URL: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Submission: On April 24 via manual from US

Summary

This website contacted 5 IPs in 3 countries across 5 domains to perform 12 HTTP transactions. The main IP is 185.199.109.153, located in United States and belongs to FASTLY, US. The main domain is ceso.github.io.
TLS certificate: Issued by DigiCert SHA2 High Assurance Server CA on June 27th 2018. Valid for: 2 years.
This is the only time ceso.github.io was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
7 185.199.109.153 54113 (FASTLY)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
12 5
Domain Requested by
7 ceso.github.io ceso.github.io
2 utteranc.es ceso.github.io
utteranc.es
1 netdna.bootstrapcdn.com ceso.github.io
1 ajax.googleapis.com ceso.github.io
1 cdnjs.cloudflare.com ceso.github.io
12 5
Subject Issuer Validity Valid
www.github.com
DigiCert SHA2 High Assurance Server CA
2018-06-27 -
2020-06-20
2 years crt.sh
cloudflare.com
CloudFlare Inc ECC CA-2
2020-01-07 -
2020-10-09
9 months crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-01-31 -
2020-10-09
8 months crt.sh
upload.video.google.com
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
*.bootstrapcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-09-14 -
2020-10-13
a year crt.sh

This page contains 2 frames:

Primary Page: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Frame ID: EA7F5105BDAAC19B20731EDD32ACBE55
Requests: 11 HTTP requests in this frame

Frame: https://utteranc.es/utterances.html?src=https%3A%2F%2Futteranc.es%2Fclient.js&repo=ceso%2Fblog-source&issue-term=title&label=comments%20%3Aspeech_balloon%3A&theme=github-dark&crossorigin=anonymous&url=https%3A%2F%2Fceso.github.io%2Fposts%2F2020%2F04%2Fhacking%2Foscp-cheatsheet%2F&origin=https%3A%2F%2Fceso.github.io&pathname=posts%2F2020%2F04%2Fhacking%2Foscp-cheatsheet%2F&title=Hacking%2FOSCP%20cheatsheet%20%3A%3A%20Ceso%20Adventures&description=Hacking%2FOSCP%20Cheatsheet%20Well%2C%20just%20finished%20my%2090%20days%20journey%20of%20OSCP%20labs%2C%20so%20now%20here%20is%20my%20cheatsheet%20of%20it%20(and%20of%20hacking%20itself)%2C%20I%20will%20be%20adding%20stuff%20in%20an%20incremental%20way%20as%20I%20go%20having%20time%20and%2For%20learning%20new%20stuff.%20But%20this%20is%20basically%20the%20tools%20I%20tend%20to%20relie%20and%20use%20in%20this%20way%20the%20most.%20Hope%20is%20helpfull%20for%20you!%0AEnumeration%20Network%20discoverie%20Nmap%20I%20tend%20to%20run%203%20nmaps%2C%20an%20initial%20one%2C%20a%20full%20one%20and%20an%20UDP%20one%2C%20all%20of%20them%20in%20parallel%3A
Frame ID: 4AEED2DAF2D518A16BBDAB695F828EC3
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /^https?:\/\/[^/]+\.github\.io\//i
  • headers server /^GitHub\.com$/i

Overall confidence: 100%
Detected patterns
  • headers via /varnish(?: \(Varnish\/([\d.]+)\))?/i

Overall confidence: 100%
Detected patterns
  • url /^https?:\/\/[^/]+\.github\.io\//i
  • headers server /^GitHub\.com$/i

Overall confidence: 100%
Detected patterns
  • url /^https?:\/\/[^/]+\.github\.io\//i
  • headers server /^GitHub\.com$/i

Page Statistics

12
Requests

100 %
HTTPS

80 %
IPv6

5
Domains

5
Subdomains

5
IPs

3
Countries

280 kB
Transfer

631 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

12 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
55 KB
14 KB
Document
General
Full URL
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.199.109.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
19743d30c81495e76e74e6f6aed4206efa53f1cb053ea4d0a222fbf4ef87021c

