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Sat, 12 Sep 2020 07:41:57 GMT
cache-control
no-cache, must-revalidate
x-msedge-ref
Ref A: 17E9C5241F8149C49259F4A6E6114C2E Ref B: FRAEDGE1219 Ref C: 2020-09-12T07:41:58Z
access-control-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
web.js
ads.celtra.com/9be726cc/ Frame 5AFF
14 KB
5 KB
Script
General
Full URL
https://ads.celtra.com/9be726cc/web.js?&clickUrl=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjstK6j_IpOmMgZ2N5o-IR2bGwLM5dp6vcqZtLX_Ke8HuImxXnQd_UghEMKYda7tt2-GY4u368mbgPOBWRBmd_fEsfKt0tIdisrmEtcloduBe0X5E9lvi439xlzTYQ8d_aj43r9vcqeU_qUPzXdy7S-9OHFjofHjPJ71_GszrJHxNTpEEIM_B1RYJuQXX2X2lxoCcs_YUfB44aVE-aqFTDLPM242ZqmfyWIiv4AoFZjmuXCzaF6Enc_IMZc8M2wSmvsz8LiiUSzRnqp4S_p22nFtdBZUUBzkN3DRpqi9T%26sai%3DAMfl-YQKmYTAkItgywI4Bkq70Qq-awCV3ygaHoDpRoB7CfZVtNmHF1EGSXcqn-On7ZoTRxjnK9v_cDXHsRMpoZh3FVsEnu3y65Y8iju1rcxAF6VKB_lqCKWwsFlxgGDluF4%26sig%3DCg0ArKJSzJbYs3IXruvkEAE%26urlfix%3D1%26adurl%3D&expandDirection=undefined&clickEvent=advertiser&iosAdvId=&androidAdvId=&externalAdServer=DFPPremium&tagVersion=html-standard-7&eas.JWVjaWQh=138307618846&externalCreativeId=138307618846&externalPlacementId=43877916&externalSiteId=27868836&externalSiteName=darkreading.com&externalLineItemId=5324189708&externalCampaignId=2676539655&externalAdvertiserId=4854677916&scriptId=celtra-script-1&clientTimestamp=1599896518.58&clientTimeZoneOffsetInMinutes=-120&hostPageLoadId=02474183084811754
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.157.88.25 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-157-88-25.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
f9f7db3044919596c2907ba0df9387910d5e9e6a51b539162a005dfec82daee7

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
Content-Type
application/javascript; charset=utf-8
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
4716
Expires
0
NL-button.png
img.deusm.com/informationweek/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/informationweek/NL-button.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/styles/pano-framework.css?v1.27
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b5688f8b168e06251901442c4f2f72b30c4477cb472833cde7979a8dca0a862

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
cf-cache-status
REVALIDATED
last-modified
Fri, 08 Nov 2013 15:09:43 GMT
server
cloudflare
etag
"9c6-4eaabc5a3dbc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd393ad1c29a-FRA
content-length
2502
cf-request-id
0522dc97c30000c29ac6065200000001
view
securepubads.g.doubleclick.net/pcs/ Frame F25E
0
21 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv7H3ZFr6eXe8B0r8LMOzfcy0apVW5WrGVeeEWF4u6kwKBkHM3O9qEP39IFEOiKgXRivPQ7gTu7SDYsRyNakq1sTntXGAFqZgKraLB5U-AOXQhI4_Xjo7f-j3CDFGwTIZHjcI2DrL8uI9eh8cP5pAFS9kh_z00UZR8XI-pgTfxDhJiZnH3TBKG0fwSPTiGaEUxfF0oaOULIGA1ywScu_00c5VqSzTJIHVvFk2SIGo9WkT120yM3runJegbBYO_sUeYb2F447WOWKA4rCleYhAV5IZU8wEv9pWVISOIDSkhyEI1L-_Ch&sai=AMfl-YQfP4y6tEL19-M5zE_xonFlJFToQBOiryYQCgV6MTlgdK8PJ1vyfycJBEoN4bxit7Akqm1LlD8hQIVHr_d2pC7_z_ly0V6yXUoxTeUN9ZtppaK-VsCd53spG9OH_Bs&sig=Cg0ArKJSzIsZA33OU95oEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:58 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
view
securepubads.g.doubleclick.net/pcs/ Frame 3D5E
0
21 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu5338pJDDPrbfa_TJYlCkC0DNFQEs-CKfrowJYnuljXS_lkH1xDNHzlnl4JuNpe3Vw8dVOcmX4-LztBOYuIK2Yt2MZ7MKYJzUz_q0lRJkuIrayNKUXFiC7bZZceljbMqZ_npE6uYRB0xSU4RVk_XxMPioqOwouRcIy8Tu46OlPK-x2miXC9FvwHt8eFRGTUwwYnpe0wy4B2GnsW0Jxrbgjg5W0Op_RhZYt58L8mZhTgNr4KAfYphS4jZ0r_vGM-fEufLSJbMCRs68cOwvgztBZm7fllc6lFMduWrPam728VDU&sai=AMfl-YQbG2nUhAdQK8Y5mQyA2UVKJs79ougP9xIIjMYZBt9mGfWUPXQUH1mwIqiupA6ZcsPWD-PVht-HclzL6JOq6-G73yochGFYvcpMcqlO-dVLbnB-dBjO7OQpiB_SXIA&sig=Cg0ArKJSzPVfOoZNCikHEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:58 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
view
securepubads.g.doubleclick.net/pcs/ Frame 8F76
0
21 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssRKql1BLFME5BeaqtxqDg6kGJZO7ACUYjkuJDucNrno7MY_SVw_TzwT3kbFHG7OhPBXXHwNhCtB7tLlqvYAwVfl9CmDY29p2q7tFoJziKNibk2eYnsqppOs_Y97LmOnATjtznJ5_nTj_fugKrjJ-Gu1jv6eTahnA47fTKLTMDiMjiyvXg1Q_FeeA-HvpbKqkwRwIfIX0zkKmrHpWhmGHPqeykDye1cJFmk5c7SbkL5ixkxPWu-HjZMX1L0GKznT8ZWc_kOt1si6hUThjZJFN02CjH_wHttoLW5Uhi0DODFUno&sai=AMfl-YSLmE7xaCevHM4P9IuQli9sfxk-tt6tT17hcwQT81p4tgNb8zfZhnV34QcOF5lAOxwCIaDyrfbHjVR9sE-FfXFBQq6_G_yRdgtH9QpBqfp-MkuTVdz3iE_J71kXjdg&sig=Cg0ArKJSzI3P17Y5ijmoEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:58 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
truncated
/ Frame 50B2
219 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
199910b487d552a27409368e9d09ff0f451ae32c01016e3cfbc2539a132c0996

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame F25E
219 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6984a1b18762d1d5d17fdae986554afdfe6f358d6a307a4696471cdb4a7f29b3

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 3D5E
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9ee43447c1f959452480fe17087f6a5498e41654ef13d45ed8fb60900472ea5a

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 5AFF
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
14f8abc15d4dc53328a3e67ffabd105664d33476e680da33171a07e4d20c20f1

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 8F76
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d8211d90e9a86c075d471349268b01c8b65cfe9dd1dd09e18bf413b6930d1067

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 20EF
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuuKuGFFGOJ0CqjWjOF1dZ-w5BCNK26U3TCf_zGSRWXc-CLaWqa87co5HbWwRMxRKiC7gkz-xFcB6G0ROWx3bjmFrfLmxLNZMOSfzHH1huV7tXVysCNe1HnvFZ81p4Nild9yoPD_njr4RFL20B_gXqZlyQ9zZp4YFf2s3l3o8gVjjLkMfEhylZwSqrTw-71Wf_Hy-12lXc3VUn2WwSKcOYpQ26D6_sooYV0Ry9d3iGtZMio7d-_e0P0kIrHnGTMHDzVVxthZATrmGN7247NoY6G0k6LNwK--DFDtRV1sVUU&sai=AMfl-YQ30pRzo9-2GsPxGKKLqyt5abT5aRA9kEGP35RSbEt6c9XiY7gHWVxoRJv4PkqEUmwGvOjEXL1zYKdPPvUiZzTchciRAJnyx1Lrvcl2AUDxeZfuXJMQ0esmslUGMs4&sig=Cg0ArKJSzK7q3mqc7WmHEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:58 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200909/r20110914/client/ Frame 20EF
3 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200909/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
87adcd951526f566dd8a1eb655a8c4736a3bad8167f6e09a255e54650aeeb655
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 11 Sep 2020 23:35:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
29198
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1330
x-xss-protection
0
server
cafe
etag
15429208973290199181
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Fri, 25 Sep 2020 23:35:20 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 20EF
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
92a55cb35db6842298c40fdef3e7e6e84a243de080837cb0ec1fba94dea19513
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1599824047903655"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28764
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:58 GMT
l
www.google.com/ads/measurement/ Frame 20EF
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaSTmIShW3jThUX_C9U-AtAhU5xWV7ohJTd9bMAcyEK3AJuEM7Lpt9N28CCrGTW2KtQB3hkI
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:814::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 20EF
295 KB
100 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
dc865bc599e784873af80d11610e625fece605a29f3b3b0d32dd10c70ca16bbf

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
content-encoding
gzip
last-modified
Mon, 24 Aug 2020 20:52:28 GMT
server
AmazonS3
x-amz-request-id
3RAV5SEJCG0T8HAW
etag
"081e99dc04c5a71ab4c56a39ac703934"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
accept-ranges
bytes
content-length
101896
x-amz-id-2
AZpE+X3yS7Ma3fcH5/3ZnJqVRLGCn5t2NC7WkJ8GCYckHlGm2Jj4Ym6USEPRuhMi3POIPT34Bok=
919854872814247425
tpc.googlesyndication.com/simgad/ Frame 20EF
247 KB
247 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/919854872814247425
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f4539aa5670a5ca84f183d2057a22e7ccabefc8e745687b061cda4701fba3dbf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 05 Sep 2020 08:37:27 GMT
x-content-type-options
nosniff
age
601471
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
252808
x-xss-protection
0
last-modified
Thu, 16 Apr 2020 18:02:41 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 05 Sep 2021 08:37:27 GMT
truncated
/ Frame B014
220 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e0aa850563dc4c8c4e8ae368cdd6f68c4fc285d8d01f2753c9003dd948d7a6cc

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
index.php
a.dpmsrv.com/dpmpxl/
Redirect Chain
  • https://ib.adnxs.com/getuid?https://a.dpmsrv.com/dpmpxl/index.php?id=$UID&q%3DxImp%26v%3D1.x%26cl%3D55%26pixelIndex%3D0%26r%3D512369%26tzOffset%3D-120%26url%3Dhttps%253A%252F%252Fwww.darkreading.co...
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fa.dpmsrv.com%2Fdpmpxl%2Findex.php%3Fid%3D%24UID%26q%253DxImp%2526v%253D1.x%2526cl%253D55%2526pixelIndex%253D0%2526r%253D512369%2526tzOffset%253...
  • https://a.dpmsrv.com/dpmpxl/index.php?id=875984478630338109&q=xImp&v=1.x&cl=55&pixelIndex=0&r=512369&tzOffset=-120&url=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch...
242 B
993 B
Script
General
Full URL
https://a.dpmsrv.com/dpmpxl/index.php?id=875984478630338109&q=xImp&v=1.x&cl=55&pixelIndex=0&r=512369&tzOffset=-120&url=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&_=1599896518742
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.229.100.58 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-229-100-58.compute-1.amazonaws.com
Software
/
Resource Hash
c518a654b4eddd4e07cb608a93e468590482404afab140a361e5d39eb8a8369c

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
content-encoding
gzip
Access-Control-Max-Age
10
Access-Control-Allow-Methods
GET, POST, PUT, DELETE, OPTIONS
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
text/javascript
Access-Control-Allow-Headers
content-type, accept
Content-Length
217
Expires
0

Redirect headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:41:59 GMT
X-Proxy-Origin
185.156.175.107; 185.156.175.107; 729.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.222.241:80
AN-X-Request-Uuid
1bc69120-869b-4bb8-8ff9-b5a930bdb022
Server
nginx/1.17.9
Access-Control-Allow-Origin
*
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Location
https://a.dpmsrv.com/dpmpxl/index.php?id=875984478630338109&q=xImp&v=1.x&cl=55&pixelIndex=0&r=512369&tzOffset=-120&url=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&_=1599896518742
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
/
www.facebook.com/tr/
44 B
377 B
Image
General
Full URL
https://www.facebook.com/tr/?id=832000476880185&ev=PageView&dl=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&rl=&if=false&ts=1599896518844&sw=1600&sh=1200&v=2.9.24&r=stable&ec=0&o=30&fbp=fb.1.1599896518843.2094319517&it=1599896518529&coo=false&rqm=GET
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:58 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
44
expires
Sat, 12 Sep 2020 07:41:58 GMT
status
www.facebook.com/x/oauth/
0
0
Fetch
General
Full URL
https://www.facebook.com/x/oauth/status?client_id=640989409269461&input_token&origin=1&redirect_uri=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&sdk=joey&wants_cookie_data=false
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=727f0c2b22092f3569f64ec9b92bfd1d&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
x-fb-debug
uPXcwAUbfolYbTna8NTezn13SOPA0E8ZTIAX4IRpzpX0wYYN93CQiQqxnq4WGUmxiP5FsWmrZ8Ghgdc+ICA6SQ==
fb-s
unknown
status
200
date
Sat, 12 Sep 2020 07:41:58 GMT
strict-transport-security
max-age=15552000; preload
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.darkreading.com
access-control-expose-headers
fb-s
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
0
x-content-type-options
nosniff
expires
Sat, 01 Jan 2000 00:00:00 GMT
tag.aspx
ml314.com/ Frame 50B2
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?1282020
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/pentonmedia53440730609/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.248.181.236 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-248-181-236.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
c293a28e23c66b27bd04bc1742f3aab0ebf6c382961c1e83140f035a08ea5e5d

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 07:41:58 GMT
Content-Encoding
gzip
Last-Modified
Sat, 12 Sep 2020 06:44:40 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=82961
Connection
keep-alive
Content-Length
11932
Expires
Sun, 13 Sep 2020 06:44:40 GMT
n.js
geo.moatads.com/
113 B
288 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1599896518960&de=507637044668&m=0&ar=2ab45f8-clean&iw=0e7324d&q=2&cb=0&ym=0&cu=1599896518960&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4590849068%3A2692438704%3A5366925059%3A138317469203&zMoatPS=wallpaper&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&bo=27868836&bp=43877916&bd=wallpaper&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1902%3A2149%3A0%3A0&iq=na&tt=na&fs=184513&na=1725601791&cs=0&callback=MoatDataJsonpRequest_39734190
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/pentonmedia53440730609/moatad.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.147.18 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-194-147-18.eu-west-1.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
f98db884896fc1718bb97cda45f9891da0f12e66a017fcf4207730bfc36af1b6

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
server
TornadoServer/4.5.3
etag
"cc27033fcd625492f26daad856b66080a4af7c15"
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=900
timing-allow-origin
*
content-length
113
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1599896518960&de=507637044668&m=0&ar=2ab45f8-clean&iw=0e7324d&q=3&cb=0&ym=0&cu=1599896518960&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4590849068%3A2692438704%3A5366925059%3A138317469203&zMoatPS=wallpaper&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&bo=27868836&bp=43877916&bd=wallpaper&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1902%3A2149%3A0%3A0&iq=na&tt=na&fs=184513&na=1344602683&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:59 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:41:59 GMT
spacer.gif
img.lightreading.com/images/
49 B
365 B
Image
General
Full URL
https://img.lightreading.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
99.86.2.56 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-2-56.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 01:57:49 GMT
via
1.1 c275031486c6f7b744b8d30847e98b14.cloudfront.net (CloudFront)
last-modified
Fri, 20 Jun 2014 19:05:53 GMT
server
AmazonS3
age
20651
etag
"4909631c93ffa90e65247e3fd4454f2d"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
49
x-amz-cf-id
frcxMV7X9DBuj3VeuzJQsX7SbOzM49bvYmckgCNjJamxcszGXYnQRg==
view
securepubads.g.doubleclick.net/pcs/ Frame 20EF
0
44 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvtZE4ZHhy5ca1rfAcqjrM63irJ__EeuGRYk8Q-qIYnpFqJp5TNpvskj5FsBj2xCIdzUwe5zWJ8kcrTSFIrvwTDjaKCN57rvkjgkLynpji3jWDsfqANb_-Kk6pRLdYliIrksZzI7b4C87JZepGr9laFDje0QwZXdq61L9SnSckc3Ly43JcahiNVovA0857ivEBt7jRu-6vm9Yv3A9JD9mf_h9e3OIdiLhYuF6XGlR5nV0lDG04yiIFG1xowe-0r9ZrJj5v0yH78YO7wTfwdwRZuGagRWH-UdbaMDs1WRhYn960&sai=AMfl-YTGXlBr_mziXazRZBi-hb00qktrOUBl3NEkLuLoNFSxbfDuBDDLr5Os8bNcVW3L-YU2hmUyNamOCPY6bQXojBYmAHZL62TTI0i6fkfATw-kn9SSWEM5dvCmSAeXjLY&sig=Cg0ArKJSzHyFgfbxU7SeEAE&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
view
securepubads.g.doubleclick.net/pcs/ Frame B014
0
21 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjst2EBxNJcoSUP-sQ7Q3y5ySgbTd1eB3okbeSc1xyJHCMghLxgTkUzfaYhJrkfh1wEvdy0AncCX1fx1osrbYnCW_GiV9Vh-u0_pKhSkxucXIB_1DVpY_iof7FQXhMq9riHZVEVCq0A66oIaZ5hx2CfxRp0Twkj_Z_QaIM6NAycunb6YiCPwZA_CLSk_puXAgMu6sk-msGOrMurHIezLYMZPYEj5-DHbc76qRdfZwMWoocAOl9d5XJpBDUHz4DOMqpfWp-7dTrNY4AXPlMHfKaNYLQZU7BUUYl-P221tkY4mqkurFrlw&sai=AMfl-YQAbE_cvnCnQ07gpLATSvBKY-YBJwd65wCIxPfVPrHlQuIOUQBV6CC0PosS2W855ayfbwuuCm1x229-gg8fJZX8hxolQ35RzrE90720jITwIjK737kBTFoG5epZVNQ&sig=Cg0ArKJSzHFj5z17TvBvEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
truncated
/ Frame 20EF
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b8216ca3654fbe70123a3e40b9bb54075728dd060306647ce0f862d7e83295c6

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
web.js
cache-ssl.celtra.com/api/creatives/48fdc269/compiled/ Frame 5AFF
655 KB
133 KB
Script
General
Full URL
https://cache-ssl.celtra.com/api/creatives/48fdc269/compiled/web.js?v=13-a6fb4d4584&secure=1&cachedVariantChoices=W10-&eventMetadataExperiment=newMeta&inmobi=0&adx-in-banner-video=1
Requested by
Host: ads.celtra.com
URL: https://ads.celtra.com/9be726cc/web.js?&clickUrl=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjstK6j_IpOmMgZ2N5o-IR2bGwLM5dp6vcqZtLX_Ke8HuImxXnQd_UghEMKYda7tt2-GY4u368mbgPOBWRBmd_fEsfKt0tIdisrmEtcloduBe0X5E9lvi439xlzTYQ8d_aj43r9vcqeU_qUPzXdy7S-9OHFjofHjPJ71_GszrJHxNTpEEIM_B1RYJuQXX2X2lxoCcs_YUfB44aVE-aqFTDLPM242ZqmfyWIiv4AoFZjmuXCzaF6Enc_IMZc8M2wSmvsz8LiiUSzRnqp4S_p22nFtdBZUUBzkN3DRpqi9T%26sai%3DAMfl-YQKmYTAkItgywI4Bkq70Qq-awCV3ygaHoDpRoB7CfZVtNmHF1EGSXcqn-On7ZoTRxjnK9v_cDXHsRMpoZh3FVsEnu3y65Y8iju1rcxAF6VKB_lqCKWwsFlxgGDluF4%26sig%3DCg0ArKJSzJbYs3IXruvkEAE%26urlfix%3D1%26adurl%3D&expandDirection=undefined&clickEvent=advertiser&iosAdvId=&androidAdvId=&externalAdServer=DFPPremium&tagVersion=html-standard-7&eas.JWVjaWQh=138307618846&externalCreativeId=138307618846&externalPlacementId=43877916&externalSiteId=27868836&externalSiteName=darkreading.com&externalLineItemId=5324189708&externalCampaignId=2676539655&externalAdvertiserId=4854677916&scriptId=celtra-script-1&clientTimestamp=1599896518.58&clientTimeZoneOffsetInMinutes=-120&hostPageLoadId=02474183084811754
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
d7832395981af74dd6f4747eb4735ae72a38f0eab19aa9ec7ca51ab2840266ee

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 08 Sep 2020 08:21:06 GMT
content-encoding
gzip
age
343253
x-cache
Hit from cloudfront
status
200
content-length
135495
access-control-allow-origin
*
server
Apache
etag
"9ac3fd2b2b23e0736d0439e02ecd329a366d0e7374a202a64aa037c0b6565ff9"
vary
Accept-Encoding
x-varnish
10256516 10551487
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
0Qvym73JaTBWm5DY2wB_CjzWJZHIwDKbr5_6gJ1zmiIRzpqIJ8xWcg==
truncated
/ Frame 5AFF
167 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d26432e661658ef9d3d538b1f71b1478193f6c141f1cd7dfed03e5b677d178c2

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
607813c4-ebbc-4689-b5fb-115d4dfe4338
https://www.darkreading.com/ Frame 5AFF
167 B
0
Image
General
Full URL
blob:https://www.darkreading.com/607813c4-ebbc-4689-b5fb-115d4dfe4338
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d26432e661658ef9d3d538b1f71b1478193f6c141f1cd7dfed03e5b677d178c2

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Length
167
Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 5E5C
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvME4gjSHNWz0uLl8ZjEm7zgZ37u5Pv8Mq9gnBiidHBLqSk-kYJ3gp-239_ZP200S1nTZ_2KvLPIG-RcgmqyJbqBr9TvyGtlCVh0Okaec6QXpMoh32d0mHui6MODT5D3N8T0OR3wf49jhVMorK6g6KNN0P71gWa6H5AjPZUsckOxmg_V1c7Qs5aU-xAV6QGCnsM6tKRK_FnQ5Wuz6LUmaWbpCt76BGW1LlFcKiD0yJ69GfDbXfXGmwjQwjb0SIFT3Gyasi2HfGPjU9bXpPaLVJpiRjTz-Cp1RMLzTcNjtI&sai=AMfl-YT8lfKCewr1x7iQmdM2mNwLBCNClnjcwaYFTGT7QTL6N6X1Y0oL0F7vTzO2jQxZKDqL0Oj8lOGtP61wUEDQK7jRGXHC-fl3O3k2C6NWikUkJDqI0L9A_UsKLEatPJk&sig=Cg0ArKJSzIbsQLLsraAYEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
tag
a.teads.tv/page/11512/ Frame 5E5C
1 KB
901 B
Script
General
Full URL
https://a.teads.tv/page/11512/tag
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.7 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b26b734a06d61deee9a1dc6b49e415c12d84ae4c99cc201fc254046fe8995f7d

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
content-encoding
gzip
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, must-revalidate, max-age=3600
access-control-allow-credentials
true
content-length
651
expires
Sat, 12 Sep 2020 08:41:59 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 5E5C
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
92a55cb35db6842298c40fdef3e7e6e84a243de080837cb0ec1fba94dea19513
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1599824047903655"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28764
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:41:59 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 5E5C
295 KB
100 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
dc865bc599e784873af80d11610e625fece605a29f3b3b0d32dd10c70ca16bbf

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
content-encoding
gzip
last-modified
Mon, 24 Aug 2020 20:52:28 GMT
server
AmazonS3
x-amz-request-id
3RAV5SEJCG0T8HAW
etag
"081e99dc04c5a71ab4c56a39ac703934"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
accept-ranges
bytes
content-length
101896
x-amz-id-2
AZpE+X3yS7Ma3fcH5/3ZnJqVRLGCn5t2NC7WkJ8GCYckHlGm2Jj4Ym6USEPRuhMi3POIPT34Bok=
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1599896519044&de=617180366305&m=0&ar=2ab45f8-clean&iw=0e7324d&q=7&cb=0&ym=0&cu=1599896519044&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4854677916%3A2676539655%3A5324189708%3A138307618846&zMoatPS=TAPunit&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&bo=27868836&bp=43877916&bd=TAPunit&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1902%3A2149%3A0%3A0&iq=na&tt=na&fs=184513&na=793553035&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:59 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:41:59 GMT
s82121059907672
ubmtech.d3.sc.omtrdc.net/b/ss/cmpglobalvista/1/JS-2.8.2/
43 B
244 B
Image
General
Full URL
https://ubmtech.d3.sc.omtrdc.net/b/ss/cmpglobalvista/1/JS-2.8.2/s82121059907672?AQB=1&ndh=1&pf=1&t=12%2F8%2F2020%209%3A41%3A59%206%20-120&mid=37598059817171331490799608459952513966&aamlh=6&ce=UTF-8&ns=ubmtech&pageName=darkreading.com%20perimeter%20jai%20vijayan%20attackers%20exploit%20cisco%20switch%20issue%20as%20vendor%20warns%20of%20yet%20another%20critical%20flaw&g=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&cc=USD&events=event5&aamb=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&h1=Dark%20Reading%7CPerimeter&c2=1331490&v2=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&c3=Dark%20Reading%20%7C%201331490%20%7C%20Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20Warns%20of%20Yet%20Another%20Critical%20Flaw&c4=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20Warns%20of%20Yet%20Another%20Critical%20Flaw&c5=Perimeter%20-%20Perimeter&c7=Jai%20Vijayan&c8=2a01%3A4f8%3A192%3A5414%3A%3A2%20%7C%20Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&v10=saturday%7C3%3A30am&c11=News%20Analysis&v12=1331490&c13=saturday%7C3%3A30am&v13=www.darkreading.com&v15=First%20Visit&c17=New&v17=New&c19=Un-Registered&c20=20180409&c22=First%20Visit&c23=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&v28=Jai%20Vijayan&v37=News%20Analysis&c41=3&c48=1&v48=1&c50=2.8.2&v61=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&mcorgid=77FB1CFE532B22840A490D45%40AdobeOrg&AQE=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
15.236.9.100 Paris, France, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-15-236-9-100.eu-west-3.compute.amazonaws.com
Software
jag /
Resource Hash
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
x-c
master-1347.Ibe097b.M0-443
p3p
CP="This is not a P3P policy"
status
200
content-length
43
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sun, 13 Sep 2020 07:41:59 GMT
server
jag
xserver
anedge-5bd4cfd76-89xwm
etag
3435751613129916416-4614372330622028701
vary
*
content-type
image/gif;charset=utf-8
access-control-allow-origin
*
cache-control
no-cache, no-store, max-age=0, no-transform, private
expires
Fri, 11 Sep 2020 07:41:59 GMT
/
api.bibblio.org/v1/content-item-url-ingestions/ Frame
0
0
Other
General
Full URL
https://api.bibblio.org/v1/content-item-url-ingestions/
Protocol
H2
Server
143.204.215.93 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-93.fra53.r.cloudfront.net
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.darkreading.com
Sec-Fetch-Mode
cors

