www.fortinet.com
Open in
urlscan Pro
2a05:d014:f3c:6c02:209f:ae6c:3c6e:e3dd
Public Scan
Submission: On April 18 via api from DE — Scanned from DE
Summary
TLS certificate: Issued by DigiCert Global G2 TLS RSA SHA256 202... on July 5th 2023. Valid for: a year.
This is the only time www.fortinet.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
45 | 2a05:d014:f3c... 2a05:d014:f3c:6c02:209f:ae6c:3c6e:e3dd | 16509 (AMAZON-02) (AMAZON-02) | |
6 | 2606:4700::68... 2606:4700::6813:b134 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:440... 2606:4700:4400::6812:2089 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 2a02:26f0:480... 2a02:26f0:480:983::1e80 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
2 | 95.101.75.185 95.101.75.185 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2a02:26f0:710... 2a02:26f0:7100::210:172 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 176.34.140.246 176.34.140.246 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 13.248.142.121 13.248.142.121 | 16509 (AMAZON-02) (AMAZON-02) | |
1 2 | 63.140.62.222 63.140.62.222 | 15224 (OMNITURE) (OMNITURE) | |
64 | 10 |
ASN16509 (AMAZON-02, US)
www.fortinet.com |
ASN20940 (AKAMAI-ASN1, NL)
assets.adobedtm.com |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a95-101-75-185.deploy.static.akamaitechnologies.com
j.6sc.co | |
c.6sc.co |
ASN16509 (AMAZON-02, US)
PTR: ec2-176-34-140-246.eu-west-1.compute.amazonaws.com
dpm.demdex.net |
ASN16509 (AMAZON-02, US)
PTR: ac3ff6aafb2cddae2.awsglobalaccelerator.com
epsilon.6sense.com |
ASN15224 (OMNITURE, US)
PTR: ip-63-140-62-222.data.adobedc.net
metrics.fortinet.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
47 |
fortinet.com
1 redirects
www.fortinet.com — Cisco Umbrella Rank: 140698 metrics.fortinet.com — Cisco Umbrella Rank: 323239 |
4 MB |
6 |
cookielaw.org
cdn.cookielaw.org — Cisco Umbrella Rank: 306 |
126 KB |
5 |
adobedtm.com
assets.adobedtm.com — Cisco Umbrella Rank: 427 |
136 KB |
3 |
6sc.co
j.6sc.co — Cisco Umbrella Rank: 5885 c.6sc.co — Cisco Umbrella Rank: 9001 ipv6.6sc.co — Cisco Umbrella Rank: 6019 |
18 KB |
2 |
6sense.com
epsilon.6sense.com — Cisco Umbrella Rank: 9083 |
708 B |
1 |
demdex.net
dpm.demdex.net — Cisco Umbrella Rank: 233 |
542 B |
1 |
onetrust.com
geolocation.onetrust.com — Cisco Umbrella Rank: 535 |
306 B |
64 | 7 |
Domain | Requested by | |
---|---|---|
45 | www.fortinet.com |
www.fortinet.com
|
6 | cdn.cookielaw.org |
www.fortinet.com
cdn.cookielaw.org |
5 | assets.adobedtm.com |
cdn.cookielaw.org
assets.adobedtm.com |
2 | metrics.fortinet.com | 1 redirects |
2 | epsilon.6sense.com |
j.6sc.co
|
1 | dpm.demdex.net |
assets.adobedtm.com
|
1 | ipv6.6sc.co |
j.6sc.co
|
1 | c.6sc.co |
j.6sc.co
|
1 | j.6sc.co |
www.fortinet.com
|
1 | geolocation.onetrust.com |
cdn.cookielaw.org
|
64 | 10 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.fortinet.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-07-05 - 2024-08-04 |
a year | crt.sh |
cookielaw.org Cloudflare Inc ECC CA-3 |
2024-03-01 - 2024-12-31 |
10 months | crt.sh |
onetrust.com Cloudflare Inc ECC CA-3 |
2023-11-13 - 2024-11-12 |
a year | crt.sh |
assets.adobedtm.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-07-11 - 2024-08-10 |
a year | crt.sh |
6sc.co R3 |
2024-04-09 - 2024-07-08 |
3 months | crt.sh |
*.demdex.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-09-26 - 2024-10-26 |
a year | crt.sh |
*.6sense.com Amazon RSA 2048 M03 |
2024-03-31 - 2025-04-29 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread
Frame ID: 439315E4AC6D06985E6A26CF5A4B66D5
Requests: 65 HTTP requests in this frame
Screenshot
Page Title
Botnets Continue Exploiting CVE-2023-1389 for Wide-Scale Spread | FortiGuard LabsDetected technologies
Adobe Experience Manager (CMS) ExpandDetected patterns
- /etc/designs/
- /etc\.clientlibs/
OneTrust (Cookie compliance) Expand
Detected patterns
- cdn\.cookielaw\.org
- otSDKStub\.js
Page Statistics
11 Outgoing links
These are links going to different origins than the main page.