Request headers

:method
GET
:authority
ceso.github.io
:scheme
https
:path
/posts/2020/04/hacking/oscp-cheatsheet/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
server
GitHub.com
content-type
text/html; charset=utf-8
last-modified
Wed, 15 Apr 2020 23:53:32 GMT
etag
W/"5e979e7c-dc77"
access-control-allow-origin
*
expires
Fri, 24 Apr 2020 15:48:20 GMT
cache-control
max-age=600
content-encoding
gzip
x-proxy-cache
MISS
x-github-request-id
96DC:7011:10F251:158900:5EA307EC
accept-ranges
bytes
date
Fri, 24 Apr 2020 15:38:20 GMT
via
1.1 varnish
age
0
x-served-by
cache-hhn4034-HHN
x-cache
MISS
x-cache-hits
0
x-timer
S1587742701.756096,VS0,VE102
vary
Accept-Encoding
x-fastly-request-id
88ce07c14e05057ad5830e4480e02f0a74af9a7b
content-length
14126
flag-icon.min.css
cdnjs.cloudflare.com/ajax/libs/flag-icon-css/3.2.1/css/
33 KB
2 KB
Stylesheet
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/flag-icon-css/3.2.1/css/flag-icon.min.css
Requested by
Host: ceso.github.io
URL: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:85e5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0fe6690c98e11b16b97dfc9092e4efc228b8027b4518165ae235214a97658633
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 15:38:20 GMT
content-encoding
br
vary
Accept-Encoding
cf-cache-status
HIT
age
1704617
status
200
alt-svc
h3-27=":443"; ma=86400, h3-25=":443"; ma=86400, h3-24=":443"; ma=86400, h3-23=":443"; ma=86400
cf-request-id
024e700d86000097ba6f12f200000001
served-in-seconds
0.001
timing-allow-origin
*
last-modified
Wed, 24 Oct 2018 15:46:03 GMT
server
cloudflare
etag
W/"5bd093bb-8398"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000; includeSubDomains
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=30672000
cf-ray
5890e928db3897ba-FRA
expires
Wed, 14 Apr 2021 15:38:20 GMT
main.min.5dcefbf8102eb536dd3e2de53ffebfa58599ab2435c241a0db81728a5e015f2e.css
ceso.github.io/
15 KB
4 KB
Stylesheet
General
Full URL
https://ceso.github.io/main.min.5dcefbf8102eb536dd3e2de53ffebfa58599ab2435c241a0db81728a5e015f2e.css
Requested by
Host: ceso.github.io
URL: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.199.109.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
ca841cff7dee086edad9b62aa016efbf4e42d313e07855fdbccc2b47c951318f

Request headers

Referer
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-fastly-request-id
2780760407218a41d799182184f28d787e412911
date
Fri, 24 Apr 2020 15:38:21 GMT
content-encoding
gzip
age
0
x-cache
MISS
status
200
content-length
4080
x-served-by
cache-hhn4034-HHN
access-control-allow-origin
*
last-modified
Wed, 15 Apr 2020 23:53:32 GMT
server
GitHub.com
x-github-request-id
2EA6:0BA0:2245CD:2B3383:5EA307EC
x-timer
S1587742701.944386,VS0,VE96
etag
W/"5e979e7c-3a5b"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 varnish
expires
Fri, 24 Apr 2020 15:48:21 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
1
x-proxy-cache
MISS
x-cache-hits
0
scroll.css
ceso.github.io/css/
1 KB
551 B
Stylesheet
General
Full URL
https://ceso.github.io/css/scroll.css
Requested by
Host: ceso.github.io
URL: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.199.109.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
2caf9602e4db15231fff5e40e5619c3733679440a14ad6ad298b848fdde0af8a