Response headers

status
200
content-type
application/json
content-length
0
date
Sat, 12 Sep 2020 07:41:59 GMT
x-amzn-requestid
4acfc3eb-02df-4885-90f4-241ca73d39f8
access-control-allow-origin
*
access-control-allow-headers
Content-Type,X-Amz-Date,Authorization,X-Api-Key,X-Amz-Security-Token
x-amz-apigw-id
SvhHLGFHDoEFR5Q=
access-control-allow-methods
POST,OPTIONS
x-cache
Miss from cloudfront
via
1.1 78c402b74e65ae12b398b6b957ab229e.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53-C1
x-amz-cf-id
kPSDIkOIWrf-9AmQKbb31JkaV7S4wn2mDT29J-fnp0QbWfENF8iIGQ==
recommendations
api.bibblio.org/v1/ Frame
0
0
Other
General
Full URL
https://api.bibblio.org/v1/recommendations?limit=6&page=1&fields=name,url,moduleImage,datePublished,author,description&customUniqueIdentifier=1331490
Protocol
H2
Server
143.204.215.93 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-93.fra53.r.cloudfront.net
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
GET
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.darkreading.com
Sec-Fetch-Mode
cors

Response headers

status
200
content-type
application/json
content-length
0
date
Sat, 12 Sep 2020 07:41:59 GMT
x-amzn-requestid
b328da30-fa1d-46e5-a5ca-72ad6b26e8a2
access-control-allow-origin
*
access-control-allow-headers
Content-Type,X-Amz-Date,Authorization,X-Api-Key,X-Amz-Security-Token
x-amz-apigw-id
SvhHLFotjoEFcHA=
access-control-allow-methods
GET,OPTIONS
x-cache
Miss from cloudfront
via
1.1 78c402b74e65ae12b398b6b957ab229e.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53-C1
x-amz-cf-id
FssBX-xcezd_ptAZFZALsCz6DqupRL243nKL5DiqzYSkR8TxyjC67A==
/
api.bibblio.org/v1/content-item-url-ingestions/
175 B
547 B
XHR
General
Full URL
https://api.bibblio.org/v1/content-item-url-ingestions/
Requested by
Host: cdn.bibblio.org
URL: https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.93 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-93.fra53.r.cloudfront.net
Software
/
Resource Hash
6daa62ec3812d8c4cc65448351cefcbe9a190ecec9c63cc261d28a851632d5fa

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Authorization
Bearer cad9e1a0-1087-4b12-918a-6a2155eb25a3
Content-Type
application/json

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
via
1.1 78c402b74e65ae12b398b6b957ab229e.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53-C1
x-amzn-requestid
ccb2ad58-21bd-4700-9e01-e0ad3808214d
status
422
x-cache
Error from cloudfront
content-type
application/json
access-control-allow-origin
*
x-amzn-trace-id
Root=1-5f5c7bc7-1453c3f2225342257b5ccfc0;Sampled=0
x-amz-apigw-id
SvhHLFw2joEFVBw=
content-length
175
x-amz-cf-id
iETwFOya95XwUinG8M_5kbI_ND9NuDVAOC_tT868G0K0Nm9VzLQcaA==
recommendations
api.bibblio.org/v1/
4 KB
5 KB
XHR
General
Full URL
https://api.bibblio.org/v1/recommendations?limit=6&page=1&fields=name,url,moduleImage,datePublished,author,description&customUniqueIdentifier=1331490
Requested by
Host: cdn.bibblio.org
URL: https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.93 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-93.fra53.r.cloudfront.net
Software
/
Resource Hash
a5efcd56cf3d69ee8495174a3fcac057bf716e2101418135335db17c1447c2c3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Authorization
Bearer cad9e1a0-1087-4b12-918a-6a2155eb25a3
Content-Type
application/json

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
via
1.1 78c402b74e65ae12b398b6b957ab229e.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53-C1
x-amzn-requestid
2b9b0ef5-03c5-45b5-ac43-cd592a68d69c
status
200
x-cache
Miss from cloudfront
content-type
application/json
access-control-allow-origin
*
x-amzn-trace-id
Root=1-5f5c7bc7-defcc6b6fac3a02322187bb6;Sampled=0
x-amz-apigw-id
SvhHLHG9joEFl_g=
content-length
4432
x-amz-cf-id
hzql83tGpHnvUC59HXjlYG5N299FdA0A_WOlQ58JIQo47hHXWvXAuw==
widget_iframe.2d7d9a6d04538bf11c7b23641e75738c.html
platform.twitter.com/widgets/ Frame 9009
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.2d7d9a6d04538bf11c7b23641e75738c.html?origin=https%3A%2F%2Fwww.darkreading.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash

Request headers

:method
GET
:authority
platform.twitter.com
:scheme
https
:path
/widgets/widget_iframe.2d7d9a6d04538bf11c7b23641e75738c.html?origin=https%3A%2F%2Fwww.darkreading.com
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490

Response headers

status
200
last-modified
Tue, 01 Sep 2020 17:58:17 GMT
cache-control
public, max-age=315360000
content-type
text/html; charset=utf-8
etag
"9fa476ae827f556d5b037fe43632370d+gzip"
content-encoding
gzip
access-control-allow-methods
GET
access-control-allow-origin
*
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
accept-ranges
bytes
date
Sat, 12 Sep 2020 07:41:59 GMT
x-served-by
cache-bwi5125-BWI, cache-hhn4057-HHN
x-cache
HIT, HIT
vary
Accept-Encoding
tw-cdn
FT
content-length
5825
like.php
www.facebook.com/plugins/ Frame AF62
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df2ed3882e73d32c%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff3793adc736afdc%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=727f0c2b22092f3569f64ec9b92bfd1d&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df2ed3882e73d32c%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff3793adc736afdc%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
fr=05os4E645DRqN6Tuo..BfXHvG...1.0.BfXHvG.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-type
text/html; charset="utf-8"
x-fb-debug
VmJfkm2BfRsBmKd4Dm6Rt1e4G/pGz5u5O1vE7DLFbQ0RSiRHMPaUxFRDdar5a0mBPoJy3dMTfRSi6XFSgGx7Dg==
date
Sat, 12 Sep 2020 07:41:59 GMT
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
record.do
ins.techweb.com/beacon/ Frame 99EB
0
0
Document
General
Full URL
https://ins.techweb.com/beacon/record.do?a=68841bbbf037b3bd9eda236cfd0edcb96932f665438d7b833aaa994d869277ac&u=https%253A%252F%252Fwww.darkreading.com%252Fperimeter%252Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%252Fd%252Fd-id%252F1331490&t=P
Requested by
Host: ins.techweb.com
URL: https://ins.techweb.com/beacon/js/beacon-min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::681b:89d7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
ins.techweb.com
:scheme
https
:path
/beacon/record.do?a=68841bbbf037b3bd9eda236cfd0edcb96932f665438d7b833aaa994d869277ac&u=https%253A%252F%252Fwww.darkreading.com%252Fperimeter%252Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%252Fd%252Fd-id%252F1331490&t=P
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490

Response headers

status
204
date
Sat, 12 Sep 2020 07:41:59 GMT
set-cookie
__cfduid=d4f0dfe4469eecff376a1d10a5b1128911599896519; expires=Mon, 12-Oct-20 07:41:59 GMT; path=/; domain=.techweb.com; HttpOnly; SameSite=Lax Insights=27-7df8f32e-af73-47c0-8d27-9db2d20731a9; Domain=.techweb.com; Expires=Thu, 11-Sep-2025 07:41:59 GMT; Path=/
p3p
CP='IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT'
cf-cache-status
DYNAMIC
cf-request-id
0522dc9ab1000006010b3f5200000001
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
5d17fd3def050601-FRA
elqCfg.min.js
img.en25.com/i/
6 KB
3 KB
Script
General
Full URL
https://img.en25.com/i/elqCfg.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.78.166 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a95-100-78-166.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6b4ebd6049c806e3eef1bd770b2d8b4fdd75803861ead3584ee753e41988efae
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Encoding
gzip
X-Content-Type-Options
nosniff
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Connection
keep-alive
Content-Length
2115
X-XSS-Protection
1; mode=block
Pragma
no-cache
Last-Modified
Fri, 17 Jul 2020 18:55:09 GMT
Date
Sat, 12 Sep 2020 07:41:59 GMT
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
no-cache, no-store
ETag
"8bc15cb6b5cd61:0"
Accept-Ranges
bytes
Expires
Sat, 12 Sep 2020 07:41:59 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 50B2
0
21 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstBcnD_L1fyehtu8JGRp3THknL9wV4wdH_X_G9UHw3MIY7cIgNxt3550fz_HAOt3r8HM11R-OJHZJ245ffKWDPuM67LZ-SDjNRobIrgwwi2N5kzYlm0fR2pB05teuS_gmjMmnqiV05I2fThY7wBhYTZZpgU_JiWpAQMbTiAZNKocXiGN4g2m8PJkdYKQWgM8rfT-IUWmoRUYsRPRXrOkbIoeaRgWZ98yFNqyA8vObyVEsEa57Ymh8hVMC_vaXfH62wraWetDiI2uRSKddODCXl8b6lV6R_rucYRWT6WjqOcEzAlqn3GyqiB&sai=AMfl-YQTOfgvtrJi9HkndOi4H9oeYDpTRAuxUM5cNNu75i-rNhZLKO6Tx_E4aitkmh2wNoArRsflO9_ztDKmhM0itRaTtz2O-z4pj1RZ43Zcw_93DEWv35jxaXNtgXf4DvE&sig=Cg0ArKJSzCWC4sVXxtJmEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
truncated
/ Frame 5E5C
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1290f89ed4e37d8be8bfe1ad96be8152519135f03fb7452da034cf4a273e5224

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WJ9RHF7
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
1fbd06d98ff87713eb030669571c929ab75539f05252f04ae1df807c28b20e95
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 19 Aug 2020 20:46:40 GMT
server
Golfe2
age
1579
date
Sat, 12 Sep 2020 07:15:40 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18323
expires
Sat, 12 Sep 2020 09:15:40 GMT
Cookie set login.jsp
ng.techweb.com/authds/login/ Frame F03E
0
0
Document
General
Full URL
https://ng.techweb.com/authds/login/login.jsp?type=iframe&cdsocket_client=https://www.darkreading.com/cdsocket_proxy.html
Requested by
Host: img.deusm.com
URL: https://img.deusm.com/darkreading/JQuery_Library/Jquery_3.4.1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:103::192:155:48:119 , United States, ASN19994 (RACKSPACE, US),
Reverse DNS
Software
NG /
Resource Hash

Request headers

Host
ng.techweb.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490

Response headers

Set-Cookie
JSESSIONID=B53A34BE141C4379D7E8495FC6BB31B0; Path=/; Secure; HttpOnly
vary
accept-encoding
Content-Type
text/html;charset=ISO-8859-1
Content-Length
755
Date
Sat, 12 Sep 2020 07:41:59 GMT
Server
NG
Content-Encoding
gzip
Connection
Keep-Alive
moment~timeline~tweet.2e5232162202896d50461b242819754e.js
platform.twitter.com/js/
23 KB
8 KB
Script
General
Full URL
https://platform.twitter.com/js/moment~timeline~tweet.2e5232162202896d50461b242819754e.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
357eac5a1ab8249b3fc4569040b13d64795f5aa945ae3570f782d979015bef56

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
content-encoding
gzip
x-cache
HIT, HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
7651
x-served-by
cache-bwi5149-BWI, cache-hhn4057-HHN
last-modified
Tue, 01 Sep 2020 17:58:08 GMT
etag
"cce4698c56d0a54ba3f908b953e403c1+gzip"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=315360000
accept-ranges
bytes
tw-cdn
FT
timeline.610564c46865d0bb1eccdd42c0dc6ea7.js
platform.twitter.com/js/
21 KB
7 KB
Script
General
Full URL
https://platform.twitter.com/js/timeline.610564c46865d0bb1eccdd42c0dc6ea7.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
ca782cbdd8cee7ccccef6983f6566c9c29e1aa5da753a81e65250fad30bb6359

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
content-encoding
gzip
x-cache
HIT, HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
6647
x-served-by
cache-bwi5134-BWI, cache-hhn4057-HHN
last-modified
Tue, 01 Sep 2020 17:58:08 GMT
etag
"c556b2c56f55b3b2458cc2f84945663d+gzip"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=315360000
accept-ranges
bytes
tw-cdn
FT
button.e24f3bcdec527b80b9c80e88b62047c3.js
platform.twitter.com/js/
7 KB
2 KB
Script
General
Full URL
https://platform.twitter.com/js/button.e24f3bcdec527b80b9c80e88b62047c3.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
da3e524928bcca821af2551eb6f9e9ae2449ceb48642cce4f2dae23383098537

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
content-encoding
gzip
x-cache
HIT, HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
2295
x-served-by
cache-bwi5134-BWI, cache-hhn4057-HHN
last-modified
Tue, 01 Sep 2020 17:58:08 GMT
etag
"2288bbd5e30b6dba457d3d615de9e136+gzip"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=315360000
accept-ranges
bytes
tw-cdn
FT
/
www.facebook.com/tr/
0
38 B
Other
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
multipart/form-data; boundary=----WebKitFormBoundaryLveOxzFlNlOcSjAm

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
server
proxygen-bolt
date
Sat, 12 Sep 2020 07:41:59 GMT
status
200
content-type
text/plain
access-control-allow-origin
https://www.darkreading.com
access-control-allow-credentials
true
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
0
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1599896519052&de=794843065894&m=0&ar=2ab45f8-clean&iw=0e7324d&q=11&cb=0&ym=0&cu=1599896519052&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4590849068%3A2692438704%3A5366923562%3A138316530126&zMoatPS=top&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&bo=27868836&bp=43877916&bd=top&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1902%3A2149%3A0%3A0&iq=na&tt=na&fs=184513&na=585052706&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:59 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:41:59 GMT
teads-format.min.js
s8t.teads.tv/media/format/v3/
732 KB
195 KB
Script
General
Full URL
https://s8t.teads.tv/media/format/v3/teads-format.min.js
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/page/11512/tag
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:10c:295::36f1 , Ascension Island, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
/
Resource Hash
390663e9400d0a75871a9b16c18de5e78d848910faf28d351eaa78f63392f021

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
content-encoding
gzip
vary
Accept-Encoding
x-amz-request-id
8FE119BF670593CE
status
200
content-length
198331
x-amz-id-2
hkhHaVRTM0sQTKvzzKVcwrVY6CW6gsC90K4eaxtRYn2rl4G6jg50ZcVu2s79XDY0pFJ9v7ydMfM=
last-modified
Fri, 11 Sep 2020 12:40:01 GMT
etag
"ac68be92120d258541178774c6ee32ca"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
text/javascript;charset=utf-8
access-control-allow-origin
*
cache-control
private, must-revalidate, max-age=1800, no-transform
access-control-allow-credentials
false
x-bucket
6
accept-ranges
bytes
access-control-allow-headers
*
expires
Sat, 12 Sep 2020 08:11:59 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 5AFF
0
21 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuKMNqYifzun-zalzgr86xcj7TL-_S40E8ltSjJ8cSr686u_p3hFXiTrgO4Yx9zlLvs9dQeA1r1wVFzDBs1kXkWk4BeWimlgvfEbRQP3K9kb6tdH47dVfgILHnore_dLYHqViiXo_vacwKo9tvsQMU3Jv6jbWlx0o38BBBvRDqBFrFuVTR2ZG1w9Pwie1sNTtCfIrA7KES0bxWy9BfkCDuuHK9SdrvwpF1w06UsSG5EriX5zHVKT4-FBC8kyAE6UeaN6oOu4dcZ3e1s0WWooe5eo9xn8FUGJ70k9JPXwgwL5yI&sai=AMfl-YSw20IFVL67j3YoCsbM1pSRDaX3478ukuhKWR5ioo-CK6qtyGdKDps3UgRfJShKV7C_sXUAFUCv5EwV1cM1-4YMcrNPZ73A_a1pNXS8pNxhHxcfysSOSh4-WGlHOMA&sig=Cg0ArKJSzBvWwCAVLR8iEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
4041530955237463471
tpc.googlesyndication.com/simgad/
6 KB
6 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/4041530955237463471?
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
3b6db638fdbdb02380d83d5539cdbb9bc12b00a50dae68573b772e5298ce2313
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 07 Sep 2020 13:10:33 GMT
x-content-type-options
nosniff
age
412286
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6345
x-xss-protection
0
last-modified
Fri, 04 Sep 2020 14:29:02 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 07 Sep 2021 13:10:33 GMT
collect
www.google-analytics.com/j/
2 B
399 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j85&a=364934958&t=pageview&_s=1&dl=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&dp=%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&ul=en-us&de=windows-1252&dt=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YAhAAEADQAAAAC~&jid=1457614226&gjid=2145690352&cid=674484425.1599896518&tid=UA-135180592-2&_gid=1428835087.1599896520&_r=1&gtm=2wg920WJ9RHF7&cd1=news%20analysis&cd2=jai%20vijayan&cd3=1&cd4=null&cd5=20180409&cd6=perimeter%20-%20perimeter&cd9=not%20set&cd10=0&z=1485701705
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
de3246094525b21a870fc7d2a67490d0132535c6fa5993755c549f1a9d1bd8af
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
text/plain
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2
expires
Fri, 01 Jan 1990 00:00:00 GMT
js
www.google-analytics.com/gtm/
75 KB
30 KB
Script
General
Full URL
https://www.google-analytics.com/gtm/js?id=OPT-W6LRXN3&t=gtm34&cid=674484425.1599896518
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
d23bd8c102d788a16499ceb7c2ed6c0e9de7e65b446bb266cfb616419fad46f6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
content-encoding
br
vary
Accept-Encoding
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
30240
x-xss-protection
0
last-modified
Sat, 12 Sep 2020 06:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Sat, 12 Sep 2020 07:41:59 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 5E5C
0
21 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss1NoFvejIv7yYC9363ktf7fROFvMOz42KyVop-UUbiyRx_KQ6OEchbdowvLDfl2PJx9fb-Dbh36sWZL4BtBudOkm0Xec70l0hmPvQFBi56HKOxevWEAOzT_WMqSpFZeKY7ExQqO4ASVOJw7eb2cvv2BgsqfW3FNckHlnbNmex6mHij3A92cS0W37kExG0uBq_o1HdyhNBNiIqQ7IUTegw8ReYAjJBIt2Qb4ZIArEC4JpL4V7nhZbbdQ-rMuRmEc7IXX545L4HkWfHV8iCRjLdd_0xwABvKUvdhj9etMr3lbw&sai=AMfl-YSkzWjO88Q7Hx88C3OfG6-vD3pgL-p_hqm2n6R8UuEMtKubFcKiF6sx4noYcDibEnHgU6o1qd7ji9iZQTv89-LZZoeXzAadrGK0Usmrp5R4JzQcOvTaCQxbtPFStaY&sig=Cg0ArKJSzPjragOmpLKsEAE&urlfix=1&adurl=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.206.2 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s20-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
profile
cdn.syndication.twimg.com/timeline/
170 KB
12 KB
Script
General
Full URL
https://cdn.syndication.twimg.com/timeline/profile?callback=__twttr.callbacks.tl_i0_profile_DarkReading_old&dnt=true&domain=www.darkreading.com&lang=en&screen_name=DarkReading&suppress_response_codes=true&t=1777662&tz=GMT%2B0200&with_replies=false
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (lcy/1D41) /
Resource Hash
0c198b70851466bb67af5a47d632b20771162f94d1904121674a390c42bc6772
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
251
x-cache
HIT
status
200
content-disposition
attachment; filename=jsonp.jsonp
access-control-allow-methods
GET
vary
Accept-Encoding
content-length
11580
x-xss-protection
0
x-response-time
168
last-modified
Sat, 12 Sep 2020 07:37:48 GMT
server
ECS (lcy/1D41)
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
application/javascript;charset=utf-8
expires
Sat, 12 Sep 2020 07:46:59 GMT
cache-control
must-revalidate, max-age=300
x-connection-hash
cd30bdceb028f7820b5db156ac0e702e
accept-ranges
bytes
timing-allow-origin
*
x-transaction
004977b40060e039
access-contol-allow-origin
platform.twitter.com
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F10313124205650561801&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519052&de=794843065894&cu=1599896519052&m=22&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4331&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=0&ag=5&an=0&gf=5&gg=0&ix=5&ic=5&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=5&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9&cd=0&ah=9&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4590849068%3A2692438704%3A5366923562%3A138316530126&bo=27868836&bp=43877916&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-3&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-3&iq=na&tt=na&tc=0&fs=184513&na=1379735273&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:59 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:41:59 GMT
tweet_button.2d7d9a6d04538bf11c7b23641e75738c.en.html
platform.twitter.com/widgets/ Frame C541
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/tweet_button.2d7d9a6d04538bf11c7b23641e75738c.en.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash

Request headers

:method
GET
:authority
platform.twitter.com
:scheme
https
:path
/widgets/tweet_button.2d7d9a6d04538bf11c7b23641e75738c.en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490

Response headers

status
200
last-modified
Tue, 01 Sep 2020 17:58:14 GMT
cache-control
public, max-age=315360000
content-type
text/html; charset=utf-8
etag
"287ee8422006a852a093d257a3e63161+gzip"
content-encoding
gzip
access-control-allow-methods
GET
access-control-allow-origin
*
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
accept-ranges
bytes
date
Sat, 12 Sep 2020 07:41:59 GMT
x-served-by
cache-bwi5127-BWI, cache-hhn4057-HHN
x-cache
HIT, HIT
vary
Accept-Encoding
tw-cdn
FT
content-length
12279
svrGP.aspx
s657486201.t.eloqua.com/visitor/v200/
Redirect Chain
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=678&firstPartyCookieDomain=trk.darkreading.com
  • https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=678&firstPartyCookieDomain=trk.darkreading.com&elqCookie=1
0
369 B
Script
General
Full URL
https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=678&firstPartyCookieDomain=trk.darkreading.com&elqCookie=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
142.0.160.13 Ashburn, United States, ASN7160 (NETDYNAMICS, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Sat, 12 Sep 2020 07:41:59 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
application/javascript
Content-Length
0
X-XSS-Protection
1; mode=block
Expires
-1

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Sat, 12 Sep 2020 07:41:59 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Location
https://s657486201.t.eloqua.com/visitor/v200/svrGP.aspx?pps=50&siteid=657486201&DLKey=7435f16d0b5c4189a89d0d109d2517f5&DLLookup=&ms=678&firstPartyCookieDomain=trk.darkreading.com&elqCookie=1
Cache-Control
private,no-cache, no-store
Content-Type
text/html; charset=utf-8
Content-Length
331
X-XSS-Protection
1; mode=block
Expires
-1
svrGP.aspx
trk.darkreading.com/visitor/v200/
Redirect Chain
  • https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=3&siteid=2150&ref2=elqNone&tzo=-60&ms=678&optin=disabled&firstPartyCookieDomain=trk.darkreading.com
  • https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=-60&ms=678&optin=disabled&elq1pcGUID=4FF7DA052C6D402F905F9FC4C2674140
49 B
535 B
Image
General
Full URL
https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=-60&ms=678&optin=disabled&elq1pcGUID=4FF7DA052C6D402F905F9FC4C2674140
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
142.0.173.134 , United States, ASN7160 (NETDYNAMICS, US),
Reverse DNS
Software
/
Resource Hash
f1ccea6b7204d9f7913ab45e1afa51d79f83bd4f0319de937b0132e6e02b1aab
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Sat, 12 Sep 2020 07:42:00 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
image/gif
Content-Length
49
X-XSS-Protection
1; mode=block
Expires
-1

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Sat, 12 Sep 2020 07:41:59 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Location
https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=3&siteid=2150&ref2=elqNone&tzo=-60&ms=678&optin=disabled&elq1pcGUID=4FF7DA052C6D402F905F9FC4C2674140
Cache-Control
private,no-cache, no-store
Content-Type
text/html; charset=utf-8
Content-Length
297
X-XSS-Protection
1; mode=block
Expires
-1
collect
stats.g.doubleclick.net/j/
1 B
87 B
XHR
General
Full URL
https://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j85&tid=UA-135180592-2&cid=674484425.1599896518&jid=1457614226&gjid=2145690352&_gid=1428835087.1599896520&_u=YAhAAEACQAAAAC~&z=1789380486
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c00::9d Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Sat, 12 Sep 2020 07:41:59 GMT
status
200
content-type
text/plain
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1
expires
Fri, 01 Jan 1990 00:00:00 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiOjAsImNsaWVudFRpbWVzdGFtcCI6MTU5OTg5NjUxOS42NDIsIm5hbWUiOiJjb250YWluZXJCZWNhbWVWaWV3YWJsZSJ9XX0=?crc32c=921219910
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.194.7 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-123-194-7.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:41:59 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
track
t.teads.tv/
23 B
143 B
Image
General
Full URL
https://t.teads.tv/track?action=debug-bts&fv=529&ts=1599896519812&env=js-web&pageId=11512&pid=21882&auctid=6e9f6bfc-0528-42bc-b45e-fc86128ada32&f=1&debug_metadata=wb&referer=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.84.57.75 , United States, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
date
Sat, 12 Sep 2020 07:41:59 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Sat, 26 Jul 1997 05:00:00 GMT
track
t.teads.tv/
23 B
143 B
Image
General
Full URL
https://t.teads.tv/track?action=placementCall&env=js-web&auctid=6e9f6bfc-0528-42bc-b45e-fc86128ada32&pageId=11512&pid=21882&fv=529&ts=1599896519814&f=1&referer=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.84.57.75 , United States, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
date
Sat, 12 Sep 2020 07:41:59 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Sat, 26 Jul 1997 05:00:00 GMT
track
t.teads.tv/
23 B
143 B
Image
General
Full URL
https://t.teads.tv/track?action=slotAvailable&env=js-web&auctid=6e9f6bfc-0528-42bc-b45e-fc86128ada32&pageId=11512&pid=21882&slot=native&fv=529&ts=1599896519826&f=1&referer=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.84.57.75 , United States, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
date
Sat, 12 Sep 2020 07:41:59 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Sat, 26 Jul 1997 05:00:00 GMT
ad
a.teads.tv/page/11512/
485 B
663 B
XHR
General
Full URL
https://a.teads.tv/page/11512/ad?windowWidth=1600&windowHeight=1200&windowDepth=1&windowReferrerUrl=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&page=%7B%22id%22%3A11512%2C%22placements%22%3A%5B%7B%22id%22%3A21882%2C%22validity%22%3A%7B%22status%22%3Atrue%2C%22reasons%22%3A%5B%5D%7D%2C%22player%22%3A%7B%22width%22%3A489%2C%22height%22%3A275%7D%2C%22slotType%22%3A%22native%22%7D%5D%2C%22gdpr_iab%22%3A%7B%22reason%22%3A220%2C%22status%22%3A22%2C%22consent%22%3A%22%22%2C%22apiVersion%22%3Anull%2C%22cmpId%22%3Anull%7D%7D&auctid=6e9f6bfc-0528-42bc-b45e-fc86128ada32&formatVersion=2.22.61&env=js-web&netBw=10&ttfb=925
Requested by
Host: s8t.teads.tv
URL: https://s8t.teads.tv/media/format/v3/teads-format.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.7 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
90357453746789676c69cda33641594774de320b355a8cbd1cbea1857e3ae518