Title: CVE-2023-1389
Search URL Search Domain Scan URL
Title: Fortinet Certified Fundamentals
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: FortiGuard Labs
Search URL Search Domain Scan URL
Title: Fortinet Community
Search URL Search Domain Scan URL
Title: Investor Relations
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 64- https://metrics.fortinet.com/b/ss/fortinetincproduction/1/JS-2.26.0-LDQM/s26351098886453?AQB=1&ndh=1&pf=1&t=18%2F3%2F2024%2016%3A21%3A24%204%20-120&fid=578043B96BA009B9-0D8B876F5B627889&ce=UTF-8&pageName=en%3Ablog%3Athreat-research%3Abotnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread&g=https%3A%2F%2Fwww.fortinet.com%2Fblog%2Fthreat-research%2Fbotnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread&c.&cm.&ssf=1&.cm&.c&cc=USD&v1=www.fortinet.com%2Fblog%2Fthreat-research%2Fbotnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread&c7=Entire%20Site&c8=New&v27=BLOG&v33=en%3Ablog%3Athreat-research%3Abotnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread&v35=Enabled&v92=https%3A%2F%2Fwww.fortinet.com%2Fblog%2Fthreat-research%2Fbotnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1 HTTP 302
- https://metrics.fortinet.com/b/ss/fortinetincproduction/1/JS-2.26.0-LDQM/s26351098886453?AQB=1&pccr=true&vidn=331096323EE81DE8-40001AFEE219300E&ndh=1&pf=1&t=18%2F3%2F2024%2016%3A21%3A24%204%20-120&fid=578043B96BA009B9-0D8B876F5B627889&ce=UTF-8&pageName=en%3Ablog%3Athreat-research%3Abotnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread&g=https%3A%2F%2Fwww.fortinet.com%2Fblog%2Fthreat-research%2Fbotnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread&c.&cm.&ssf=1&.cm&.c&cc=USD&v1=www.fortinet.com%2Fblog%2Fthreat-research%2Fbotnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread&c7=Entire%20Site&c8=New&v27=BLOG&v33=en%3Ablog%3Athreat-research%3Abotnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread&v35=Enabled&v92=https%3A%2F%2Fwww.fortinet.com%2Fblog%2Fthreat-research%2Fbotnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1
64 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread
www.fortinet.com/blog/threat-research/ |
81 KB 24 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
visitorapi.min.js
www.fortinet.com/etc/designs/fortinet/adb-target/ |
64 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
at.js
www.fortinet.com/etc/designs/fortinet/adb-target/ |
104 KB 48 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
clientlib-base.min.dd0a483149c256850fa49d2e21abf149.css
www.fortinet.com/etc.clientlibs/fortinet-blog/clientlibs/ |
540 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
otSDKStub.js
cdn.cookielaw.org/scripttemplates/ |
21 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fortinet-logo-white.svg
www.fortinet.com/content/dam/fortinet-blog/ |
32 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
toc-icon.jpg
www.fortinet.com/content/dam/fortinet/images/ |
1 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
clientlib-base.min.45f6c0bdb03736a410d54befc06568ae.js
www.fortinet.com/etc.clientlibs/fortinet-blog/clientlibs/ |
156 KB 73 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
f85f39fc-d7aa-467a-b762-fbb722748016.json
cdn.cookielaw.org/consent/f85f39fc-d7aa-467a-b762-fbb722748016/ |
5 KB 2 KB |
XHR
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
71 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cve-2023-1389-hero.png
www.fortinet.com/content/dam/fortinet-blog/article-heros/ |
276 KB 277 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ddos-botnets-zyxel-thumbnail.png.thumb.319.319.png
www.fortinet.com/content/dam/fortinet-blog/article-heros/ |
46 KB 47 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trickbot01.png.thumb.319.319.png
www.fortinet.com/content/dam/fortinet-blog/article-images/ive_got_trickbot_under_my_screen/ |
17 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
botnet_thumbnail.png.thumb.319.319.png
www.fortinet.com/content/dam/fortinet-blog/article-images/a-wicked-family-of-bots/ |
130 KB 131 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