Request headers

Referer
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-fastly-request-id
be3ca25dbc1bcd23c5cdcb4f9653c24eb04ed27f
date
Fri, 24 Apr 2020 15:38:21 GMT
content-encoding
gzip
age
0
x-cache
MISS
status
200
content-length
411
x-served-by
cache-hhn4034-HHN
access-control-allow-origin
*
last-modified
Wed, 15 Apr 2020 23:53:32 GMT
server
GitHub.com
x-github-request-id
D03E:199F:394EE1:4849C8:5EA307EC
x-timer
S1587742701.948475,VS0,VE97
etag
W/"5e979e7c-451"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 varnish
expires
Fri, 24 Apr 2020 15:48:21 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
0
smb-version-wireshark.png
ceso.github.io/images/cheatsheet/
35 KB
35 KB
Image
General
Full URL
https://ceso.github.io/images/cheatsheet/smb-version-wireshark.png
Requested by
Host: ceso.github.io
URL: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.199.109.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
152e78785e9df9d9f0ea07fb128fe55c9faed297658ac7bd2533207949e88452

Request headers

Referer
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-fastly-request-id
fb84b8ba393a90d630571c3cf2aaa28edf1c2a6f
date
Fri, 24 Apr 2020 15:38:21 GMT
via
1.1 varnish
age
0
x-cache
HIT
status
200
content-length
35550
x-served-by
cache-hhn4034-HHN
last-modified
Wed, 15 Apr 2020 23:53:32 GMT
server
GitHub.com
x-github-request-id
1A28:35FE:1CE711:2470D4:5EA2C903
x-timer
S1587742701.011473,VS0,VE91
etag
"5e979e7c-8ade"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
expires
Fri, 24 Apr 2020 11:19:55 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
1
x-proxy-cache
MISS
x-cache-hits
1
multiple-hop-sshuttle.png
ceso.github.io/images/cheatsheet/
68 KB
69 KB
Image
General
Full URL
https://ceso.github.io/images/cheatsheet/multiple-hop-sshuttle.png
Requested by
Host: ceso.github.io
URL: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.199.109.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
f621c989ef64269fa52320924e02d97fde4f2e66a28dcfe8359faf1b212e3433

Request headers

Referer
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-fastly-request-id
475cd4347f87a0611a9747f4841e2d90157061f9
date
Fri, 24 Apr 2020 15:38:21 GMT
via
1.1 varnish
age
0
x-cache
HIT
status
200
content-length
69957
x-served-by
cache-hhn4034-HHN
last-modified
Wed, 15 Apr 2020 23:53:32 GMT
server
GitHub.com
x-github-request-id
3962:48E7:E6BD9:123E4E:5EA2C903
x-timer
S1587742701.011538,VS0,VE96
etag
"5e979e7c-11145"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
expires
Fri, 24 Apr 2020 11:19:55 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
1
x-proxy-cache
MISS
x-cache-hits
1
client.js
utteranc.es/
3 KB
2 KB
Script
General
Full URL
https://utteranc.es/client.js
Requested by
Host: ceso.github.io
URL: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3030::681c:1c78 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5a28aee6bfe7853879974ab95d8ff829e6954c75a281be9d1961f93d640a85ba

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Origin
https://ceso.github.io