Request headers

Accept
application/json; charset=UTF-8
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:59 GMT
content-encoding
gzip
status
200
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
https://www.darkreading.com
cache-control
max-age=0, no-cache, no-store
access-control-allow-credentials
true
content-length
338
expires
Sat, 12 Sep 2020 07:41:59 GMT
p
sb.scorecardresearch.com/
43 B
589 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17198971&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=1599896519830&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=28010733&cs_ucfr=
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.238.139 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-238-139.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:41:59 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1599896519080&de=769391848030&m=0&ar=2ab45f8-clean&iw=0e7324d&q=15&cb=0&ym=0&cu=1599896519080&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4537903594%3A2627560981%3A5460721674%3A138322625365&zMoatPS=native&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&bo=27868836&bp=43877916&bd=native&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1902%3A2149%3A0%3A0&iq=na&tt=na&fs=184513&na=728312008&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:59 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:41:59 GMT
bib_red_square.png
img.deusm.com/darkreading/
281 B
513 B
Image
General
Full URL
https://img.deusm.com/darkreading/bib_red_square.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/styles/pano-framework.css?v1.27
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3032::6818:71dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2b54640c4481464f755e4729d7f105f4decc25690afe59923aec5c739d178aed

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 08 May 2020 12:31:10 GMT
server
cloudflare
age
2871
etag
"119-5a5222c0bdf80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
5d17fd412f78c29a-FRA
content-length
281
cf-request-id
0522dc9cb50000c29ac60dc200000001
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/e3929b21-9f94-4a19-9704-7fbbd2d1825f/main/160x90/4m19s378ms/match/
7 KB
8 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/e3929b21-9f94-4a19-9704-7fbbd2d1825f/main/160x90/4m19s378ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
143.204.212.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-212-151.fra53.r.cloudfront.net
Software
/ BC
Resource Hash
59c9ac12854f79c2e48004102fc128dbc0166a1edce41401cfad2ae2d5e48a90

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 00:30:46 GMT
Via
1.1 4809763494a078a525dc1a2dff5ddf6c.cloudfront.net (CloudFront)
Age
25873
X-Powered-From
gantry
X-Powered-By
BC
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Pop
FRA53-C1
Content-Length
7565
X-Amz-Cf-Id
bj77k6uj2lkAIaHHwoLVlIkWoaX_hEIBWHRj2AuVo_MChLOzNZV1mw==
2613.jpg
img.lightreading.com/securitynow/2019/08/753791/
29 KB
29 KB
Image
General
Full URL
https://img.lightreading.com/securitynow/2019/08/753791/2613.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
99.86.2.56 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-2-56.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
fde420230453eae5a47b3a48ce45675fa1175578b15597ad17e6342253cfee34

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:01 GMT
via
1.1 c275031486c6f7b744b8d30847e98b14.cloudfront.net (CloudFront)
last-modified
Fri, 30 Aug 2019 13:00:47 GMT
server
AmazonS3
x-amz-cf-pop
FRA6-C1
etag
"033821782c0384f9cdf539bb57028c19"
x-cache
Miss from cloudfront
content-type
image/jpeg
status
200
accept-ranges
bytes
content-length
29812
x-amz-cf-id
aEF8Nl98HmRPsXpa8qnuKmK2KkPtK7yuYzMamP3lTMIn1KDX0FWGTA==
SsZoGjxt
pbs.twimg.com/card_img/1304510119238131714/ Frame 1C4C
30 KB
30 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1304510119238131714/SsZoGjxt?format=png&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40FA) /
Resource Hash
24b718e50fcd03ae2cbca99320ea8cca4b57a1eb6665d31e7bc838cfd46833bb
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
age
40138
x-cache
HIT
status
200
content-length
30775
x-response-time
155
surrogate-key
card_img card_img/bucket/5 card_img/1304510119238131714
last-modified
Fri, 11 Sep 2020 19:58:23 GMT
server
ECS (fcn/40FA)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
cb47007746fff037163e5c632a781aeb
accept-ranges
bytes
4M1rmtpx
pbs.twimg.com/card_img/1303696411515482113/ Frame 1C4C
4 KB
4 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1303696411515482113/4M1rmtpx?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40DA) /
Resource Hash
15f0c4d5c59fcfd038128cb0e160cf968c2aeacf708859afd7cb121051a93561
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
age
235938
x-cache
HIT
status
200
content-length
4246
x-response-time
124
surrogate-key
card_img card_img/bucket/6 card_img/1303696411515482113
last-modified
Wed, 09 Sep 2020 14:05:00 GMT
server
ECS (fcn/40DA)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
b3762b213a33e4bbd1d0c7f1cbcf466f
accept-ranges
bytes
kb6WOuMI
pbs.twimg.com/card_img/1304177953362923521/ Frame 1C4C
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1304177953362923521/kb6WOuMI?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4190) /
Resource Hash
70566a93dc0cdb461e58656ff5a14a7e00b4f6730c8fd96c78c3a01228124044
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
age
120842
x-cache
HIT
status
200
content-length
5391
x-response-time
131
surrogate-key
card_img card_img/bucket/9 card_img/1304177953362923521
last-modified
Thu, 10 Sep 2020 21:58:29 GMT
server
ECS (fcn/4190)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
cb301b092f6378c7cfe204c4ffb00888
accept-ranges
bytes
Qzvs0Asy
pbs.twimg.com/card_img/1304121594822885377/ Frame 1C4C
8 KB
8 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1304121594822885377/Qzvs0Asy?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/419A) /
Resource Hash
88d0ff13f5977662b8c71444286ad62c023c79dc6b67c08ded1a4a08c22b9237
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
age
131592
x-cache
HIT
status
200
content-length
8546
x-response-time
138
surrogate-key
card_img card_img/bucket/2 card_img/1304121594822885377
last-modified
Thu, 10 Sep 2020 18:14:32 GMT
server
ECS (fcn/419A)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
fb11c808cc78fe326e91b398bf0b5429
accept-ranges
bytes
___GaY1O
pbs.twimg.com/card_img/1303116266350272512/ Frame 1C4C
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1303116266350272512/___GaY1O?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4196) /
Resource Hash
e25b417a57ea79647830453e459009ef9bf5182674efb28d8a2b7159400b667b
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
age
153023
x-cache
HIT
status
200
content-length
5049
x-response-time
165
surrogate-key
card_img card_img/bucket/4 card_img/1303116266350272512
last-modified
Mon, 07 Sep 2020 23:39:43 GMT
server
ECS (fcn/4196)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2edd67112c10d29d8c7d56c240500858
accept-ranges
bytes
timeline.32f7f89e2e680ebfe3f4cfefb27966ae.light.ltr.css
platform.twitter.com/css/ Frame 1C4C
53 KB
12 KB
Stylesheet
General
Full URL
https://platform.twitter.com/css/timeline.32f7f89e2e680ebfe3f4cfefb27966ae.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
8a322ede0b619b9051fccbe2a1a31f402f416d45f92c245aafcbe75e42f6f2b2

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
content-encoding
gzip
x-cache
HIT, HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
12144
x-served-by
cache-bwi5147-BWI, cache-hhn4057-HHN
last-modified
Tue, 01 Sep 2020 17:58:05 GMT
etag
"fb5a989a2b36d6be5344baad6a1936fd+gzip"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=315360000
accept-ranges
bytes
tw-cdn
FT
timeline.32f7f89e2e680ebfe3f4cfefb27966ae.light.ltr.css
platform.twitter.com/css/
53 KB
53 KB
Image
General
Full URL
https://platform.twitter.com/css/timeline.32f7f89e2e680ebfe3f4cfefb27966ae.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
content-encoding
gzip
x-cache
HIT, HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
12144
x-served-by
cache-bwi5147-BWI, cache-hhn4057-HHN
last-modified
Tue, 01 Sep 2020 17:58:05 GMT
etag
"fb5a989a2b36d6be5344baad6a1936fd+gzip"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=315360000
accept-ranges
bytes
tw-cdn
FT
index.php
a.dpmsrv.com/dpmpxl/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=datapoint_dmp&google_cm&ap_id=875984478630338109&pixelIndex=0&_=1599896518743
  • https://a.dpmsrv.com/dpmpxl/index.php?q=dfp&ap_id=875984478630338109&pixelIndex=0&_=1599896518743&google_gid=CAESEI0Cn5WE8ZewTgVc2O43SPQ&google_cver=1
0
597 B
Script
General
Full URL
https://a.dpmsrv.com/dpmpxl/index.php?q=dfp&ap_id=875984478630338109&pixelIndex=0&_=1599896518743&google_gid=CAESEI0Cn5WE8ZewTgVc2O43SPQ&google_cver=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.229.100.58 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-229-100-58.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Access-Control-Max-Age
10
Access-Control-Allow-Methods
GET, POST, PUT, DELETE, OPTIONS
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
text/javascript
Access-Control-Allow-Headers
content-type, accept
Content-Length
0
Expires
0

Redirect headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:59 GMT
server
HTTP server (unknown)
status
302
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
location
https://a.dpmsrv.com/dpmpxl/index.php?q=dfp&ap_id=875984478630338109&pixelIndex=0&_=1599896518743&google_gid=CAESEI0Cn5WE8ZewTgVc2O43SPQ&google_cver=1
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
367
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
423396.gif
idsync.rlcdn.com/
0
66 B
Image
General
Full URL
https://idsync.rlcdn.com/423396.gif?partner_uid=875984478630338109
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.244.174.68 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
451
date
Sat, 12 Sep 2020 07:41:59 GMT
via
1.1 google
alt-svc
clear
content-length
0
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1599896519097&de=399339085620&m=0&ar=2ab45f8-clean&iw=0e7324d&q=19&cb=0&ym=0&cu=1599896519097&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=21887076%3A2734573621%3A5454835618%3A138321086638&zMoatPS=insight&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&bo=27868836&bp=43877916&bd=insight&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1902%3A2149%3A0%3A0&iq=na&tt=na&fs=184513&na=10536541&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:41:59 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:41:59 GMT
2_webfont.woff2
cache-ssl.celtra.com/api/fonts/google/Lato:400/ Frame 93EA
4 KB
4 KB
Font
General
Full URL
https://cache-ssl.celtra.com/api/fonts/google/Lato:400/2_webfont.woff2?subset=ACDEIOPRSTUVW
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
3ed11976a24e8941c2e7d521180168f017c60c3d8b3d3a621da9fb0dcf93f37d

Request headers

Origin
https://www.darkreading.com
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 11 Sep 2020 12:59:24 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1764af62d635a1a6ee51aabc37405452.cloudfront.net (CloudFront)
age
67355
x-cache
Hit from cloudfront
status
200
content-length
3908
server
Apache
etag
"3ed11976a24e8941c2e7d521180168f017c60c3d8b3d3a621da9fb0dcf93f37d"
x-varnish
4595747 5225092
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=86400
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/font-woff2
x-amz-cf-id
Gq3TpnnLAkAYG_hZCBL2_-wMAyjkJlgjzCfHIkVp03YJn7I2vALsCQ==
SsZoGjxt
pbs.twimg.com/card_img/1304510119238131714/ Frame 1C4C
30 KB
30 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1304510119238131714/SsZoGjxt?format=png&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.2e5232162202896d50461b242819754e.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40B3) /
Resource Hash
24b718e50fcd03ae2cbca99320ea8cca4b57a1eb6665d31e7bc838cfd46833bb
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
age
40138
x-cache
HIT
status
200
content-length
30775
x-response-time
155
surrogate-key
card_img card_img/bucket/5 card_img/1304510119238131714
last-modified
Fri, 11 Sep 2020 19:58:23 GMT
server
ECS (fcn/40B3)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
cb47007746fff037163e5c632a781aeb
accept-ranges
bytes
4M1rmtpx
pbs.twimg.com/card_img/1303696411515482113/ Frame 1C4C
4 KB
4 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1303696411515482113/4M1rmtpx?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.2e5232162202896d50461b242819754e.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418A) /
Resource Hash
15f0c4d5c59fcfd038128cb0e160cf968c2aeacf708859afd7cb121051a93561
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
age
235938
x-cache
HIT
status
200
content-length
4246
x-response-time
124
surrogate-key
card_img card_img/bucket/6 card_img/1303696411515482113
last-modified
Wed, 09 Sep 2020 14:05:00 GMT
server
ECS (fcn/418A)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
b3762b213a33e4bbd1d0c7f1cbcf466f
accept-ranges
bytes
kb6WOuMI
pbs.twimg.com/card_img/1304177953362923521/ Frame 1C4C
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1304177953362923521/kb6WOuMI?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.2e5232162202896d50461b242819754e.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AF) /
Resource Hash
70566a93dc0cdb461e58656ff5a14a7e00b4f6730c8fd96c78c3a01228124044
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
age
120842
x-cache
HIT
status
200
content-length
5391
x-response-time
131
surrogate-key
card_img card_img/bucket/9 card_img/1304177953362923521
last-modified
Thu, 10 Sep 2020 21:58:29 GMT
server
ECS (fcn/41AF)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
cb301b092f6378c7cfe204c4ffb00888
accept-ranges
bytes
Qzvs0Asy
pbs.twimg.com/card_img/1304121594822885377/ Frame 1C4C
8 KB
8 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1304121594822885377/Qzvs0Asy?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.2e5232162202896d50461b242819754e.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40B3) /
Resource Hash
88d0ff13f5977662b8c71444286ad62c023c79dc6b67c08ded1a4a08c22b9237
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
age
131592
x-cache
HIT
status
200
content-length
8546
x-response-time
138
surrogate-key
card_img card_img/bucket/2 card_img/1304121594822885377
last-modified
Thu, 10 Sep 2020 18:14:32 GMT
server
ECS (fcn/40B3)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
fb11c808cc78fe326e91b398bf0b5429
accept-ranges
bytes
___GaY1O
pbs.twimg.com/card_img/1303116266350272512/ Frame 1C4C
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1303116266350272512/___GaY1O?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.2e5232162202896d50461b242819754e.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40B0) /
Resource Hash
e25b417a57ea79647830453e459009ef9bf5182674efb28d8a2b7159400b667b
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
age
153023
x-cache
HIT
status
200
content-length
5049
x-response-time
165
surrogate-key
card_img card_img/bucket/4 card_img/1303116266350272512
last-modified
Mon, 07 Sep 2020 23:39:43 GMT
server
ECS (fcn/40B0)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2edd67112c10d29d8c7d56c240500858
accept-ranges
bytes
A4mG0U5P_normal.jpg
pbs.twimg.com/profile_images/885169621795565573/ Frame 1C4C
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/885169621795565573/A4mG0U5P_normal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40B4) /
Resource Hash
25b438de3e944547e69c6de98e403f46a9aa4fb98e6d1bb34954fd30ebc19b56
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
age
266062
x-cache
HIT
status
200
content-length
1883
x-response-time
116
surrogate-key
profile_images profile_images/bucket/8 profile_images/885169621795565573
last-modified
Wed, 12 Jul 2017 16:08:58 GMT
server
ECS (fcn/40B4)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
f75b4e121aea2ac05d156e81505187aa
accept-ranges
bytes
jkdjZpCZ_normal.jpg
pbs.twimg.com/profile_images/1159162018106150917/ Frame 1C4C
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1159162018106150917/jkdjZpCZ_normal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418E) /
Resource Hash
d1c4968c56129e5f503b4b89be35a55d9c710ee63a58ad7497dbee1e372b1f54
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:41:59 GMT
x-content-type-options
nosniff
age
431313
x-cache
HIT
status
200
content-length
1807
x-response-time
122
surrogate-key
profile_images profile_images/bucket/6 profile_images/1159162018106150917
last-modified
Wed, 07 Aug 2019 17:56:55 GMT
server
ECS (fcn/418E)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
bf3e3a11c2832d7c748ec190a830b6e2
accept-ranges
bytes
EhowSTpWkAAAqrX
pbs.twimg.com/media/ Frame 1C4C
23 KB
23 KB
Image
General
Full URL
https://pbs.twimg.com/media/EhowSTpWkAAAqrX?format=jpg&name=360x360
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40DE) /
Resource Hash
e7c060e4cfa396d8922bccbea356fb7531f0623d60488953f09dbaa61b9e8066
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:00 GMT
x-content-type-options
nosniff
age
56932
x-cache
HIT
status
200
content-length
23679
x-response-time
156
surrogate-key
media media/bucket/6 media/1304408133146677248
last-modified
Fri, 11 Sep 2020 13:13:08 GMT
server
ECS (fcn/40DE)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2a6dbd52826fdbd57f29a7e35055d7da
accept-ranges
bytes
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/ Frame 1C4C
44 KB
7 KB
Stylesheet
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:7ee2:97c:ab4c:6c70:be36 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8FC6) /
Resource Hash
a549034009f79ead18a2154a8b730d8acb61e2f36c0434c0f9cff0f73df5d8cf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
220481
x-ton-expected-size
45170
x-cache
HIT
status
200
vary
Accept-Encoding
content-length
6839
x-response-time
8
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:54 GMT
server
ECAcc (frc/8FC6)
etag
"4mhImCFS9rptiUICNnLD1g=="
strict-transport-security
max-age=631138519
content-type
text/css
access-control-allow-origin
*
x-connection-hash
270b84f19322789fec971540df83998a
accept-ranges
bytes
expires
Sat, 19 Sep 2020 07:42:00 GMT
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/
44 KB
44 KB
Image
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:7ee2:97c:ab4c:6c70:be36 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8FC6) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
220481
x-ton-expected-size
45170
x-cache
HIT
status
200
vary
Accept-Encoding
content-length
6839
x-response-time
8
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:54 GMT
server
ECAcc (frc/8FC6)
etag
"4mhImCFS9rptiUICNnLD1g=="
strict-transport-security
max-age=631138519
content-type
text/css
access-control-allow-origin
*
x-connection-hash
270b84f19322789fec971540df83998a
accept-ranges
bytes
expires
Sat, 19 Sep 2020 07:42:00 GMT
truncated
/ Frame 1C4C
825 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
45055babdbc02ea34c7baa53f33fc68389c4c5f73afe0bfafd6c9bc5733399bc

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame 1C4C
572 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
42ecd6904f43af4e6cef62ddbeffa7b2b0b6c8ec5080a3e1deec4576f4294859

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame 1C4C
644 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
195e8e91bc727766f427243d4cfb79cdc873639991600bf99e9d2cab5cad77c8

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame 1C4C
739 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ed07f590bdfa9aa775dbfdef617d98e1e972d102d4289c7a68d3bd9118c280b

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame 1C4C
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ded16b9cb72df85ea242aaef8878c716abb57c746f0bfda6eabd2b9ddb2a23b5

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
Thenewgoldstandard.jpg
cache-ssl.celtra.com/api/blobs/f1e175301f63a768f9557559154aae061b7ee6abcb3fad4a37d7a9a316f7b063/ Frame 93EA
5 KB
6 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/f1e175301f63a768f9557559154aae061b7ee6abcb3fad4a37d7a9a316f7b063/Thenewgoldstandard.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
b15d16c084d5f596c6e53bd497fab961c2c5fd3562b5ca806bd8165bcab86ae6

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 21 Aug 2020 03:57:56 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
1914244
x-cache
Hit from cloudfront
status
200
content-length
5339
server
Apache
etag
"b15d16c084d5f596c6e53bd497fab961c2c5fd3562b5ca806bd8165bcab86ae6"
x-varnish
2311778 9318578
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
43AMJhLeyV8RZW2Ipi3KmbtSdYC80kIF5UyJb_CsfAJJZx0oUM9VFQ==
enterprisevisibilitywithdisciplinedcontrol.jpg
cache-ssl.celtra.com/api/blobs/ff0fbc2103eb71d1f7ac54e32fa12504dab0444cf2006724f1e1f12d145a7dfd/ Frame 93EA
18 KB
19 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/ff0fbc2103eb71d1f7ac54e32fa12504dab0444cf2006724f1e1f12d145a7dfd/enterprisevisibilitywithdisciplinedcontrol.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
7b955c4f2afd9b3b20b749f375416b51935aeb3c3a73003bc81629b74624189f

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 05 Sep 2020 01:00:14 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
628906
x-cache
Hit from cloudfront
status
200
content-length
18769
server
Apache
etag
"7b955c4f2afd9b3b20b749f375416b51935aeb3c3a73003bc81629b74624189f"
x-varnish
31921488
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
25f5ShjaRzet_EFlCO7aEPQLjC2JoL56WpRe8xB-f7tK21l2Vk4IRA==
OTsecurityforITprofessionals.jpg
cache-ssl.celtra.com/api/blobs/259b4bac541e601d4bb13d5c10796f0e8d255ab704b6fc4c3aca6fccfb91e172/ Frame 93EA
13 KB
14 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/259b4bac541e601d4bb13d5c10796f0e8d255ab704b6fc4c3aca6fccfb91e172/OTsecurityforITprofessionals.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
402e45bad7d0e11de6a07937d554f0c049d3ae1396f7d174e5f8bb2cb08239a9

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 28 Aug 2020 02:26:09 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
1314951
x-cache
Hit from cloudfront
status
200
content-length
13786
server
Apache
etag
"402e45bad7d0e11de6a07937d554f0c049d3ae1396f7d174e5f8bb2cb08239a9"
x-varnish
14458258
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
9SlWRDot3NtSiS3mqCY_Qg_29GaEd5456YBitDDYakHUdY23mbm0HQ==
securityoperationstech_book.jpg
cache-ssl.celtra.com/api/blobs/75f597e557add6abecfbdab44b325ef0ff5b254e8501f2f7676d8e06c5d96ab5/ Frame 93EA
13 KB
13 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/75f597e557add6abecfbdab44b325ef0ff5b254e8501f2f7676d8e06c5d96ab5/securityoperationstech_book.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
6ccbf0b657087412ac60ed87bec3b0ddf1100a1386e75d0623d59c184d0aad83

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sun, 06 Sep 2020 08:12:48 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
516552
x-cache
Hit from cloudfront
status
200
content-length
13287
server
Apache
etag
"6ccbf0b657087412ac60ed87bec3b0ddf1100a1386e75d0623d59c184d0aad83"
x-varnish
31103414 33097239
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
6L7PfUWTUV305z1k3KAtLWSMd9K7kFUIiVnrHy3gPnsBH4rZX34uNg==
securingpowergeneration.jpg
cache-ssl.celtra.com/api/blobs/5516c2b5b58df2bd22c6a909333d50a7afaa0ed792d0740aa796b80514b7c206/ Frame 93EA
19 KB
20 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/5516c2b5b58df2bd22c6a909333d50a7afaa0ed792d0740aa796b80514b7c206/securingpowergeneration.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
80534764d40f4f4f23e525c5a7c11c8b7fb6fadd3bda006833be4202fd55105b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 18 Aug 2020 04:00:30 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
2173289
x-cache
Hit from cloudfront
status
200
content-length
19449
server
Apache
etag
"80534764d40f4f4f23e525c5a7c11c8b7fb6fadd3bda006833be4202fd55105b"
x-varnish
48362371 18116238
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
3IC5WIsYPrBMOHKqpgdKBMUdFFCBAnKvutIxdgMWKeI5OBio4PEqTQ==
li_hover.png
cache-ssl.celtra.com/api/blobs/e3228348fc17573d7db7d135ba5cf60985157f70dae6643939d3a6686b2aa699/ Frame 93EA
591 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/e3228348fc17573d7db7d135ba5cf60985157f70dae6643939d3a6686b2aa699/li_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
c19345a03fed44d267abbe2f427bdcd261aa86a447320f15f3eef8e121690794

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 24 Jun 2020 08:39:30 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
6908550
x-cache
Hit from cloudfront
status
200
content-length
591
server
Apache
etag
"c19345a03fed44d267abbe2f427bdcd261aa86a447320f15f3eef8e121690794"
x-varnish
14319631
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
gbrPJo6446Jnv4uVVU2jUvPGjzSaTle-rbZBpIgsoxt7Gahmw4RgFQ==
li.png
cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/ Frame 93EA
585 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/li.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 24 Jun 2020 08:39:09 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
6908571
x-cache
Hit from cloudfront
status
200
content-length
585
server
Apache
etag
"d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c"
x-varnish
7700850 4554754
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
RYH2NtA_k8WI3n6RUD1xzAL8BnmEbDGmmnyvusReT8KRf2gRAi3Rqw==
fb_hover.png
cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/ Frame 93EA
348 B
857 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/fb_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 07 Aug 2020 02:10:47 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
3130273
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39"
x-varnish
10649651
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
pgQQvRl2AiSAV9I-DGir9Bbq12z1LPAwXb6VizV0BgsYwhgmtS_dEg==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 93EA
348 B
865 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 24 Jun 2020 08:40:30 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
6908490
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
15761952 19464267
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
s-1HuRymjIzAJ5fU5HNNFRfd3xUP56oSF7-50gDc0I0FyONy1skjyw==
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 93EA
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 06 Aug 2020 11:54:14 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
3181666
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
5873950
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
K8mUoFQJlqAm7Fpj6woXqr21O7VOFMxwoBwMwL6eclxjVIqmVoMq-w==
tw_hover.png
cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/ Frame 93EA
777 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/tw_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 24 Jun 2020 08:39:13 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
6908567
x-cache
Hit from cloudfront
status
200
content-length
777
server
Apache
etag
"1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e"
x-varnish
10813465 6291479
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
8FfD5yXL29mOn8BcM5-HdpGP8TnbsJTEhFt6DK514exHEI8HZy3hLw==
yt_hover.png
cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/ Frame 93EA
918 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/yt_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 24 Jun 2020 08:39:09 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
6908571
x-cache
Hit from cloudfront
status
200
content-length
918
server
Apache
etag
"6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677"
x-varnish
5440136 2129933
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
icbe3PFS9yHrdKAjUxXGaHSEwW6LyjkUI7uLoy-wIBqaqV4LEKp9QQ==
yt.png
cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/ Frame 93EA
914 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/yt.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 24 Jun 2020 08:39:09 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
6908571
x-cache
Hit from cloudfront
status
200
content-length
914
server
Apache
etag
"8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28"
x-varnish
5440137 164521
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
kUIc2Kho2MYw6tcJ-2rAjXM3r9h-gsshX_P3kXtOBEiRJuK3fuHpCA==
blogger_hover.png
cache-ssl.celtra.com/api/blobs/1f4640591d1345ceaeb90f8c11af7ccf4e25448d2e796f05dee7a018dd2c2f2d/ Frame 93EA
790 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/1f4640591d1345ceaeb90f8c11af7ccf4e25448d2e796f05dee7a018dd2c2f2d/blogger_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
b9a83984bfc54b6515de11d7f365042e4d87f71aa7a0f17dcadb2b2ce308db1d