UcC73FwrK3iLTeHuS_fvQtMwCp50KnMa1ZL7.woff2
www.fortinet.com/etc/designs/fortinet/gfonts/ |
37 KB 38 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
location
geolocation.onetrust.com/cookieconsentpub/v1/geo/ |
68 B 306 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig00-tp-link-telemetry.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_69113330.img.png/1712939390464/ |
31 KB 32 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig01-ips-telemetry.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image.img.png/1712939407501/ |
61 KB 63 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig02-vulnerability-poc.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1994044765.img.png/1712939425917/ |
42 KB 44 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
42 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig03-exploit-packet.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1401988846.img.png/1712939448347/ |
25 KB 26 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig04-script-file-exec-sh.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_872533556.img.png/1712939464341/ |
70 KB 71 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig05-assembly-code-for-user-creation.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1731474421.img.png/1712939483280/ |
126 KB 127 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig06-malware-execution.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_835866544.img.png/1712939500273/ |
87 KB 88 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig07-established-c2-session-packet.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1504075610.img.png/1712939520627/ |
125 KB 126 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig08-established-c2-session-packet-with-credential.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_429462719.img.png/1712939537600/ |
102 KB 104 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig09-exploit-packet.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_618234054.img.png/1712939550759/ |
29 KB 30 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig10-script-file-bins-sh.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_578031186.img.png/1712939568856/ |
60 KB 61 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig11-initial-connection-message-concatenation.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_741222763.img.png/1712939586806/ |
32 KB 33 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig12-c2-server-connection.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_806509797.img.png/1712939608532/ |
165 KB 166 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig13-hand-coded-commands.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1187360097.img.png/1712939624947/ |
40 KB 41 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig14-exploit-packet.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1706601208.img.png/1712939639369/ |
20 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig15-script-file-1-sh.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_925191786.img.png/1712939653956/ |
60 KB 61 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig16-moobot-c2-session.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_522897434.img.png/1712939669144/ |
173 KB 175 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig17-assembly-code-for-ddos-method.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_58423568.img.png/1712939685897/ |
155 KB 156 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig18-exploit-packet.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1880189608.img.png/1712939699911/ |
64 KB 66 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig19-script-file-tenda-sh.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_702217218.img.png/1712939803574/ |
59 KB 60 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig20-upx-packed.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1418577685.img.png/1712939817232/ |
