www.dfir.training
Open in
urlscan Pro
2400:cb00:2048:1::6812:2b35
Public Scan
Effective URL: https://www.dfir.training/resources/forensic-artifacts
Submission: On July 07 via manual from US
Summary
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on June 24th 2018. Valid for: 6 months.
This is the only time www.dfir.training was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2400:cb00:204... 2400:cb00:2048:1::6812:2a35 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
5 | 2400:cb00:204... 2400:cb00:2048:1::6812:2b35 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
2 | 209.197.3.15 209.197.3.15 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
7 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
www.dfir.training |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
www.dfir.training |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip0x00f.map2.ssl.hwcdn.net
maxcdn.bootstrapcdn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
dfir.training
1 redirects
www.dfir.training |
33 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
83 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
6 | www.dfir.training |
1 redirects
www.dfir.training
|
2 | maxcdn.bootstrapcdn.com |
www.dfir.training
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni179334.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-06-24 - 2018-12-31 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.dfir.training/resources/forensic-artifacts
Frame ID: 525E11E1CB5ED5C6736E052B5E82BAA5
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.dfir.training/resources/forensic-artifacts
HTTP 301
https://www.dfir.training/resources/forensic-artifacts Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /cloudflare/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+font-awesome(?:\.min)?\.css/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.dfir.training/resources/forensic-artifacts
HTTP 301
https://www.dfir.training/resources/forensic-artifacts Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
forensic-artifacts
www.dfir.training/resources/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.css
www.dfir.training/templates/haven/bootstrap/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cms.css
www.dfir.training/templates/haven/css/ |
41 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
theme.css
www.dfir.training/templates/haven/css/ |
129 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
www.dfir.training/templates/haven/css/ |
74 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/ |
75 KB 76 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.dfir.training/ | Name: 0a5a15c01db5c060d0ec4b6c8b774694 Value: f2a7peoi2402j6eirmv720ujf5 |
|
.dfir.training/ | Name: __cfduid Value: dc33b2b915592853321b50457b99ae92a1530990107 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
maxcdn.bootstrapcdn.com
www.dfir.training
209.197.3.15
2400:cb00:2048:1::6812:2a35
2400:cb00:2048:1::6812:2b35
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
8120d3eac7e4c2fda4fa2a94a0b0116180536bec6b41363f111a74e7d593ee3f
8aa04d66b4753ab045caa0c73eb0e5f6ef7fb72ce2297f5a099c653852eadddb
8cf94c6957c4eaad162bbf90038c642acd80263906ec039fb0d4c22ba6c9c20c
a0778a12ecb362c9903d1b5cd63e5f935c33bc31789b94e686e495739e41e4c1