cloudbrothers.info
Open in
urlscan Pro
2a02:c206:3006:6536::1
Public Scan
Submission: On September 23 via manual from MX — Scanned from DE
Summary
TLS certificate: Issued by R3 on August 1st 2022. Valid for: 3 months.
This is the only time cloudbrothers.info was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
24 | 2a02:c206:300... 2a02:c206:3006:6536::1 | 51167 (CONTABO) (CONTABO) | |
24 | 1 |
ASN51167 (CONTABO, DE)
cloudbrothers.info | |
plausible.cloudbrothers.info |
Apex Domain Subdomains |
Transfer | |
---|---|---|
24 |
cloudbrothers.info
cloudbrothers.info plausible.cloudbrothers.info |
636 KB |
24 | 1 |
Domain | Requested by | |
---|---|---|
22 | cloudbrothers.info |
cloudbrothers.info
|
2 | plausible.cloudbrothers.info |
cloudbrothers.info
plausible.cloudbrothers.info |
24 | 2 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cloudbrothers.info R3 |
2022-08-01 - 2022-10-30 |
3 months | crt.sh |
plausible.cloudbrothers.info R3 |
2022-07-31 - 2022-10-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cloudbrothers.info/azure-attack-paths/
Frame ID: 317AD057D13682890C2D8A5E3128CDA5
Requests: 24 HTTP requests in this frame
Screenshot
Page Title
Azure Attack Paths - CloudbrothersDetected technologies
animate.css (Web Frameworks) ExpandDetected patterns
- <link [^>]+(?:/([\d.]+)/)?animate\.(?:min\.)?css
Clipboard.js (Miscellaneous) Expand
Detected patterns
- clipboard(?:-([\d.]+))?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
103 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: attackers
Search URL Search Domain Scan URL
Title: real world
Search URL Search Domain Scan URL
Title: properties
Search URL Search Domain Scan URL
Title: User Access Administrator
Search URL Search Domain Scan URL
Title: Azure RBAC
Search URL Search Domain Scan URL
Title: Directory Activity
Search URL Search Domain Scan URL
Title: @cbrhh
Search URL Search Domain Scan URL
Title: out
Search URL Search Domain Scan URL
Title: article
Search URL Search Domain Scan URL
Title: https://security.microsoft.com/cloudapps/activity-log?service=eq(i:12260,)&activity.eventType=eq(12260:EVENT_AZURE_GENERIC:Microsoft.Authorization%252FelevateAccess%252Faction,)&source=eq(t:2,)&activityObject=eq(%252Fproviders%252FMicrosoft.Authorization,)
Search URL Search Domain Scan URL
Title: https://portal.cloudappsecurity.com/#/audits?service=eq(i:12260,)&activity.eventType=eq(12260:EVENT_AZURE_GENERIC:Microsoft.Authorization%2FelevateAccess%2Faction,)&source=eq(t:2,)&activityObject=eq(%2Fproviders%2FMicrosoft.Authorization,)
Search URL Search Domain Scan URL
Title: Keys of the kingdom: Playing God as Global Admin
Search URL Search Domain Scan URL
Title: @DrAzureAD
Search URL Search Domain Scan URL
Title: @samilamppu
Search URL Search Domain Scan URL
Title: Elevate access to manage all Azure subscriptions and management groups
Search URL Search Domain Scan URL
Title: Virtual Machine Contributor
Search URL Search Domain Scan URL
Title: Configure Azure Activity logs to stream to specified Log Analytics workspace
Search URL Search Domain Scan URL
Title: Azure VM Run Command operations executing a unique PowerShell script
Search URL Search Domain Scan URL
Title: Azure VM Run Command executed from Azure IP address
Search URL Search Domain Scan URL
Title: Keys of the kingdom: Playing God as Global Admin
Search URL Search Domain Scan URL
Title: Lateral Movement With Managed Identities Of Azure Virtual Machines
Search URL Search Domain Scan URL
Title: @DebugPrivilege
Search URL Search Domain Scan URL
Title: Run scripts in your Windows VM by using action Run Commands
Search URL Search Domain Scan URL
Title: Azure Lighthouse
Search URL Search Domain Scan URL
Title: can’t use
Search URL Search Domain Scan URL
Title: DataActions
Search URL Search Domain Scan URL
Title: Azure Policy
Search URL Search Domain Scan URL
Title: Azure Portal
Search URL Search Domain Scan URL
Title: Azure Portal
Search URL Search Domain Scan URL
Title: Role support for Azure Lighthouse
Search URL Search Domain Scan URL
Title: Recommended security practices
Search URL Search Domain Scan URL
Title: Securing Azure Lighthouse with Azure Policy and Azure Privileged Identity Management for MSP’s and customers
Search URL Search Domain Scan URL
Title: delegated administrative privileges
Search URL Search Domain Scan URL
Title: Cloud Solution Providers (CSP)
Search URL Search Domain Scan URL
Title: granular delegated admin privileges (GDAP)
Search URL Search Domain Scan URL
Title: Microsoft Admin Center
Search URL Search Domain Scan URL
Title: Microsoft recommends
Search URL Search Domain Scan URL
Title: Microsoft partners: The Good, The Bad, or The Ugly?