162 KB 164 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig21-packet-analysis-tool-list.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1199483276.img.png/1712939835861/ |
110 KB 112 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig22-c2-command-packets.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_906379190.img.png/1712939853456/ |
106 KB 107 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig23-exploit-packet.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_764362924.img.png/1712939866014/ |
38 KB 40 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig24-script-file-shk.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1974353489.img.png/1712939880657/ |
31 KB 32 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig25-hard-coded-username-password-list.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1912893580.img.png/1712939898456/ |
269 KB 271 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig26-c2-command-packets.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_925027603.img.png/1712939912492/ |
71 KB 72 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig27-exploit-packet.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_784346424.img.png/1712939926470/ |
58 KB 60 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig28-script-file-jack5tr-sh.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1326466419.img.png/1712939940424/ |
129 KB 131 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig29-c2-session.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1149565179.img.png/1712939956765/ |
139 KB 141 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig30-check-process.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_81153327.img.png/1712939971328/ |
122 KB 123 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig31-condi-attacking-methods.png
www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread/_jcr_content/root/responsivegrid/table_content/par/image_1332901227.img.png/1712939985115/ |
95 KB 97 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
otBannerSdk.js
cdn.cookielaw.org/scripttemplates/6.10.0/ |
356 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
en.json
cdn.cookielaw.org/consent/f85f39fc-d7aa-467a-b762-fbb722748016/4ee482d4-0cd8-4c59-918a-90483d5b8131/ |
100 KB 24 KB |
Fetch
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
www.fortinet.com/etc/designs/fortinet-blog/ |
318 B 2 KB |
Other
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
otCenterRounded.json
cdn.cookielaw.org/scripttemplates/6.10.0/assets/ |
9 KB 3 KB |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
otPcTab.json
cdn.cookielaw.org/scripttemplates/6.10.0/assets/v2/ |
45 KB 12 KB |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
launch-EN23cb8375449840dc93b13f34d935b8b9.min.js
assets.adobedtm.com/ |
493 KB 120 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AppMeasurement.min.js
assets.adobedtm.com/extensions/EPc7341b33570d4c988798fc9f0093d4b2/ |
35 KB 13 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AppMeasurement_Module_ActivityMap.min.js
assets.adobedtm.com/extensions/EPc7341b33570d4c988798fc9f0093d4b2/ |
3 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6si.min.js
j.6sc.co/ |
65 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
RC448863e9e05a4b4880daa4a5fb7da328-source.min.js
assets.adobedtm.com/b359cfb740b4/a792d4e6ffcd/cf461c22b737/ |
358 B 485 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
RC0ba76d5bbb984ea6a79cd6308c48dbff-source.min.js
assets.adobedtm.com/b359cfb740b4/a792d4e6ffcd/cf461c22b737/ |
2 KB 981 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
c.6sc.co/ |
7 B 194 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
ipv6.6sc.co/ |
14 B 300 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
optOutStatus
dpm.demdex.net/ |
41 B 542 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
details
epsilon.6sense.com/v3/company/ |
725 B 708 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
details
epsilon.6sense.com/v3/company/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