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 26 Aug 2020 19:08:19 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
1427621
x-cache
Hit from cloudfront
status
200
content-length
790
server
Apache
etag
"b9a83984bfc54b6515de11d7f365042e4d87f71aa7a0f17dcadb2b2ce308db1d"
x-varnish
78552053 70049505
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
lWbtQ6acAParvyvU8KMq08Nelmdm2WDh_yuyC-bHUhKgY5OsgC4iDQ==
blogger.png
cache-ssl.celtra.com/api/blobs/4d432c7463c13823917f9489319d004cb32312d5c53b963d76312e8500f8b6f9/ Frame 93EA
790 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/4d432c7463c13823917f9489319d004cb32312d5c53b963d76312e8500f8b6f9/blogger.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
42ab1d01fe2216dbedbdc85cdb98ef9921421d1d6a5c71a40121f0ec0c98282a

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 05 Sep 2020 06:10:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
610265
x-cache
Hit from cloudfront
status
200
content-length
790
server
Apache
etag
"42ab1d01fe2216dbedbdc85cdb98ef9921421d1d6a5c71a40121f0ec0c98282a"
x-varnish
32572141 17099825
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
LspaQ9KK2YIwuj5Enm3xdX3wkdvarc5LuZbSf7-o3Of1-Z4_EiOj7g==
3092075958191873562
tpc.googlesyndication.com/simgad/
250 KB
250 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/3092075958191873562?
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
edc22566c852f4dbc2da2a3aa45078afd771596eaf042510365da81ec2b3ae52
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 08 Sep 2020 06:22:09 GMT
x-content-type-options
nosniff
age
350391
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
256016
x-xss-protection
0
last-modified
Mon, 20 Jul 2020 21:23:58 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 08 Sep 2021 06:22:09 GMT
waterfall%20logo%20copy.png
cache-ssl.celtra.com/api/blobs/fc832b7736ebf39dd4efe1918a6cf47a8343b8272d1acfe7918f85083ae42004/ Frame 93EA
6 KB
7 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/fc832b7736ebf39dd4efe1918a6cf47a8343b8272d1acfe7918f85083ae42004/waterfall%20logo%20copy.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
bee14e3d1698d79b5119ef95492ec5ba9f055b7729ea91e8d3d6a7db7c13955b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 18 Aug 2020 04:05:08 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
2173011
x-cache
Hit from cloudfront
status
200
content-length
6374
server
Apache
etag
"bee14e3d1698d79b5119ef95492ec5ba9f055b7729ea91e8d3d6a7db7c13955b"
x-varnish
50796154 49292830
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
wT1u69gt26prEFIrii8r3JDKjwh25kLhp-pNFu_FpHhYw4PCyIIPRg==
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F14179621541502530401&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=184&w=592&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519097&de=399339085620&cu=1599896519097&m=14&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4331&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4&cd=0&ah=4&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=21887076%3A2734573621%3A5454835618%3A138321086638&bo=27868836&bp=43877916&bd=insight&zMoatPS=insight&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-17&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-17&iq=na&tt=na&tc=0&fs=184513&na=899776075&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 8F76
42 B
209 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstq85EgVcLgBsBLdozqgbgoqYtwX74IzJzXLxyPTHwdQriusiorRDRzqrFSMMxLd5nF3Jhc3dAv0EdlWHzp65GJDjkclNgpgjHtPH2IHhQ&sig=Cg0ArKJSzA-cbYhyu66dEAE&adk=273951308&tt=-1&bs=1600%2C1200&mtos=1172,1172,1172,1172,1172&tos=1172,0,0,0,0&p=461,960,711,1260&rxlist=1&mcvt=1172&rs=0&ht=0&tfs=242&tls=1414&mc=1&lte=-1&bas=0&bac=0&met=mue&avms=nio&niot_obs=22&niot_cbk=213&md=2&btr=0&cpmav=0&lm=2&rst=1599896518517&dlt&rpt&isd=0&msd&xdi=0&ps=1600%2C5506&scs=1600%2C1200&pt=-1&bin=4&deb=1-0-0-8-22-7-7-0-0-0&tvt=1393&is=300%2C250&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&r=v&id=osdim&vs=4&uc=8&upc=2&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=300x250&itpl=3&v=20200911
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame F25E
42 B
107 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssiTKvvNseU8_iwtNZDFS-wPeIO_6P2AS3QbOeSQfrHS5qse4pyzrFcdAKgQrmew9VZpu5_CADyFrxHxBsnek4YapAukg5-v1S_tMJNSK8&sig=Cg0ArKJSzM7M91tC4IHHEAE&adk=3643211432&tt=-1&bs=1600%2C1200&mtos=1192,1192,1192,1192,1192&tos=1192,0,0,0,0&p=98,436,188,1164&rxlist=1&mcvt=1192&rs=0&ht=0&tfs=265&tls=1457&mc=1&lte=-1&bas=0&bac=0&met=mue&avms=nio&niot_obs=7&niot_cbk=243&md=2&btr=0&cpmav=0&lm=2&rst=1599896518473&dlt&rpt=605&isd=0&msd=0&xdi=0&ps=1600%2C5506&scs=1600%2C1200&pt=-1&bin=4&deb=1-0-0-8-5-7-7-0-0-0&tvt=1453&is=728%2C90&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&r=v&id=osdim&vs=4&uc=8&upc=2&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=728x90&itpl=3&v=20200911
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
waterfall%20logo%20copy.png
cache-ssl.celtra.com/api/blobs/fc832b7736ebf39dd4efe1918a6cf47a8343b8272d1acfe7918f85083ae42004/ Frame 93EA
6 KB
7 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/fc832b7736ebf39dd4efe1918a6cf47a8343b8272d1acfe7918f85083ae42004/waterfall%20logo%20copy.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
bee14e3d1698d79b5119ef95492ec5ba9f055b7729ea91e8d3d6a7db7c13955b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 18 Aug 2020 04:05:08 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
2173011
x-cache
Hit from cloudfront
status
200
content-length
6374
server
Apache
etag
"bee14e3d1698d79b5119ef95492ec5ba9f055b7729ea91e8d3d6a7db7c13955b"
x-varnish
50796154 49292830
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
3EgX3iKCTGBgTRvlgApcM-yZ5wZ_e6fbjJonw_G4ToD_TWQFzmUAQQ==
Thenewgoldstandard.jpg
cache-ssl.celtra.com/api/blobs/f1e175301f63a768f9557559154aae061b7ee6abcb3fad4a37d7a9a316f7b063/ Frame 93EA
5 KB
6 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/f1e175301f63a768f9557559154aae061b7ee6abcb3fad4a37d7a9a316f7b063/Thenewgoldstandard.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
b15d16c084d5f596c6e53bd497fab961c2c5fd3562b5ca806bd8165bcab86ae6

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 21 Aug 2020 03:57:56 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
1914244
x-cache
Hit from cloudfront
status
200
content-length
5339
server
Apache
etag
"b15d16c084d5f596c6e53bd497fab961c2c5fd3562b5ca806bd8165bcab86ae6"
x-varnish
2311778 9318578
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
SfIHcyfO7v5m-qzEvQxEUNUfoVcThl5uLE55cHOY7AteJObYkDtmYw==
enterprisevisibilitywithdisciplinedcontrol.jpg
cache-ssl.celtra.com/api/blobs/ff0fbc2103eb71d1f7ac54e32fa12504dab0444cf2006724f1e1f12d145a7dfd/ Frame 93EA
18 KB
19 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/ff0fbc2103eb71d1f7ac54e32fa12504dab0444cf2006724f1e1f12d145a7dfd/enterprisevisibilitywithdisciplinedcontrol.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
7b955c4f2afd9b3b20b749f375416b51935aeb3c3a73003bc81629b74624189f

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 05 Sep 2020 01:00:14 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
628906
x-cache
Hit from cloudfront
status
200
content-length
18769
server
Apache
etag
"7b955c4f2afd9b3b20b749f375416b51935aeb3c3a73003bc81629b74624189f"
x-varnish
31921488
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
GMRjoeLkqerDyhnoJ3XSmv2VxlHxr9jtQkdjo491LqVM8ZyfbtaKqw==
OTsecurityforITprofessionals.jpg
cache-ssl.celtra.com/api/blobs/259b4bac541e601d4bb13d5c10796f0e8d255ab704b6fc4c3aca6fccfb91e172/ Frame 93EA
13 KB
14 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/259b4bac541e601d4bb13d5c10796f0e8d255ab704b6fc4c3aca6fccfb91e172/OTsecurityforITprofessionals.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
402e45bad7d0e11de6a07937d554f0c049d3ae1396f7d174e5f8bb2cb08239a9

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 28 Aug 2020 02:26:09 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
1314951
x-cache
Hit from cloudfront
status
200
content-length
13786
server
Apache
etag
"402e45bad7d0e11de6a07937d554f0c049d3ae1396f7d174e5f8bb2cb08239a9"
x-varnish
14458258
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
81IWEIcz6lkTfY6JwrvuEJ-UWbin_FAAOWK9NgOzT84ImqUF6RtH2Q==
securityoperationstech_book.jpg
cache-ssl.celtra.com/api/blobs/75f597e557add6abecfbdab44b325ef0ff5b254e8501f2f7676d8e06c5d96ab5/ Frame 93EA
13 KB
13 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/75f597e557add6abecfbdab44b325ef0ff5b254e8501f2f7676d8e06c5d96ab5/securityoperationstech_book.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
6ccbf0b657087412ac60ed87bec3b0ddf1100a1386e75d0623d59c184d0aad83

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sun, 06 Sep 2020 08:12:48 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
516552
x-cache
Hit from cloudfront
status
200
content-length
13287
server
Apache
etag
"6ccbf0b657087412ac60ed87bec3b0ddf1100a1386e75d0623d59c184d0aad83"
x-varnish
31103414 33097239
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
MD5Xuw78wq2lshaLMdIsL7AN5V3jFWW8a6yMHtpanK5PgHV6759moQ==
securingpowergeneration.jpg
cache-ssl.celtra.com/api/blobs/5516c2b5b58df2bd22c6a909333d50a7afaa0ed792d0740aa796b80514b7c206/ Frame 93EA
19 KB
20 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/5516c2b5b58df2bd22c6a909333d50a7afaa0ed792d0740aa796b80514b7c206/securingpowergeneration.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
80534764d40f4f4f23e525c5a7c11c8b7fb6fadd3bda006833be4202fd55105b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 18 Aug 2020 04:00:30 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
2173289
x-cache
Hit from cloudfront
status
200
content-length
19449
server
Apache
etag
"80534764d40f4f4f23e525c5a7c11c8b7fb6fadd3bda006833be4202fd55105b"
x-varnish
48362371 18116238
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
zHIiFz2V_72JmCeUj2oJ0p1jxHn8HIP4hT7Z040r0BdNmW36rvOAAw==
li.png
cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/ Frame 93EA
585 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/li.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 24 Jun 2020 08:39:09 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
6908571
x-cache
Hit from cloudfront
status
200
content-length
585
server
Apache
etag
"d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c"
x-varnish
7700850 4554754
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
y8vzFTeNYQrrEGrjxHowqXY3-IZIhp8hV4eipVEReeChIabSKo1xBg==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 93EA
348 B
848 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 31 Aug 2020 11:18:13 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
1023826
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
4072961
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
-ikGO1hNJ54ZG_HIN24-tnIw-7H1Ht6KOuOlfuOWrHYN6Kok1rDtUA==
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 93EA
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 06 Aug 2020 11:54:14 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
3181666
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
5873950
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
yK8r5zCNCRZdhcguEnNZYgdXa3kTpTEnSjae8mUMV9Xz2mLQ462pSA==
yt.png
cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/ Frame 93EA
914 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/yt.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sun, 23 Aug 2020 04:48:59 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
1738381
x-cache
Hit from cloudfront
status
200
content-length
914
server
Apache
etag
"8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28"
x-varnish
69906753
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
uy0Q8hSq1-gpKOvelS-bqYRyGoBC2E9jxP9bwmmIo7cWhy-OO4nFWQ==
blogger.png
cache-ssl.celtra.com/api/blobs/4d432c7463c13823917f9489319d004cb32312d5c53b963d76312e8500f8b6f9/ Frame 93EA
790 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/4d432c7463c13823917f9489319d004cb32312d5c53b963d76312e8500f8b6f9/blogger.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
42ab1d01fe2216dbedbdc85cdb98ef9921421d1d6a5c71a40121f0ec0c98282a

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 05 Sep 2020 06:10:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
610265
x-cache
Hit from cloudfront
status
200
content-length
790
server
Apache
etag
"42ab1d01fe2216dbedbdc85cdb98ef9921421d1d6a5c71a40121f0ec0c98282a"
x-varnish
32572141 17099825
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
wJ-wEuRs_4bsLMNVtEsCvWYCZl4HTzgTkfGeaeDhah2h9dDqtqvARg==
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiOjEsImNsaWVudFRpbWVzdGFtcCI6MTU5OTg5NjUxOS42OTMsInNjb3BlIjoiZ2xvYmFsIiwidXNlckFnZW50IjoiTW96aWxsYS81LjAgKE1hY2ludG9zaDsgSW50ZWwgTWFjIE9TIFggMTBfMTRfNSkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzgzLjAuNDEwMy42MSBTYWZhcmkvNTM3LjM2Iiwib3JpZW50YXRpb24iOjAsInRvcG1vc3RSZWFjaGFibGVXaW5kb3ciOnsid2lkdGgiOjE2MDAsImhlaWdodCI6MTIwMH0sImhvc3RXaW5kb3ciOnsid2lkdGgiOjUsImhlaWdodCI6NX0sIm5lc3RpbmciOnsiaWZyYW1lIjp0cnVlLCJmcmllbmRseUlmcmFtZSI6dHJ1ZSwiaWFiRnJpZW5kbHlJZnJhbWUiOnRydWUsImhvc3RpbGVJZnJhbWUiOmZhbHNlLCJpZnJhbWVEZXB0aCI6MX0sInBhZ2VWaXNpYmlsaXR5QXBpIjp0cnVlLCJyZXF1ZXN0QW5pbWF0aW9uRnJhbWUiOnRydWUsInRvcFdpbmRvd05hdGl2ZVJBRlN1cHBvcnRlZCI6dHJ1ZSwiYWxsb3dOb25OYXRpdmVSQUZGb3JWaWV3YWJsZVRpbWVVc2VkIjpmYWxzZSwiY2xpZW50VGltZVpvbmVPZmZzZXRJbk1pbnV0ZXMiOi0xMjAsInN1cHBvcnRzQ29udGFpbmVyVmlld2FiaWxpdHkiOnRydWUsInN1cHBvcnRzQ29udGFpbmVySW5pdGlhbFZpZXdhYmlsaXR5Ijp0cnVlLCJ0YWdQYXJlbnRXaWR0aCI6MCwidGFnUGFyZW50SGVpZ2h0IjowLCJhbXBEZXRlY3RlZCI6ZmFsc2UsImFtcE5lc3RpbmdMZXZlbCI6IiIsInNhZmVGcmFtZURldGVjdGVkIjpmYWxzZSwiZmV0Y2hTdXBwb3J0ZWQiOnRydWUsImFzYXBFbmFibGVkIjpudWxsLCJuYXRpdmVQcm9taXNlc1N1cHBvcnRlZCI6dHJ1ZSwiYmVhY29uU3VwcG9ydGVkIjp0cnVlLCJJbnRlcnNlY3Rpb25PYnNlcnZlclN1cHBvcnRlZCI6dHJ1ZSwiaXNNdXRhdGlvbk9ic2VydmVyU3VwcG9ydGVkIjp0cnVlLCJ3ZWJWaWV3IjpudWxsLCJpc1dpbmRvd09wZW5OYXRpdmUiOnRydWUsInByb3RvTG9hZGluZyI6eyJkYXRhTG9hZFN0YXR1cyI6InN1cHBvcnRlZCIsImJsb2JMb2FkU3RhdHVzIjoic3VwcG9ydGVkIn0sInRvcFdpbmRvd0xvY2F0aW9uIjoiaHR0cHM6Ly93d3cuZGFya3JlYWRpbmcuY29tIiwidG9wV2luZG93TG9jYXRpb25MZW5ndGgiOjI3LCJuYW1lIjoiZW52aXJvbm1lbnRJbmZvIn0seyJzZXNzaW9uSWQiOiJzMTU5OTg5NjUxOHg1MGE4YmM2OGJkYTdjZng4MjU2ODIwNyIsImFjY291bnRJZCI6IjQ0Yjc0YjM1Iiwic3RyZWFtIjoiYWRFdmVudHMiLCJpbnN0YW50aWF0aW9uIjoiMDY0NjM5NTk2NjA4MDk2NiIsImluZGV4IjoyLCJjbGllbnRUaW1lc3RhbXAiOjE1OTk4OTY1MjAuMTY1LCJuYW1lIjoiY3JlYXRpdmVMb2FkZWQiLCJ2aWV3YWJpbGl0eTAwTWVhc3VyYWJsZSI6dHJ1ZSwidmlld2FiaWxpdHk1MDFNZWFzdXJhYmxlIjp0cnVlLCJ2aWV3YWJsZVRpbWVNZWFzdXJhYmxlIjp0cnVlLCJjZG5WYXJpYW50Ijoibm9uZSJ9LHsic2Vzc2lvbklkIjoiczE1OTk4OTY1MTh4NTBhOGJjNjhiZGE3Y2Z4ODI1NjgyMDciLCJhY2NvdW50SWQiOiI0NGI3NGIzNSIsInN0cmVhbSI6ImFkRXZlbnRzIiwiaW5zdGFudGlhdGlvbiI6IjA2NDYzOTU5NjYwODA5NjYiLCJpbmRleCI6MywiY2xpZW50VGltZXN0YW1wIjoxNTk5ODk2NTIwLjE5MiwibmFtZSI6InZpZXdwb3J0UGxhY2VtZW50R2VvbWV0cnkiLCJwYWdlRGltZW5zaW9ucyI6eyJoZWlnaHQiOjY1MDYsIndpZHRoIjoxNjAwfSwidmlld3BvcnRQb3NpdGlvblJlY3QiOnsid2lkdGgiOjE2MDAsImhlaWdodCI6MTIwMCwibGVmdCI6MCwidG9wIjowfSwiZmlyc3RQbGFjZW1lbnRQb3NpdGlvblJlY3QiOnsibGVmdCI6OTQyLCJ0b3AiOjQzNS45MjE4NzUsIndpZHRoIjozMzYsImhlaWdodCI6NjAwfX0seyJzZXNzaW9uSWQiOiJzMTU5OTg5NjUxOHg1MGE4YmM2OGJkYTdjZng4MjU2ODIwNyIsImFjY291bnRJZCI6IjQ0Yjc0YjM1Iiwic3RyZWFtIjoiYWRFdmVudHMiLCJpbnN0YW50aWF0aW9uIjoiMDY0NjM5NTk2NjA4MDk2NiIsImluZGV4Ijo0LCJjbGllbnRUaW1lc3RhbXAiOjE1OTk4OTY1MjAuMTk3LCJuYW1lIjoidmlld2FibGUwMCIsImNyaXRlcmlvbiI6eyJuYW1lIjoiQ29yZSIsInJhdGlvIjowLCJ0aW1lIjowfX0seyJzZXNzaW9uSWQiOiJzMTU5OTg5NjUxOHg1MGE4YmM2OGJkYTdjZng4MjU2ODIwNyIsImFjY291bnRJZCI6IjQ0Yjc0YjM1Iiwic3RyZWFtIjoiYWRFdmVudHMiLCJpbnN0YW50aWF0aW9uIjoiMDY0NjM5NTk2NjA4MDk2NiIsImluZGV4Ijo1LCJjbGllbnRUaW1lc3RhbXAiOjE1OTk4OTY1MjAuMjEyLCJ1bml0TmFtZSI6ImJhbm5lciIsInVuaXRWYXJpYW50TG9jYWxJZCI6bnVsbCwic2NyZWVuTG9jYWxJZCI6MTM2OCwic2NyZWVuVGl0bGUiOiJSZXNvdXJjZXMiLCJzY3JlZW5Jc01hc3RlciI6ZmFsc2UsIm9iamVjdExvY2FsSWQiOm51bGwsIm9iamVjdE5hbWUiOm51bGwsIm9iamVjdENsYXp6IjpudWxsLCJpbml0aWF0aW9uVGltZXN0YW1wIjoxNTk5ODk2NTIwLjIxMiwibmFtZSI6InNjcmVlblNob3duIn0seyJzZXNzaW9uSWQiOiJzMTU5OTg5NjUxOHg1MGE4YmM2OGJkYTdjZng4MjU2ODIwNyIsImFjY291bnRJZCI6IjQ0Yjc0YjM1Iiwic3RyZWFtIjoiYWRFdmVudHMiLCJpbnN0YW50aWF0aW9uIjoiMDY0NjM5NTk2NjA4MDk2NiIsImluZGV4Ijo2LCJjbGllbnRUaW1lc3RhbXAiOjE1OTk4OTY1MjAuMjEyLCJuYW1lIjoiY3JlYXRpdmVSZW5kZXJlZCJ9XX0=?crc32c=484015274
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.194.7 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-123-194-7.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:00 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1599896519119&de=542684197896&m=0&ar=2ab45f8-clean&iw=0e7324d&q=23&cb=0&ym=0&cu=1599896519119&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=21887076%3A2685786169%3A5350135869%3A138308935691&zMoatPS=rec2&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&bo=27868836&bp=43877916&bd=rec2&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1902%3A2149%3A0%3A0&iq=na&tt=na&fs=184513&na=452887207&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
news_stroke_v1_78ce5b21fb24a7c7e528d22fc25bd9f9df7f24e2.svg
ton.twimg.com/tfw/assets/ Frame 1C4C
829 B
530 B
Image
General
Full URL
https://ton.twimg.com/tfw/assets/news_stroke_v1_78ce5b21fb24a7c7e528d22fc25bd9f9df7f24e2.svg
Requested by
Host: ton.twimg.com
URL: https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:7ee2:97c:ab4c:6c70:be36 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8FB7) /
Resource Hash
5c0f79d0286f1fd3db48e1b689358017b302c0f4babde540329e8c644cf119c7
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
219737
x-ton-expected-size
829
x-cache
HIT
status
200
vary
Accept-Encoding
content-length
395
x-response-time
9
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:54 GMT
server
ECAcc (frc/8FB7)
etag
"CTUg6L9PuY+d9h5xpE0zmw=="
strict-transport-security
max-age=631138519
content-type
image/svg+xml
access-control-allow-origin
*
x-connection-hash
612fdf00591e6b333a07099fbd40c9c9
accept-ranges
bytes
expires
Sat, 19 Sep 2020 07:42:00 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiOjcsImNsaWVudFRpbWVzdGFtcCI6MTU5OTg5NjUyMC4yMzQsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTk5ODk2NTIwLjE5OCwidG8iOjE1OTk4OTY1MjAuMTk4fV19?crc32c=2004559048
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.194.7 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-123-194-7.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:00 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
user_timeline
cache-ssl.celtra.com/api/twitter/statuses/ Frame 93EA
57 KB
5 KB
Script
General
Full URL
https://cache-ssl.celtra.com/api/twitter/statuses/user_timeline?screen_name=WaterfallSecure&jsonp=jsonp_celtra_twitter_proxy_366
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
751ab87bdc582620e469b04ca28105c8fd212eab37e186d934fbadec457dadcf

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:00 GMT
content-encoding
gzip
age
0
x-cache
Miss from cloudfront
status
200
content-length
4629
access-control-allow-origin
*
server
Apache
etag
"aa9ffe7dd63ddc910e56b7753882bf2ce8f1feb22baf390c9f2f7ab774228829"
vary
Accept-Encoding
x-varnish
16091710
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=900
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
Gf1BVTwLSqEN7BG1DXwogXciSzX4Si0L5smyMZ3TFxRwdEoXZwZJAg==
iframe_api
www.youtube.com/ Frame 93EA
859 B
1 KB
Script
General
Full URL
https://www.youtube.com/iframe_api
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
YouTube Frontend Proxy /
Resource Hash
7303fd4521b231bad4280672d36b7a4486a47a3bc0248da7df8c28989e462400
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:00 GMT
x-content-type-options
nosniff
server
YouTube Frontend Proxy
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
status
200
cache-control
no-cache
content-type
application/javascript
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
859
x-xss-protection
0
expires
Tue, 27 Apr 1971 19:44:06 GMT
SsZoGjxt
pbs.twimg.com/card_img/1304510119238131714/ Frame 1C4C
30 KB
30 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1304510119238131714/SsZoGjxt?format=png&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40B3) /
Resource Hash
24b718e50fcd03ae2cbca99320ea8cca4b57a1eb6665d31e7bc838cfd46833bb
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:00 GMT
x-content-type-options
nosniff
age
40139
x-cache
HIT
status
200
content-length
30775
x-response-time
155
surrogate-key
card_img card_img/bucket/5 card_img/1304510119238131714
last-modified
Fri, 11 Sep 2020 19:58:23 GMT
server
ECS (fcn/40B3)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
cb47007746fff037163e5c632a781aeb
accept-ranges
bytes
li_hover.png
cache-ssl.celtra.com/api/blobs/e3228348fc17573d7db7d135ba5cf60985157f70dae6643939d3a6686b2aa699/ Frame 93EA
591 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/e3228348fc17573d7db7d135ba5cf60985157f70dae6643939d3a6686b2aa699/li_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
c19345a03fed44d267abbe2f427bdcd261aa86a447320f15f3eef8e121690794