Response headers

x-fastly-request-id
8e13477d4c64e4df0fe676921350ae6a8225edf5
date
Fri, 24 Apr 2020 15:38:21 GMT
via
1.1 varnish
cf-cache-status
REVALIDATED
x-cache
HIT
status
200
x-cache-hits
1
content-encoding
br
x-origin-cache
1
cf-request-id
024e700e1c000096d4ad90d200000001
x-served-by
cache-fra19127-FRA
last-modified
Sun, 22 Mar 2020 19:06:08 GMT
server
cloudflare
x-github-request-id
DB9E:50FB:5E117:86CFF:5E9CCBF7
x-timer
S1587383073.418433,VS0,VE99
etag
W/"5e77b720-a7e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5890e929cbe696d4-FRA
x-proxy-cache
MISS
expires
Fri, 24 Apr 2020 09:55:55 GMT
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.4.1/
86 KB
30 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/3.4.1/jquery.min.js
Requested by
Host: ceso.github.io
URL: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 23 Apr 2020 17:38:24 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
79196
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
30774
x-xss-protection
0
last-modified
Mon, 13 May 2019 14:37:17 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 23 Apr 2021 17:38:24 GMT
font-awesome.css
netdna.bootstrapcdn.com/font-awesome/3.2.1/css/
27 KB
5 KB
Stylesheet
General
Full URL
https://netdna.bootstrapcdn.com/font-awesome/3.2.1/css/font-awesome.css
Requested by
Host: ceso.github.io
URL: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac19::1:b:2b , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
22a22e76f4de930e54dd33af00c71b68828847409e5e79787df5224dd9776c6f
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 15:38:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 12 Dec 2018 18:35:19 GMT
status
200
etag
"1544639719"
vary
Accept-Encoding
x-cache
HIT
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=31536000
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
timing-allow-origin
*
content-length
5376
bundle.min.2d5469329143160ae2456a69c3c76dc2d0a3b212b46afe291a51bd68650ed6f8697e001dab54f1c272c77ce08092a8c55e5bb4314e0ee334aab4b927ec896638.js
ceso.github.io/
308 KB
118 KB
Script
General
Full URL
https://ceso.github.io/bundle.min.2d5469329143160ae2456a69c3c76dc2d0a3b212b46afe291a51bd68650ed6f8697e001dab54f1c272c77ce08092a8c55e5bb4314e0ee334aab4b927ec896638.js
Requested by
Host: ceso.github.io
URL: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.199.109.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
28b23730b39fd0bc58acf7ba2fd1cf14773422dbbdd3ef618f95d411c089cdff

Request headers

Referer
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-fastly-request-id
2c730613f90952dd31a50b192bebe082e34c4525
date
Fri, 24 Apr 2020 15:38:21 GMT
content-encoding
gzip
age
0
x-cache
MISS
status
200
content-length
120639
x-served-by
cache-hhn4034-HHN
access-control-allow-origin
*
last-modified
Wed, 15 Apr 2020 23:53:32 GMT
server
GitHub.com
x-github-request-id
85FC:7012:2151FE:29F96C:5EA307EC
x-timer
S1587742701.997277,VS0,VE102
etag
W/"5e979e7c-4d12f"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 24 Apr 2020 15:48:21 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
1
x-proxy-cache
MISS
x-cache-hits
0
scroll.js
ceso.github.io/js/
486 B
436 B
Script
General
Full URL
https://ceso.github.io/js/scroll.js
Requested by
Host: ceso.github.io
URL: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.199.109.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
f43d618753436a636b3f8fc07967643eb357f68e817b2346bf978d21d94bb505

