www.robotattack.org
Open in
urlscan Pro
2a01:4f8:121:1ffe:1:1008:0:17e3
Public Scan
Effective URL: https://www.robotattack.org/
Submission: On December 05 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 25th 2022. Valid for: 3 months.
This is the only time www.robotattack.org was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 2a01:4f8:121:... 2a01:4f8:121:1ffe:1:1008:0:17e3 | 24940 (HETZNER-AS) (HETZNER-AS) | |
8 | 2 |
ASN24940 (HETZNER-AS, DE)
robotattack.org | |
www.robotattack.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
robotattack.org
1 redirects
robotattack.org www.robotattack.org |
16 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
4 | www.robotattack.org |
www.robotattack.org
|
1 | robotattack.org |
1 redirects
www.robotattack.org
|
8 | 2 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.robotattack.org R3 |
2022-10-25 - 2023-01-23 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.robotattack.org/
Frame ID: B7E028211A38C567FD623B6436EC4C57
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
The ROBOT Attack - Return of Bleichenbacher's Oracle ThreatPage URL History Show full URLs
-
https://robotattack.org/
HTTP 301
https://www.robotattack.org/ Page URL
Page Statistics
102 Outgoing links
These are links going to different origins than the main page.
Title: Hanno Böck
Search URL Search Domain Scan URL
Title: Juraj Somorovsky
Search URL Search Domain Scan URL
Title: Hackmanit GmbH
Search URL Search Domain Scan URL
Title: Craig Young
Search URL Search Domain Scan URL
Title: Tripwire VERT
Search URL Search Domain Scan URL
Title: published at the Usenix Security conference
Search URL Search Domain Scan URL
Title: published at the Cryptology ePrint Archive
Search URL Search Domain Scan URL
Title: Pwnie award
Search URL Search Domain Scan URL
Title: ROBOT presentation at RuhrSec 2018
Search URL Search Domain Scan URL
Title: ROBOT presentation at BornHack 2018
Search URL Search Domain Scan URL
Title: ROBOT presentation at USENIX Security 2018
Search URL Search Domain Scan URL
Title: python tool to scan for vulnerable hosts
Search URL Search Domain Scan URL
Title: SSL Labs test
Search URL Search Domain Scan URL
Title: BIG-IP SSL vulnerability
Search URL Search Domain Scan URL
Title: CVE-2017-6168
Search URL Search Domain Scan URL
Title: TLS Padding Oracle Vulnerability in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway
Search URL Search Domain Scan URL
Title: CVE-2017-17382
Search URL Search Domain Scan URL
Title: Security Advisory: Adaptive chosen-ciphertext attack vulnerability
Search URL Search Domain Scan URL
Title: CVE-2017-17427
Search URL Search Domain Scan URL
Title: Bleichenbacher Attack on TLS Affecting Cisco Products
Search URL Search Domain Scan URL
Title: End-of-Sale and End-of-Life
Search URL Search Domain Scan URL
Title: CVE-2017-17428
Search URL Search Domain Scan URL
Title: CVE-2017-12373
Search URL Search Domain Scan URL
Title: 1.59 beta 9
Search URL Search Domain Scan URL
Title: Patch / Commit
Search URL Search Domain Scan URL
Title: CVE-2017-13098
Search URL Search Domain Scan URL
Title: OTP 18.3.4.7
Search URL Search Domain Scan URL
Title: OTP 19.3.6.4
Search URL Search Domain Scan URL
Title: OTP 20.1.7
Search URL Search Domain Scan URL
Title: CVE-2017-1000385
Search URL Search Domain Scan URL
Title: Github PR / patch
Search URL Search Domain Scan URL
Title: CVE-2017-13099
Search URL Search Domain Scan URL
Title: PAN-OS exposure to ROBOT attack
Search URL Search Domain Scan URL
Title: Advisory (fixed in PAN-OS 7.1.15, 8.0.7)
Search URL Search Domain Scan URL
Title: CVE-2017-17841
Search URL Search Domain Scan URL
Title: IBM i is affected by GSKIT vulnerability
Search URL Search Domain Scan URL
Title: Information disclosure in IBM HTTP Server