Search URL Search Domain Scan URL
Title: Managed Identities
Search URL Search Domain Scan URL
Title: system or user-assigned managed identities
Search URL Search Domain Scan URL
Title: Azure AD - Enterprise applications
Search URL Search Domain Scan URL
Title: Detecting privilege escalation with Azure AD service principals in Microsoft Sentinel
Search URL Search Domain Scan URL
Title: @reprise_99
Search URL Search Domain Scan URL
Title: application management
Search URL Search Domain Scan URL
Title: permissions
Search URL Search Domain Scan URL
Title: AppRoleAssignment.ReadWrite.All
Search URL Search Domain Scan URL
Title: RoleManagement.ReadWrite.Directory
Search URL Search Domain Scan URL
Title: AuditAppRoles.ps1
Search URL Search Domain Scan URL
Title: Andy Robbins
Search URL Search Domain Scan URL
Title: Unusual addition of credentials to an OAuth app
Search URL Search Domain Scan URL
Title: Azure Privilege Escalation via Azure API Permissions Abuse
Search URL Search Domain Scan URL
Title: @_wald0
Search URL Search Domain Scan URL
Title: Everything About Service Principals, Applications, And API Permissions
Search URL Search Domain Scan URL
Title: Azure AD privilege escalation - Taking over default application permissions as Application Admin
Search URL Search Domain Scan URL
Title: @_dirkjan
Search URL Search Domain Scan URL
Title: Detect and Remediate Illicit Consent Grants
Search URL Search Domain Scan URL
Title: Delegate app registration permissions in Azure Active Directory
Search URL Search Domain Scan URL
Title: OAuth app policies
Search URL Search Domain Scan URL
Title: Tutorial: Investigate and remediate risky OAuth apps
Search URL Search Domain Scan URL
Title: Azure Privilege Escalation via Service Principal Abuse
Search URL Search Domain Scan URL
Title: HOWTO: Set an alert to notify when an additional person is assigned the Azure AD Global Administrator role
Search URL Search Domain Scan URL
Title: @SanderBerkouwer
Search URL Search Domain Scan URL
Title: Password reset permissions
Search URL Search Domain Scan URL
Title: Privileged Role Administrator
Search URL Search Domain Scan URL
Title: security defaults
Search URL Search Domain Scan URL
Title: Unnoticed sidekick: Getting access to cloud as an on-prem admin
Search URL Search Domain Scan URL
Title: Decrypting ADSync passwords - my journey into DPAPI
Search URL Search Domain Scan URL
Title: Shooting Up: On-Prem to Cloud — Detecting “AADConnect” Creds Dump
Search URL Search Domain Scan URL
Title: @kirtar_oza
Search URL Search Domain Scan URL
Title: Abuse of Azure AD Connect Sync Service Account
Search URL Search Domain Scan URL
Title: @Thomas_Live
Search URL Search Domain Scan URL
Title: Harden your Azure AD Connect server
Search URL Search Domain Scan URL
Title: Azure Active Directory Connect Installation with Granular Permissions
Search URL Search Domain Scan URL
Title: @tobrz
Search URL Search Domain Scan URL
Title: Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps
Search URL Search Domain Scan URL
Title: @shakreiner
Search URL Search Domain Scan URL
Title: Making the Case for 30-day Token-signing and Token-decrypting Certificates in AD FS
Search URL Search Domain Scan URL
Title: Backdoor Office 365 and Active Directory - Golden SAML
Search URL Search Domain Scan URL
Title: @inversecos
Search URL Search Domain Scan URL
Title: ADFSpoof
Search URL Search Domain Scan URL
Title: @doughsec
Search URL Search Domain Scan URL
Title: Detection And Hunting Of Golden SAML Attack
Search URL Search Domain Scan URL
Title: Azure Persistence with Desired State Configurations
Search URL Search Domain Scan URL
Title: @jakekarnes42
Search URL Search Domain Scan URL
Title: Azure Automation State Configuration overview
Search URL Search Domain Scan URL
Title: How to create custom guest configuration package artifacts
Search URL Search Domain Scan URL
Title: Abusing Azure Hybrid Workers for Privilege Escalation – Part 1
Search URL Search Domain Scan URL
Title: @kfosaaen
Search URL Search Domain Scan URL
Title: How to create an Azure Automation Run As account
Search URL Search Domain Scan URL
Title: Limit Run As account permissions
Search URL Search Domain Scan URL
Title: Security roadmap - Top priorities for the first 30 days, 90 days, and beyond
Search URL Search Domain Scan URL
Title: session on YouTube
Search URL Search Domain Scan URL
Title: Security rapid modernization plan
Search URL Search Domain Scan URL