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 24 Jun 2020 08:39:30 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
6908550
x-cache
Hit from cloudfront
status
200
content-length
591
server
Apache
etag
"c19345a03fed44d267abbe2f427bdcd261aa86a447320f15f3eef8e121690794"
x-varnish
14319631
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
ENT4nxksTJTfbyFVFhudAH7ABGYNBfO0M3hJ7CVtFXUG8n671DJUfQ==
li.png
cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/ Frame 93EA
585 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/2e1d1ae5940fbdaa5f95c1c17393175faf02b27a8c6b37dca2419c70113760ab/li.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 24 Jun 2020 08:39:09 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
6908571
x-cache
Hit from cloudfront
status
200
content-length
585
server
Apache
etag
"d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c"
x-varnish
7700850 4554754
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
kC1hXf0k8qwBN9CR-lSS3mUkwe5YfIDlDj6vP_McUHv9cSbm9s_YEg==
fb_hover.png
cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/ Frame 93EA
348 B
849 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/fb_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sun, 30 Aug 2020 00:58:53 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
1147387
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39"
x-varnish
25977039
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
LOoYdSOOBBN7TzvB-b651IbITPyRir7Yc1AqeabhCHPk_c64sDrhJg==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 93EA
348 B
849 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 31 Aug 2020 11:18:13 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
1023826
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
4072961
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
6YKYyFt2nRXA_r0H3pe-vIvyZTL7eU2LEMwJvtq-swMhK5KxPxoqmw==
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 93EA
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 06 Aug 2020 11:54:14 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
3181666
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
5873950
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
5oU_FndGRCuy5P0H_9huxwkfWx2yIjZkuqLY_BuFAfTrF_AD3Om8fA==
tw_hover.png
cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/ Frame 93EA
777 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/tw_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 24 Jun 2020 08:39:13 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
6908567
x-cache
Hit from cloudfront
status
200
content-length
777
server
Apache
etag
"1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e"
x-varnish
10813465 6291479
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
cB0kooy5EtpAq0x9EhU1qQXTWFMm9byg9JOz9x_TBMn5dk68YU-Kcg==
yt_hover.png
cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/ Frame 93EA
918 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/yt_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 09 Sep 2020 04:17:45 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
271454
x-cache
Hit from cloudfront
status
200
content-length
918
server
Apache
etag
"6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677"
x-varnish
4042496
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
3P4V7OIwXXBGYkRmv3Q3oWLWjB0rCwVld8rzkOJfoBkSFowE9qkZRw==
yt.png
cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/ Frame 93EA
914 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/yt.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sun, 23 Aug 2020 04:48:59 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
1738381
x-cache
Hit from cloudfront
status
200
content-length
914
server
Apache
etag
"8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28"
x-varnish
69906753
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
QKzVcyiNWZvqbWQGZ3Ci3rT05ZNizBKZtcgCkpRFn0_929kuL82TEw==
blogger_hover.png
cache-ssl.celtra.com/api/blobs/1f4640591d1345ceaeb90f8c11af7ccf4e25448d2e796f05dee7a018dd2c2f2d/ Frame 93EA
790 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/1f4640591d1345ceaeb90f8c11af7ccf4e25448d2e796f05dee7a018dd2c2f2d/blogger_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
b9a83984bfc54b6515de11d7f365042e4d87f71aa7a0f17dcadb2b2ce308db1d

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 26 Aug 2020 19:08:19 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
1427621
x-cache
Hit from cloudfront
status
200
content-length
790
server
Apache
etag
"b9a83984bfc54b6515de11d7f365042e4d87f71aa7a0f17dcadb2b2ce308db1d"
x-varnish
78552053 70049505
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
y22EsijBA5JA2hZYjp3GuN5MfaJNVhRdKjDF_A50iu6uoLRLFKeCBQ==
blogger.png
cache-ssl.celtra.com/api/blobs/4d432c7463c13823917f9489319d004cb32312d5c53b963d76312e8500f8b6f9/ Frame 93EA
790 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/4d432c7463c13823917f9489319d004cb32312d5c53b963d76312e8500f8b6f9/blogger.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
42ab1d01fe2216dbedbdc85cdb98ef9921421d1d6a5c71a40121f0ec0c98282a

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 05 Sep 2020 06:10:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
610265
x-cache
Hit from cloudfront
status
200
content-length
790
server
Apache
etag
"42ab1d01fe2216dbedbdc85cdb98ef9921421d1d6a5c71a40121f0ec0c98282a"
x-varnish
32572141 17099825
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
8AIJb0fOchmV3tVGYV3k1fIRxtV4phmczlUCo8o7kYmf00bY8fcSRw==
Podcast%20Logo_image.jpg
cache-ssl.celtra.com/api/blobs/ed99fc30d7c9ea97a308b9756535189fe3c637f993feb6fcda31051dbc5f53ab/ Frame 93EA
33 KB
34 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/ed99fc30d7c9ea97a308b9756535189fe3c637f993feb6fcda31051dbc5f53ab/Podcast%20Logo_image.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
04dd9ba44f5f3abf15cf5866e7254905c7dbe521e7d721e572641be220a51582

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 28 Aug 2020 02:26:10 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
1314950
x-cache
Hit from cloudfront
status
200
content-length
34203
server
Apache
etag
"04dd9ba44f5f3abf15cf5866e7254905c7dbe521e7d721e572641be220a51582"
x-varnish
8524286
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
o3XmRJBtdR512QoIW-61e8rsSoyjQGjraudag8aKLwFGiD5QslOdzA==
listen_now_black.png
cache-ssl.celtra.com/api/blobs/c5a472a29ae52d8152b7ca5086e9e9d66af3fa81359ecb94f7b5afd362bf5035/ Frame 93EA
804 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/c5a472a29ae52d8152b7ca5086e9e9d66af3fa81359ecb94f7b5afd362bf5035/listen_now_black.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
143.204.215.89 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-215-89.fra53.r.cloudfront.net
Software
Apache /
Resource Hash
4d74b3c0bac64278bd6a397ff070229e056df5b34adeb60252dc0b7de916125f

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 11 Sep 2020 01:09:52 GMT
via
1.1 varnish (Varnish/5.0), 1.1 269bfdd288bfea5423a4e9e701777da6.cloudfront.net (CloudFront)
age
109928
x-cache
Hit from cloudfront
status
200
content-length
804
server
Apache
etag
"4d74b3c0bac64278bd6a397ff070229e056df5b34adeb60252dc0b7de916125f"
x-varnish
14485790
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range, Content-Disposition
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
M6vy00ai9bzqjeDDiNO4H0CQhSs2IlvVjPYSYfz1ovtfRynfMggdEw==
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1599896519135&de=360353063672&m=0&ar=2ab45f8-clean&iw=0e7324d&q=27&cb=0&ym=0&cu=1599896519135&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4854677916%3A2676539655%3A5324189708%3A138312214604&zMoatPS=rec1&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&bo=27868836&bp=43877916&bd=rec1&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1902%3A2149%3A0%3A0&iq=na&tt=na&fs=184513&na=66053087&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
4M1rmtpx
pbs.twimg.com/card_img/1303696411515482113/ Frame 1C4C
4 KB
4 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1303696411515482113/4M1rmtpx?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418A) /
Resource Hash
15f0c4d5c59fcfd038128cb0e160cf968c2aeacf708859afd7cb121051a93561
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:00 GMT
x-content-type-options
nosniff
age
235939
x-cache
HIT
status
200
content-length
4246
x-response-time
124
surrogate-key
card_img card_img/bucket/6 card_img/1303696411515482113
last-modified
Wed, 09 Sep 2020 14:05:00 GMT
server
ECS (fcn/418A)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
b3762b213a33e4bbd1d0c7f1cbcf466f
accept-ranges
bytes
www-widgetapi.js
s.ytimg.com/yts/jsbin/www-widgetapi-vflOyhzcj/ Frame 93EA
93 KB
33 KB
Script
General
Full URL
https://s.ytimg.com/yts/jsbin/www-widgetapi-vflOyhzcj/www-widgetapi.js
Requested by
Host: www.youtube.com
URL: https://www.youtube.com/iframe_api
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f03e882b29d452040b26578e5612d8708fe2940d5009d6ba60988413275562de
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 10 Sep 2020 20:12:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
127760
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
33990
x-xss-protection
0
last-modified
Thu, 10 Sep 2020 18:21:18 GMT
server
sffe
vary
Accept-Encoding, Origin
content-type
text/javascript
cache-control
public, max-age=691200
accept-ranges
bytes
timing-allow-origin
https://www.youtube.com
expires
Fri, 18 Sep 2020 20:12:40 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F16304094160278446494&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519135&de=360353063672&cu=1599896519135&m=12&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4331&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=0&ag=2&an=0&gf=2&gg=0&ix=2&ic=2&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=2&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4&cd=0&ah=4&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138312214604&bo=27868836&bp=43877916&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-4&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-4&iq=na&tt=na&tc=0&fs=184513&na=1093981291&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
kb6WOuMI
pbs.twimg.com/card_img/1304177953362923521/ Frame 1C4C
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1304177953362923521/kb6WOuMI?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AF) /
Resource Hash
70566a93dc0cdb461e58656ff5a14a7e00b4f6730c8fd96c78c3a01228124044
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:00 GMT
x-content-type-options
nosniff
age
120843
x-cache
HIT
status
200
content-length
5391
x-response-time
131
surrogate-key
card_img card_img/bucket/9 card_img/1304177953362923521
last-modified
Thu, 10 Sep 2020 21:58:29 GMT
server
ECS (fcn/41AF)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
cb301b092f6378c7cfe204c4ffb00888
accept-ranges
bytes
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1599896519440&de=625473362302&m=0&ar=2ab45f8-clean&iw=0e7324d&q=31&cb=0&ym=0&cu=1599896519440&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=17527716%3A193997916%3A42403476%3A138212589663&zMoatPS=video&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&bo=27868836&bp=43877916&bd=video&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1902%3A2149%3A0%3A2936&iq=na&tt=na&fs=184513&na=32443232&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
Qzvs0Asy
pbs.twimg.com/card_img/1304121594822885377/ Frame 1C4C
8 KB
8 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1304121594822885377/Qzvs0Asy?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40B3) /
Resource Hash
88d0ff13f5977662b8c71444286ad62c023c79dc6b67c08ded1a4a08c22b9237
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:00 GMT
x-content-type-options
nosniff
age
131593
x-cache
HIT
status
200
content-length
8546
x-response-time
138
surrogate-key
card_img card_img/bucket/2 card_img/1304121594822885377
last-modified
Thu, 10 Sep 2020 18:14:32 GMT
server
ECS (fcn/40B3)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
fb11c808cc78fe326e91b398bf0b5429
accept-ranges
bytes
___GaY1O
pbs.twimg.com/card_img/1303116266350272512/ Frame 1C4C
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1303116266350272512/___GaY1O?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40B0) /
Resource Hash
e25b417a57ea79647830453e459009ef9bf5182674efb28d8a2b7159400b667b
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:00 GMT
x-content-type-options
nosniff
age
153024
x-cache
HIT
status
200
content-length
5049
x-response-time
165
surrogate-key
card_img card_img/bucket/4 card_img/1303116266350272512
last-modified
Mon, 07 Sep 2020 23:39:43 GMT
server
ECS (fcn/40B0)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2edd67112c10d29d8c7d56c240500858
accept-ranges
bytes
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F919854872814247425&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519119&de=542684197896&cu=1599896519119&m=557&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5511&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4&cd=0&ah=4&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=21887076%3A2685786169%3A5350135869%3A138308935691&bo=27868836&bp=43877916&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-5&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-5&iq=na&tt=na&tc=0&fs=184513&na=1668341953&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519052&de=794843065894&cu=1599896519052&m=1062&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5506&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=1053&an=5&gi=1&gf=1053&gg=5&ix=1053&ic=1053&ez=1&ck=1053&kw=815&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1053&bx=5&ci=1053&jz=815&dj=1&aa=0&ad=914&cn=0&gk=914&gl=0&ik=914&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=815&cd=9&ah=815&am=9&rf=0&re=1&ft=914&fv=0&fw=914&wb=1&cl=0&at=0&d=4590849068%3A2692438704%3A5366923562%3A138316530126&bo=27868836&bp=43877916&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-3&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-3&iq=na&tt=na&tc=0&fs=184513&na=2093748403&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
uDcmDfz4_normal.jpg
pbs.twimg.com/profile_images/1160562034586652673/ Frame 93EA
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1160562034586652673/uDcmDfz4_normal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AE) /
Resource Hash
2d5d97145529b9226542587e5909ebee914389eea055bfca0b1b77713b080e92
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:00 GMT
x-content-type-options
nosniff
age
433599
x-cache
HIT
status
200
content-length
2035
x-response-time
121
surrogate-key
profile_images profile_images/bucket/6 profile_images/1160562034586652673
last-modified
Sun, 11 Aug 2019 14:40:05 GMT
server
ECS (fcn/41AE)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
db138e820f158c8ae8a45037235ef727
accept-ranges
bytes
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519052&de=794843065894&cu=1599896519052&m=1063&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5506&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=1053&an=1053&gi=1&gf=1053&gg=1053&ix=1053&ic=1053&ez=1&ck=1053&kw=815&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1053&bx=1053&ci=1053&jz=815&dj=1&aa=0&ad=914&cn=914&gk=914&gl=914&ik=914&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=815&cd=815&ah=815&am=815&rf=0&re=1&ft=914&fv=914&fw=914&wb=1&cl=0&at=0&d=4590849068%3A2692438704%3A5366923562%3A138316530126&bo=27868836&bp=43877916&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-3&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-3&iq=na&tt=na&tc=0&fs=184513&na=1543886400&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 50B2
42 B
269 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuoa8b7KVgfU0uqCVoQvDct3VzuYNYbDoLLiP3PNNaCdr5hLsdLWH4J52cXC_0F_i7je6lPFuGeRSMf5eMOJwWtii-4wUt-3e7vvAKVeI8&sig=Cg0ArKJSzNVRbmXqRuAXEAE&adk=2566487286&tt=-1&bs=1600%2C1200&mtos=1079,1079,1079,1079,1079&tos=1079,0,0,0,0&p=360,300,362,301&rxlist=1&mcvt=1079&rs=0&ht=0&tfs=962&tls=2041&mc=1&lte=-1&bas=0&bac=0&met=ce&avms=nio&niot_obs=749&niot_cbk=845&md=2&btr=0&cpmav=0&lm=2&rst=1599896518468&dlt&rpt=902&isd=0&msd=0&xdi=0&ps=1600%2C6506&scs=1600%2C1200&pt=-1&bin=4&deb=1-0-0-10-2-9-9-0-0-0&tvt=2040&is=1%2C2&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&r=v&id=osdim&vs=4&uc=10&upc=2&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200911
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519052&de=794843065894&cu=1599896519052&m=1064&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5506&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=1053&an=1053&gi=1&gf=1053&gg=1053&ix=1053&ic=1053&ez=1&ck=1053&kw=815&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1053&bx=1053&ci=1053&jz=815&dj=1&aa=0&ad=914&cn=914&gk=914&gl=914&ik=914&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=815&cd=815&ah=815&am=815&rf=0&re=1&ft=914&fv=914&fw=914&wb=1&cl=0&at=0&d=4590849068%3A2692438704%3A5366923562%3A138316530126&bo=27868836&bp=43877916&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-3&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-3&iq=na&tt=na&tc=0&fs=184513&na=240458496&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519052&de=794843065894&cu=1599896519052&m=1295&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6506&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=1286&an=1053&gi=1&gf=1286&gg=1053&ix=1286&ic=1286&ez=1&ck=1053&kw=815&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1286&bx=1053&ci=1053&jz=815&dj=1&aa=1&ad=1147&cn=914&gn=1&gk=1147&gl=914&ik=1147&co=1147&cp=1057&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1057&cd=815&ah=1057&am=815&rf=0&re=1&ft=1147&fv=914&fw=914&wb=1&cl=0&at=0&d=4590849068%3A2692438704%3A5366923562%3A138316530126&bo=27868836&bp=43877916&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-3&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-3&iq=na&tt=na&tc=0&fs=184513&na=63765110&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519135&de=360353063672&cu=1599896519135&m=1228&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6506&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=1220&an=2&gi=1&gf=1108&gg=2&ix=1108&ic=1108&ez=1&ck=1220&kw=997&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1220&bx=2&ci=1220&jz=997&dj=1&aa=1&ad=1076&cn=0&gk=964&gl=0&ik=964&co=1076&cp=997&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=997&cd=4&ah=997&am=4&rf=0&re=1&ft=807&fv=0&fw=807&wb=1&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138312214604&bo=27868836&bp=43877916&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-4&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-4&iq=na&tt=na&tc=0&fs=184513&na=327204697&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519135&de=360353063672&cu=1599896519135&m=1229&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6506&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=1220&an=1220&gi=1&gf=1108&gg=1108&ix=1108&ic=1108&ez=1&ck=1220&kw=997&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1220&bx=1220&ci=1220&jz=997&dj=1&aa=1&ad=1076&cn=1076&gk=964&gl=964&ik=964&co=1076&cp=997&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=997&cd=997&ah=997&am=997&rf=0&re=1&ft=807&fv=807&fw=807&wb=1&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138312214604&bo=27868836&bp=43877916&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-4&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-4&iq=na&tt=na&tc=0&fs=184513&na=1087984534&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519135&de=360353063672&cu=1599896519135&m=1230&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6506&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=1220&an=1220&gi=1&gf=1108&gg=1108&ix=1108&ic=1108&ez=1&ck=1220&kw=997&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1220&bx=1220&ci=1220&jz=997&dj=1&aa=1&ad=1076&cn=1076&gk=964&gl=964&ik=964&co=1076&cp=997&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=997&cd=997&ah=997&am=997&rf=0&re=1&ft=807&fv=807&fw=807&wb=1&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138312214604&bo=27868836&bp=43877916&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-4&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-4&iq=na&tt=na&tc=0&fs=184513&na=1348037363&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Fwww.darkreading.com%2F%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519044&de=617180366305&cu=1599896519044&m=1607&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6506&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=0&ag=56&an=0&gf=56&gg=0&ix=56&ic=56&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=56&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=111&cd=0&ah=111&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138307618846&bo=27868836&bp=43877916&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-8&hv=Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-8&iq=na&tt=na&tc=0&fs=184513&na=191054776&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:00 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:00 GMT
sodar
pagead2.googlesyndication.com/getconfig/
8 KB
7 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020090701&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
9089adb2fc470329b8a4cd196b3008ac385b4ade556c56ebd766e620a48e0ffb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 12 Sep 2020 07:42:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
6435
x-xss-protection
0
roundtrip.js
s.adroll.com/j/
38 KB
13 KB
Script
General
Full URL
https://s.adroll.com/j/roundtrip.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.214.206 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-214-206.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
b151c43349b3aca0bd8701e90e7b18a2e4cb39d057e4cc869c86af9e48d92a69

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-amz-version-id
WXjn0J4rMIJvyhtdmTWR32LQRfF25XbN
Content-Encoding
gzip
ETag
"4a1b094811c51a6baf5ca2dc7f750960"
x-amz-request-id
9FECB7DDCE93DE8D
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
12210
x-amz-id-2
zmm4E72jc8yr4m36aSkMdgXZHurNU+p7y/gpEjMfNERy5jIV3yR8SajuMpm9wrLEqiagDPSON4c=
Last-Modified
Thu, 10 Sep 2020 21:05:32 GMT
Server
AmazonS3
Date
Sat, 12 Sep 2020 07:42:01 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
chartbeat.js
static.chartbeat.com/js/
36 KB
14 KB
Script
General
Full URL
https://static.chartbeat.com/js/chartbeat.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2057:1a00:18:1fcd:34e:d2a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
9233eac6e8f7adc20a334ce3854d5adbbed6dcc031a36ea1eee952894407951c

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:29:56 GMT
content-encoding
gzip
last-modified
Fri, 24 Apr 2020 01:13:41 GMT
server
nginx
age
725
etag
W/"5ea23d45-8e68"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=7200
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
fc-_jrJR9jA0CeC4Gai0PGH0XykKBPswvyhi6DTlz6JYtVq8j4tjQA==
via
1.1 92ab13182d4b89ed20b3b5c10adc4f23.cloudfront.net (CloudFront)
expires
Sat, 12 Sep 2020 09:29:56 GMT
ping
ping.chartbeat.net/
43 B
168 B
Image
General
Full URL
https://ping.chartbeat.net/ping?h=darkreading.com&p=%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&u=rDy6FgE_MsBiJaYz&d=darkreading.com&g=53678&g0=perimeter%20-%20perimeter&g1=jai%20vijayan&g4=news%20analysis&n=1&f=00001&c=0&x=0&m=0&y=6506&o=1600&w=1200&j=45&R=1&W=0&I=0&E=0&e=0&r=&b=4646&t=CWmS70CrH6LLDSqfw7Cr8hCyvfi3Y&V=120&i=Attackers%20Exploit%20Cisco%20Switch%20Issue%20as%20Vendor%20...&tz=-120&sn=1&sv=CC3YrpBu5b_CBRXrUlVsTEjC_5Hxf&sd=1&im=067b0fff&_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.216.229.66 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
/
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Sat, 12 Sep 2020 07:42:01 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
43
expires
0
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
6 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020090701.js?21067406
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
08f50e9e70388c99977ca13b6af3a49f8f48c83e79230d51ea72a56c0735bd0c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 12 Sep 2020 07:42:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1591403518460474"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5540
x-xss-protection
0
expires
Sat, 12 Sep 2020 07:42:01 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/210/ Frame F3C9
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/210/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:820::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/210/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
4590
date
Sat, 12 Sep 2020 06:52:33 GMT
expires
Sun, 12 Sep 2021 06:52:33 GMT
last-modified
Wed, 26 Feb 2020 19:47:50 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
2968
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
index.js
s.adroll.com/j/exp/
Redirect Chain
  • https://s.adroll.com/j/exp/TQSV74R4GVCSJITSZC2MCP/index.js
  • https://s.adroll.com/j/exp/index.js
28 B
747 B
Script
General
Full URL
https://s.adroll.com/j/exp/index.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.214.206 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-214-206.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f59e5f34a941183aacaed25322ac0856628493c2cfd936ded3fddc0a49510e52

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-amz-version-id
2U8XMvdFINXJNFsilaXONuSvqmREKV3.
Content-Encoding
gzip
ETag
"5816cced8568d223aa09d889f300692b"
x-amz-request-id
0A9DFB41B15EF3A2
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
48
x-amz-id-2
9wtYzl8isf76a+KTcCc0hWCh/ZKrxXSL0KsmsoDDvS1VGgWl/GxdSe7DtPnOmbh4BH+84jF1nEY=
Last-Modified
Fri, 31 Jul 2020 16:11:15 GMT
Server
AmazonS3
Date
Sat, 12 Sep 2020 07:42:01 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*

Redirect headers

Date
Sat, 12 Sep 2020 07:42:01 GMT
Server
AkamaiGHost
Location
https://s.adroll.com/j/exp/index.js
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Connection
keep-alive
Access-Control-Allow-Headers
*
Content-Length
0
index.js
s.adroll.com/j/pre/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG/
1 KB
1 KB
Script
General
Full URL
https://s.adroll.com/j/pre/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG/index.js
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/j/roundtrip.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.214.206 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-214-206.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
cbce85e96b7752208ce15a09ea4d5a58b792edc9e77f1c5ccf46c01935970f9d

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-amz-version-id
JmJxdZWjehhOhQqvhLB4J_5tiWn4E.rD
Content-Encoding
gzip
ETag
"3996d65282dd996ee0d7d4c90c139158"
x-amz-request-id
E4E19F64C19421CC
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
635
x-amz-id-2
mh/6s801x7se0Jn+LQSRUmruN5Ic3SktEOPHBF1gieRXFu8le2g9tqBHYHPOhUIO8p8i6DLf3hc=
Last-Modified
Fri, 11 Sep 2020 23:45:29 GMT
Server
AmazonS3
Date
Sat, 12 Sep 2020 07:42:01 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
text/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
/
d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/
Redirect Chain
  • https://d.adroll.mgr.consensu.org/consent/iabcheck/TQSV74R4GVCSJITSZC2MCP?_s=46b9b64d1430571a6a8ab806b98ceaf7&_b=2
  • https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=46b9b64d1430571a6a8ab806b98ceaf7&_b=2
386 B
852 B
Script
General
Full URL
https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=46b9b64d1430571a6a8ab806b98ceaf7&_b=2
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.249.88.231 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-249-88-231.eu-west-1.compute.amazonaws.com
Software
nginx/1.16.1 /
Resource Hash
9a62f4e4ce4381b5873c5576d99405bd4f6b67a630ece29254f7b3c6457859e5

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:01 GMT
server
nginx/1.16.1
p3p
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
status
200
cache-control
no-store, no-cache, must-revalidate
content-type
application/javascript
content-length
386

Redirect headers

status
302
date
Sat, 12 Sep 2020 07:42:01 GMT
server
nginx/1.16.1
content-length
105
location
https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=46b9b64d1430571a6a8ab806b98ceaf7&_b=2
jot.html
platform.twitter.com/ Frame 084C
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash

Request headers

:method
GET
:authority
platform.twitter.com
:scheme
https
:path
/jot.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
Origin
https://www.darkreading.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
last-modified
Tue, 01 Sep 2020 20:40:53 GMT
cache-control
public, max-age=315360000
content-type
text/html; charset=utf-8
etag
"d9592a6c704736fa4da218d4357976dd+gzip"
content-encoding
gzip
access-control-allow-methods
GET
access-control-allow-origin
*
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
accept-ranges
bytes
date
Sat, 12 Sep 2020 07:42:01 GMT
x-served-by
cache-bwi5147-BWI, cache-hhn4057-HHN
x-cache
HIT, HIT
vary
Accept-Encoding
tw-cdn
FT
content-length
95