s26351098886453
metrics.fortinet.com/b/ss/fortinetincproduction/1/JS-2.26.0-LDQM/ Redirect Chain
|
43 B 248 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
68 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| OneTrustStub function| OptanonWrapper object| fortinet_blog object| EasyAutocomplete object| search_config object| keywords object| siteId object| lang object| options boolean| searchFired boolean| blogFilter string| documentsQuery string| blogCategories string| authorsList string| yearsList object| lastQuery number| totalReturn number| lastRow object| lastWordsForCounting function| htmlEncode function| hideAutoComplete function| sitesearch_init function| sitesearch_search_callback function| sitesearch_countall_callback function| sitesearch_do_search function| sitesearch_do_force_search function| sitesearch_spellcheck_callback function| sitesearch_do_spellcheck function| sitesearch_do_suggest_search function| sitesearch_query_searchresult_callback function| sitesearch_do_query_searchresult function| sitesearch_click_page_callback function| sitesearch_click_page function| search_action function| sitesearch_search_fortiguard function| count_facets_type function| shuffle_facets function| setImmediate function| clearImmediate function| $ function| jQuery string| OnetrustActiveGroups string| OptanonActiveGroups object| dataLayer object| otStubData object| Optanon object| OneTrust object| _satellite boolean| __satelliteLoaded object| adobe function| Visitor object| s_c_il number| s_c_in number| timer_e object| _6si function| AppMeasurement function| s_gi function| s_pgicq number| s_objectID number| s_giq function| AppMeasurement_Module_ActivityMap object| Sixsct object| t function| liberatedGetOptOut boolean| _storagePopulated object| s_i_fortinetincproduction object| targetGlobalSettings11 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.fortinet.com/ | Name: cookiesession1 Value: 678A3E13F6D39B2C2ED72B204234A992 |
|
www.fortinet.com/ | Name: AWSALB Value: yQ/aoiFowjTExmKLgNwcKTKa1cOFJqvN4RzBu8/sPA70xWvZEBuQvj77C4TNUAwayVjk+VyD9JdF4z/Ixnd+Rz6Vtnz+TGpBI9sCtBD8ZYPwrp/RlOZH1cbVAeaZ8cOaQSFoPM3axhpPEZDOvQQH3dw/GmKoZVZ7zwZBficiydDwozqCUJDi5d//Me5on34iYbDrSFUjib14lO8n95QRWw== |
|
www.fortinet.com/ | Name: AWSALBCORS Value: yQ/aoiFowjTExmKLgNwcKZmSzE++dLQ6WjVksvvBPvJ/x7wvUesj6Cs0eEeu3ahBVxDtuFabc1F8Bb1mq/WtGntRqLd75iQbKufY/6sy6X5mdcqaEJeyUI6oJWWSbtutoyA8+OSDy89J5HHkiMv9P6KFvz9U8XejddPk0GYfrnCMC8EZ4sZVJEB+LLXlIih2WmOnwwFRejPVo2Vm4N8MHg== |
|
.fortinet.com/ | Name: OptanonConsent Value: isIABGlobal=false&datestamp=Thu+Apr+18+2024+16%3A21%3A22+GMT%2B0200+(Mitteleurop%C3%A4ische+Sommerzeit)&version=6.10.0&hosts=&consentId=57bc00b3-efa8-4836-ac59-d262d3a5ba33&interactionCount=0&landingPath=https%3A%2F%2Fwww.fortinet.com%2Fblog%2Fthreat-research%2Fbotnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread&groups=C0001%3A1%2CC0002%3A0%2CC0003%3A0%2CC0004%3A0 |
|
www.fortinet.com/ | Name: aa_cc Value: DE |
|
www.fortinet.com/ | Name: aa_cn Value: DE |
|
.fortinet.com/ | Name: s_fid Value: 578043B96BA009B9-0D8B876F5B627889 |
|
.fortinet.com/ | Name: gpv_pn Value: www.fortinet.com%2Fblog%2Fthreat-research%2Fbotnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread |
|
.fortinet.com/ | Name: s_getNewRepeat Value: 1713450084292-New |
|
.fortinet.com/ | Name: s_cc Value: true |
|
.fortinet.com/ | Name: s_vi Value: [CS]v1|331096323EE81DE8-40001AFEE219300E[CE] |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | frame-ancestors 'self' https://www.fortinet.com |
Strict-Transport-Security | max-age=31536000; includeSubDomains |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.adobedtm.com
c.6sc.co
cdn.cookielaw.org
dpm.demdex.net
epsilon.6sense.com
geolocation.onetrust.com
ipv6.6sc.co
j.6sc.co
metrics.fortinet.com
www.fortinet.com
13.248.142.121
176.34.140.246
2606:4700:4400::6812:2089
2606:4700::6813:b134
2a02:26f0:480:983::1e80
2a02:26f0:7100::210:172
2a05:d014:f3c:6c02:209f:ae6c:3c6e:e3dd
63.140.62.222
95.101.75.185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