Title: Securing privileged access
Search URL Search Domain Scan URL
Title: AAD Internals
Search URL Search Domain Scan URL
Title: GitHub
Search URL Search Domain Scan URL
Title: PowerShell gallery
Search URL Search Domain Scan URL
Title: Bloodhound
Search URL Search Domain Scan URL
Title: November of 2020
Search URL Search Domain Scan URL
Title: March of 2022
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
24 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
cloudbrothers.info/azure-attack-paths/ |
111 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
normalize.min.css
cloudbrothers.info/lib/normalize/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.min.css
cloudbrothers.info/css/ |
67 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.css
cloudbrothers.info/lib/fontawesome-free/ |
57 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
animate.min.css
cloudbrothers.info/lib/animate/ |
57 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
plausible.outbound-links.js
plausible.cloudbrothers.info/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading.min.svg
cloudbrothers.info/svg/ |
482 B 990 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lightgallery.min.css
cloudbrothers.info/lib/lightgallery/ |
20 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
smooth-scroll.min.js
cloudbrothers.info/lib/smooth-scroll/ |
5 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
autocomplete.min.js
cloudbrothers.info/lib/autocomplete/ |
56 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lunr.min.js
cloudbrothers.info/lib/lunr/ |
29 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lunr.stemmer.support.min.js
cloudbrothers.info/lib/lunr/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lunr.de.min.js
cloudbrothers.info/lib/lunr/ |
6 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lazysizes.min.js
cloudbrothers.info/lib/lazysizes/ |
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lightgallery.min.js
cloudbrothers.info/lib/lightgallery/ |
25 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lg-thumbnail.min.js
cloudbrothers.info/lib/lightgallery/ |
9 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lg-zoom.min.js
cloudbrothers.info/lib/lightgallery/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
clipboard.min.js
cloudbrothers.info/lib/clipboard/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
theme.min.js
cloudbrothers.info/js/ |
22 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-brands-400.woff2
cloudbrothers.info/lib/webfonts/ |
75 KB 75 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-solid-900.woff2
cloudbrothers.info/lib/webfonts/ |
78 KB 78 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-regular-400.woff2
cloudbrothers.info/lib/webfonts/ |
13 KB 14 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
event
plausible.cloudbrothers.info/api/ |
2 B 233 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AzureDominancePathsColor.png
cloudbrothers.info/azure-attack-paths/images/ |
330 KB 331 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
38 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| SmoothScroll function| autocomplete function| lunr object| lazySizes object| utils object| lgData object| lgModules function| lightGallery object| Lightgallery object| LgThumbnail object| LgZoom function| ClipboardJS object| config function| _objectDestructuringEmpty function| _createForOfIteratorHelper function| _toConsumableArray function| _nonIterableSpread function| _unsupportedIterableToArray function| _iterableToArray function| _arrayWithoutHoles function| _arrayLikeToArray function| _classCallCheck function| _defineProperties function| _createClass function| Util function| Theme function| themeInit number| _zid function| plausible0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | default-src 'self'; script-src 'self' 'unsafe-inline' https://plausible.cloudbrothers.info/js/plausible.outbound-links.js; style-src 'self' 'unsafe-inline'; object-src 'none'; base-uri 'self'; connect-src 'self' https://plausible.cloudbrothers.info; font-src 'self'; frame-src 'self' https://www.youtube-nocookie.com; img-src 'self'; manifest-src 'self'; media-src 'self'; worker-src 'none' |
Strict-Transport-Security | max-age=63072000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cloudbrothers.info
plausible.cloudbrothers.info
2a02:c206:3006:6536::1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