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Sat, 12 Sep 2020 07:42:01 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Sat, 12 Sep 2020 07:42:01 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_o
strict-transport-security
max-age=631138519
x-connection-hash
76850a054372c0670930c573d2f9a6c0
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
151
x-transaction
00a6a31500c5e065
x-tsa-request-body-time
19
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
gen_204
pagead2.googlesyndication.com/pagead/
0
47 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=210&t=2&li=gpt_2020090701&jk=1580847990478593&bg=!KCulKzNYCstC3y_zzZUCAAAAVFIAAAAMCgHhoddxYYeyjobLndF-fAncy606TG7j-TVg2wI5eMU9RcQcg1vQqRpJUwc19-m_s-h1YSu9N55pdyjfBVj8hyDAYx0e2YPL8pRCxjOheLllbK6flcT0b5s4sy0DDA6wDAb9aCKYOhciqBEIJNw5z7xyYTOuuBiFhaphWw9e-BiEDFg-EBhX0heBok980tqrEZhD5SHixh6ddYBiVqKpbfgtN_Vtg-Jx4HaCPJ1d9oFQvXG3hMdKdJLeCDlp24mCHmEsSmsmG2WeDPChAli-Ek4o5UdNPxhLwu43lMoQhbxERuH8bAcy5_W3OhNWXHzyV_BKHeBrDDX3w_Bw4mBA8CBwiOiQM-p_nYp0W5eo4dNkfMbaS2783QlFFWTT4g8tzMAZk7_vKKyMWCz2VUKh7e0t1g7juM0AbCHU-udfN0ETx-g476zAzGuWEIzQ53W5n-C2m-GmX1rjuNBr9WHmmdm1SLmDm-53VEtcngMbVAHKPjPcjlTeZZa3dOydt7L-KlGSo3K9m1eQHTTWHnm0K9NsLNHiMC6cmdb7yWovk7hQxzAXo-tpc_J2ILopoa49F33uJU5zQqY_16lhWo41s3n6rbc9quHRIITjRqf-0nzaRL5iiHC7A-j2aNv2LpivB4JVMpkBrLy8IWDta9JbUJFL2GyE9gLjlCeMkXFMbvT_sCvZ7K472WavzeHW6MJxQsMlpg9cN8cQEd5KlDJvtIr8_ZPE4NCHzoh4DO1VKxyTTSMAaAsuvYhXHNMLZOjbQYvec_0p522XGJ5wsYrui6F3qn-f-uPQLlh9kG_To9Ug__-8-MThoOFbneqEkom6_YLn51EauUoDD8hg926sTTiZZGAFov3cZqxKtSC9MOK0px7kJe-58ZBLzjuH_Qbdum4qtGSi0QeN8uEpZDXT0VUYDhnqqavG0yCtEWbAlMdyDv8eLjjOa9NoZG7ozUowbnZ9y3rkaQbeH5tSuIKGLxr81VNd6smApz1ofdsCFZoPnGwJg-Lj_NLbvRuC1avjkYdSIEO1QIUtBI_iXkzGc8g8WflNjDBW9C6E-e7LY4HbKhNGAj_QofW9PiAC5CM-3qdyJ27dPewMFn6Mr2jNW2zsDEDAoQnbmWx89s3gxyMWsGyZp5zdGu9Kd8uX2rjcFpZCBFLgdUoVX305j0RCmLOenjTpCBWacMeGYMxgY3ivtwXbAbwc31adRUPxM6LJfM2L
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:01 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiOjgsImNsaWVudFRpbWVzdGFtcCI6MTU5OTg5NjUyMS4yMTYsIm5hbWUiOiJ2aWV3YWJsZTUwMSIsImNyaXRlcmlvbiI6eyJuYW1lIjoiNTAvMSIsInJhdGlvIjowLjUsInRpbWUiOjEwMDB9fV19?crc32c=3188045998
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.194.7 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-123-194-7.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:01 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
5J7UL5ZX3NAI7FWSGVCHLY.js
s.adroll.com/pixel/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG/
Redirect Chain
  • https://d.adroll.com/pixel/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-e...
  • https://s.adroll.com/pixel/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG/5J7UL5ZX3NAI7FWSGVCHLY.js
3 KB
2 KB
Script
General
Full URL
https://s.adroll.com/pixel/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG/5J7UL5ZX3NAI7FWSGVCHLY.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.214.206 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-214-206.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
886a5ad0e44b6b877488ea02ec9835b296eb921a989634fe15d9caa8be5c0813

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-amz-version-id
8SjPA2K6BbDhi1WrCl2x44sZxonRLy7H
Content-Encoding
gzip
ETag
"36b364d0a1db26fd5e22a1c1028605e9"
x-amz-request-id
744DB8EAEF2A854F
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
1035
x-amz-id-2
wkbqaD8WjBjJ4cDoRuroHDC82W9OEBhjZ0jRSS+L1yt/3Y4FxE5RUxCHLc1SSK26s3hwqS+1sZw=
Last-Modified
Tue, 04 Feb 2020 23:50:45 GMT
Server
AmazonS3
Date
Sat, 12 Sep 2020 07:42:02 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
text/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*

Redirect headers

date
Sat, 12 Sep 2020 07:42:01 GMT
x-segment-display-name
darkreading_network_perimeter
p3p
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
status
302
content-length
0
pragma
no-cache
x-conversion-value
0.00
server
nginx/1.16.1
x-rule
+darkreading_network_perimeter
x-segment-eid
5J7UL5ZX3NAI7FWSGVCHLY
location
https://s.adroll.com/pixel/TQSV74R4GVCSJITSZC2MCP/ACPJ7LN56VBITNNAUDPDMG/5J7UL5ZX3NAI7FWSGVCHLY.js
cache-control
no-store, no-cache, must-revalidate
x-pixel-eid
ACPJ7LN56VBITNNAUDPDMG
x-segment-name
darkreading_network_perimeter
x-advertisable-eid
TQSV74R4GVCSJITSZC2MCP
x-conversion-currency
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519044&de=617180366305&cu=1599896519044&m=2702&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=1154&an=56&gi=1&gf=1154&gg=56&ix=1154&ic=1154&ez=1&ck=1154&kw=1008&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1154&bx=56&ci=1154&jz=1008&dj=1&aa=1&ad=1052&cn=0&gn=1&gk=1052&gl=0&ik=1052&co=1052&cp=1008&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1008&cd=111&ah=1008&am=111&rf=0&re=0&wb=1&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138307618846&bo=27868836&bp=43877916&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-8&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-8&iq=na&tt=na&tc=0&fs=184513&na=220854527&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:01 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:01 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519044&de=617180366305&cu=1599896519044&m=2703&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=1154&an=1154&gi=1&gf=1154&gg=1154&ix=1154&ic=1154&ez=1&ck=1154&kw=1008&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1154&bx=1154&ci=1154&jz=1008&dj=1&aa=1&ad=1052&cn=1052&gn=1&gk=1052&gl=1052&ik=1052&co=1052&cp=1008&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1008&cd=1008&ah=1008&am=1008&rf=0&re=0&wb=1&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138307618846&bo=27868836&bp=43877916&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-8&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-8&iq=na&tt=na&tc=0&fs=184513&na=26879608&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:01 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:01 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519044&de=617180366305&cu=1599896519044&m=2704&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=1154&an=1154&gi=1&gf=1154&gg=1154&ix=1154&ic=1154&ez=1&ck=1154&kw=1008&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1154&bx=1154&ci=1154&jz=1008&dj=1&aa=1&ad=1052&cn=1052&gn=1&gk=1052&gl=1052&ik=1052&co=1052&cp=1008&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1008&cd=1008&ah=1008&am=1008&rf=0&re=0&wb=1&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138307618846&bo=27868836&bp=43877916&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-8&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-8&iq=na&tt=na&tc=0&fs=184513&na=2072770312&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:01 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:01 GMT
sync
ups.analytics.yahoo.com/ups/55980/
Redirect Chain
  • https://d.adroll.com/cm/aol/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns...
  • https://pixel.advertising.com/ups/55980/sync?uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&_origin=1&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA
  • https://pixel.advertising.com/ups/55980/sync?uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&_origin=1&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&verify=true
  • https://ups.analytics.yahoo.com/ups/55980/sync?uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&_origin=1&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&apid=UP725bf9b8-f4cb-11ea-b7c4-06...
  • https://ups.analytics.yahoo.com/ups/55980/sync?uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&_origin=1&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&apid=UP725bf9b8-f4cb-11ea-b7c4-06...
0
506 B
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/55980/sync?uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&_origin=1&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&apid=UP725bf9b8-f4cb-11ea-b7c4-06c05e201bd2&verify=true
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
3.126.56.137 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
ATS/7.1.2.113 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 07:42:02 GMT
Server
ATS/7.1.2.113
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

Date
Sat, 12 Sep 2020 07:42:02 GMT
Server
ATS/7.1.2.113
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
Location
https://ups.analytics.yahoo.com/ups/55980/sync?uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&_origin=1&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&apid=UP725bf9b8-f4cb-11ea-b7c4-06c05e201bd2&verify=true
Connection
keep-alive
Content-Length
0
rum
dsum-sec.casalemedia.com/
Redirect Chain
  • https://d.adroll.com/cm/index/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-war...
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&expiration=1631432522
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&expiration=1631432522&C=1
43 B
1003 B
Image
General
Full URL
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&expiration=1631432522&C=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.215.135 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-215-135.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:02 GMT
Server
Apache
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Sat, 12 Sep 2020 07:42:02 GMT

Redirect headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:02 GMT
Server
Apache
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Location
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&expiration=1631432522&C=1
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
text/html; charset=iso-8859-1
Content-Length
333
Expires
Sat, 12 Sep 2020 07:42:02 GMT
tap.php
pixel.rubiconproject.com/
Redirect Chain
  • https://d.adroll.com/cm/n/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-o...
  • https://pixel.rubiconproject.com/tap.php?v=194538&nid=3644&put=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&expires=365
42 B
798 B
Image
General
Full URL
https://pixel.rubiconproject.com/tap.php?v=194538&nid=3644&put=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&expires=365
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.138 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Expires
0
Cache-Control
no-cache,no-store,must-revalidate
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
content-length
42
X-RPHost
611afce88997db6fdd35eb213e662871
Content-Type
image/gif

Redirect headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:02 GMT
server
nginx/1.16.1
status
302
p3p
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
location
https://pixel.rubiconproject.com/tap.php?v=194538&nid=3644&put=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&expires=365
cache-control
no-store, no-cache, must-revalidate
content-length
124
cookie-sync
sync.outbrain.com/
Redirect Chain
  • https://d.adroll.com/cm/outbrain/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-...
  • https://sync.outbrain.com/cookie-sync?p=adroll&uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
  • https://sync.outbrain.com/cookie-sync?p=adroll&uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&rdrctExp=true
0
477 B
Image
General
Full URL
https://sync.outbrain.com/cookie-sync?p=adroll&uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&rdrctExp=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.95 , United States, ASN23352 (SERVERCENTRAL, US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 07:42:02 GMT
Cache-Control
no-cache
X-TraceId
ea7be1d93680aaff517cbf628ea0c588
Content-Length
0

Redirect headers

Location
https://sync.outbrain.com/cookie-sync?p=adroll&uid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&rdrctExp=true
Date
Sat, 12 Sep 2020 07:42:02 GMT
X-TraceId
140d37f673ed1955bbcccfdfffab5d36
Content-Length
0
Pug
simage2.pubmatic.com/AdServer/
Redirect Chain
  • https://d.adroll.com/cm/pubmatic/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-...
  • https://simage2.pubmatic.com/AdServer/Pug?vcode=bz0yJnR5cGU9MSZqcz0xJmNvZGU9MzMwNiZ0bD01MjU2MDA&piggybackCookie=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&gdpr=0&gdpr_consent=BOOoKswOOoKswA2ABBENA...
1 B
885 B
Image
General
Full URL
https://simage2.pubmatic.com/AdServer/Pug?vcode=bz0yJnR5cGU9MSZqcz0xJmNvZGU9MzMwNiZ0bD01MjU2MDA&piggybackCookie=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&gdpr=0&gdpr_consent=BOOoKswOOoKswA2ABBENAkwAAAAXyACACYAIIA
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.110 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.0-fips mod_fastcgi/2.4.6 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

X-Cnection
close
Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:02 GMT
X-lat
Pug22013:0:770
Server
Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.0-fips mod_fastcgi/2.4.6
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Cache-Control
no-store, no-cache, private
Content-Type
text/html; charset=utf-8
Content-Length
1

Redirect headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:02 GMT
server
nginx/1.16.1
status
302
p3p
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
location
https://simage2.pubmatic.com/AdServer/Pug?vcode=bz0yJnR5cGU9MSZqcz0xJmNvZGU9MzMwNiZ0bD01MjU2MDA&piggybackCookie=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&gdpr=0&gdpr_consent=BOOoKswOOoKswA2ABBENAkwAAAAXyACACYAIIA
cache-control
no-store, no-cache, must-revalidate
content-length
220
in
d.adroll.com/cm/r/
Redirect Chain
  • https://d.adroll.com/cm/r/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-o...
  • https://ads.yahoo.com/cms/v1?esig=1~bf4e7dc4546a90c08591652d78a230d3f2ef5733&nwid=10001032567&sigv=1&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA
  • https://d.adroll.com/cm/r/in?xid=E0&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA
42 B
498 B
Image
General
Full URL
https://d.adroll.com/cm/r/in?xid=E0&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.249.88.231 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-249-88-231.eu-west-1.compute.amazonaws.com
Software
nginx/1.16.1 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:02 GMT
server
nginx/1.16.1
p3p
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
status
200
cache-control
no-store, no-cache, must-revalidate
content-type
image/gif
content-length
42

Redirect headers

date
Sat, 12 Sep 2020 07:42:02 GMT
referrer-policy
no-referrer-when-downgrade
server
ATS
age
0
status
302
expect-ct
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
strict-transport-security
max-age=15552000
p3p
policyref="https://policies.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
location
https://d.adroll.com/cm/r/in?xid=E0&gdpr=0&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA
x-xss-protection
1; mode=block
content-length
0
x-content-type-options
nosniff
rtb-h
sync.taboola.com/sg/adroll-network/1/
Redirect Chain
  • https://d.adroll.com/cm/taboola/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-w...
  • https://sync.taboola.com/sg/adroll-network/1/rtb-h?taboola_hm=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
0
219 B
Image
General
Full URL
https://sync.taboola.com/sg/adroll-network/1/rtb-h?taboola_hm=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
141.226.228.48 , Netherlands, ASN200478 (TABOOLA-AS, IL),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
tbl-x-upstream
10.41.24.10:10213
date
Sat, 12 Sep 2020 07:42:02 GMT
server
nginx
x-fastly-to-nlb-rtt
23325

Redirect headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:02 GMT
server
nginx/1.16.1
status
302
p3p
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
location
https://sync.taboola.com/sg/adroll-network/1/rtb-h?taboola_hm=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
cache-control
no-store, no-cache, must-revalidate
content-length
111
xuid
eb2.3lift.com/
Redirect Chain
  • https://d.adroll.com/cm/triplelift/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendo...
  • https://eb2.3lift.com/xuid?mid=4714&xuid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&dongle=c85e
  • https://eb2.3lift.com/xuid?ld=1&mid=4714&xuid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&dongle=c85e&gdpr=1&cmp_cs=&us_privacy=
37 B
352 B
Image
General
Full URL
https://eb2.3lift.com/xuid?ld=1&mid=4714&xuid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&dongle=c85e&gdpr=1&cmp_cs=&us_privacy=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.29.22.19 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-29-22-19.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
bb229a48bee31f5d54ca12dc9bd960c63a671f0d4be86a054c1d324a44499d96

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
date
Sat, 12 Sep 2020 07:42:02 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
37
p3p
policyref="http://cdn.3lift.com/w3c/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"

Redirect headers

status
302
date
Sat, 12 Sep 2020 07:42:02 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
0
location
/xuid?ld=1&mid=4714&xuid=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU&dongle=c85e&gdpr=1&cmp_cs=&us_privacy=
p3p
policyref="http://cdn.3lift.com/w3c/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"
sync
x.bidswitch.net/ul_cb/
Redirect Chain
  • https://d.adroll.com/cm/b/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-o...
  • https://x.bidswitch.net/sync?dsp_id=44&user_id=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
  • https://x.bidswitch.net/ul_cb/sync?dsp_id=44&user_id=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
43 B
410 B
Image
General
Full URL
https://x.bidswitch.net/ul_cb/sync?dsp_id=44&user_id=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.196.212.47 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-196-212-47.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
date
Sat, 12 Sep 2020 07:42:02 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
43
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"

Redirect headers

status
302
date
Sat, 12 Sep 2020 07:42:02 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
0
location
https://x.bidswitch.net/ul_cb/sync?dsp_id=44&user_id=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
setuid
ib.adnxs.com/
Redirect Chain
  • https://d.adroll.com/cm/x/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-o...
  • https://ib.adnxs.com/setuid?entity=172&code=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
43 B
1 KB
Image
General
Full URL
https://ib.adnxs.com/setuid?entity=172&code=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.221.13 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
729.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.17.9 /
Resource Hash
4b5b6b15c6255109e06720cce42a06d3aead8b7874423d9c52cb0303212c25ef
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:02 GMT
X-Proxy-Origin
185.156.175.107; 185.156.175.107; 729.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.234:80
AN-X-Request-Uuid
3da9b239-a26e-4543-94ec-f73847a2bb3b
Server
nginx/1.17.9
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Cache-Control
no-store, no-cache, private
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:02 GMT
server
nginx/1.16.1
status
302
p3p
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
location
https://ib.adnxs.com/setuid?entity=172&code=NGUyMmExZTJiZTNiN2ZjMzVmMThjZGE5MzBkZjg3ZWU
cache-control
no-store, no-cache, must-revalidate
content-length
93
377928.gif
idsync.rlcdn.com/
Redirect Chain
  • https://d.adroll.com/cm/l/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-o...
  • https://idsync.rlcdn.com/377928.gif?partner_uid=4e22a1e2be3b7fc35f18cda930df87ee
0
42 B
Image
General
Full URL
https://idsync.rlcdn.com/377928.gif?partner_uid=4e22a1e2be3b7fc35f18cda930df87ee
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.244.174.68 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
451
date
Sat, 12 Sep 2020 07:42:02 GMT
via
1.1 google
alt-svc
clear
content-length
0

Redirect headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:02 GMT
server
nginx/1.16.1
status
302
p3p
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
location
https://idsync.rlcdn.com/377928.gif?partner_uid=4e22a1e2be3b7fc35f18cda930df87ee
cache-control
no-store, no-cache, must-revalidate
content-length
86
sd
us-u.openx.net/w/1.0/
Redirect Chain
  • https://d.adroll.com/cm/o/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-o...
  • https://us-u.openx.net/w/1.0/sd?id=537103138&val=4e22a1e2be3b7fc35f18cda930df87ee
  • https://us-u.openx.net/w/1.0/sd?cc=1&id=537103138&val=4e22a1e2be3b7fc35f18cda930df87ee
43 B
180 B
Image
General
Full URL
https://us-u.openx.net/w/1.0/sd?cc=1&id=537103138&val=4e22a1e2be3b7fc35f18cda930df87ee
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.98.64.218 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
OXGW/16.193.0 /
Resource Hash
4e0705327480ad2323cb03d9c450ffcae4a98bf3a5382fa0c7882145ed620e49

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:02 GMT
via
1.1 google
server
OXGW/16.193.0
vary
Accept
p3p
CP="CUR ADM OUR NOR STA NID"
status
200
cache-control
private, max-age=0, no-cache
content-type
image/gif
alt-svc
clear
content-length
43
expires
Mon, 26 Jul 1997 05:00:00 GMT

Redirect headers

date
Sat, 12 Sep 2020 07:42:02 GMT
via
1.1 google
server
OXGW/16.193.0
status
302
p3p
CP="CUR ADM OUR NOR STA NID"
location
https://us-u.openx.net/w/1.0/sd?cc=1&id=537103138&val=4e22a1e2be3b7fc35f18cda930df87ee
alt-svc
clear
content-length
0
in
d.adroll.com/cm/g/
Redirect Chain
  • https://d.adroll.com/cm/g/out?adroll_fpc=8b3096f87dbec40c1ada67e5a1e296d7-1599896521326&arrfrr=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-o...
  • https://cm.g.doubleclick.net/pixel?google_sc&google_nid=artb&google_hm=TiKh4r47f8NfGM2pMN-H7g
  • https://d.adroll.com/cm/g/in
42 B
535 B
Image
General
Full URL
https://d.adroll.com/cm/g/in
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.249.88.231 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-249-88-231.eu-west-1.compute.amazonaws.com
Software
nginx/1.16.1 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:02 GMT
server
nginx/1.16.1
p3p
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
status
200
cache-control
no-store, no-cache, must-revalidate
content-type
image/gif
content-length
42
x-result
g.-1.-1.-1

Redirect headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:02 GMT
server
HTTP server (unknown)
status
302
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
location
https://d.adroll.com/cm/g/in
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
225
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.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?crc32c=3771201013
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.194.7 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-123-194-7.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:02 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
utsync.ashx
ml314.com/ Frame 50B2
644 B
1 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=62439&ct=js&pi=&fp=&clid=&if=1&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&pv=1599896519287_w3iq4ixvk&bl=en-us&cb=6501942&return=&ht=&d=&dc=&si=1599896519287_w3iq4ixvk&cid=&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?1282020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.248.181.236 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-248-181-236.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
c2ad0814be9324b04169a8e23d3f457982575f1cece789608e7633081e4f7953

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:01 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
468
Expires
0
ud.ashx
in.ml314.com/ Frame 50B2
20 B
482 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=1282020
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?1282020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.202.64.133 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 07:42:02 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public
Connection
keep-alive
Content-Length
138
Expires
Sun, 13 Sep 2020 07:42:02 GMT
svrGP.aspx
trk.darkreading.com/visitor/v200/
Redirect Chain
  • https://s2150.t.eloqua.com/visitor/v200/svrGP?pps=50&siteid=2150&DLKey=f09b5473ef7642a085c28ad29c30c1d2&DLLookup=&ms=678&firstPartyCookieDomain=trk.darkreading.com
  • https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=50&siteid=2150&DLKey=f09b5473ef7642a085c28ad29c30c1d2&DLLookup=&ms=678&elq1pcGUID=5A4262F0D50A44CD91C15F0B89656D92
0
498 B
Script
General
Full URL
https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=50&siteid=2150&DLKey=f09b5473ef7642a085c28ad29c30c1d2&DLLookup=&ms=678&elq1pcGUID=5A4262F0D50A44CD91C15F0B89656D92
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
142.0.173.134 , United States, ASN7160 (NETDYNAMICS, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Sat, 12 Sep 2020 07:42:01 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Cache-Control
private,no-cache, no-store
Content-Type
application/javascript
Content-Length
0
X-XSS-Protection
1; mode=block
Expires
-1

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000;
X-Content-Type-Options
nosniff
Date
Sat, 12 Sep 2020 07:42:01 GMT
P3P
CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
Location
https://trk.darkreading.com/visitor/v200/svrGP.aspx?pps=50&siteid=2150&DLKey=f09b5473ef7642a085c28ad29c30c1d2&DLLookup=&ms=678&elq1pcGUID=5A4262F0D50A44CD91C15F0B89656D92
Cache-Control
private,no-cache, no-store
Content-Type
text/html; charset=utf-8
Content-Length
307
X-XSS-Protection
1; mode=block
Expires
-1
ibs:dpid=22052&dpuuid=3613068792951734300&redir=
dpm.demdex.net/ Frame 50B2
42 B
915 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=22052&dpuuid=3613068792951734300&redir=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.248.119.134 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-248-119-134.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v081-0228d5b13.edge-irl1.demdex.com 5.78.0.20200908113611 0ms (+1ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-TID
nafo65yoSAM=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT
csync.ashx
ml314.com/ Frame 50B2
Redirect Chain
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3613068792951734300
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTMzYxMzA2ODc5Mjk1MTczNDMwMBAAGg0Iyvfx-gUSBQjoBxAAQgBKAA
  • https://ml314.com/csync.ashx?fp=eae4789221e9de171f6c360da42e2a0a079ddae9e624ba1c9df7aa84be186c7ff4cb09cee1a4f8eb&person_id=3613068792951734300&eid=50082
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=eae4789221e9de171f6c360da42e2a0a079ddae9e624ba1c9df7aa84be186c7ff4cb09cee1a4f8eb&person_id=3613068792951734300&eid=50082
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.248.181.236 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-248-181-236.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 07:42:01 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sun, 13 Sep 2020 03:42:02 GMT

Redirect headers

date
Sat, 12 Sep 2020 07:42:02 GMT
via
1.1 google
status
307
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
location
https://ml314.com/csync.ashx?fp=eae4789221e9de171f6c360da42e2a0a079ddae9e624ba1c9df7aa84be186c7ff4cb09cee1a4f8eb&person_id=3613068792951734300&eid=50082
cache-control
no-cache, no-store
timing-allow-origin
*
alt-svc
clear
content-length
0
csync.ashx
ml314.com/ Frame 50B2
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=51d79ff1-32ab-4ec7-ab0c-4f1b79fc6b17
  • https://ml314.com/csync.ashx?fp=51d79ff1-32ab-4ec7-ab0c-4f1b79fc6b17&person_id=3613068792951734300&eid=53819
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=51d79ff1-32ab-4ec7-ab0c-4f1b79fc6b17&person_id=3613068792951734300&eid=53819
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.248.181.236 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-248-181-236.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 07:42:02 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sun, 13 Sep 2020 03:42:02 GMT

Redirect headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:02 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Location
https://ml314.com/csync.ashx?fp=51d79ff1-32ab-4ec7-ab0c-4f1b79fc6b17&person_id=3613068792951734300&eid=53819
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
0,Sun, 13 Sep 2020 03:42:02 GMT
csync.ashx
ml314.com/ Frame 50B2
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3613068792951734300
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3613068792951734300
  • https://ml314.com/csync.ashx?fp=e9c55ae2f9bff1287e3cd8c1b2689be&eid=50146&person_id=3613068792951734300
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=e9c55ae2f9bff1287e3cd8c1b2689be&eid=50146&person_id=3613068792951734300
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.248.181.236 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-248-181-236.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 07:42:02 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sun, 13 Sep 2020 03:42:02 GMT

Redirect headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:02 GMT
status
302
p3p
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
location
https://ml314.com/csync.ashx?fp=e9c55ae2f9bff1287e3cd8c1b2689be&eid=50146&person_id=3613068792951734300
cache-control
no-cache
x-server
10.45.16.217
content-length
0
expires
0
match
ps.eyeota.net/ Frame 50B2
Redirect Chain
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=295y2cDZ7ulhrmQcX9I6ci6DbyJbDkNuSh_ipJOHpuVw&gdpr=0&gdpr_consent=&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil%26referrer_p...
  • https://ml314.com/csync.ashx?fp=295y2cDZ7ulhrmQcX9I6ci6DbyJbDkNuSh_ipJOHpuVw&person_id=3613068792951734300&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil%26referre...
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil&referrer_pid=r8hrb20
70 B
440 B
Image
General
Full URL
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil&referrer_pid=r8hrb20
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.124.210.90 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-124-210-90.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
de9d3fd0eb948bd294477d0eda60a73b85caff1794803530d0463193a113da98