Search URL Search Domain Scan URL
Title: WebSphere MQ is vulnerable to disclosing side channel information via discrepencies between valid and invalid PKCS#1 padding
Search URL Search Domain Scan URL
Title: CVE-2018-1388
Search URL Search Domain Scan URL
Title: MCP TLS susceptible to ROBOT attack
Search URL Search Domain Scan URL
Title: CVE-2018-5762
Search URL Search Domain Scan URL
Title: SA160: Return of the Bleichenbacher Oracle Threat (ROBOT)
Search URL Search Domain Scan URL
Title: CVE-2017-18268
Search URL Search Domain Scan URL
Title: CVE-2017-15533
Search URL Search Domain Scan URL
Title: Cavium Secutiy Advisory
Search URL Search Domain Scan URL
Title: PSIRT Advisory FG-IR-17-302
Search URL Search Domain Scan URL
Title: CVE-2018-9192
Search URL Search Domain Scan URL
Title: CVE-2018-9194
Search URL Search Domain Scan URL
Title: Inconsistencies in answers to RSA errors (possiby Bleichenbacher/ROBOT attack)
Search URL Search Domain Scan URL
Title: Changes in 3.8.3
Search URL Search Domain Scan URL
Title: CVE-2016-6883
Search URL Search Domain Scan URL
Title: Oracle Critical Patch Update Advisory - October 2012
Search URL Search Domain Scan URL
Title: CVE-2012-5081
Search URL Search Domain Scan URL
Title: Aruba Product Security Advisory ARUBA-PSA-2018-002
Search URL Search Domain Scan URL
Title: Bouncy Castle Weak Oracle (CVE-2017-13098)
Search URL Search Domain Scan URL
Title: section on Bleichenbacher countermeasures in the latest TLS 1.2 standard (7.4.7.1)
Search URL Search Domain Scan URL
Title: DROWN
Search URL Search Domain Scan URL
Title: OpenSSL here
Search URL Search Domain Scan URL
Title: NSS here
Search URL Search Domain Scan URL
Title: PKCS #1 v2.2
Search URL Search Domain Scan URL
Title: different
Search URL Search Domain Scan URL
Title: reasons
Search URL Search Domain Scan URL
Title: XML Encryption
Search URL Search Domain Scan URL
Title: PKCS#11 interfaces
Search URL Search Domain Scan URL
Title: Javascript Object Signing and Encryption (JOSE)
Search URL Search Domain Scan URL
Title: Cryptographic Message Syntax / S/MIME
Search URL Search Domain Scan URL
Title: discovered by Daniel Bleichenbacher in 1998
Search URL Search Domain Scan URL
Title: improved the attack and discovered the bad-version oracle in 2003
Search URL Search Domain Scan URL
Title: Christopher Meyer and others discovered Bleichenbacher vulnerabilities in JSSE and other products
Search URL Search Domain Scan URL
Title: it is possible to use a cross-protocol Bleichenbacher attack against TLS 1.3 and QUIC
Search URL Search Domain Scan URL
Title: testssl.sh
Search URL Search Domain Scan URL
Title: snapshot is available
Search URL Search Domain Scan URL
Title: TLS-Attacker
Search URL Search Domain Scan URL
Title: version 2.2 was extended with additional checks to cover all ROBOT variations
Search URL Search Domain Scan URL
Title: SSLLabs
Search URL Search Domain Scan URL
Title: Tripwire IP360
Search URL Search Domain Scan URL
Title: tlsfuzzer
Search URL Search Domain Scan URL
Title: SSLyze
Search URL Search Domain Scan URL
Title: support for ROBOT detection
Search URL Search Domain Scan URL
Title: ROBOT CTF
Search URL Search Domain Scan URL
Title: The Register: F5 DROWNing, not waving, in crypto fail
Search URL Search Domain Scan URL
Title: Golem.de: ROBOT-Angriff - 19 Jahre alter Angriff auf TLS funktioniert immer noch
Search URL Search Domain Scan URL
Title: Forbes: 'ROBOT Attack' Exposed Facebook With 19-Year-Old Bug -- Massive Websites Still Vulnerable
Search URL Search Domain Scan URL
Title: Ars Technica: 1998 attack that messes with sites’ secret crypto keys is back in a big way
Search URL Search Domain Scan URL
Title: The Hacker News: ROBOT Attack: 19-Year-Old Bleichenbacher Attack On Encrypted Web Reintroduced
Search URL Search Domain Scan URL