Request headers

Referer
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-fastly-request-id
b872072cc0305c03aaf3f40b71f46f501f4754b0
date
Fri, 24 Apr 2020 15:38:21 GMT
content-encoding
gzip
age
0
x-cache
HIT
status
200
content-length
271
x-served-by
cache-hhn4034-HHN
access-control-allow-origin
*
last-modified
Wed, 15 Apr 2020 23:53:32 GMT
server
GitHub.com
x-github-request-id
BD2A:3E0E:35BA9:472AC:5EA2C902
x-timer
S1587742701.011415,VS0,VE95
etag
W/"5e979e7c-1e6"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 24 Apr 2020 11:19:55 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
utterances.html
utteranc.es/ Frame 4AEE
0
0
Document
General
Full URL
https://utteranc.es/utterances.html?src=https%3A%2F%2Futteranc.es%2Fclient.js&repo=ceso%2Fblog-source&issue-term=title&label=comments%20%3Aspeech_balloon%3A&theme=github-dark&crossorigin=anonymous&url=https%3A%2F%2Fceso.github.io%2Fposts%2F2020%2F04%2Fhacking%2Foscp-cheatsheet%2F&origin=https%3A%2F%2Fceso.github.io&pathname=posts%2F2020%2F04%2Fhacking%2Foscp-cheatsheet%2F&title=Hacking%2FOSCP%20cheatsheet%20%3A%3A%20Ceso%20Adventures&description=Hacking%2FOSCP%20Cheatsheet%20Well%2C%20just%20finished%20my%2090%20days%20journey%20of%20OSCP%20labs%2C%20so%20now%20here%20is%20my%20cheatsheet%20of%20it%20(and%20of%20hacking%20itself)%2C%20I%20will%20be%20adding%20stuff%20in%20an%20incremental%20way%20as%20I%20go%20having%20time%20and%2For%20learning%20new%20stuff.%20But%20this%20is%20basically%20the%20tools%20I%20tend%20to%20relie%20and%20use%20in%20this%20way%20the%20most.%20Hope%20is%20helpfull%20for%20you!%0AEnumeration%20Network%20discoverie%20Nmap%20I%20tend%20to%20run%203%20nmaps%2C%20an%20initial%20one%2C%20a%20full%20one%20and%20an%20UDP%20one%2C%20all%20of%20them%20in%20parallel%3A
Requested by
Host: utteranc.es
URL: https://utteranc.es/client.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3030::681c:1c78 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
utteranc.es
:scheme
https
:path
/utterances.html?src=https%3A%2F%2Futteranc.es%2Fclient.js&repo=ceso%2Fblog-source&issue-term=title&label=comments%20%3Aspeech_balloon%3A&theme=github-dark&crossorigin=anonymous&url=https%3A%2F%2Fceso.github.io%2Fposts%2F2020%2F04%2Fhacking%2Foscp-cheatsheet%2F&origin=https%3A%2F%2Fceso.github.io&pathname=posts%2F2020%2F04%2Fhacking%2Foscp-cheatsheet%2F&title=Hacking%2FOSCP%20cheatsheet%20%3A%3A%20Ceso%20Adventures&description=Hacking%2FOSCP%20Cheatsheet%20Well%2C%20just%20finished%20my%2090%20days%20journey%20of%20OSCP%20labs%2C%20so%20now%20here%20is%20my%20cheatsheet%20of%20it%20(and%20of%20hacking%20itself)%2C%20I%20will%20be%20adding%20stuff%20in%20an%20incremental%20way%20as%20I%20go%20having%20time%20and%2For%20learning%20new%20stuff.%20But%20this%20is%20basically%20the%20tools%20I%20tend%20to%20relie%20and%20use%20in%20this%20way%20the%20most.%20Hope%20is%20helpfull%20for%20you!%0AEnumeration%20Network%20discoverie%20Nmap%20I%20tend%20to%20run%203%20nmaps%2C%20an%20initial%20one%2C%20a%20full%20one%20and%20an%20UDP%20one%2C%20all%20of%20them%20in%20parallel%3A
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/

Response headers

status
200
date
Fri, 24 Apr 2020 15:38:24 GMT
content-type
text/html; charset=utf-8
set-cookie
__cfduid=df731ad9289d0dd2e112d2fb558b07f961587742704; expires=Sun, 24-May-20 15:38:24 GMT; path=/; domain=.utteranc.es; HttpOnly; SameSite=Lax
x-origin-cache
1
last-modified
Sun, 22 Mar 2020 19:06:08 GMT
access-control-allow-origin
*
expires
Fri, 24 Apr 2020 14:13:48 GMT
cache-control
max-age=600
x-proxy-cache
MISS
x-github-request-id
D164:6FE7:81EAA:A6438:5EA2F1C4
via
1.1 varnish
age
0
x-served-by
cache-fra19180-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1587742704.395095,VS0,VE101
vary
Accept-Encoding
x-fastly-request-id
541aa756be35c6f94c324df5e040f36ff56d100f
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
5890e93e5e8c177e-FRA
content-encoding
br
cf-request-id
024e701af60000177e19994200000001

Verdicts & Comments Add Verdict or Comment

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery object| _self object| Prism object| typescript object| metaThemeColor function| parcelRequire

0 Cookies