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 12 Sep 2020 07:42:02 GMT
Content-Type
image/gif
Content-Length
70
P3P
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR SAMo BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR", policyref="http://ps.eyeota.net/w3c/p3p.xml"

Redirect headers

Date
Sat, 12 Sep 2020 07:42:02 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
text/html; charset=utf-8
Location
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil&referrer_pid=r8hrb20
Cache-Control
private
Connection
keep-alive
Content-Length
193
Expires
Sun, 13 Sep 2020 03:42:02 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiOjExLCJjbGllbnRUaW1lc3RhbXAiOjE1OTk4OTY1MjMuMjgzLCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU5OTg5NjUyMi4yNTMsInRvIjoxNTk5ODk2NTIzLjI2N31dfQ==?crc32c=4177734944
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.194.7 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-123-194-7.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:03 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519052&de=794843065894&cu=1599896519052&m=5111&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=5103&an=1286&gi=1&gf=5103&gg=1286&ix=5103&ic=5103&ez=1&ck=1053&kw=815&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5103&bx=1286&ci=1053&jz=815&dj=1&aa=1&ad=4964&cn=1147&gn=1&gk=4964&gl=1147&ik=4964&co=1147&cp=1057&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4906&cd=1057&ah=4906&am=1057&rf=0&re=1&ft=4864&fv=1147&fw=914&wb=2&cl=0&at=0&d=4590849068%3A2692438704%3A5366923562%3A138316530126&bo=27868836&bp=43877916&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-3&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-3&iq=na&tt=na&tc=0&fs=184513&na=1801332611&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:04 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519135&de=360353063672&cu=1599896519135&m=5065&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=5057&an=1220&gi=1&gf=1108&gg=1108&ix=1108&ic=1108&ez=1&ck=1220&kw=997&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5057&bx=1220&ci=1220&jz=997&dj=1&aa=1&ad=4913&cn=1076&gk=964&gl=964&ik=964&co=1076&cp=997&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4859&cd=997&ah=4859&am=997&rf=0&re=1&ft=4644&fv=807&fw=807&wb=1&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138312214604&bo=27868836&bp=43877916&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-4&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-4&iq=na&tt=na&tc=0&fs=184513&na=114695135&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:04 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=184&w=592&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519097&de=399339085620&cu=1599896519097&m=5279&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A0%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5074&cd=4&ah=5074&am=4&rf=0&re=1&wb=1&cl=0&at=0&d=21887076%3A2734573621%3A5454835618%3A138321086638&bo=27868836&bp=43877916&bd=insight&zMoatPS=insight&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-17&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-17&iq=na&tt=na&tc=0&fs=184513&na=540087402&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:04 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519119&de=542684197896&cu=1599896519119&m=5877&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A0%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5127&cd=4&ah=5127&am=4&rf=0&re=0&wb=1&cl=0&at=0&d=21887076%3A2685786169%3A5350135869%3A138308935691&bo=27868836&bp=43877916&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-5&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-5&iq=na&tt=na&tc=0&fs=184513&na=1963257275&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:05 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:05 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiOjEyLCJjbGllbnRUaW1lc3RhbXAiOjE1OTk4OTY1MjUuMywibmFtZSI6InZpZXdhYmxlVGltZSIsImZyb20iOjE1OTk4OTY1MjMuMjY3LCJ0byI6MTU5OTg5NjUyNS4yODV9XX0=?crc32c=2294941883
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.194.7 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-123-194-7.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:05 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519044&de=617180366305&cu=1599896519044&m=6735&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=5187&an=1154&gi=1&gf=5187&gg=1154&ix=5187&ic=5187&ez=1&ck=1154&kw=1008&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5187&bx=1154&ci=1154&jz=1008&dj=1&aa=1&ad=5085&cn=1052&gn=1&gk=5085&gl=1052&ik=5085&co=1052&cp=1008&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5041&cd=1008&ah=5041&am=1008&rf=0&re=0&wb=2&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138307618846&bo=27868836&bp=43877916&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-8&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-8&iq=na&tt=na&tc=0&fs=184513&na=749567732&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:05 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:05 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519044&de=617180366305&cu=1599896519044&m=6936&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=5388&an=5187&gi=1&gf=5388&gg=5187&ix=5388&ic=5388&ez=1&ck=1154&kw=1008&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5388&bx=5187&ci=1154&jz=1008&dj=1&aa=1&ad=5286&cn=5085&gn=1&gk=5286&gl=5085&ik=5286&co=1052&cp=1008&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5242&cd=5041&ah=5242&am=5041&rf=0&re=0&wb=2&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138307618846&bo=27868836&bp=43877916&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-8&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-8&iq=na&tt=na&tc=0&fs=184513&na=2137613905&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:06 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:06 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiOjEzLCJjbGllbnRUaW1lc3RhbXAiOjE1OTk4OTY1MjcuMzE3LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU5OTg5NjUyNS4yODUsInRvIjoxNTk5ODk2NTI3LjN9XX0=?crc32c=2246649881
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.194.7 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-123-194-7.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:07 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=11&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=&t=1599896518960&de=507637044668&m=0&ar=2ab45f8-clean&iw=0e7324d&q=32&cb=0&ym=0&cu=1599896518960&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4590849068%3A2692438704%3A5366925059%3A138317469203&zMoatPS=wallpaper&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&bo=27868836&bp=43877916&bd=wallpaper&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1902%3A2149%3A0%3A0&iq=na&tt=na&fs=184513&na=2080831065&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:09 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:09 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=11&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=&t=1599896519080&de=769391848030&m=0&ar=2ab45f8-clean&iw=0e7324d&q=33&cb=0&ym=0&cu=1599896519080&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4537903594%3A2627560981%3A5460721674%3A138322625365&zMoatPS=native&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&bo=27868836&bp=43877916&bd=native&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1902%3A2149%3A0%3A0&iq=na&tt=na&fs=184513&na=254394678&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:09 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:09 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519052&de=794843065894&cu=1599896519052&m=10154&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=10145&an=5103&gi=1&gf=10145&gg=5103&ix=10145&ic=10145&ez=1&ck=1053&kw=815&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10145&bx=5103&ci=1053&jz=815&dj=1&aa=1&ad=10006&cn=4964&gn=1&gk=10006&gl=4964&ik=10006&co=1147&cp=1057&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9949&cd=4906&ah=9949&am=4906&rf=0&re=1&ft=4864&fv=4864&fw=914&wb=2&cl=0&at=0&d=4590849068%3A2692438704%3A5366923562%3A138316530126&bo=27868836&bp=43877916&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-3&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-3&iq=na&tt=na&tc=0&fs=184513&na=1848282353&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:09 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:09 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519135&de=360353063672&cu=1599896519135&m=10092&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=58&vx=58%3A58%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=10085&an=5057&gi=1&gf=1108&gg=1108&ix=1108&ic=1108&ez=1&ck=1220&kw=997&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10085&bx=5057&ci=1220&jz=997&dj=1&aa=1&ad=9941&cn=4913&gk=964&gl=964&ik=964&co=1076&cp=997&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9886&cd=4859&ah=9886&am=4859&rf=0&re=1&ft=4947&fv=4644&fw=807&wb=1&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138312214604&bo=27868836&bp=43877916&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-4&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-4&iq=na&tt=na&tc=0&fs=184513&na=879110803&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:09 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:09 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiOjE0LCJjbGllbnRUaW1lc3RhbXAiOjE1OTk4OTY1MjkuMzM2LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU5OTg5NjUyNy4zLCJ0byI6MTU5OTg5NjUyOS4zMTd9XX0=?crc32c=4277208361
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.194.7 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-123-194-7.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:09 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=184&w=592&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519097&de=399339085620&cu=1599896519097&m=10330&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A0%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=10125&cd=5074&ah=10125&am=5074&rf=0&re=1&wb=1&cl=0&at=0&d=21887076%3A2734573621%3A5454835618%3A138321086638&bo=27868836&bp=43877916&bd=insight&zMoatPS=insight&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-17&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-17&iq=na&tt=na&tc=0&fs=184513&na=622497210&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:09 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:09 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=11&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&k=&bq=0&f=0&j=&t=1599896519440&de=625473362302&m=0&ar=2ab45f8-clean&iw=0e7324d&q=34&cb=0&ym=0&cu=1599896519440&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=17527716%3A193997916%3A42403476%3A138212589663&zMoatPS=video&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&bo=27868836&bp=43877916&bd=video&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1902%3A2149%3A0%3A2936&iq=na&tt=na&fs=184513&na=1332371975&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:09 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:09 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=1&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519119&de=542684197896&cu=1599896519119&m=10912&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A0%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=10163&cd=5127&ah=10163&am=5127&rf=0&re=0&wb=1&cl=0&at=0&d=21887076%3A2685786169%3A5350135869%3A138308935691&bo=27868836&bp=43877916&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-5&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-5&iq=na&tt=na&tc=0&fs=184513&na=1900631771&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:10 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:10 GMT
pixel.gif
px.moatads.com/
43 B
253 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=13&kq=1&lo=4&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Fwww.darkreading.com%2F%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F-&i=PENTONMEDIA1&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%5Elv%3Ch%2CeI8!A2QnbjPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&th=4007238046&tf=nMzjG---CSa7H-fUfHv-j7VIQD-xFQTS-nMzjG-&vi=111111&rc=0%2C0%2C0%2C0%2C%2C1%2C0%2C0%2Cprobably%2Cprobably&os=&qp=00000&is=BBBBB2BBEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB41kNBBBBBBBBBBBBBhcjG6BBJMhLeBk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJfR0BqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&id=1&ii=4&f=0&j=&t=1599896519044&de=617180366305&cu=1599896519044&m=11566&ar=2ab45f8-clean&iw=0e7324d&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6491&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1902%3A2149%3A0%3A0&as=1&ag=10017&an=5388&gi=1&gf=10017&gg=5388&ix=10017&ic=10017&ez=1&ck=1154&kw=1008&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10017&bx=5388&ci=1154&jz=1008&dj=1&aa=1&ad=9915&cn=5286&gn=1&gk=9915&gl=5286&ik=9915&co=1052&cp=1008&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9871&cd=5242&ah=9871&am=5242&rf=0&re=0&wb=2&cl=0&at=0&d=4854677916%3A2676539655%3A5324189708%3A138307618846&bo=27868836&bp=43877916&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43877916&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43877916&zMoatMMV_MAX=na&zMoatMGV_MAX=na&zMoatCURL=darkreading.com%2Fperimeter%2Fattackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw%2Fd%2Fd-id%2F1331490&zMoatDev=Desktop&zMoatDfpSlotId=div-gpt-ad-961777897907396673-8&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=div-gpt-ad-961777897907396673-8&iq=na&tt=na&tc=0&fs=184513&na=80462631&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 12 Sep 2020 07:42:10 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
Apache
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Sat, 12 Sep 2020 07:42:10 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTk5ODk2NTE4eDUwYThiYzY4YmRhN2NmeDgyNTY4MjA3IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwNjQ2Mzk1OTY2MDgwOTY2IiwiaW5kZXgiOjE1LCJjbGllbnRUaW1lc3RhbXAiOjE1OTk4OTY1MzEuMzUsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTk5ODk2NTI5LjMxNywidG8iOjE1OTk4OTY1MzEuMzM2fV19?crc32c=1443467095
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.194.7 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-123-194-7.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 12 Sep 2020 07:42:11 GMT
Cache-Control
no-cache, no-store, must-revalidate
Expires
0
Connection
keep-alive
Content-Length
35
Content-Type
image/gif

Verdicts & Comments Add Verdict or Comment

439 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes object| dataLayer function| displayDefaultNativeAd function| displayNativeAd function| displayLandingPageNativeAd function| displaySecondLandingPageNativeAd function| displayArticleNativeAd function| displayInsightAd function| displaySASInsightAd object| respond string| theSiteDomain string| theMsgChatQueueInclude string| theChatStatusInclude boolean| doHideShowDivOpacityFade function| MM_swapImgRestore function| MM_preloadImages function| MM_findObj function| MM_swapImage function| MM_openBrWindow function| SwitchColor function| MakeDark function| MakeLight string| pop_collection string| pop_styleObj function| GetObject function| SwitchHTML function| SwitchDivs function| HideDiv function| ShowDiv function| URLEncodeString object| opacitySliderTimeouts function| SlideObjOpacity function| ChangeObjOpacity object| heightSliderTimeouts function| SlideObjHeight function| ChangeObjHeight function| ClearTimeoutArray function| AttachEventFunctionToObject function| RemoveEventFunctionFromObject function| SetCookie function| GetCookie function| AlignObject function| MoveObject function| MoveDivToColTop function| AddEventListenerToObj function| ContentNotifyPrefsShortSubmit function| ContentNotifyPrefsShortGenerateAndDisplayRSSFeed function| RedirectConfirm function| blend function| returnPosYofObj function| returnPosXofObj function| returnCurrentWindowYOffset function| returnCurrentWindowXOffset object| menuMoverTimeouts number| menuMoverTimeoutCounter number| menuMaxOpacity function| ShowMenu function| ChangeObjectLeft function| ChangeObjectTop function| NumStepsToMove function| AddPopMenuEventListener boolean| lockPoppedMenu string| lockedPoppedMenuObjName function| PopMenu object| closeMenuTimeouts number| closeMenuTimeoutCounter function| PopMenuOff number| globalPopXDiff number| globalPopYDiff function| createSubmenu function| LRSliderHandler string| active_pop_collection string| active_pop_styleObj function| GetActiveObject function| PrintActiveContent function| LoadScript function| RemoveScript string| theRateLink function| ShowRateMenu function| ShowSaveInfo function| HideSaveInfo function| HideRateMenu function| RateThis function| ChangeRateMenuFormParam function| BuildAndLoadRateMenuScript function| ClearRateMenuForm function| ClearRateLink function| ContentConsumptionLoggedSuccess function| ContentSignUpLoggedSuccess function| ObjectFader function| PageEffectPopUp function| returnWidthofObj function| cookiesEnabled boolean| pop_ns4 boolean| pop_dom boolean| active_pop_ns4 boolean| active_pop_dom function| $ function| jQuery function| displayWhatsThisBox function| displayPartnerPerspectivesBox function| displayMalwareBytesPartnerPerspectivesBox function| displayEvidentioPartnerPerspectivesBox function| displayF5PartnerPerspectivesBox function| displayBitdefenderPartnerPerspectivesBox function| displayGeneralDynamicsFidelisPartnerPerspectivesBox function| displayPartnerPerspectivesBoxArticle function| displayMalwareBytesPartnerPerspectivesBoxArticle function| displayGigamonPartnerPerspectivesBoxArticle function| displayAuthorInfoBox function| highlightTopStory function| showMobileIconOverlay function| closeMobileOverlayMenu function| goToByScroll function| ToggleNavButtonMenu function| ToggleNavButton object| designlinesSliderHandler string| designlinesLeftArrowButtonMouseoutImgSrc string| designlinesRightArrowButtonMouseoutImgSrc number| oneScrollHeight number| currentTickerItem number| numberOfTickerItems boolean| tickerIsPopulated undefined| tickerTimeout boolean| tickerStopped function| InitializeNewsTicker function| RotateNewsTicker function| StartNewsTicker function| StopNewsTicker boolean| superNavEventsMenuOpen function| ToggleSuperNavEventsMenu function| swipeleftHandler function| swiperightHandler function| tapholdHandler function| tapholdOutHandler function| sizeAnyBrightcoveObjects function| sizeDocImageClass object| visitor function| Visitor object| s_c_il number| s_c_in object| adobe function| mboxCreate function| mboxDefine function| mboxUpdate function| getCookie function| setCookie string| thePageTitle string| ngenv string| ngserv string| omn_regtrackproduct string| omn_nltrackproduct function| CSBJs_Core function| CSBJs_OOP function| CSBJs_Resources function| CSBJs_ServiceRequest function| CSBJs_Exception function| CSBJs_Ajax function| CSBJs_Decorator function| CSBJs_Decorator_HtmlNode function| CSBJs_App function| CSBJs_App_Window function| CSBJs_App_Window_Modal function| CSBJs_App_Window_Alert function| CSBJs_App_Button function| CSBJs_App_Html function| CSBJs_App_Field function| CSBJs_App_Field_File function| CSBJs_App_Field_TextArea function| CSBJs_Timer function| CSBJs_Form function| CSBJs_Form_Group function| CSBJs_Form_Step function| CSBJs_Form_Element function| CSBJs_Form_Element_Html function| CSBJs_Form_Element_Image function| CSBJs_Form_Element_TextField function| CSBJs_Form_Element_OtherTextField function| CSBJs_Form_Element_Submit function| CSBJs_Form_Element_NextStep function| CSBJs_Form_Element_PreviousStep function| CSBJs_Form_Element_Reset function| CSBJs_Form_Element_Multi function| CSBJs_Form_Element_Select function| CSBJs_Form_Element_Password function| CSBJs_Form_Element_Dynamic function| CSBJs_Form_Element_Hidden function| CSBJs_Form_Element_Checkbox function| CSBJs_Form_Element_Checkboxes function| CSBJs_Form_Element_Radio function| CSBJs_Form_Element_TextArea function| CSBJs_Form_Validation function| CSBJs_Form_Validation_Regex function| CSBJs_Form_Validation_CompareEqual function| CSBJs_Form_Validation_Required function| CSBJs_Form_Validation_JsFunction function| CSBJs_Form_Validation_Ajax function| CSBJs_Form_Validation_JsonP function| CSBJs_Form_Observer function| CSBJs_Form_Observer_Action function| CSBJs_Form_Observer_Action_Hide function| CSBJs_Form_Observer_Action_ChangeDynamic function| CSBJs_Form_Filter function| CSBJs_Form_Filter_Replace function| UBM function| rcCallback string| siteLogo string| privacyLogo string| privacyText string| loginRedirectURL string| loginNextAction string| securityJobAction boolean| reloadOnClose object| ngconfig string| regHeaderContent string| regAction string| ngRegAsset object| loginWidget object| registrationWidget object| updateWidget object| optoutWidget object| newsletterWidget object| newsletterSignupWidget object| externalAuthSuppWidget function| openRegisterThanks function| login function| verifyToken function| securityJobsFromUpdate function| securityJobs function| loginWithMessage function| changePassword function| openForm function| updateForm function| newsletterForm function| newsletterSignupForm function| extAuthSuppForm function| ngLogoutUser function| ngCreateCookie function| ngRreadCookie function| ngEraseCookie function| trackShortRegistrationOpen function| trackSocialMediaBasicRegistration function| trackLongRegistrationOpen function| trackLoginOpen function| trackLoginSuccess function| trackPasswordResetOpen function| trackNewsletterPrefsOpen function| trackNewsletterPrefsConfirm function| trackShortRegistrationConfirm function| trackRegistrationThankYou object| welcomeLinks number| loginCheck string| loginHTML string| loginHTMLMobile function| initGatewayCheck function| setNGReg function| SubmitInPageSurvey number| _doubleclickRand function| jobalert object| _AdsNativeOpts object| googletag object| gptadslots object| ggeac object| googleToken object| googleIMState object| google_js_reporting_queue function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter undefined| google_measure_js_timing object| _comscore function| fbq function| _fbq function| processGoogleToken number| __google_ad_urls_id number| google_unique_id object| gaGlobal object| google_conversion_id object| google_custom_params object| google_remarketing_only function| GooglemKTybQhCsO object| google_conversion_date object| google_conversion_time number| google_conversion_snippets number| google_conversion_first_time object| google_conversion_js_version object| google_conversion_format object| google_enable_display_cookie_match object| google_tag_data object| google_conversion_type object| google_conversion_order_id object| google_conversion_language object| google_conversion_value object| google_conversion_currency object| google_conversion_domain object| google_conversion_label object| google_conversion_color object| google_disable_viewthrough object| google_gtag_event_data object| google_conversion_linker object| google_tag_for_child_directed_treatment object| google_tag_for_under_age_of_consent object| google_allow_ad_personalization_signals object| google_restricted_data_processing object| google_conversion_items object| google_conversion_merchant_id object| google_user_id object| onload_callback object| opt_image_generator object| google_gtm_url_processor object| google_conversion_page_url object| google_conversion_referrer_url object| google_gtm object| google_gcl_cookie_prefix object| google_read_gcl_cookie_opt_out object| google_basket_feed_country object| google_basket_feed_language object| google_basket_discount object| google_basket_transaction_type object| google_additional_conversion_params object| google_additional_params object| google_transport_url object| uetq object| ab string| isblocked function| unhideMainContent object| _elqQ object| ___grecaptcha_cfg object| grecaptcha string| __recaptcha_api boolean| __google_recaptcha_client object| Bibblio object| BibblioActivity object| BibblioUtils object| BibblioEvents object| BibblioTemplates object| google_tag_manager object| __twttrll object| twttr object| __twttr function| FlipboardWidgets object| __core-js_shared__ object| Sslac object| IN number| _sf_startpt object| __google_ad_urls boolean| google_osd_loaded boolean| google_onload_fired object| FB function| udm_ object| ns_p object| COMSCORE object| recaptcha function| UET function| Togglehottopicseditorschoice object| lwvalues string| valueToUselw function| Toggleliveeventswebinarslive function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| video_reportsSliderHandler string| video_reportsLeftArrowButtonMouseoutImgSrc string| video_reportsRightArrowButtonMouseoutImgSrc function| Dpxl object| dpmPixels object| jQuery1111031717248674738974 object| ube object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 boolean| attachedML object| MoatDataJsonpRequest_39734190 string| s_account object| s string| SCCodeVersion function| s_doPlugins function| getHier function| s_getLoadTime function| AppMeasurement_Module_ActivityMap function| AppMeasurement function| s_gi function| s_pgicq number| s_objectID number| s_giq undefined| s_code string| s_hour string| s_day string| s_timepart number| s_loadT string| x number| y number| d object| eo string| f0 object| s_i_cmpglobalvista string| thispage_sharelink object| beacon object| GetElqContentPersonalizationValue string| adroll_adv_id string| adroll_pix_id string| adroll_segments boolean| recaptchaReady string| GoogleAnalyticsObject function| ga object| _sf_async_config object| __CELTRA object| teadsscript object| gaplugins object| gaData object| elqCookieValue object| _elq object| teads object| google_optimize boolean| __adroll_loaded number| _sf_endpt object| _cb_shared object| pSUPERFLY_mab object| _cbq object| pSUPERFLY object| GoogleGcLKhOms string| adroll_sid object| __adroll boolean| adroll_optout object| adroll_ext_network object| adroll_callbacks undefined| adroll_tpc_callback object| google_image_requests function| __cmp boolean| __adroll_consent boolean| __adroll_consent_is_gdpr object| __adroll_consent_data string| __adroll_consent_user_country string| __adroll_consent_adv_country number| adroll_xavier_called number| __adroll_xid_ch object| adroll_currency object| adroll_conversion_value object| adroll_conversion_value_in_dollars object| adroll_exp_list

29 Cookies

Domain/Path Name / Value
.facebook.com/ Name: fr
Value: 05os4E645DRqN6Tuo..BfXHvG...1.0.BfXHvG.
.demdex.net/ Name: demdex
Value: 42419473348105527500426479216929987933
www.darkreading.com/ Name: dpm_time_site
Value: 2.03
.darkreading.com/ Name: _ga
Value: GA1.2.674484425.1599896518
www.darkreading.com/ Name: gdpr_cookie_darkreading
Value: 1
.darkreading.com/ Name: undefined_s
Value: First%20Visit
.darkreading.com/ Name: s_invisit
Value: true
.darkreading.com/ Name: s_cc
Value: true
www.darkreading.com/ Name: piddlNGPageReferer
Value: /
.darkreading.com/ Name: s_nr
Value: 1599896519250-New
www.darkreading.com/ Name: dpm_url_count
Value: 1
.darkreading.com/ Name: _uetvid
Value: 5f7d7bd9fd0b0a8ca952f11169da5ab1
.darkreading.com/ Name: AMCV_77FB1CFE532B22840A490D45%40AdobeOrg
Value: -330454231%7CMCIDTS%7C18518%7CMCMID%7C37598059817171331490799608459952513966%7CMCAAMLH-1600501317%7C6%7CMCAAMB-1600501317%7C6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y%7CMCOPTOUT-1599903717s%7CNONE%7CMCAID%7CNONE%7CMCSYNCSOP%7C411-18525%7CvVersion%7C3.1.2
.darkreading.com/ Name: _gid
Value: GA1.2.1428835087.1599896520
www.darkreading.com/ Name: darkreading_lastvisit
Value: 9/12/2020 3:41:58 AM
.darkreading.com/ Name: __gads
Value: ID=4f9b1ab0428d136b-22ca1a42d8b800c1:T=1599896518:S=ALNI_MY36b2GN3ZGx7uLBqnPzJg4lcjzaQ
www.darkreading.com/ Name: piddlNGSiteReferer
Value: /
.darkreading.com/ Name: _uetsid
Value: 235434001c7d6509b0643cf22a6eea9d
www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id Name: hasLiveRampMatch
Value: true
.darkreading.com/ Name: _fbp
Value: fb.1.1599896518843.2094319517
.darkreading.com/ Name: _gat_UA-135180592-2
Value: 1
www.darkreading.com/ Name: darkreading%2Dmeter
Value: 1331490
.darkreading.com/ Name: ELOQUA
Value: GUID=4FF7DA052C6D402F905F9FC4C2674140
www.darkreading.com/ Name: gatewayChecked
Value:
www.darkreading.com/ Name: darkreading%5Fvisits
Value: 3
.darkreading.com/ Name: __cfduid
Value: d71d6ceff2d0c7497b57eae4fb45407251599896516
.darkreading.com/ Name: s_vnum
Value: 1601503200251%26vn%3D1
www.darkreading.com/ Name: cplChannelTagID
Value:
.darkreading.com/ Name: AMCVS_77FB1CFE532B22840A490D45%40AdobeOrg
Value: 1