Title: The Register: I, Robot? Aiiiee, ROBOT! RSA TLS crypto attack pwns Facebook, PayPal, 27 of 100 top domains
Search URL Search Domain Scan URL
Title: Security Affairs: ROBOT Attack: RSA TLS crypto attack worked against Facebook, PayPal, and tens of 100 top domains
Search URL Search Domain Scan URL
Title: Bleeping Computer: Variation of 19-Year-Old Cryptographic Attack Affects Facebook, PayPal, Others
Search URL Search Domain Scan URL
Title: ThreatPost: 19-Year-Old TLS Vulnerability Weakens Modern Website Crypto
Search URL Search Domain Scan URL
Title: SC Magazine: TLS exploit 'ROBOT' capitalizes on 19-year-old vulnerability; vendors issue patch
Search URL Search Domain Scan URL
Title: heise: ROBOT-Attacke: TLS-Angriff von 1998 funktioniert immer noch
Search URL Search Domain Scan URL
Title: digi.no: Gammel kryptosårbarhet er tilbake. Facebook blant de berørte
Search URL Search Domain Scan URL
Title: TripWire / The State of Security: VERT Threat Alert: Return of Bleichenbacher’s Oracle Threat (ROBOT)
Search URL Search Domain Scan URL
Title: Cryptosense: Bleichenbacher is Back – Again
Search URL Search Domain Scan URL
Title: Trustzone: The ROBOT attack: RSA Encryptoin is vulnerable
Search URL Search Domain Scan URL
Title: Kudelski Security / JP Aumasson: Algorithms can't be patched
Search URL Search Domain Scan URL
Title: Hubert Kario / Red Hat: Detecting ROBOT and other vulnerabilities using Red Hat testing tools
Search URL Search Domain Scan URL
Title: CERT/CC: Vulnerability Note VU#144389
Search URL Search Domain Scan URL
Title: TLS mailing list, Colm MacCárthaigh (Amazon s2n): A closer look at ROBOT, BB Attacks, timing attacks in general, and what we can do in TLS
Search URL Search Domain Scan URL
Title: Sarah Madden
Search URL Search Domain Scan URL
Title: Corkami
Search URL Search Domain Scan URL
Title: CC0
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://robotattack.org/
HTTP 301
https://www.robotattack.org/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.robotattack.org/ Redirect Chain
|
29 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
robot.css
www.robotattack.org/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontlocal.css
www.robotattack.org/ |
1 KB 353 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
robot.svg
www.robotattack.org/ |
8 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
montserrat-v12-latin-700.woff2
robotattack.org/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
open-sans-v15-latin-700.woff2
robotattack.org/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
open-sans-v15-latin-regular.woff2
robotattack.org/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
open-sans-v15-latin-600.woff2
robotattack.org/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- robotattack.org
- URL
- https://robotattack.org/fonts/montserrat-v12-latin-700.woff2
- Domain
- robotattack.org
- URL
- https://robotattack.org/fonts/open-sans-v15-latin-700.woff2
- Domain
- robotattack.org
- URL
- https://robotattack.org/fonts/open-sans-v15-latin-regular.woff2
- Domain
- robotattack.org
- URL
- https://robotattack.org/fonts/open-sans-v15-latin-600.woff2
Verdicts & Comments Add Verdict or Comment
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | block-all-mixed-content;default-src 'self' https://robotattack.org; |
Strict-Transport-Security | max-age=63072000;includeSubDomains |
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
robotattack.org
www.robotattack.org
robotattack.org
2a01:4f8:121:1ffe:1:1008:0:17e3
9d53f7c2ee76eab600494f4584becd6a7b524e30cf25170f272a0642de9037b5
a0a5dec4cb49e3e68bf046ce2fb49b36f0a59e0e7bc9947de06da539bf84a79b
a55c9761dbd487924612d2cb146ddf5896c2e1c9b5e9f9cea971e887b0c88740
e21476b1a798641ed868a39cdf137f2a61e2144b0bb5f937ec3f441f71db8e50