9 Console Messages

Source Level URL
Text
console-api warning URL: https://twimgs.com/custom/library.gtecevent.com/assets/at.js?ormzkk(Line 9)
Message:
AT: Adobe Target content delivery is disabled. Update your DOCTYPE to support Standards mode.
console-api log URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490(Line 426)
Message:
lpage==>notblocked
console-api log URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490(Line 434)
Message:
interstitial unit found
console-api log URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490(Line 436)
Message:
empty Interstitial
console-api log URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490(Line 448)
Message:
unhide main content
console-api info URL: https://platform.twitter.com/widgets.js(Line 1)
Message:
You may have been affected by an update to settings in embedded timelines. See https://twittercommunity.com/t/deprecating-widget-settings/102295. [object HTMLAnchorElement]
console-api info URL: https://cdn.bibblio.org/rcm/4.9/bib-related-content.min.js(Line 1)
Message:
Bibblio: This page has been queued for ingestion. Please note that a 404 response to GET /recommendations is normal. This tells us that the item does not exist and should be ingested. The 422 on POST /url-ingestions is also normal. It tells us that the item has already been queued for ingestion by a prior page load.
console-api log URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490(Line 429)
Message:
5 second timeout
console-api log URL: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490(Line 448)
Message:
unhide main content

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=63072000; includeSubDomains

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

6600d6d98e534115970f9529a45f3195.js.ubembed.com
a.dpmsrv.com
a.teads.tv
ads.celtra.com
ads.yahoo.com
adservice.google.com
adservice.google.de
api.bibblio.org
assets.ubembed.com
bat.bing.com
cache-ssl.celtra.com
cd88e5cedaac5a5053d54fc7d036fb0f.safeframe.googlesyndication.com
cdn.bibblio.org
cdn.flipboard.com
cdn.syndication.twimg.com
cf-images.us-east-1.prod.boltdns.net
cm.everesttech.net
cm.g.doubleclick.net
connect.facebook.net
d.adroll.com
d.adroll.mgr.consensu.org
dpm.demdex.net
dsimg.ubm-us.net
dsum-sec.casalemedia.com
eb2.3lift.com
fonts.googleapis.com
fonts.gstatic.com
fpn.flipboard.com
geo.moatads.com
googleads.g.doubleclick.net
i.ubm-us.net
ib.adnxs.com
idsync.rlcdn.com
images.reg.techweb.com
img.deusm.com
img.en25.com
img.lightreading.com
in.ml314.com
ins.techweb.com
match.adsrvr.org
maxcdn.bootstrapcdn.com
ml314.com
ng.techweb.com
pagead2.googlesyndication.com
pbs.twimg.com
ping.chartbeat.net
pixel.advertising.com
pixel.rubiconproject.com
platform.linkedin.com
platform.twitter.com
ps.eyeota.net
px.moatads.com
s.adroll.com
s.dpmsrv.com
s.ytimg.com
s2150.t.eloqua.com
s657486201.t.eloqua.com
s8t.teads.tv
sb.scorecardresearch.com
securepubads.g.doubleclick.net
simage2.pubmatic.com
static.chartbeat.com
stats.g.doubleclick.net
sync.crwdcntrl.net
sync.outbrain.com
sync.taboola.com
syndication.twitter.com
t.teads.tv
ton.twimg.com
tpc.googlesyndication.com
track.celtra.com
trk.darkreading.com
twimgs.com
ubm.demdex.net
ubmtech.d3.sc.omtrdc.net
ups.analytics.yahoo.com
us-u.openx.net
www.darkreading.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
www.youtube.com
x.bidswitch.net
z.moatads.com
104.111.214.206
104.111.215.135
104.111.216.96
104.111.238.139
104.244.42.8
104.84.57.75
141.226.228.48
142.0.160.13
142.0.173.134
143.204.212.151
143.204.215.21
143.204.215.26
143.204.215.89
143.204.215.93
15.236.9.100
151.101.112.157
151.101.113.131
18.196.212.47
185.33.221.13
185.64.189.110
2.16.186.152
2.18.232.7
2001:4de0:ac19::1:b:1b
209.167.231.17
216.58.206.2
216.58.212.162
2600:9000:2057:1a00:18:1fcd:34e:d2a1
2600:9000:2057:8e00:e:5a70:ca47:86e1
2600:9000:2057:9e00:14:85db:2b40:93a1
2606:2800:134:fa2:1627:1fe:edb:1665
2606:2800:233:66b5:799a:7cd3:f74d:7071
2606:2800:233:7ee2:97c:ab4c:6c70:be36
2606:4700:3031::ac43:c629
2606:4700:3032::6818:71dc
2606:4700:3032::681b:89d7
2606:4700:3033::681f:40b2
2606:4700::6811:7863
2620:103::192:155:48:119
2620:1ec:c11::200
2a00:1288:f03d:1fa::2000
2a00:1450:4001:800::2002
2a00:1450:4001:808::2003
2a00:1450:4001:809::2001
2a00:1450:4001:809::200a
2a00:1450:4001:80b::200e
2a00:1450:4001:814::2004
2a00:1450:4001:815::2003
2a00:1450:4001:817::2003
2a00:1450:4001:81b::2002
2a00:1450:4001:820::2001
2a00:1450:4001:821::200e
2a00:1450:4001:824::2008
2a00:1450:4001:825::200e
2a00:1450:400c:c00::9d
2a02:26f0:10c:295::36f1
2a03:2880:f01c:8012:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
3.123.194.7
3.124.210.90
3.126.56.137
3.216.229.66
3.229.100.58
34.202.64.133
34.248.119.134
34.248.181.236
34.249.88.231
34.98.64.218
35.157.88.25
35.244.174.68
52.28.239.147
52.29.22.19
52.30.187.36
54.194.147.18
64.202.112.95
66.117.28.86
69.173.144.138
95.100.78.166
99.80.128.92
99.86.2.56
99.86.2.87
01b4ebef3b601f246d0adbff5259fabbe7c8e0311f1169b495f0bb2b862db981
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
04dd9ba44f5f3abf15cf5866e7254905c7dbe521e7d721e572641be220a51582
0615fb751c4db849533b1e432f05428e307591466902876f8ab30d7873b7f38b
08f50e9e70388c99977ca13b6af3a49f8f48c83e79230d51ea72a56c0735bd0c
097afea517679d2e0b986d77cb3fe7808026882b52ca074a050e03e7a4a6996b
0a4f12795a11d0957a7e476cdd2516967e3e00f54841456fbd8c0dd607984d92
0c198b70851466bb67af5a47d632b20771162f94d1904121674a390c42bc6772
0c9111d9514a49ad97e7c6d5fd97a00f3232b73537e9155726f32f123eb69b5a
0f762bf1a58c917c1ad50006bfcd192ab55b2d01a857b7c08b6c40e3af878695
10a6e0f0427a05104050292e8d62b3d01062f9422701e267df74958d0cc2eef7
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
1290f89ed4e37d8be8bfe1ad96be8152519135f03fb7452da034cf4a273e5224
1399c38bd120b5ec5548085f61949d402a8bbf05a3831e0ff11a5f1345269046
14f8abc15d4dc53328a3e67ffabd105664d33476e680da33171a07e4d20c20f1
15f0c4d5c59fcfd038128cb0e160cf968c2aeacf708859afd7cb121051a93561
190f689e0f479324a217a5ea88c1acc132b66d24b16559052d59b892ff5dcba2
195e8e91bc727766f427243d4cfb79cdc873639991600bf99e9d2cab5cad77c8
199910b487d552a27409368e9d09ff0f451ae32c01016e3cfbc2539a132c0996
1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e
1ae4b8548f250831a2443bd449af625f6331b7c72e1f408789642a3050596d45
1d68962c84c8ee34a23605fce201c391a597b5fb16be8763e17d35d46f11228c
1fbd06d98ff87713eb030669571c929ab75539f05252f04ae1df807c28b20e95
20cbcc1c3a0b7c92033adbeb8f6f8b0cb03067db48a19f7116b40e8f2fbf8b3a
22bbb6b40bd42c0475a9a999d1a60f7e16760777f89b418722efdfb9f9532996
22c53eeed2c33c21657590793b89fed83648ee555686c0e9ff90b39c1dab406f
24b718e50fcd03ae2cbca99320ea8cca4b57a1eb6665d31e7bc838cfd46833bb
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
25b438de3e944547e69c6de98e403f46a9aa4fb98e6d1bb34954fd30ebc19b56
2b54640c4481464f755e4729d7f105f4decc25690afe59923aec5c739d178aed
2d5d97145529b9226542587e5909ebee914389eea055bfca0b1b77713b080e92
2e9b6fed568a85ee88f1eb2aa1d51cb2073d907cbb0109a5dd703f0b1e5651d6
2ec7b8d3c38a996f67dd4e580c975ece3e9d936d4267167d12604a59a5ff2c87
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96
31d6a6f1d85f1a1f717b72079a1b5f534284429b0ab88da33bb6eec38fa5b890
32821e69d091e71a62b9dbefcd09516c2133b50c50a3f8d597207d9cab5d59b8
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7
33194e1b282eaf349b01b68de4fee20452ff6877b4b82605d5c68c5132444f96
357eac5a1ab8249b3fc4569040b13d64795f5aa945ae3570f782d979015bef56
37a0bbeac143b190eb553c9e8ebf42b7f85b1acba06883855eda085fdf155c4b
390663e9400d0a75871a9b16c18de5e78d848910faf28d351eaa78f63392f021
3a08be5766c0e198ba8171f7decd09065c08a5c850276325cc1792f25e7b356e
3b43fbc8252069c5e9b035da27901e2d586444c2c922100308422c48b3556526
3b6db638fdbdb02380d83d5539cdbb9bc12b00a50dae68573b772e5298ce2313
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407
3ed11976a24e8941c2e7d521180168f017c60c3d8b3d3a621da9fb0dcf93f37d
3eea91bd1f33507891a2909689d21be3a6e0fb1b688037c2a7d59c042503d910
402e45bad7d0e11de6a07937d554f0c049d3ae1396f7d174e5f8bb2cb08239a9
42ab1d01fe2216dbedbdc85cdb98ef9921421d1d6a5c71a40121f0ec0c98282a
42ecd6904f43af4e6cef62ddbeffa7b2b0b6c8ec5080a3e1deec4576f4294859
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
44fc0a3d10c47ae5aa6c77c76b4b8f81aa08022ca464ef235005ddd86570eb5b
45055babdbc02ea34c7baa53f33fc68389c4c5f73afe0bfafd6c9bc5733399bc
48d211ee8f54e0f314ee98a2b63e6e470b33fb1de29d326c742be16125bda71a
4b5b6b15c6255109e06720cce42a06d3aead8b7874423d9c52cb0303212c25ef
4bbed2de83df27dc8130644101bce3dd9ddd1c178815e42bcb49118b4a73593c
4d74b3c0bac64278bd6a397ff070229e056df5b34adeb60252dc0b7de916125f
4e0705327480ad2323cb03d9c450ffcae4a98bf3a5382fa0c7882145ed620e49
4e19e8f9902a8b9ec4840aaf54110d6f502c5fb500303dc605f8776c40f7fb67
4ed07f590bdfa9aa775dbfdef617d98e1e972d102d4289c7a68d3bd9118c280b
4f65ccd30d1c95588b51035a804dd49090d7fbe6c2829a576a31d1b6a3e0f86b
4f89a03faa36f0b6eeb92b9a8f0b8d2f9d3e564ba8bf13bb169bf05b126ca81e
523296d1a2c9a67ee707b5e0bc582f488e5786ec9b343c7b3da58a0d162d643b
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
568c4d6160efabb5b61ed1d2add90083e6bef67fc9964a27310c8a135b1e077d
59c9ac12854f79c2e48004102fc128dbc0166a1edce41401cfad2ae2d5e48a90
5b21d495e672a89a4d8dc047b17ab94531525297644c1a4340a2bc3f26ab782f
5c0f79d0286f1fd3db48e1b689358017b302c0f4babde540329e8c644cf119c7
5c622f5433cbb6ea1df5c0dd8671e55ef7d1464366074730473c453de50a579b
61494fd1b573b217034bef7e22044bda91962797d68efada6726910d32bb995b
63484bd691450c081b848e5159315bfcd02720741d3f72a69717643d6630e578
6414656f939f73a463499bd2c5a8f75793658adf6e05d0e4cd61d1ba36636b94
670aeadab801545b994fbbdf0379b3e06e37bc709b2283586915fa124ce10693
6984a1b18762d1d5d17fdae986554afdfe6f358d6a307a4696471cdb4a7f29b3
69efca1369951fa732f5396af116c284263e13f5936340b58d7390be708639e5
6ad80c3d7e4bdaf43e39825ca84c4af13ddcf0b6869284c3f781e9708757d06c
6b4ebd6049c806e3eef1bd770b2d8b4fdd75803861ead3584ee753e41988efae
6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
6ccbf0b657087412ac60ed87bec3b0ddf1100a1386e75d0623d59c184d0aad83
6d8663ec95d798834ad4c4dae5c578d5ea48f582f973fe1182df3e4ab2ec2b11
6daa62ec3812d8c4cc65448351cefcbe9a190ecec9c63cc261d28a851632d5fa
6dd394ad8df7d5e2ed0f220ff18451f281ccc907cae0d25d233c51533ad8887f
6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677
6ecf902cb7a30237dbc77619bb3060783188435f25d7c9e5c0343a513f7e92eb
6ff62abf29a6565c5cb35d63fe841adc82c3f786aafd7472ade313f823721e98
70566a93dc0cdb461e58656ff5a14a7e00b4f6730c8fd96c78c3a01228124044
71c805ad1e5135a1d4dd9fccaa913bbdaf94cc3608d9619e5b546c1b865a2c16
7303fd4521b231bad4280672d36b7a4486a47a3bc0248da7df8c28989e462400
731e7bf0e3b7c8fb1978a6c04ba3940b77ce5166bd55dcc2c710baa011c517c6
74a584aafb20fa5524e8005c8f236bb47119e12225ac0d9e30d6c6ae69354808
751ab87bdc582620e469b04ca28105c8fd212eab37e186d934fbadec457dadcf
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
7b02cdb496b954e874c4b87d48eb1ea16f088258786ed0d2f0771acc3d01649e
7b5688f8b168e06251901442c4f2f72b30c4477cb472833cde7979a8dca0a862
7b955c4f2afd9b3b20b749f375416b51935aeb3c3a73003bc81629b74624189f
7bb0d75d42e3ccf1a9d1a055bcddfbc23003ed3ab75bb0eb49c05ba747bce8c9
7d23c140b5d7396d35b446f636c1bb8220accc6834abe5f51d7355fca8d91144
7e934bead283231bbf24a114f2db8e95cc45a9e286a191cfaa9672d23b6a0e57
80534764d40f4f4f23e525c5a7c11c8b7fb6fadd3bda006833be4202fd55105b
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
83fcd002defdabf28ad5c9cb014be00f4c4e0bd59a2f8abcc119658382ae61c2
8420f59cd348cf0e10e05482724523ad6b83f88467bbfacf6826eaadd3a03985
854f7a7915f240546d3950dd2b067466da13c013d04a3f8c790880c58ec61151
87adcd951526f566dd8a1eb655a8c4736a3bad8167f6e09a255e54650aeeb655
87cdbacb358e421a482bc1a52dc9cfc04a9f6d8dfe86c7c6c66bcde013792850
886a5ad0e44b6b877488ea02ec9835b296eb921a989634fe15d9caa8be5c0813
88d0ff13f5977662b8c71444286ad62c023c79dc6b67c08ded1a4a08c22b9237
8a322ede0b619b9051fccbe2a1a31f402f416d45f92c245aafcbe75e42f6f2b2
8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28
8e7ad8de87781f6ad65b36a7d3243b44d80dc182df6af076484a2bec85051550
90357453746789676c69cda33641594774de320b355a8cbd1cbea1857e3ae518
9089adb2fc470329b8a4cd196b3008ac385b4ade556c56ebd766e620a48e0ffb
9182e8a1e20a5437d2f311b096b2a98a33d54e94d4d9d6d01c5db3861460d04e
9233eac6e8f7adc20a334ce3854d5adbbed6dcc031a36ea1eee952894407951c
9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39
92a55cb35db6842298c40fdef3e7e6e84a243de080837cb0ec1fba94dea19513
92dd2340c0b1093f3720f56d609515bdc7ea3519bc998186d4dea577758bc459
9531f64ef8f04e686e8e6c7ee20bc76387ea9684ece0a49e6b17df8fdf3ce746
95ef5b080ecf0e2726835bafef2613d3fd328832e84f81da38c5f4f26dab8755
97386a4fc7c65d0524406aa101de0a85f9ffc9818eb7f9375f96c64d196fe495
973ccce3f58b175a9e021c76978726083cc7e5cbed75cd0ff09ff83919934d15
976aabc512994a6ecc5981a85c489d1bb242ba6734b746a964d69db615f72875
984cd1fa5dd20c2b1b8fd77b6bb876a3a211cdf14aaaed6bc1481e3c98027544
98fb88ec226feae902fb7f98528a41db7abd7de155a6d7b65658c6ab7f2b95f4
9a62f4e4ce4381b5873c5576d99405bd4f6b67a630ece29254f7b3c6457859e5
9bb134ceb966cd6cbccfec7ab7dcb2fede6b0a5705e991030c0c248670d99168
9e0e2ad3a93ec78d016efee0993b5856ba9b4acafcee3aa4d6f7162f039fcce4
9ee43447c1f959452480fe17087f6a5498e41654ef13d45ed8fb60900472ea5a
9f61400081191bf755c967c186a8fd356b02010fac3412f84cf83d5dfe10dd5d
a022504d0450c9b28dba2f831f2ccf963c36e72fcee41446a0b003237fd0f63e
a0761aa1289035f3d20430d55e475043a8fa40deff221715e31068905d561753
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
a256529bd5b1b8846f8d2536ce7581fb6cea4479992f222d01535903dff48d79
a290ede885635a3f7bb2b8e630bf795f15dde146fea32520b775bee1b2926ff3
a456c328bbb88fc991a5ddb80db492ec9e179a3ef443d50bf80b3fbbb5e8a7f7
a549034009f79ead18a2154a8b730d8acb61e2f36c0434c0f9cff0f73df5d8cf
a5efcd56cf3d69ee8495174a3fcac057bf716e2101418135335db17c1447c2c3
a6595372db2688a9dfb0991bc6cea16343042dd3caa33483b393d21a77d1c4be
a698bb252d5b3671f5a6e7d52c2f37cfdc799bdc02e434c2afa34dc1ebf03a06
a761b426004caba495cdac2c93ce7dd306c47bc4d7bdc63c4840c3d8182396a9
a8041ba3d02102bd99dcead4dcc9882c484902362927cfd598e389e930f68ceb
a8f4fa7376444ffe05d0f7b296439401fb9729bdee84d760ee6286e7b663c753
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
b151c43349b3aca0bd8701e90e7b18a2e4cb39d057e4cc869c86af9e48d92a69
b15d16c084d5f596c6e53bd497fab961c2c5fd3562b5ca806bd8165bcab86ae6
b19f14d674857362b6e10d0dcb1703b149d9dda6f350d1737562fc36e4e67a81
b26b734a06d61deee9a1dc6b49e415c12d84ae4c99cc201fc254046fe8995f7d
b309c9c4a6c27c7cfc64ab2bc7f545e8d7b41a795c46202ab2a9c633f7128287
b4cf7d6d50b6a36f070f6c49e975198a9a8930838695b64e480bf1f6199f0572
b5c543f59d71e1e4f6b51c896febf86975206dcf9e34757f475b125d64d16ea6
b8216ca3654fbe70123a3e40b9bb54075728dd060306647ce0f862d7e83295c6
b9a83984bfc54b6515de11d7f365042e4d87f71aa7a0f17dcadb2b2ce308db1d
bb229a48bee31f5d54ca12dc9bd960c63a671f0d4be86a054c1d324a44499d96
bee14e3d1698d79b5119ef95492ec5ba9f055b7729ea91e8d3d6a7db7c13955b
bfc1797e85a0565d0cfba1621eac801dc5ebd78a02f45e0ab8de5c6c2eb3f987
c19345a03fed44d267abbe2f427bdcd261aa86a447320f15f3eef8e121690794
c293a28e23c66b27bd04bc1742f3aab0ebf6c382961c1e83140f035a08ea5e5d
c2ad0814be9324b04169a8e23d3f457982575f1cece789608e7633081e4f7953
c518a654b4eddd4e07cb608a93e468590482404afab140a361e5d39eb8a8369c
c5882768d33bf8778b8c12ec81466d13a9c4e1c797d5cc1686f3f2564ab1983d
c670b28572ed7804386b274eb1ddafbc0253a1aff515b0d15805c57c26bcee64
c7d1ee4f5a608fa05b8f9c6cbd47e3eab7516facc3380d704b7332805877afff
c9a1566a9237b6b7b03584c403452894df53d094784c5245d0d81ba353a03ce1
ca496980f053a2645d65d70105e801b4c84c81febf062416c2e25ddc7c5ad191
ca782cbdd8cee7ccccef6983f6566c9c29e1aa5da753a81e65250fad30bb6359
cbce85e96b7752208ce15a09ea4d5a58b792edc9e77f1c5ccf46c01935970f9d
cd199b07e569b1eaaa2cfb7140e1db1bebbc6f1e87c9d8c8dbe1fdc61fb0696e
cd8ddec509daf284f644926ce4a94e2cf5a3cefa41c7c18f2358b6cca80a4a3f
cf167be72549318f78f8c03d0d93b923f8e8e290acec47b870a1cede920e859b
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
cf7bdb0487590885c13a3cc0a2a1450b3ac649a465de267af12f552be8bcb5fe
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7
d10a2d03c9fb4943f449b97d333b8d22990200afa70d13d5c1c23ad4d783200c
d1c4968c56129e5f503b4b89be35a55d9c710ee63a58ad7497dbee1e372b1f54
d23bd8c102d788a16499ceb7c2ed6c0e9de7e65b446bb266cfb616419fad46f6
d26432e661658ef9d3d538b1f71b1478193f6c141f1cd7dfed03e5b677d178c2
d4b95126382745e9e07d76812e3bbc8d6de2cfa6356c586f930ece7d4acb8052
d50d436889f46d5b9455690493e877e02ad30ea4dca963ffcaa3024c45c1d58c
d6df7d1f2b9c65c06c5ae1e798650b6c388f26f6852b8814f942557d712b9745
d7832395981af74dd6f4747eb4735ae72a38f0eab19aa9ec7ca51ab2840266ee
d8211d90e9a86c075d471349268b01c8b65cfe9dd1dd09e18bf413b6930d1067
d8b7ea5cc75abc79d502a95c5ccac8f97aa82fd8c13acc74c84c754eb86cc4c3
d90b3087b3f870e77bcd7abb161def87f779505609b1fd6c2d42409eaf6daa34
da3e524928bcca821af2551eb6f9e9ae2449ceb48642cce4f2dae23383098537
dafb72bcf008c9b9754482b88e8ba8b8e854f1a69483f0753b1c3f12101c1a9f
dc865bc599e784873af80d11610e625fece605a29f3b3b0d32dd10c70ca16bbf
dca7bdda94eda64db8d112c477c6ac925e80ff17777ae330fd4bf390f39bf83f
de309132f417ea1f43ee235841b11e40081e1ea204cbbf29b9c896dc3350dd64
de3246094525b21a870fc7d2a67490d0132535c6fa5993755c549f1a9d1bd8af
de9d3fd0eb948bd294477d0eda60a73b85caff1794803530d0463193a113da98
ded16b9cb72df85ea242aaef8878c716abb57c746f0bfda6eabd2b9ddb2a23b5
df25786bc3951d78d0f763a2a75a1f33b01b8ae2a5157831d2cf4d0348c2ede7
dff56217b36beb3f039af3fe14b507c4ec6600ee9f7ef7182c5ddae190406da9
e0aa850563dc4c8c4e8ae368cdd6f68c4fc285d8d01f2753c9003dd948d7a6cc
e25b417a57ea79647830453e459009ef9bf5182674efb28d8a2b7159400b667b
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e5cc2027e2da5b3d553fba6a4d2d7276aafa604001e9b0321e18d1fd62b03b3f
e76d2d771deceb87567b67f968ef2196915e110c0027ade297fab2209965fd30
e7c060e4cfa396d8922bccbea356fb7531f0623d60488953f09dbaa61b9e8066
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395
eb12eaa9c690d06187a7099545a6bf52318a2364411fc9c4ec73e7fa4ecbb0f9
ebe3a0272a317857bf566a0deec42181bf0e89d280bb3143bba14da1ae1ddb10
ed2c6c0fb3151dc9d40120a17446f07d8873a8b6e08b071bbed82cd6de9b78ba
edc22566c852f4dbc2da2a3aa45078afd771596eaf042510365da81ec2b3ae52
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
f03881c2d6e064d809abaadf7eabe69ee8b1e58812b308022f6811c4ef004d63
f03e882b29d452040b26578e5612d8708fe2940d5009d6ba60988413275562de
f1ccea6b7204d9f7913ab45e1afa51d79f83bd4f0319de937b0132e6e02b1aab
f30d5c0433d74c8224a2343a3c6c08468015909c22315b8693f9bdee33f48217
f3bd482cd3ec17583f25ad0819d1ccbcd0cdcb0fe26f8d87b7f30fd61b3dc640
f4539aa5670a5ca84f183d2057a22e7ccabefc8e745687b061cda4701fba3dbf
f46875e915b2916fcfb3fc2f62a3eabf7ce5340e87a39507c03cd29668451ed6
f5932acd6c5f2796f354dedc5e8dfe30e206787365186bbf0f9789d083472a75
f598a8748bf3e022bb3b431e6a0ad2b735d99b41288d56361dc9ce63b4e4d285
f59e5f34a941183aacaed25322ac0856628493c2cfd936ded3fddc0a49510e52
f77ad10a049dc9fdbb57aa36aad65ec6e0702349a1525f18ed065bad0997c443
f98db884896fc1718bb97cda45f9891da0f12e66a017fcf4207730bfc36af1b6
f9f7db3044919596c2907ba0df9387910d5e9e6a51b539162a005dfec82daee7
fa30597c8340ed18b045cc801a2dfb2e1185f9ca5ea02753e5935e64df5aa4c5
fb295c2a72d39784b18a1d2d5b0c9976807f7cf010fe730b86d43bc55b0ae251
fbb475f48d03815474a554d3c16599917c2fabf811e3fe2772aeabeee474aa8f
fd2f3015d1e62a6f24420652afa85f8dbce31636ea8ee86781dc794c243dec68
fdb0066a030a45bd44f17d459c6369901b3fa648c94de3afa0f824d87dfd1527
fde420230453eae5a47b3a48ce45675fa1175578b15597ad17e6342253cfee34
ffcaeef328a1e67717f714997426aaf936e4b9d378a5fbe1bd2a063dfeb50750